Keywords: WLAN, IEEE g, VPN, OpenVPV, Security.
|
|
|
- Mary Mills
- 10 years ago
- Views:
Transcription
1 Volume 4, Issue 2, February 2014 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Wireless LAN Security : IEEE g & VPN Abu Taha Zamani, Javed Ahmad Research Scholar, Techno Global University, Shillong, Meghalaya, India Abstract: g is an exciting new technology that offers additional performance, while providing investment protection for b clients through backward compatibility. By using previous technologies and economies of scale, g devices are available at little or no additional cost relative to b. As such, there are many reasons to begin migrating from b to g g is not, however, a panacea for WLAN capacity issues. As WLAN capacity needs increase, network professionals are well-advised to begin deploying a dual-band infrastructure to access the far greater capacity available with a. As such, g should be viewed as a portion of an overall WLAN architecture, not a substitute for a g is a "bridge" technology and an ideal means for migrating from low-capacity b networks to the high-capacity, dual-band WLANs of the very near future. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. This paper presents an approach to secure IEEE g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE g WLAN. Keywords: WLAN, IEEE g, VPN, OpenVPV, Security. 1. INTRODUCTION The IEEE g WLAN standard can be thought of as an intersection between the b and a standards. Like b, g operates in the same 2.4-GHz portion of the radio frequency spectrum that allows for license-free operation on a nearly worldwide basis g is also limited to the same three non-overlapping channels as b. An important mandatory requirement of g is full backward compatibility with b, which both provides investment protection for the installed base of b clients and extracts a substantial performance penalty when operating in this mode. Like a, g uses Orthogonal Frequency Division Multiplexing (OFDM) for transmitting data. OFDM is a more efficient means of transmission than Direct Sequence Spread Spectrum (DSSS) transmission, which is used by b. When coupled with various modulation types, g (like a) is capable of supporting much higher data rates than b. As noted in Table 1, g uses a combination of OFDM and DSSS transmission to support a large set of data rates-in fact, all of the data rates supported by both a and b. These security issues are of great concern for this technology as it is being subjected to numerous attacks [3], [4], and [5]. The most common attacks on wireless LANs are unwanted or automatic connection to the wrong network, man-in-themiddle attack with a fake Access Point (AP), theft of information by illegal tapping of the network, intrusion from open air, scrambling of the WLAN and consumption of device batteries. The Wired Equivalent Privacy (WEP) is a standard security mechanism for IEEE g WLAN. When it was introduced, it was considered as a secured algorithm. But later it was found that it can be cracked easily [3], [6], [7], and [8]. VPN technology has been used successfully to securely transmit data in wired networks especially when using Internet as the medium. This success of VPN in wired networks and the inherent security limitations of wireless networks have prompted developers and administrators to deploy it in case of wireless networks. A VPN works by creating a tunnel, on top of a protocol such as IP. In this paper we evaluated the impact of OpenVPN [9], transport layer VPN solution, on performance of IEEE g WLAN. 2. WIRELESS LAN STANDARDS The IEEE is a set of standards for wireless local area network (WLAN) computer communications in the 2.4, 3.6 and 5 GHz frequency bands [11]. The a, b, and g standards are the most common for home wireless access points and large business wireless systems. The a is faster than b with a data transfer rates up to 54Mbps. As compare to b it can support more simultaneous connections and suffers less interference as it operates in 5GHz frequency band. However, among the three standards a has shortest range. The b works in 2.4 GHz frequency band and support maximum transfer rate of 11Mbps. As compare to a it uses less expensive hardware and better in penetrating physical barriers. It is more susceptible to interference as its working frequency is used by many electronic appliances. The g operates in 2.4GHz frequency band with maximum transfer rate of 54Mbps and have 2014, IJARCSSE All Rights Reserved Page 523
2 backward compatibility with b. Being operated in the 2.4GHz it also susceptible to interference. In practical scenario distance coverage by g is better than a but slightly less than b. These WLAN standards are summarized in the Table WIRED EQUIVALENT PRIVACY (WEP) The WEP is a privacy protocol specified in IEEE to protect the link data transmitted in WLAN. It refers to the intent to provide a privacy service to wireless LAN users similar to that provided by the physical security inherent in a wired LAN. The WEP encryption uses the RC4 symmetric stream cipher with 40-bit and 104-bit encryption keys. Although 104-bit encryption keys are not specified in the standard, many wireless AP vendors support them Security Issues with WEP Security researchers have discovered potential attacks that let malicious users compromise the security of WLAN that use WEP [5], [7]. The following is a list of such attacks: Passive attacks to decrypt traffic, based on statistical analysis. Active attacks to inject new traffic from unauthorized mobile stations, based on known plaintext. Active attacks to decrypt traffic, based on tricking the access point. Dictionary-building attacks, after analyzing enough traffic on a busy network. WEP has been widely criticized for a number of weaknesses [6], [8]: WEP is vulnerable because of relatively short IVs and keys. Authentication messages can be easily forged. Reuse Problem: Stream ciphers are vulnerable to analysis when the key stream is reused. Integrity Check value Insecurity: WEP uses a CRC for the integrity check. Although the value of the integrity check is encrypted by the RC4 key stream, CRCs are not cryptographically secure. Use of a weak integrity check does not prevent determined attackers from transparently modifying frames. Key Management: The WEP standard does not define any key-management protocol and resumes that secret keys are distributed to the wireless nodes by an external key management service Tools available for attacking WLAN The various popular tools for attacking the WLAN are listed in Table 2. Table 2. Tools for Attacking WLAN. TOOLS Operating System Description Aircrack [13] Linux/Windows It is a WEP key cracking program for use on networks. The primary purpose for the program is to recover the unknown WEP key once enough data is captured. Airpwn [14] Linux It is a tool for generic packet injection on an network. Airsnarf [15] Linux It is a simple rogue wireless access point setup utility to steal usernames and passwords from public Wi-Fi hotspots. BSD-Airtools [16] Linux It contains a bsd-based wep cracking application, called dweputils. It also contains a AP detection application similar to netstumbler (dstumbler) that can be used to detect wireless access points and connected nodes, view signal to noise graphs etc. Dsniff [17] Linux It is counterpart of NetStumbler Dstumbler [18] FreeBSD It is counterpart of NetStumbler Fake AP [19] Linux It generates thousands of counterfeit WLAN access points. KisMAC [20] MacOS It is a free stumble application for MacOS X. It puts network card into the monitor mode, completely invisible and send no probe requests. 2014, IJARCSSE All Rights Reserved Page 524
3 Kismet [21] Linux It passively monitors wireless traffic and dissects frames to identify SSIDs, MAC addresses, channels and connection speeds. MacIdChanger Windows It is a MAC address spoofing tool. This is generally used to [22] conceal the unique MAC id that is on every network adapter. MacStumbler [23] MacOS It is a utility to display information about nearby b and g wireless access points. Netstumbler [24] Windows It is a wireless access point identifier running on Windows. Wep0ff [25] Linux/Windows It is a tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. WEPCrack [26] Linux It is a tool that cracks WEP encryption keys by exploiting the weaknesses of RC4 key scheduling. WEPWedgie [27] Linux It is a toolkit for determining WEP keystreams and injecting traffic with known keystreams. The toolkit also includes logic for firewall rule mapping, ping scanning, and port scanning via the injection channel and a cellular modem. Wifitap [28] Linux It allows users to connect to wifi networks using traffic injection. 4. VIRTUAL PRIVATE NETWORK (VPN) VPN technology provides the means to securely transmit data between two network devices over an insecure data transport medium.vpn technology has been used successfully in wired networks especially when using Internet as the medium. This success of VPN in wired networks and the inherent security limitations of wireless networks have prompted developers and administrators to deploy it in case of wireless networks. A VPN works by creating a tunnel, on top of a protocol such as IP. VPN technology provides three levels of security: Confidentiality: To provide the security against the loss of confidentiality, VPN provides a secure tunnel on top of inherently un-secure medium like the Internet. The data is encrypted before passing through the tunnel which provides another level of data confidentiality. If an attacker manages to get into the tunnel and intercepts the data, that attacker will only get encrypted data. Integrity: VPN uses integrity check mechanism such as hashing, message authentication code or digital signature to protect against the modification of data. It guarantees that all traffic is from authenticated devices thus implying data integrity. Origin Authentication: VPN provides mechanism for origin authentication by using cryptographic mechanism such as message authentication code or digital signature. Replay Protection: VPN also provides security against replay attack by using sliding window mechanism Need for VPN in Wireless Networks The WLAN did not focus on security as a primary requirement. Generally the main focuses were on connectivity, throughput and other architectural and functional issues. As compared to wired networking the wireless networking is inherently more prone to attacks and less secure. Physical boundary for a wireless network cannot be confined. Although WEP is an existing security mechanism for WLAN, researchers have found many vulnerabilities in it. The WEP is also subjected to numerous attacks. These security issues of WLAN, lead the researchers, vendors and analysts to look for a solution to prevent these attacks. The tunneling of data using VPN technology is a widely agreed robust protection against many threats and attacks. 5. OPENVPN The OpenVPN is free and open source user space VPN solution which tunnels the traffic through transport layer using TCP or UDP protocol for encapsulation and transfer of data. It uses virtual network interface (VNI) for capturing incoming traffic before encryption and sending outgoing traffic after decryption. Security in OpenVPN is handled by the OpenSSL [12] cryptographic library which provides strong security over Secure Socket Layer (SSL) using standard algorithms such as Advanced Encryption Standard (AES), Blowfish, or Triple DES (3DES). The OpenVPN uses a mode called Cipher Block Chaining (CBC) which makes the cipher text of the current block dependent on the cipher text of the previous block. This prevents an attacker from seeing patterns between blocks with identical plaintext messages and manipulating one or more of these blocks. The VNI appears as actual network interface to all applications and users. Packets of incoming traffic sent via a VNI are delivered to a user-space program attached to the VNI. A user-space program may also pass packets into a VNI. In this case the VNI injects these packets to the operating system network stack to sends it to the location mentioned in destination address field of the packets. The TUN and TAP are open source VNI. The TAP simulates an Ethernet device and it operates with layer 2 packets such as Ethernet frames. The TUN simulates a network layer device and it operates with layer 3 packets such as IP packets [29, 30] In Figure 1, the working of OpenVPN is explained and in Figure 2, the data flow in OpenVPN environment is shown. 2014, IJARCSSE All Rights Reserved Page 525
4 Figure 1. OpenVPN Tunnel between two end points. Figure 2. OpenVPN Data Flow The OpenVPN performs the following to secure the communications: Receives the packets of outgoing plain traffic from user space program by using the VNI. After receiving the packets, it compresses the received packets using Lempel-Ziv-Oberhumer (LZO) compression. After compression, it encrypts the packets using OpenSSL cryptographic library. For our experimentation we are using AES-128. OpenVPN also applies sliding window method to provide replay protection. Then it tunnels the packet using UDP or TCP protocol to the other end. On receiving the encrypted traffic at other end, the OpenVPN performs the reverse of cryptographic operations to verify integrity, authenticity etc. After successful completion of reverse cryptographic operations, it decompresses the packet. The decompressed packet is then passed via VNI to the user space program OpenVPN Cryptographic Operation OpenVPN uses a security model designed to protect against both passive and active attacks. OpenVPN security model is based on using SSL/TLS for session authentication and the IPSec ESP protocol for secure tunnel transport over UDP. OpenVPN uses the X509 PKI (public key infrastructure) for session authentication. OpenVPN uses TLS protocol for cryptographic key exchange. OpenVPN uses two factor authentication for authenticate the clients. OpenVPN uses OpenSSL cipher-independent EVP, an OpenSSL API that provides high-level interface to cryptographic functions, for encrypting tunnel data. OpenVPN uses HMAC-SHA1 algorithm for authenticating tunnel data Overcoming WEP vulnerabilities In Table 3 shows how OpenVPN overcomes the WEP vulnerabilities by comparing it with WEP on various parameters. Table 3. OpenVPN Comparison with WEP. Parameter WEP OpenVPN Remark Initialization 24 bit (Too small) Cipher dependent and equal OpenVPN solves the IV Vector (IV) Encryption Algorithm RC4 stream cipher to cipher block size. All Block Cipher supported by OpenSSL. Ex. AES, Blowfish, DES etc. reuse problem of WEP. Encryption is fast and more secure in penvpn. CBC Mode Not supported Supported OpenVP protects against know plain text attack. Authentication Open system and TLS based two factor OpenVPN authentication is shared secret Authentication strong than WEP. authentication 2014, IJARCSSE All Rights Reserved Page 526
5 Data Authentication By using Cyclic All OpenSSL authentication OpenVPN provides better and Integrity check Redundancy Check mechanism like HMAC- data authentication and (CRC) SHA1, MD5 etc. integrity check. Key Management No key management PKI X509 and pre shared OpenVPN supports two secret. Established key management. Replay Protection No Yes OpenVPN uses sliding window mechanism to provide replay protection Attacks: Bit Vulnerable to these Secure against these attacks OpenVPN provide security flipping, dictionary attacks [5], [7], [8] against well known WEP building, FMS etc. attacks. 6. EXPERIMENT SETUP FOR PERFORMANCE MEASUREMENT For analyzing the impact of OpenVPN on performance of IEEE g WLAN we created two experiment scenarios. First was for measuring the throughput under normal conditions and the second was to analyze the variation of traffic throughputs over an IEEE g WLAN when OpenVPN is implemented in WLAN. The following parameters were used as metrics for performance measurement during our experiments: Throughput is the rate at which bulk of data transfers can be transmitted from one host to another over a sufficiently long period of time. Latency is the total time required for a packet to travel from one host to another, generally from a transmitter through a network to a receiver. Frame loss is measured as the frames transmitted but not received at the destination compared to the total number or frames transmitted. IP Packet delay variation is measured for packets belonging to the same packet stream and shows the difference in the one-way delay that packets experience in the network Standard followed for performance measurement We followed the IP Performance Metrics (IPPM) RFC 4148 [31], to measure the performance. The following is the list of metrics we have used along with the standard followed to measure these metrics. Maximum throughput achieved as per RFC 2544 [32], One-way Delay as per RFC 2679 [33], One-way Packet Loss as per RFC 2680 [34], IP Packet Delay Variation Metric as per RFC 3393 [35] Requirements for Experimentation The following is a list of the general Software and Hardware requirements for our experiments: Two laptops loaded with Red Hat Enterprise Linux 5, Ethernet Cables, TL-WA601G 108M TP-Link Wireless Access point, SPT-2000A Spirent test center Experiment Setup In our experiment setup two laptops are connected using TP-Link Access point. The distance between the AP and the laptops is set to 4 meters to keep the signal strength high. Port-1 of Spirent test center is connected to laptop-1 and port-2 of Spirent is connected to laptop-2 using Ethernet cables of length 3 meters. These ports act as clients for laptops. These ports are used for traffic generation and analysis purpose. Port-1 of Spirent test center is used to generate the desired traffic for various data rates, frame sizes etc. Port-2 receives the traffic and analyses it. The analysis includes max throughput achieved, latency and packet delay variation with respect to various frame sizes. The g WLAN standard does not have inbuilt compression feature. OpenVPN supports both modes without compression and with compression, in our study we experimented both modes Performance without OpenVPN The experiment setup for this is shown in Figure 3. We carried out this experiment for measuring the baseline performance of IEEE g WLAN. Figure 3. Experiment setup without OpenVPN 2014, IJARCSSE All Rights Reserved Page 527
6 This experiment comprises of two steps. The first step measures the throughput with respect to UDP traffic, while the second step measures the throughput with respect to TCP traffic. In the first step, port-1 of Spirent test center sends UDP traffic of different frame sizes to laptop-1, which is connected to laptop-2 through wireless link using an Access Point (AP). Laptop-1 forwards this data to laptop-2 through AP and then laptop-2 send this data to port-2 of the Spirent test center. The second step of the experiment was conducted using the same environment variables described above, but this time TCP traffic was generated using port-1 to send traffic with different frame sizes from laptop1 to laptop2. We varied the size of the frame from 512 bytes to 1518 bytes Performance with OpenVPN Now our next aim is to analyze the impact of applying OpenVPN security solution to g WLAN. In this scenario first we have to run our OpenVPN solution on both the laptops. To analyze the impact of applying OpenVPN security to g WLAN on the throughput of UDP and TCP traffic in IEEE g WLAN, we performed the experiments in two steps. In first step we measured the impact on UDP traffic over IEEE g and in second step we measured the impact on TCP traffic over IEEE g. Experimentation was carried out in the same manner as for baseline performance measurement. Figure 4. Experiment setup with OpenVPN 7. EXPERIMENT RESULT AND ANALYSIS The results for all test scenarios of our experiment were collected from the test bed illustrated in the experiment setup section. Each experiment was repeated for twenty iterations to find the average performance values Throughput The UDP and TCP throughput are measured as per RFC 2544 standards for different frame sizes. The results of these experiments for UDP are presented in Table 5 and in Figure 5. The results of these experiments for TCP are presented in Figure 5 and Figure 6 indicates that the throughput increases for both UDP and TCP traffic with increased frame size. Throughput increases because when the data transmitted using large frames the total overhead for transmitting the data due to frame headers will be less as compare to when the data is transmitted using small frames. The throughput is decreased slightly when OpenVPN is applied because of the increased overhead which is due to encapsulation and cryptographic operations used by OpenVPN. When compression is used with OpenVPN throughput increases since compression reduces the packet size in physical interface. Throughput in this case is better than the throughput in normal case i.e. without OpenVPN because IEEE g does not has inbuilt compression and after compression packet size reduces considerably if data is not randomly distributed which is true most of the time. As mentioned above, throughput of WLAN decreases slightly for both UDP and TCP traffic after applying OpenVPN security. Table 7 lists the decrease in throughput corresponding to each frame size and for UDP and TCP traffic. From the table it is clear that maximum decrease in throughput is 15.84% (0.86 Mbps) in case of UDP traffic. In case of TCP traffic the maximum decrease in throughput is 16.91% (0.53Mbps) Average latency We measured the average latency as per RFC 2679 standards for both UDP and TCP traffic with various frame size. Figure 5 and Figure 6 shows the experimental result for average latency. The figures clearly indicate that the latency increases for both UDP and TCP traffic as we increase the frame size. This is due to the fact that round trip time is proportional to the size of frame. From these figures it is also clear that latency is less for normal case as compare to the two cases of OpenVPN mode because in OpenVPN mode additional processing is required for performing cryptographic operation, compression and encapsulation. From the experiment results we also analyzed that the latency in case of OpenVPN without compression is more than in case of OpenVPN with compression. Even though compression takes some processing time it reduces the frame size which results in decreased transmission time as compare to the transmission time when frame is not compressed. 2014, IJARCSSE All Rights Reserved Page 528
7 Figure 5. UDP Average Latency according to frame size. Figure 6. TCP Average Latency according to frame size Frame Loss Percentage Frame Loss Percentage is measured as per RFC 2680 standards for UDP and TCP traffic with different loads. The results of these experiments are presented in Figure 7 and Figure 8. These figures indicate that as we increase the load the Frame Loss Percentage increases for both UDP and TCP traffic. The frame loss percentage increases exponentially as the load crosses the throughput value corresponding to particular frame size. Figure 7. UDP Frame Loss Percentage according to frame size. Figure 8. TCP Frame Loss Percentage according to frame size. 2014, IJARCSSE All Rights Reserved Page 529
8 7.4. IP Packet Delay Variation The IP Packet delay variation is measured as per RFC 3393 standards for UDP traffic for different frame size with different transmission rates. The result of this experiment is presented above. This figure indicates that as we increase the load the IP Packet delay variation increases. From the above figures we observe that with the use of compression with OpenVPN, the IP Packet delay variation decreased as compared to normal case because compression reduces the payload size of packet. 8. CONCLUSIONS The benefit of wireless networks is driving the explosive growth of the WLAN market, where security has been the single largest concern for wireless network deployment. Through this paper we discuss why security is a major concern for WLAN. We have investigated and listed security vulnerabilities and attacks on the standard security mechanism for WLAN called WEP. We also explained how VPN can be used as a security solution for WLAN. In this work a transport layer tunneling based VPN solution named OpenVPN was adopted and implemented for g WLAN. To show how OpenVPN overcomes the weaknesses of WEP, we have compared OpenVPN with WEP based on various security parameters. The performance analysis was carried out with respect to throughput, latency, frame loss and IP packet delay variation. To measure these performance matrices we have followed RFC4148, RFC 2544, RFC 2679, RFC 2680 and RFC Experimentation was carried out for both UDP and TCP traffic with respect to various data rates and frame sizes using Spirent test center to analyses the impact of OpenVPN on performance of g WLAN. From the experimental results we can conclude that there is slight decrease in performance of g WLAN with the implementation of OpenVPN. But there is an increase in the performance of g WLAN with the use of compression in OpenVPN. REFERENCES [1] T. Karygiannis & L. Owens, (2002) Wireless Network Security , Bluetooth and Handheld Devices, National Institute of technology, Special Publication, pp International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November [2] Y. Zahur & T. A. Yang, (2004) Wireless LAN Security and Laboratory Designs, Journal of Computing Sciences in Colleges, vol. 19, pp [3] N. Borisov, I. Goldberg & D. Wagner, (2001) Intercepting Mobile Communications: The Insecurity of , Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking. [4] D. B. Faria & D. R. Cheriton, (2002) DoS and Authentication in Wireless Public Access Networks, Proceedings of ACM Workshop on Wireless Security, pp [5] W. A. Arbaugh, N. Shankar, J. Wang & K. Zhang, (2002) Your network has no clothes, IEEE Wireless Communications Magazine. [6] S.R. Fluhrer, I. Mantin & A. Shamir, (2001) Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography, pp [7] Adam Stubblefield, John Ioannidis & Aviel D. Rubin, (2001) Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, AT&T Labs Technical Report TD-4ZCPZZ. [8] Jumnit hong & Raid Lemachheche, (2003) WEP protocol Weaknesses and Vulnerabilities, ECE 578 Computer Networks and Security. [9] OpenVPN, [10] Praveen Likhar, Ravi Shankar Yadav & Keshava Rao M, (2011) Performance Evaluation of Transport Layer VPN on IEEE g WLAN, Communications in Computer and information science, Springer-Verlag, vol. 197, pp [11] IEEE Std (Revision of IEEE Std ) [12] OpenSSL-The Open Source toolkit for SSL/TLS, [13] Aircrack, [14] TUN-TAP, [15] TUN-TAP FAQ, [16] E. Stephan, (2005) IP Performance Metrics (IIPM) Metrics Registry, RFC [17] S. Bradner & J. McQuaid, (2005) Benchmarking Methodology for Network Interconnect Devices, RFC [18] G. Almes, S. Kalidindi, & M. Zekauskas (1999) A One-way Delay Metric for IPPM, RFC [19] G. Almes, S. Kalidindi, & M. Zekauskas (1999) One Way Packet Loss Metric for IPPM, RFC [20] C. Demichelis & P. Chimento, (2002) IP Packet Delay Variation, RFC [21] M. Feilner (2006) OpenVPN: Building and Integrating Virtual Private Networks, Packt Publishing. 2014, IJARCSSE All Rights Reserved Page 530
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2)
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) Moffat Mathews, Ray Hunt Department of Computer Science and Software Engineering, University of Canterbury, New Zealand {[email protected]}
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security (WS 2003: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control (MAC and physical characteristics
WLAN and IEEE 802.11 Security
WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story
Wireless s June September 00 Agenda Wireless Security ผศ. ดร. อน นต ผลเพ ม Asst. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University,
Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2
Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
Linux Access Point and IPSec Bridge
Tamkang Journal of Science and Engineering, Vol. 6, No. 2, pp. 121-126 (2003) 121 Linux Access Point and IPSec Bridge T. H. Tseng and F. Ye Department of Electrical Engineering Tamkang University Tamsui,
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary
Methodology: Security plan for wireless networks By: Stephen Blair Mandeville A. Summary The evolution to wireless networks allows connections with the same quality of data transfer at a lower cost but
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Netzwerksicherheit: Anwendungen
Internet-Technologien (CS262) Netzwerksicherheit: Anwendungen 22. Mai 2015 Christian Tschudin & Thomas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 8 Security in Computer Networks
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
Wireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Security and privacy in public WLAN networks
Security and privacy in public WLAN networks Savio Lau [email protected] March 01, 2005 Roadmap Introduction of public WLAN networks Network security User privacy Experiments and analysis Conclusion March
Hole196 Vulnerability in WPA2
Hole196 Vulnerability in WPA2 1 Hole196 Vulnerability in WPA2 Presenters: Anthony Paladino, Managing Director, Systems Engineering Dr. Kaustubh Phanse, Principal Wireless Architect Md. Sohail Ahmad, Senior
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Ahmed A. Joha, Fathi Ben Shatwan, Majdi Ashibani The Higher Institute of Industry Misurata, Libya [email protected]
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
