Security Issues and Challenges in Wireless Networks
Dr. Mohammad Shoab
1
Introduction
2
Introduction – Wireless Technologies
3
Introduction
4
Introduction
Image from www.microsoft.com
5
Introduction
6
Introduction
7
Introduction
8
Introduction
9
Outline
10
Models of Wireless Networks
u
R
v
u'
11
Models of W ireless Networks
R
R
u
u
R
v
u'
12
Models of Wireless Networks
u
v
w
v'
13
What is the problem?
u
v
w
v'
14
What is the problem?
u
v
w
v'
15
Models of Wireless Networks
u
rt
v
w
u'
ri
16
Carrier Sensing
17
Outline
18
Various Layers of Interest – Physical Layer
19
Physical Layer – WiFi
20
Various Layers of Interest – MAC Layer
21
Various Layers of Interest – MAC Layer
DATA
DATA
22
MAC Layer
23
Various Layers – Network Layer
24
Various Layers – Network Layer
25
Other Important Layers
26
Outline
27
Threats in Present Solutions – MAC Layer
z
A
28
Threats in Present Solutions – MAC Layer
00:1A:A0:FD:FF:2E
00:0C:76:7F:DF:49
00:13:D3:07:2F:A8
00:2F:B8:77:EA:B5
29
Threats in Present Solutions – Network Layer
30
Threats in Present Solutions – Network Layer
z
A
Nodes Disrupting Routes
Source
Source
Destination
31
Threats in Present Solutions – Network Layer
z
A
RREQ(a)
RREQ(b)
RREQ(c)
….
32
Threats in Present Solutions – Network Layer
s
t
A
33
Threats in Present Solutions – Network Layer
34
Threats in Present Solutions – Network Layer
s
t
35
Threats in Present Solutions – Network Layer
36
Outline
37
Security Solutions
38
Security Solutions for 802.11 Networks
39
WEP Authentication Model
WEP Authentication Based on RC4
Challenge (Nonce)
Response (Nonce RC4 encrypted under shared key)
Wireless Node
AP
Shared secret distributed out of band
Decrypted nonce OK?
40
Security Solution for 802.11 Networks: 802.11i Model
41
802.1X Authentication
42
802.1X Authentication
43
Security in Ad Hoc Mode
44
Security in Ad Hoc Networks
45
Thank You!
46