Dependability in Wireless Networks - PowerPoint PPT Presentation

About This Presentation
Title:

Dependability in Wireless Networks

Description:

Jamming. Locating mobile nodes. Hijacking. Contd: Interception ... Jam the receiver while accessing the transmitted by using directional antenna near the sender. ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 21
Provided by: mjnoo
Category:

less

Transcript and Presenter's Notes

Title: Dependability in Wireless Networks


1
Dependability in Wireless Networks
  • By
  • Mohammed Al-Ghamdi

2
Outline
  • Introduction
  • Physical Layer
  • MAC layer
  • Conclusion

3
Introduction
  • WiFi short for Wireless Fidelity
  • the trade name for a popular wireless technology
  • Based on IEEE 802.11
  • Can We Rely on WI-FI

4
Contd
  • Researcher and Hackers easily attack Wired
    Equivalent Privacy WEP.
  • First security mechanism.
  • Successful attack block a network and its
    services.
  • Wireless network security overall depends on
    network to application.
  • PHY and MAC layers.

5
Physical Layer
  • Spec.
  • Uses a single narrow-band radio channel
  • At 2.4 to 5 GHz
  • Available power range allows an average radius of
    100 m. (depend)
  • Node same freq. share same channel
  • Two different basic coding techniques
  • Direct Sequence Spread Spectrum DSSS(11b and
    11g).
  • Orthogonal Frequency Division Multiplexing OFDM
    (11a).

6
Contd
  • These chars. Allow several attacks !
  • Interception
  • Injection
  • Jamming
  • Locating mobile nodes
  • Hijacking

7
Contd
  • Interception
  • Attacker can intercept a radio communication
    easily.
  • 802.11 not prevent traffic analysis.
  • Sol
  • Apply mechanisms at MAC layer or above.
  • Prevent information leakage.

8
Contd
  • Injection
  • Radio transmissions can not restricted in
    specific area.
  • Prevent establishing firewalls and network
    intrusion system.
  • Sol
  • MAC provide data source authentication for
    transmitted frame.

9
Contd
  • Jamming
  • Radio transmission subject to jamming easily
    (narrow-band).
  • Make WLAN unavailable.
  • Locating Mobile Nodes
  • Attacker easily track MAC address ??
  • Built database that lists wireless node.
  • Track the device owners location

10
Contd
  • Hijacking
  • Its difficult than interception and injection
  • Attacker make sure that two victim not talk
    directly
  • Jam the receiver while accessing the transmitted
    by using directional antenna near the sender.

11
MAC layer
  • It is Media Access Control layer.
  • Sub-layer data link layer
  • provides addressing and channel access control
    mechanisms
  • Has weakness features
  • Implement shared channel
  • Can have star or mesh topology

12
Shared Channel
  • Nodes use same channel.
  • You need to distinguish nodes.
  • Use MAC address as identifier.

13
Contd
  • Jamming
  • Radio transmission subject to jamming easily
    (narrow-band).
  • Make WLAN unavailable.
  • Locating Mobile Nodes
  • Attacker easily track MAC address ??
  • Built database that lists wireless node.
  • Track the device owners location

14
Shared Channel
  • Nodes use same channel.
  • You need to distinguish nodes.
  • Use MAC address as identifier.
  • Even if communication encrypted, header must
    remain.
  • Shared channel implies shared bandwidth.
  • Several nodes lower transmission speed

15
Contd
  • 802.11 uses logical mechanism to detect the
    channel ( free or busy ).
  • Duration field in the header.
  • Attack change this field.

16
Topology
  • Two different modes of network topology.
  • The infrastructure mode ( star )
  • The ad hoc mode ( mesh )

17
Star topology
AP
18
Mesh topology
19
Coclsuion
  • Introduction
  • Physical Layer
  • MAC layer
  • Conclusion

20
Question time
  • ?
Write a Comment
User Comments (0)
About PowerShow.com