Aegis_6610_tsquare

Aegis_6610_tsquare - Aegis:SecuringWirelessNetworksagainst

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Aegis: Securing Wireless Networks against  Eavesdropping Using Smart Antennas Sriram Lakshmanan , Cheng-lin Tsao & Raghupathy Sivakumar GNAN Research Group School of Electrical and Computer Engineering Georgia Tech
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
                         2 Wireless Security Gen1:Access  controls, MAC  filtering, Wired  Equivalent Privacy Minimal effort to  intercept! Hospitals Schools Gen2:WiFi Protected  Access WPA, (TKIP  using RC4 and AES) Gen3: WPA2 based  on 802.11i ,  Transport layer  security: 802.1X  Virtual Private  Networks Market* Annual  Revenue ~  $1.25 Billion Units shipped a  year~ 40  Million Colleges Airports WLANs Tetherless connectivity  User Mobility www.instat.com , Dec 2008 WLAN Security Enterprises
Background image of page 2
Current solutions  Do not limit information access to an eavesdropper Have both design and implementation flaws Significantly weaker than the core cryptographic scheme Not targeted for unique wireless attacks Privacy – user fingerprinting* Denial of Service – Beacon attacks, AP masquerading Increased use of sensitive information over  wireless Increasing smart phones and 802.11n use Is it possible to provide physical space security in  wireless networks?                          3 Issues, Exploits and Motivation * 802.11 user finger printing, Jeff Pang et al, ACM Mobicom 2007
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
                         4 Contributions Using arrays of transmitters to provide physical  space security against eavesdropping Architecture that uses arrays of antennas or arrays  of access points or both in tandem Virtual Arrays of Physical Arrays Algorithms to limit the knowledge of existence of  information from an eavesdropper  Complimentary approach to other techniques  including those based on cryptography
Background image of page 4
                         5 Topology and Scope Enterprise WLAN with  Central controller that  coordinates decisions of  p   APs  Each AP has a  k  element  array and there are  c  clients APs transmit in synchronized  time slots as decided by  controller Eavesdropper M Has  e  antenna elements ( e  ≤  k ) Has location information of  clients and APs  Location unknown to APs AP Client Eavesdropper Controller Internet
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 19

Aegis_6610_tsquare - Aegis:SecuringWirelessNetworksagainst

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online