Aegis_6610 - Aegis: Sriram Lakshmanan Cheng-Lin Tsao...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Aegis: Securing Wireless Networks against  Eavesdropping Using Smart Antennas Sriram Lakshmanan , Cheng-Lin Tsao & Raghupathy Sivakumar GNAN Research Group School of Electrical and Computer Engineering Georgia Tech
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Aegis  Motivation Background Solution strategies Integrated solution Evaluation                          2
Background image of page 2
                         3 Wireless Networks and Security Gen1:Access  controls, MAC  filtering, Wired  Equivalent Privacy Minimal effort to  intercept! Hospitals Schools Gen2:WiFi Protected  Access WPA, (TKIP  using RC4 and AES) Gen3: WPA2 based  on 802.11i ,  Transport layer  security: 802.1X  Virtual Private  Networks Market* Annual  Revenue ~  $1.25 Billion Units shipped a  year~ 40  Million Colleges Airports WLANs Tetherless connectivity  User Mobility www.instat.com , Dec 2008 WLAN Security Enterprises
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Current solutions  Do not limit information access to an eavesdropper Have both design and implementation flaws Significantly weaker than the core cryptographic scheme Not targeted for unique wireless attacks Privacy – user/device fingerprinting* Denial of Service – Beacon attacks, AP masquerading,      Jamming                          4 Issues, Exploits and Motivation * 802.11 user finger printing, Jeff Pang et al, ACM Mobicom 2007
Background image of page 4
Issues, Exploits and Motivation Increased use of sensitive information over  wireless Increasing smart phones and 802.11n use Greater ease of attacks on mobile devices  low computing capabilities single flow of control enables easier fingerprinting Wireless networks are very vulnerable to  eavesdropping Is it possible to provide physical space security in  wireless networks?                          5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
                         6 Contributions Using arrays of transmitters to provide physical  space security against eavesdropping Architecture that uses arrays of antennas or arrays  of access points or both in tandem Virtual Arrays of Physical Arrays Algorithms to limit the knowledge of existence of  information from an eavesdropper  Complimentary approach to other techniques  including those based on cryptography
Background image of page 6
Aegis  Motivation Background Solution strategies Integrated solution Evaluation                          7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
                         8 Scope Enterprise WLAN with  Central controller that  coordinates decisions of  p   APs  Each AP has a  k  element  array and there are  c  clients APs transmit in synchronized  time slots as decided by  controller Eavesdropper M Has  e  antenna elements ( e
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 49

Aegis_6610 - Aegis: Sriram Lakshmanan Cheng-Lin Tsao...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online