cse443-lecture-29-wireless

cse443-lecture-29-wireless - Wireless Security CSE497b...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Wireless Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjae ger/cse497b-s07/
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger At the mall . .. Page 2
Background image of page 2
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Wireless Networks • Network supported by radio communications . . • Alphabet soup of standards, most on 802.11 • .. destroys the illusion of a hard perimeter. Page 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Why you should fear Simon Byers . .. • Over the course of history radio frequencies have been enormously vulnerable to eavesdropping and manipulation. • ASSUME: Everything you say on a wireless network is going to be heard and potentially manipulated by your adversaries. Page 4
Background image of page 4
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Wireless LANs • Access point networks (ranging to about 300 feet) • All devices connect to the central access point • Pro: very easy to setup and maintain, simple protocols • Con: reliability/speed drops as you get away from AP or contention increases. Page 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Ad hoc Networks (a.k.a peer-to-peer) • Devices collaboratively work together to support network communication • Network topology changes in response to moving devices, e.g., bluetooth • Pro: highly flexible and responsive to changes in environment • Con: complex, subject to traffic manipulation by malicious peers Page 6
Background image of page 6
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Devices • Laptops (canonical wireless devices) • Desktops, mobile phones, . ... • Bluetooth Page 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Attacks on Wireless Networks • DOS • Planted devices • Hijacked connections • Eavesdropping • Somebody is "in the wire" . ..
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/11/2012 for the course CSE 443 taught by Professor Trentjaeger during the Spring '11 term at Penn State.

Page1 / 21

cse443-lecture-29-wireless - Wireless Security CSE497b...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online