Академический Документы
Профессиональный Документы
Культура Документы
What?
technology that enables two or more entities to communicate without network cabling.
Topologies?
WLAN
Access point.
Repeaters.
WLAN
ad-hoc networks.
size of the network. Suited for temporary situations such as meetings and conferences.
wireless devices directly communicates with each other. Does not require APs.
Transmission range communication possible low error rate Detection range detection of the signal possible no communication possible Interference range signal may not be detected signal adds to the background noise
sender
transmission
distance detection interference
Work?
(Courtesy: loupdargent.com)
Reference Model
Application
Application
Transport
Network Data Link Network Data Link Network Data Link
Transport
Network Data Link
Physical
Physical
Physical
Medium
Physical
Radio
Difference?
(Courtesy: samdiener.com)
Ack
T T T T
data
T T
data
T T
Ack data
Ack
T
T
Ack
Roaming
Bad connection in Infrastructure mode? Perform: scanning of environment listen into the medium for beacon signals or send probes into the medium and wait for an answer. send Re-association Request station sends a request to a new AP(s).
receive Re-association Response success: AP has answered, station can now participate failure: continue scanning. AP accepts Re-association Request and signals the new station to the distribution system. the distribution system updates its data base (i.e., location information). typically, the distribution system now informs the old AP so it can release resources.
Performance
802.11b offers speeds with a theoretically maximum rate of 11Mbps at in the 2.4 GHz spectrum band
Mobile communication?
Examples
stationary computer laptop in a hotel (portable) wireless LAN in historic buildings Personal Digital Assistant (PDA)
802.11 - Transmission
Frequency Hopping SS
FH systems uses a radio carrier that hops from frequency to frequency in a pattern known to both transmitter and receiver
Easy to implement Resistance to noise Limited throughput (2-3 Mbps @ 2.4 GHz)
Types:
Direct Sequence SS
DS systems uses a carrier that remains fixed to a specific frequency band. The data signal is spread onto a much larger range of frequencies (at a much lower power level) using a specific encoding scheme. Much higher throughput than FH (11 Mbps) Better range. Less resistant to noise (redundancy it transmits at least 10 fully redundant copies of the original signal at the same time)
802.11a
Advantages
Ultra-high spectrum efficiency 5 GHz band is 300 MHz (vs. 83.5 MHz @ 2.4 GHz) More data can travel over a smaller amount of bandwidth
High speed Up to 54 Mbps Less interference Fewer products using the frequency 2.4 GHz band shared by cordless phones, microwave ovens, Bluetooth, and WLANs
Disadvantages
not accepted worldwide No interoperability certification available for 802.11a products Not compatible or interoperable with 802.11b
Legal issues
License-free
spectrum in 5 GHz band not available worldwide LAN-LAN bridging, there is limited interest for 5 GHz adoption.
Market
Beyond
Applications
Building-to-building connections Video, audio conferencing/streaming video, and audio Large file transfers, such as engineering CAD drawings Faster Web access and browsing High worker density or high throughput scenarios
Numerous
Frequency
802.11b transfers at 2.4 gigahertz 802.11a transfers at 5 gigahertz
Coverage Distance
802.11b goes about 400 feet indoors 802.11a goes about 60 feet indoors
Not yet.
802.11g
Compatible with 802.11b High speed up to 54 Mbps 2.4 GHz (vs. 802.11a, 5 GHz) Using OFDM for backward compatibility.
Pros of 802.11g - fast maximum speed; signal range is good and not easily obstructed Cons of 802.11g - costs more than 802.11b; appliances may interfere on the unregulated signal frequency.
Uses beams of light in the infrared spectrum Remote controls Fairly reliable and low-cost Drawback: It is a line-of-sight technology less interference Drawback: one-to-one technology You can send data only between two things at once (but increased security)
Bluetooth
Radio-frequency also used by baby monitors, garage door openers, and cordless phones
HomeRF (SWAP)
Vision
Access internet from anywhere in and around the home from portable display devices
Member Companies
SWAP
The HomeRF SWAP is designed to carry both voice and data traffic and to interoperate with the PSTN and the Internet
Operates in the 2.4GHz ISM range Uses digital frequency hopping spread spectrum 50 hops / second
Extensions of DECT (Digital Enhanced Cordless Telephone ) and wireless LAN technology to enable a new class of home cordless services
System Architecture
Network topology
Ad hoc Network
Only
data communication is supported All stations are equal Control of network distributed between the stations
Network topology
Managed network
For
time critical applications such as interactive voice, Connection point is required to coordinate the system The Connection point provides the gateway to the PSTN and can be connected to a PC via a standard interface like USB that will enable voice and data services
Node types
The network can accommodate up to 127 nodes There are 4 basic types of nodes
Connection
Voice
base station
Data
Advantages:
Cheap, easy-to-install Allows multiple-networks in the same location Can encrypt data
Drawbacks:
Not very fast (typically limited to 1 Mbps) Limited Range (75 to 125 ft) Physical obstructions (walls, large metal objects) cause huge interference issues Difficult to integrate into existing wired networks
Whos defenseless?
Everyone in your organization who uses computers or networks in the process of doing their job.
42
Eavesdropping
Keyboard sniffers
Network sniffers
Wired Equivalent Privacy (WEP) A protocol to protect link-level data during wireless transmission between clients and access points. Services: Authentication: provides access control to the network by denying access to client stations that fail to authenticate properly.
Confidentiality: intends to prevent information compromise from casual eavesdropping. Integrity: prevents messages from being modified while in transit between the wireless client and the access point.
WEP Authentication
The following events must occur before an 802.11 station can communicate with an Ethernet network through an access point:
Turn on the wireless station. The station listens for messages from any access points that are in range. The station finds a message from an access point that has a matching SSID. The station sends an authentication request to the access point. The access point authenticates the station. The station sends an association request to the access point. The access point associates with the station. The station can now communicate with the Ethernet network through the access point.
Methods of Authentication
1.
2.
Methods of Authentication
1.
Shared System authentication. only those computers that possess the correct authentication key can join the network.
2.
The station sends an authentication request to the access point. The access point sends challenge text to the station. The station uses its configured 64-bit or 128-bit default key to encrypt the challenge text, and it sends the encrypted text to the access point. The access point decrypts the encrypted text using its configured WEP key that corresponds to the stations default key. The access point compares the decrypted text with the original challenge text. If the decrypted text matches the original challenge text, then the access point and the station share the same WEP key, and the access point authenticates the station. The station connects to the network. If the decrypted text does not match the original challenge text (that is, the access point and station do not share the same WEP key), then the access point will refuse to authenticate the station, and the station will be unable to communicate with either the 802.11 network or Ethernet network.
Security Problems
enabled.
Use of static WEP keys (keys are in use for a very long time). WEP does not provide key management.
Cryptographic keys are short. No user authentication occurs only devices are
Possible Solution
For 802.11, WEP encryption is optional. For WPA, encryption using Temporal Key Integrity Protocol (TKIP) is required. TKIP replaces WEP with a new encryption algorithm that is stronger than the WEP algorithm, but that uses the calculation facilities present on existing wireless devices to perform encryption operations. TKIP provides important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. Through these enhancements, TKIP addresses all known WEP vulnerabilities.
802.11a offers higher data rates (up to 54 mbps) -> higher throughput per user. Limited interoperability.
Data rates
Data rates affect range 802.11b 1 to 11 Mbps in 4 increments 802.11a 6 to 54 Mbps in 7 increments The minimum data rate must be determined at design time Selecting only the highest data rate will require a greater number of APs to cover a specific area Compromise between data rates and overall system cost
1200 Series).
Permanently attached.
Remote antennas connected using an antenna cable. Coax cable used for RF has a high signal loss, should not be mounted more than a 1 or 2 meters away from the device. Placement: consider building construction, ceiling height, obstacles, and aesthetics. Different materials (cement, steel) have different radio propagation characteristics.
Helps define the coverage areas, data rates, the precise placement of access point. Gather information: diagramming the coverage area and measuring the signal strength, SNR (signal to noise ratio), RF interference levels
Cryptography
Contents
1.Introduction 2. Cryptography(encryption/decryption algorithm) 3. Cryptography Machine 4. Algorithms 5. Conclusions 6.References
INTRODUCTION
The science and art of manipulating messages to make them secure is called as cryptography.
SENDER
plaintext
encryption
cipher text
RECIEVER
cipher text
decryption
plaintext
Example:
Insecure communication
Alice channel
data, control messages
Bob
data
secure sender
secure receiver
data
Devil
Cryptographic communication
Alices KA encryption key Bobs KB decryption key ciphertext decryption algorithm
plaintext
encryption algorithm
plaintext
Devil
Cryptography(encryption/decryption algorithm) 1 2
Symmetric(Private) Asymmetric(Public)
1.1
1.2
2.1
2.2
Substitution
Transposition
1.2.1
RSA
DiffieHellman
1.1.1
1.1.2
1.1.3
Rail-Fence
Simple
MonoAlphabetic
PolyAlphabetic
1.2.2
Vernam cipher
C.)
D.)
ROTORS
PLUGBOARD
1.1.1 Simple
A 1 N 14 B 2 O 15 C 3 P 16 D 4 Q 17 E 5 R 18 F 6 S 19 G 7 T 20 H 8 U 21 I 9 V 22 J 10 W 23 K 11 X 24 L 12 Y 25 M 13 Z 26
H 8
O 15
S 19
P 16
I 9
T 20
A 1
L 12
I 9
T 20
Y 25
T 20
R 18
E 5
A 1
T 20
ENCRYPTION
MESSAGE:KEY :CODE:SUBTRACT: CODE : ENCRYPTED: 8 20 28 26 2 B 15 18 33 26 7 G 24 X 17 Q 19 5 24 16 1 17 9 20 29 26 3 C 20 20 40 26 14 N 19 S 17 Q 10 J 1 18 19 12 5 17 9 1 10 20 20 40 26 14 N 25 20 45 26 19 S
B
2
G
7
X
24
Q
17
C
3
N
14
S
19
Q
17
J
10
N
14
S
19
DECRYPTION
MESSAGE:ADD :(a) CODE:(b) KEY: SUB:CODE: 8 DECRYPTION:DECRYPTED MESSAGE IS : - HOSPITALITY H 15 O 2 26 28 20 7 26 33 18 15 24 26 50 5 45 26 19 S 17 26 43 1 42 26 16 P 9 I 20 T 3 26 29 20 9 14 26 40 20 20 19 26 45 18 27 26 1 A 17 26 43 5 38 26 12 L 10 26 36 1 35 26 9 I 20 T 25 Y 14 26 40 20 20 19 26 45 20 25
(a) (b) : - 8
1.1.2 Mono-alphabetic
A 1 N 14 B 2 O 15 C 3 P 16 D 4 Q 17 E 5 R 18 F 6 S 19 G 7 T 20 H 8 U 21 I 9 V 22 J 10 W 23 K 11 X 24 L 12 Y 25 M 13 Z 26
ENCRYPTION
MESSAGE ENCRYPTION
H K
E H
L O
L O
O R
DECRYPTION
MESSAGE K H O O R
DECRYPTION
1.1.3 Poly-alphabetic
A 1 N 14 B 2 O 15 C 3 P 16 D 4 Q 17 E 5 R 18 F 6 S 19 G 7 T 20 H 8 U 21 I 9 V 22 J 10 W 23 K 11 X 24 L 12 Y 25 M 13 Z 26
ENCRYPTION
MESSAGE CODE H 8 E 5 L 12 L 12 O 15
ADD: - 12 (key) 8
CODE ENCRYPTED 20 T 13 M
5
17 Q
12
24 X
12
27 (27-26) A
DECRYPTION
MESSAGE CODE T 20 M 13 Q 17 5 X 24 12 A 1 12
SUB: - 12 (key) 8
8 8 H
5 5 E
12 12 L
12 12 L
-11 26 15 O
ENCRYPTION
MESSAGE CODE E 31 L 38 E 31 C 29 T 46 R 44 O 41 N 40 I 35 C 29 S 45
E L
E C
T R
O N
I C
ENCRYPTED msg
E 31
E 31
T 46
O 41
I 35
S 45
L 38
C 29
R 44
N 40
C 29
CODE
DECRYPTION
ENCRYPTED msg CODE E 31 E E 31 E T 46 O 41 T I 35 S 45 O L 38 C 29 I R 44 N 40 S C 29
L MESSAGE CODE E 31 L 38
C E 31 C 29
R T 46 R 44 O
N N 40 I 35
C C 29 S 45
41
ENCRYPTION
COL 1 H COL 2 E COL 3 L COL 4 L COL 5 O
DECRYPTION
ENCRYPTED MESSAGE : - LREOLLODHW COL 1 H W COL 2 E O COL 3 L R COL 4 L L COL 5 O D
Hence K1 = K2
CONCLUSION
Cryptography is considered as the secure means for communication of confidential data over a communication channel.
Symmetric key algorithm are suitable for same numeric key as well as alphabetic key. whereas Asymmetric key algorithm is suitable for same and different keys .
References
The End!
Thoughts or questions?