Your SlideShare is downloading. ×
0
Research on Security of the WLAN Campus Network karthik.k 1 st  sem, M.Tech, CNE
OUTLINE   <ul><li>WLAN Benefits. </li></ul><ul><li>WLAN Standards. </li></ul><ul><li>The 3 Feathers of WLAN. </li></ul><ul...
WLAN Benefits  <ul><li>Easy Installation. </li></ul><ul><li>Wide Range of Covering. </li></ul><ul><li>Economical. </li></u...
WLAN Standards <ul><li>IEEE 802.11b </li></ul><ul><li>IEEE 802.11a </li></ul><ul><li>IEEE 802.11g </li></ul>Dept of CSE, D...
The Three Feathers of WLAN <ul><li>The Openness of WLAN. </li></ul><ul><li>The Mobility of Node. </li></ul><ul><li>The Ins...
Security Threats <ul><li>AP Unauthorized Access. </li></ul><ul><li>Information Eavesdropping. </li></ul><ul><li>Signal Int...
Existing Security Technologies <ul><li>SSID. </li></ul><ul><li>MAC Filtering. </li></ul><ul><li>WEP. </li></ul>Dept of CSE...
New Security Control Program Proposed <ul><li>Access Control. </li></ul><ul><li>Content Filtering. </li></ul><ul><li>Data ...
Access Control <ul><li>VP N :Replace existing WEP  protocol Solutions. </li></ul><ul><li>Port Access Control[802.1x] </li>...
Content Filtering <ul><li>Use Software Filters. </li></ul><ul><li>Use Hardware Filters. </li></ul>Dept of CSE, DSCE  2010
Data Encryption <ul><li>Include larger strength Encryption technologies. </li></ul><ul><li>Replace Existing WEP by WPA. </...
User Management <ul><li>Use of different Grades with different permission levels. </li></ul><ul><li>Prohibit installing un...
Log Audit <ul><li>Audit log file. </li></ul><ul><li>Store messages about software,  services, operating system or hardware...
Conclusion <ul><li>Access control, content filtering, data  encryption, user mgmt. & several  other aspects, expected to p...
References <ul><li>Yong Yu, Wireless Distribution System in Management, 2007.5 </li></ul><ul><li>Yong Yu, “Research on Wir...
Thank You Dept of CSE, DSCE  2010
Upcoming SlideShare
Loading in...5
×

Research on security of the wlan campus network

745

Published on

Research on Enhancing the wi-fi campus network........

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
745
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Research on security of the wlan campus network"

  1. 1. Research on Security of the WLAN Campus Network karthik.k 1 st sem, M.Tech, CNE
  2. 2. OUTLINE <ul><li>WLAN Benefits. </li></ul><ul><li>WLAN Standards. </li></ul><ul><li>The 3 Feathers of WLAN. </li></ul><ul><li>Security Threats. </li></ul><ul><li>Existing Security. </li></ul><ul><li>New Security Control Program. </li></ul><ul><li>Conclusion. </li></ul><ul><li>References. </li></ul>Dept of CSE, DSCE 2010
  3. 3. WLAN Benefits <ul><li>Easy Installation. </li></ul><ul><li>Wide Range of Covering. </li></ul><ul><li>Economical. </li></ul><ul><li>High transfer rate. </li></ul>Dept of CSE, DSCE 2010
  4. 4. WLAN Standards <ul><li>IEEE 802.11b </li></ul><ul><li>IEEE 802.11a </li></ul><ul><li>IEEE 802.11g </li></ul>Dept of CSE, DSCE 2010
  5. 5. The Three Feathers of WLAN <ul><li>The Openness of WLAN. </li></ul><ul><li>The Mobility of Node. </li></ul><ul><li>The Instability of Signal. </li></ul>Dept of CSE, DSCE 2010
  6. 6. Security Threats <ul><li>AP Unauthorized Access. </li></ul><ul><li>Information Eavesdropping. </li></ul><ul><li>Signal Interference. </li></ul><ul><li>Denial of service. </li></ul>Dept of CSE, DSCE 2010
  7. 7. Existing Security Technologies <ul><li>SSID. </li></ul><ul><li>MAC Filtering. </li></ul><ul><li>WEP. </li></ul>Dept of CSE, DSCE 2010
  8. 8. New Security Control Program Proposed <ul><li>Access Control. </li></ul><ul><li>Content Filtering. </li></ul><ul><li>Data Encryption. </li></ul><ul><li>User Management. </li></ul><ul><li>Log Audit. </li></ul>Dept of CSE, DSCE 2010
  9. 9. Access Control <ul><li>VP N :Replace existing WEP protocol Solutions. </li></ul><ul><li>Port Access Control[802.1x] </li></ul>Dept of CSE, DSCE 2010
  10. 10. Content Filtering <ul><li>Use Software Filters. </li></ul><ul><li>Use Hardware Filters. </li></ul>Dept of CSE, DSCE 2010
  11. 11. Data Encryption <ul><li>Include larger strength Encryption technologies. </li></ul><ul><li>Replace Existing WEP by WPA. </li></ul>Dept of CSE, DSCE 2010
  12. 12. User Management <ul><li>Use of different Grades with different permission levels. </li></ul><ul><li>Prohibit installing unauthorized AP. </li></ul>Dept of CSE, DSCE 2010
  13. 13. Log Audit <ul><li>Audit log file. </li></ul><ul><li>Store messages about software, services, operating system or hardware devices. </li></ul>Dept of CSE, DSCE 2010
  14. 14. Conclusion <ul><li>Access control, content filtering, data encryption, user mgmt. & several other aspects, expected to provide some help with the construction of Digital Campus Network. </li></ul><ul><li>WLAN will play a more important role in colleges because of its high speed transmission capacity & flexibility. </li></ul>Dept of CSE, DSCE 2010
  15. 15. References <ul><li>Yong Yu, Wireless Distribution System in Management, 2007.5 </li></ul><ul><li>Yong Yu, “Research on Wireless Distribution System in campus Network,” ACC 2009 </li></ul><ul><li>IEEE Std 802.1X-2001:IEEE Standard for Local & Metropolitan area networks ports based network access control.USA:IEEE,2001 </li></ul><ul><li>Yunwu Dai, “Analysis of Wireless Local Network Security” Science Mosaic.2008,12 </li></ul><ul><li>Xiaohong Zhang, “Wireless LAN’s Security Mechanism,2006 </li></ul>Dept of CSE, DSCE 2010
  16. 16. Thank You Dept of CSE, DSCE 2010
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×