IMPACTS OF WIFI SECURITY
CASE STUDY OF SOCIAL NETWORKS

Assit.Prof. Chirasil Chayawan
Communication and Integrated Services Study Center
KMUTT
Main Technologies in Wireless

Proximity (Personal) area network
 Ad-hoc network
 Always connected in personal space

WLAN
Mobile communication: 3G or beyond
WLAN and mobile communication
 Interconnection
 Decoupling from terminal and applications from the access methods
Integration of PAN, WLAN and Mobile communication
 Extends users connectivity
 Complementary and hierarchical manners
 Ubiquitous wireless system
What is the weakest point in Wireless?

Wireless magnifies exposure

vulnerability

 Mobile device is vulnerable to

theft and lost.
 Transmitted over the
unprotected airwaves
 Interoperability software: virus,
hacking attacks
Wireless Vulnerability

Information going across the wireless link is exposed to anyone within

radio range
The benefit of traditional wireline is the physical security
Mobile make it more…?

Difficult to establish trust
 Due to connection to physically hidden access point
 Can service providers be trust in case of foreign networks?
System design issues

Mobile constraints
 Desire low power consumption

 Minimize computation
 Minimize network communication
 By low processing capabilities
 By limited link capacity

What mobile need?
 Cryptographic and other security algorithms to be simple
 Minimize overhead for security protocol
Basic security for communication

Privacy
Authentication
Integrity and non-Repudiation
Availability and Access Control
Privacy

Confidentially
The intended recipients know what was being sent but

unintended parties cannot determine what was sent.
Required some encryption at the sender
and required some decryption at the receiver
Authentication

Confirms the identity of the other party in the communication
Assures that
 The claimed sender is the actual sender
 The claimed receiver is the actual receiver
Integrity and Non-repudiation

Data integrity
 Data is transmitted from source to destination without undetected alteration

Non- repudiation
 Prove that a received message came from a claimed sender
Availability and Access Control

Ensure availability of resources

for the intended users
Controls access to resource
Conclusions

Integration of three main wireless approaches
 PAN
 WLAN
 Mobile communication

Security concepts
 Privacy
 Authentication
 Integrity and Non-repudiation
 Availability and Access control
How to stay safe on public WiFi
Networks...
Turn off all sharing
Computer Network Settings: Enable the Firewall
Security Browser Extensions
Consider Using a Virtual Private Network
Turn It Off When You're Not Using It
Keep Updating the Softwares
How to stay safe on public WiFi
Networks...

The Risks of Social Networks
How to stay safe on public WiFi
Networks...

Social Networking Security Threats
Examples

http://www.forbes.com/2008/11/21/data-breaches-cybertheft

https://www.sans.org/reading-room/whitepapers/policyissues

http://www.networkworld.com/news/2011/053111-social-med
Examples

http://www.sophos.com/en-us/security-news-trends/securityhttps://securityinabox.org/en/chapter_9_1

http://www.staysafeonline.org/stay-safe-online/protect-your-p
Assit.Prof. Chirasil Chayawan
Director
Communication and Integrated Services Study Center (CISS)
KMUTT
chirasil.cha@kmutt.ac.th

Wi fi security