PYDAH COLLEGE OF ENGINEERING AND TECHNOLOGY SHASIKANTH MCA III YEAR PYDAH College of Engg & Tech U.HARIKRISHNAN NAIR MCA III YEAR PYDAH College of Engg & Tech PRESENTED BY:
Jan 15, 2015
PYDAH COLLEGE OF ENGINEERING AND TECHNOLOGY
SHASIKANTHMCA III YEARPYDAH College of Engg & Tech
U.HARIKRISHNAN NAIRMCA III YEARPYDAH College of Engg & Tech
PRESENTED BY:
ADVANCED WIRELESSTECHNOLOGY
W i r e l e s s G i g a b i t
A J O U R N E Y T O W I R E L E SS G I G A B I T
CABLES OPTICAL FIBERSWIRELESS ACCESS
WI-FI
WHAT IS WIGIG?
The Wireless Gigabit Alliance(also known as the WiGig)
Operates on unlicensed 60 GHz frequency band.
Allows wireless transfer of audio and video data at up to 7Gb per second.
Transfer data within an indoor environment usually within a range of 10ms.
M O D U L AT I O N & C O D I N G S C H E M E
Two types of modulation and coding schemes
Orthogonal frequency-division multiplexing (OFDM)
supports communication over longer distances with greater delay spreads
providing more flexibility in handling obstacles and reflected signals.
OFDM allows the greatest transmission speeds of up to 7 Gbps.
Single carrier (SC)
Typically results in lower power consumption, so it is often a better fit for small, low-power handheld devices.
SC supports transmission speeds up to 4.6 Gbps.
60Ghz !
60GhzWavelengthin mm units
= millimeterwave
Enables use of previously unavailable wide band
60 GHz SPECTRUM ALLOCATION
7
57 GHZ 66 GHZ
Millimeter Wave Band
Europe : 57-66
USA and Canada : 57-64
Japan : 59-66
Australia : 59.4-62.9
8
Wireless “HDMI”
CE
5-10
m; 3
Gbp
sHD
<5m; <1Gbps
Clips Peer2Peer
<1min 4GB Flash
Wireless IO
1 sec – 30MB ads
10-30sec SD clip/movie
80 sec HD 25GB movie
Sync & Go
WiFi60G
Gigabit WLAN
U S A G E M O D E L S F O R 6 0 - G H Z W L A N & W PA N
STANDARDIZATION FOR 60 GHZ WLAN/WPAN
IEEE 802.11 ad State-of-the-art PHY/MAC standardization activities o
improve WLAN data rate to MGbps Dominated by Intel, Broadcom, NEC etc.
WiGig (Wireless Gigabit Alliance) 60-GHz Industry alliance led by Intel Promoters include Intel, Broadcom, NEC, Apple, Dell,
Microsoft, Panasonic, LGE, Toshiba, Wilocity, etc. IEEE 802.15.3c (First IEEE standard on 60 GHz WPAN)
Promoted mainly by Japanese companies
ECMA TC48 European standardization for 60 GHz WPAN
WirelessHD9
BEAMFORMING
o To overcome signal decay, WiGig uses a process called adaptive beamforming .
I. The antennas do this by adjusting both the amplitudes and the phase shifts of their broadcasted waves.
II. The reception of the signal is optimized by minimizing different kinds of problems: the error between the antenna's output and the expected signal.
WIRELESS SECURITY
WIRELESS SECURITY
WIRED EQUIVALENT PRIVACY (WEP)
WEP
RC4
CRC-32
This algorithm is used for confidentiality
This is used for integrity
Wired equivalent privacy
A 128-bit WEP key is almost always entered by users as a string of 26 hexadecimal characters. Each character represents four bits of the key.
40 bit key 24 bit initial vector
RC4 traffic key
64 bit standard WEP key
WEP is a protocol that adds security to wireless local area networks.
WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network.
WEP offers interoperability, since all wireless devices support basic WEP encryption.
Another advantage of WEP is that when uses happen to see your network during wireless detection, they will mostly likely be discouraged since it will require a key. This makes users that they are not welcome. Hence network is secure.
ADVANTAGES OF WEP SECURITY ALGORITHM
Key size is one of the security limitations in Wired Equivalent Privacy.
Cracking a longer key requires interception of more packets, but there are active attacks that simulate the necessary traffic.
The other weaknesses in Wired Equivalent Privacy include the possibility of IV collisions and altered packets that are not helped at all by a longer key.
Most users usually do not change their keys. This gives hackers more time to crack the encryption.
Master keys, instead of temporary keys, are directly used.
D R A W B A C K S O F W E P S E C U R I T Y A L G O R I T H M
T E M P O R A L K E Y I N T E G R I T Y P R O T O C O L
A security protocol used in the IEEE 802.11 wireless networking standard.
TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance.
To replace WEP without requiring the replacement of legacy hardware.
This was necessary because the breaking of WEP had left Wi-Fi networks without viable link-layer security, and a solution was required for already deployed hardware.
Key size-128bits
S E C U R I T Y AT TA C K S W I T H W E P A N D T K I P
Beck-Tews attack
Ohigashi-Morii attack
FMS attack
KoreK attack
PTW attack
The Chopchop attack
WEP
TKIP
W I - F I P R O T E C T E D A C C E S S ( W PA )
WiFi Protected Access (WPA) and WiFi Protected Access II (WPA2)
WiFi Protected Access (WPA) is a security standard for users of computers equipped with WiFi wireless connection.
WiFi Protected Access (WPA) protocol implements the majority of the IEEE 802.11i standard.
TKIP encryption replaces WEP’s 40-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change.
W I G I G S E C U R I T Y ? ? ?
WEP with 64bit or 128bit encryption strength - a simple encryption that offers limited security and is relatively easy to break
WPA-PSK (WPA-Pre Shared Key) - in the forms of WPA-TKIP which offers better security and is backwards compatible with older routers and USB keys, and WPA2-AES which offers the best security and performance but less compatibility
Since the problem with WEP AND WPA-TKIP.
WIGIG MAKE USE OF WPA2-AES(ADVANCED ENCRYPTION STANDARD)
Since only AES is not compatible with older devices thus a completely new devices should be made for this technology.
A DVA N TA G E S O F W i G i g
Small in size.
Portable.
High speed of data transfer.
Low power consumption.
Cost-effective.
In wireless LAN networks.
Inter-vehicle communication system.
Huge data file transfer.
Office appliances.
Video information transfer.
APPLICATIONS OF WiGig
F U T U R E O F W I G I G
NO WIRE WORLD:
Leave messy wires in your work places. And enter in to
FAST AND FURIOUS WORLDA DIGITALIZED LIFE.
Designed to work in high-density area
Wirelessly connect all devices to your tablet
(wireless Docking)
Download the 25Gb blu-ray disc movie in a minute.
Wireless display
“ NECCESITY IS THE MOTHER OF INVENTION”
THANK YOU
“Special Issue on Gigabit Wireless Communications,” IEEE JSAC, October 2009
Peter Smulders, “Exploiting the 60 GHz Band for Local Wireless Multimedia Access: Prospects and Future Directions,” IEEE Comm. Magazine, January 2002
htttp://www.wikipedia.comhtttp://www.pcpress.comWhite paper final press release by wigig alliance
For security related topic:
Wikipedia
www.electronicbus.com