wireless networks: signaling and security

26
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05

Upload: malinda-drakos

Post on 04-Jan-2016

34 views

Category:

Documents


1 download

DESCRIPTION

Wireless Networks: Signaling and Security. William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05. Wireless Networks: Primer. Networks are set up AD Hoc Or a Hardware/ Software Access Point is Used to Connect Devices. Wireless Networks: Primer. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Wireless Networks: Signaling and Security

Wireless Networks: Signaling and Security

William TuckerCEN 4516: Computer Networks

FGCU: Fort Myers, FL: 09/05

Page 2: Wireless Networks: Signaling and Security

Wireless Networks: Primer

Networks are set up AD Hoc

Or a Hardware/ Software Access Point is Used to Connect Devices

Page 3: Wireless Networks: Signaling and Security

Wireless Networks: Primer

Several Wireless Technologies Bluetooth IrDA 802.11 Standard

802.11a 802.11b 802.11g 802.11n

Page 4: Wireless Networks: Signaling and Security

Wireless Networks: Primer

Wireless Technologies (cont.) PCS WAP WTLS WML Wi-Fi HomeRF Most of the above are not as popular

Page 5: Wireless Networks: Signaling and Security

Bluetooth

Low Cost

Small Range (<10 M)

Mediocre Speed (700 Kbps)

Page 6: Wireless Networks: Signaling and Security

IrDA

Used in Inventory

Needs Clear LOS

Needs short Distance

Used Mostly in Desktop Cable Replacement

Page 7: Wireless Networks: Signaling and Security

The 802.11 Standard

802.11a Fastest Maximum Speed (54 Mbps) Supports More Simultaneous Users Higher Cost Shorter Range

Page 8: Wireless Networks: Signaling and Security

The 802.11 Standard

802.11b Slowest Maximum Speed (11 Mbps) Longer range (Less Obstruction) More Signal Noise (2.4 GHz)

Page 9: Wireless Networks: Signaling and Security

The 802.11 Standard

802.11g Fastest Maximum Speed (54 Mbps) Longer range (Less Obstruction) Backwards Compatible with 802.11b Combines best of 802.11a and b

Page 10: Wireless Networks: Signaling and Security

The 802.11 Standard

802.11n Utilizes Multiple Wireless Antennas Coordinates Multiple Signals Fastest Speeds (100-200+ Mbps) No Word on Compatibility (Drafts) Expected in 2006

Page 11: Wireless Networks: Signaling and Security

802.11 Specifics

Protocols operate on the physical layer

802.11 MAC addressing is done at the Data Link layer

Authentication is done by ‘handshake’ structure

Page 12: Wireless Networks: Signaling and Security

Problem Definition:

Wireless Networking: Physical Limitations Security

Methods of Improvement Signal Strengthening Security Protocols

Page 13: Wireless Networks: Signaling and Security

The Electromagnetic Spectrum

Wireless Networks Operate at 2.4 GHz

(2.4 x 10^6)

Low Traffic and Standardized

Page 14: Wireless Networks: Signaling and Security

Physical Propagation

Radio Waves are sent via a transmitter and a receiver

Data rate dependant on frequency

Signal Strength is based on Power (Watts)

Page 15: Wireless Networks: Signaling and Security

Signal Strength

Signal power is amplitude of wave

Attenuation occurs (Humidity)Amplifiers boost signal strength

Weakening and Strengthening given in Decibels

Page 16: Wireless Networks: Signaling and Security

Example of Signal

Taken Using 802.11g at Close Range

Page 17: Wireless Networks: Signaling and Security

Antennas

Responsible for converting electrical impulses into radio waves

Omni directional AntennasDirectional Antennas

Page 18: Wireless Networks: Signaling and Security

Physical Layer Security

Has not been a major problem for wired networks

Wireless is highly susceptible to physical sniffing

No security by default

Page 19: Wireless Networks: Signaling and Security

Wired Equivalent Privacy

Uses encrypted keys

Key Length (64, 128 bit)

Initialization Vectors (24 bits) 16.7 Million Possibilities (Low)

Page 20: Wireless Networks: Signaling and Security

Initialization Vectors

No check for duplication

Weakens the cryptographic system

Weak Keys are used

Page 21: Wireless Networks: Signaling and Security

Cracking WEP: How To

Wireless Card capable of being ‘passive’ (sniffing)

Packet/IV collection software

Modified Brute Force WEP Cracking Software

Page 22: Wireless Networks: Signaling and Security

Cracking WEP: Using Aircrack

Aircrack includes Airodump

Aircrack includes Aircrack

Aircrack can be run on Windows!(using CygWin1.dll)

Page 23: Wireless Networks: Signaling and Security

Aircrack Sniffing Example

15 min of collection on Medium Traffic 128 bit WEP 802.11g

Page 24: Wireless Networks: Signaling and Security

Aircrack Cracking Example

500k IV’s found from packets

Page 25: Wireless Networks: Signaling and Security

Conclusion

If using WEP, use 128 bit keys Use MAC Address Filtering Don’t Broadcast Your SSID Download Useful Programs

and Most of all…

Enable Some Security!

Page 26: Wireless Networks: Signaling and Security

Questions?