400 likes | 420 Views
Explore the evolution of wireless networking security, components, encryption enhancements, and safeguard measures against security attacks. Learn about basic service sets, encryption methods, vulnerabilities, and solutions in wireless networks.
E N D
CSE 5/7349 – April 5th 2006 Wireless Networking
Wireless Security History • Cordless Phones • Baby Monitors • Networking
802.11 modes • Infrastructure mode • Ad-hoc mode (peer-to-peer)
Infrastructure mode Access Point Basic Service Set (BSS) – Single cell Station Extended Service Set (ESS) – Multiple cells
Ad-hoc mode Independent Basic Service Set (IBSS)
Interception Range Station outside building perimeter. 100 metres Basic Service Set (BSS) – Single cell
Directional Antenna • Directional antenna provides focused reception. • D-I-Y plans available. • Aluminium cake tin. • 11 Mbps at 750 meters. • http://www.saunalahti.fi/~elepal/antennie.html
Shared Key Authentication • When station requests association with Access Point • AP sends random number to station • Station encrypts random number • Uses RC4, 40 bit shared secret key & 24 bit IV • Encrypted random number sent to AP • AP decrypts received message • Uses RC4, 40 bit shared secret key & 24 bit IV • AP compares decrypted random number to transmitted random number
Security - Summary • Shared secret key required for: • Messages are encrypted. • Messages have checksum. • But SSID still broadcast in clear.
Wireless as Untrusted LAN • Treat wireless as untrusted. • Similar to Internet. • Firewall between WLAN and Backbone. • Extra authentication required. • Intrusion Detection • WLAN / Backbone junction. • Vulnerability assessments
Discover Unauthorised Use • Search for unauthorised access points or ad-hoc networks