460 likes | 626 Views
Chapter 8. Wireless Security. Objectives. Explain wireless networking and why it is used Describe IEEE 802.11 radio wave networking Explain Bluetooth networking Describe attacks on wireless networks Discuss wireless security measures
E N D
Chapter 8 Wireless Security
Objectives • Explain wireless networking and why it is used • Describe IEEE 802.11 radio wave networking • Explain Bluetooth networking • Describe attacks on wireless networks • Discuss wireless security measures • Configure security for wireless interfaces in workstation operating systems Guide to Operating System Security
Introduction to Wireless Networking • Enables communications where a wired network is impractical • Reduces installation costs • Provides “anywhere” access • Enables easier small and home office networking • Enables data access to fit the application Guide to Operating System Security
Attacks on Wireless Networks • Many opportunities, particularly through sniffer software • Difficult or impossible to detect Guide to Operating System Security
Wireless Network Support Organizations • Wireless LAN Association (WLANA) • WINLAB Guide to Operating System Security
Why Use a Wireless Network Instead of a Wired Network? • A wired network can be difficult or impossible to install in some situations Guide to Operating System Security
Radio Wave Technologies • Network applications use high frequencies measured in hertz • Line-of-sight transmission • Spread spectrum technology • Popular technologies • IEEE 802.11 standard • Bluetooth Guide to Operating System Security
Radio Wave Technologies Guide to Operating System Security
Radio Wave Technologies • Advantages • Relatively inexpensive • Easy to install • Provide anywhere access • Offer an alternative for hard-to-cable areas • Disadvantages • Do not have speeds to match 100Mbps communications • Frequencies may experience interference Guide to Operating System Security
IEEE 802.11 Radio Wave Networking (Continued) • Advantages in terms of compatibility and reliability • Devices are not proprietary • Encompasses fixed and mobile stations • Recognizes indoor and outdoor communications Guide to Operating System Security
IEEE 802.11 Radio Wave Networking (Continued) • Kinds of communication • Discrete units (asynchronous) • Governed by time restrictions Guide to Operating System Security
How IEEE 802.11 Wireless Networks Function • Components • Access methods • Handling of data errors • Transmission speeds • Authentication • Topologies • Multiple-cell wireless LANs Guide to Operating System Security
Wireless Components • Wireless NIC (WNIC) • Functions as a transmitter/receiver (transceiver) • Access point • Antennas • Directional antenna • Omnidirectional antenna Guide to Operating System Security
Directional Antenna Guide to Operating System Security
Omnidirectional Antenna Guide to Operating System Security
Wireless Networking Access Methods • Priority-based access • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Guide to Operating System Security
Handling Data Errors • Automatic repeat request (ARQ) characteristic • Helps reduce communication errors created by sources of interference Guide to Operating System Security
Transmission Speeds Guide to Operating System Security
Infrared Wireless Networking • 802.11R standard • Can be broadcast in a single direction or in all directions • Transmits in range of 100 GHz to 1000 THz Guide to Operating System Security
Infrared Wireless Networking • Security factors • Difficult to intercept without someone knowing • Not susceptible to interference from RFI and EMI • Disadvantages (but also make it more secure) • Data transmission rates only reach up to 16 Mbps (directional) and can be less than 1 Mbps (omnidirectional) • Does not go through walls Guide to Operating System Security
Diffused Infrared Wireless Communication Guide to Operating System Security
Using Authentication to Disconnect • Prevents two communicating stations from being inadvertently disconnected by a nonauthorized station Guide to Operating System Security
802.11 Network Topologies • Independent basic service set (IBSS) topology • Consists of two or more wireless stations that can be in communication • Does not use an access point • Extended service set (ESS) topology • Uses one or more access points to provide a larger service area than an IBSS topology Guide to Operating System Security
IBSS Wireless Topology Guide to Operating System Security
ESS Wireless Topology Guide to Operating System Security
Multiple-Cell Wireless LANs • ESS wireless topology that employs two or more access points • Inter-Access Point Protocol (IAPP) • Roaming protocol that enables a mobile station to move from one cell to another without losing connection Guide to Operating System Security
Bluetooth Radio Wave Networking • Uses frequency hopping in the 2.4-GHz band designated by FCC for unlicensed ISM transmissions • Uses time-division duplexing (TDD) for packet transmissions Guide to Operating System Security
Anatomy of Attacks on Wireless Networks • Antenna • Wireless network interface card • GPS • War-driving software Guide to Operating System Security
Rogue Access Point • Wireless access point installed without knowledge of network administrator • Not configured to have security • Provides an attacker with an unsecured entryway to packet communications Guide to Operating System Security
Attacks Through Long-Range Antennas • Increases reach of a signal • Enables network to be monitored from a greater distance without being observed Guide to Operating System Security
Man-in-the-Middle Attacks • Interception of a message meant for a different computer • Attacker operates between two communicating computers in order to: • Listen in on communications • Modify communications Guide to Operating System Security
Pitfalls of Wireless Communications • Inherently not secure because they are transported over radio waves • Considerations • Avoid wireless communications for extremely sensitive information • Configure tightest security available Guide to Operating System Security
Wireless Security Measures • Open system authentication • Shared key authentication • Wired Equivalent Privacy (WEP) • Service set identifier (SSID) • 802.1x security • 802.1i security Guide to Operating System Security
Open System Authentication • Two stations can authenticate each other • Provides little security, only mutual agreement to authenticate • Default form of authentication in 802.11 Guide to Operating System Security
Shared Key Authentication • Uses symmetrical encryption • Same key for both encryption and decryption Guide to Operating System Security
Wired Equivalent Privacy (WEP) • Same encryption key is used at both stations that are communicating Guide to Operating System Security
Wired Equivalent Privacy (WEP) Guide to Operating System Security
Service Set Identifier (SSID) • Identification value: • typically up to 32 characters in length • defines a logical network for all devices that belong to it • Each device is configured to have same SSID • Typically used in ESS, but not IBSS Guide to Operating System Security
802.1x Security • Port-based form of authentication • Uncontrolled port • Controlled port • Does not include encryption • can be set up to work with EAP and its evolving versions (EAP-TTLS and PEAP) • Use different computers for authentication server and authenticator Guide to Operating System Security
802.1i Security • Builds on 802.1x standard • Implements Temporal Key Integrity Protocol (TKIP) for creating random encryption keys from one master key Guide to Operating System Security
Configuring Security for Wireless Interfaces • Windows 2000/XP Professional • Support use of WNICs • Red Hat Linux 9.x • Supports use of WNICs (installed through GNOME desktop Network Device Control tool) • Mac OS X • Built-in compatibility for AirPort WNICs and base stations (access points) Guide to Operating System Security
Open system authentication Shared key authentication WEP (40-bit and 104-bit keys) SSID 802.1x EAP Authentication through RADIUS Windows 2000 Professional Wireless Security Techniques Guide to Operating System Security
Open system authentication Shared key authentication WEP (40-bit and 104-bit keys) SSID 802.1x EAP and EAP-TLS PEAP Authentication through RADIUS Windows XP Professional Wireless Security Techniques Guide to Operating System Security
Red Hat Linux Wireless Security Techniques • Open system authentication • Shared key authentication • WEP (40-bit and 104-bit keys) • SSID • 802.1x Guide to Operating System Security
Mac OS X Wireless Security Techniques • Open system authentication • Shared key authentication • WEP (40-bit and 104-bit keys) • SSID • RADIUS authentication • Firewall protection Guide to Operating System Security
Summary • How wireless networks work • Popular approaches to wireless networking • IEEE 802.11 • Bluetooth • Types of attacks against wireless networks • Wireless security measures and how to implement them in client operating systems Guide to Operating System Security