+ All Categories
Home > Documents > CSE 5/7349 – April 5 th 2006 Wireless Networking.

CSE 5/7349 – April 5 th 2006 Wireless Networking.

Date post: 06-Jan-2018
Category:
Upload: emery-dorsey
View: 220 times
Download: 4 times
Share this document with a friend
Description:
FEC
40
CSE 5/7349 – April 5 th 2006 Wireless Networking
Transcript
Page 1: CSE 5/7349 – April 5 th 2006 Wireless Networking.

CSE 5/7349 – April 5th 2006

Wireless Networking

Page 2: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Compression

Page 3: CSE 5/7349 – April 5 th 2006 Wireless Networking.

FEC

Page 4: CSE 5/7349 – April 5 th 2006 Wireless Networking.

CRC

Page 5: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Modulation

Page 6: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Bits / Symbols / Baud

Page 7: CSE 5/7349 – April 5 th 2006 Wireless Networking.

DSSS / FHSS

Page 8: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Wireless Security History

• Cordless Phones• Baby Monitors• Networking

Page 9: CSE 5/7349 – April 5 th 2006 Wireless Networking.

802.11 Components

Page 10: CSE 5/7349 – April 5 th 2006 Wireless Networking.

802.11 modes

• Infrastructure mode• Ad-hoc mode (peer-to-peer)

Page 11: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Infrastructure mode

Basic Service Set (BSS) – Single cell

Extended Service Set (ESS) – Multiple cells

Access Point

Station

Page 12: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Ad-hoc mode

Independent Basic Service Set (IBSS)

Page 13: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Open System Authentication

Page 14: CSE 5/7349 – April 5 th 2006 Wireless Networking.

MAC Address Locking

Page 15: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Interception Range

Basic Service Set (BSS) – Single cell

Station outsidebuilding perimeter.

100 metres

Page 16: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Interception

Page 17: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Directional Antenna

• Directional antenna provides focused reception.

• D-I-Y plans available.– Aluminium cake tin.– 11 Mbps at 750 meters.

– http://www.saunalahti.fi/~elepal/antennie.html

Page 18: CSE 5/7349 – April 5 th 2006 Wireless Networking.

802.11b Security Services

Page 19: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Wired Equivalence Privacy

Page 20: CSE 5/7349 – April 5 th 2006 Wireless Networking.

WEP – Sending

Page 21: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Initialization Vector

Page 22: CSE 5/7349 – April 5 th 2006 Wireless Networking.

WEP – Receiving

Page 23: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Shared Key Authentication

• When station requests association with Access Point– AP sends random number to station– Station encrypts random number

• Uses RC4, 40 bit shared secret key & 24 bit IV– Encrypted random number sent to AP– AP decrypts received message

• Uses RC4, 40 bit shared secret key & 24 bit IV– AP compares decrypted random number to

transmitted random number

Page 24: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Security - Summary

• Shared secret key required for:• Messages are encrypted.• Messages have checksum.• But SSID still broadcast in clear.

Page 25: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Security Attacks

Page 26: CSE 5/7349 – April 5 th 2006 Wireless Networking.

802.11 Insecurities

Page 27: CSE 5/7349 – April 5 th 2006 Wireless Networking.

IV Collision attack

Page 28: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Limited WEP keys

Page 29: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Brute Force Key Attack

Page 30: CSE 5/7349 – April 5 th 2006 Wireless Networking.

128 bit WEP

Page 31: CSE 5/7349 – April 5 th 2006 Wireless Networking.

IV weakness

Page 32: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Wepcrack

Page 33: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Airsnort

Page 34: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Safeguards

Page 35: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Wireless as Untrusted LAN

• Treat wireless as untrusted.– Similar to Internet.

• Firewall between WLAN and Backbone.• Extra authentication required.• Intrusion Detection

– WLAN / Backbone junction.• Vulnerability assessments

Page 36: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Discover Unauthorised Use

• Search for unauthorised access points or ad-hoc networks

Page 37: CSE 5/7349 – April 5 th 2006 Wireless Networking.

Location of AP

Page 38: CSE 5/7349 – April 5 th 2006 Wireless Networking.

IPSec VPN

Page 39: CSE 5/7349 – April 5 th 2006 Wireless Networking.

IEEE 802.11i

Page 40: CSE 5/7349 – April 5 th 2006 Wireless Networking.

802.11i – Encryption Enhancements


Recommended