KEMBAR78
Lec25 Wireless Security (A) | PDF | Ieee 802.11 | Computer Network
0% found this document useful (0 votes)
22 views26 pages

Lec25 Wireless Security (A)

The document provides an overview of wireless security, highlighting the vulnerabilities of wireless networks and various types of wireless attacks, particularly focusing on Bluetooth technology. It discusses the IEEE 802.11 wireless standard, its evolution, and different network modes, including infrastructure and ad-hoc modes. Additionally, it outlines key risks associated with wireless security and the components involved in wireless networking.

Uploaded by

Iman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views26 pages

Lec25 Wireless Security (A)

The document provides an overview of wireless security, highlighting the vulnerabilities of wireless networks and various types of wireless attacks, particularly focusing on Bluetooth technology. It discusses the IEEE 802.11 wireless standard, its evolution, and different network modes, including infrastructure and ad-hoc modes. Additionally, it outlines key risks associated with wireless security and the components involved in wireless networking.

Uploaded by

Iman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Wireless Security

Information Security

1
Wireless Security

• Wireless Security
– Wireless Network
– Wireless Attacks: Bluetooth
– IEEE 802.11 Wireless Standard
– Wireless Network Modes
– Wireless Security Overview
– Wireless Networking Components
– Wireless LAN Attacks
– Six Modes of Wireless NICs
– Securing Wireless Networks
Wireless Security

Wireless Networks
• Wireless networks always have been targets for attackers
– Early wireless networking standards had vulnerabilities
– Hackers have found wireless networks relatively easy to break
into, and even use wireless technology to crack into wired
networks.
Wireless Security

Wireless Attacks: Bluetooth


• Bluetooth
– Wireless technology
– Uses short-range radio frequency transmissions
– Provides for rapid, ad-hoc device pairings
• Example: smartphone and Bluetooth headphones
– Personal Area Network (PAN) technology
• Two types of Bluetooth network topologies
– Piconet
– Scatternet
Wireless Security

Bluetooth
Products
Wireless Security

Wireless Attacks: Bluetooth


• Piconet
– Established when two Bluetooth devices come within range of
each other
– One device (master) controls all wireless traffic
– Other device (slave) takes commands
• Active slaves can send transmissions
• Parked slaves are connected but not actively participating
Wireless Security

Wireless Attacks: Bluetooth


• Piconet
Wireless Security

Wireless Attacks: Bluetooth


• Scatternet
– Group of piconets with connections between different piconets
• Bluejacking
– Attack that sends unrequested messages to Bluetooth-enabled
devices
• Text messages, images, or sounds
– Considered more irritating than harmful
• No data is stolen
Wireless Security

Wireless Attacks: Bluetooth


• Scatternet
Wireless Security

Wireless Attacks: Bluetooth


• Bluesnarfing
– Unauthorized access to wireless information through a
Bluetooth connection
– Often between cell phones and laptops
– Attacker copies e-mails, contacts, or other data by connecting
to the Bluetooth device without owner’s knowledge
Wireless Security

IEEE 802.11 Wireless Standard


• IEEE 802: a committee responsible for LANs
• IEEE 802.11: responsible for developing wireless
protocols
– Many standards
• The Wi-Fi alliance: became popular with 802.11b
– Wi-Fi Protected Access (WPA, WPA2)
Wireless Security

IEEE 802.11 Wireless Standard


• Institute of Electrical and Electronics Engineers (IEEE)
– Most influential organization for computer networking and
wireless communications
– Began developing network architecture standards in the
1980s
• 1997: Release of IEEE 802.11
– Standard for wireless local area networks (WLANs)
– Higher speeds added in 1999: IEEE 802.11b
Wireless Security

IEEE 802.11 Wireless Standard


• IEEE 802.11a
– Specifies maximum rated speed of 54Mbps using the 5GHz
spectrum
• IEEE 802.11g
– Preserves stable and widely accepted features of 802.11b
– Increases data transfer rates similar to 802.11a
• IEEE 802.11n
– Approve in 2009
Wireless Security

IEEE 802.11 Wireless Standard


• Improvements in IEEE 802.11n
– Speed
– Coverage area
– Interference
– Security
• Wireless client network interface card adapter
– Performs same functions as wired adapter
– Antenna sends and receives signals
Wireless Security

Wireless Network Modes


• The 802.11 wireless networks operate in two basic
modes:
– Infrastructure mode
– Ad-hoc mode
• Infrastructure mode
– Each wireless client connects directly to a central device
called Access Point (AP)
– No direct connection between wireless clients
– AP acts as a wireless hub that performs the connections
and handles them between wireless clients
Wireless Security

Wireless Network Modes


• Ad-hoc mode
– Each wireless client connects directly with each other
– No central device managing the connections
– Rapid deployment of a network where no infrastructures
exist (advantage in case of disaster…)
– Each node must maintain its proper authentication list
Wireless Security

Wireless Security Overview


• Concerns for wireless security are similar to those found
in a wired environment
• Security requirements are the same:
– Confidentiality, integrity, availability, authenticity, accountability
– Most significant source of risk is the underlying communications medium
Wireless Security

Wireless Security Overview: Key Risks Factors


• Channel: broadcast communication (more sensitive to
eavesdropping and jamming)
• Mobility: Additional risks
• Resources: Advanced OS (iPhone, Android), but limited
resources (memory, processing)
• Accessibility: Certain devices may be left unattended
Wireless Security

Wireless Networking Components (Facilitating points of


attacks)
• Wireless client: WIFI-enabled laptop/tablet, cell phone, Bluetooth
device, …
• Access point: Cell towers, WIFI hotspots, wireless routers
• Transmission medium: carries signals
Wireless Security

Wireless Networking Components


• Access point (AP) major parts
– Antenna and radio transmitter/receiver send and receive
wireless signals
– Bridging software to interface wireless devices to other devices
– Wired network interface allows it to connect by cable to
standard wired networks
Wireless Security

Wireless Networking Components


Wireless Security

Wireless Networking Components


• AP functions
– Acts as “base station” for wireless network
– Acts as a bridge between wireless and wired networks
• Can connect to wired network by a cable
– Instead of running cable between the two buildings, which is
more expensive, two outdoor access points have been
configured for wireless mesh.
Wireless Security

Wireless Networking Components


• Autonomous access points
– All APs were Autonomous mode, which means that each AP
worked as a standalone unit with no knowledge of or
interaction among other APs.
– APs are connected to the same network, and may use the same
SSID, they are all individually configured and separate from one
another.
– Have necessary “intelligence” for wireless authentication,
encryption, and management
Wireless Security

Wireless Networking Components


• Autonomous access points
Wireless Security

Wireless Networking Components


• Lightweight access points
– Rather than using Autonomous mode APs, you can use
Lightweight mode APs if you have a network component that
offers Wireless LAN Controller services.
• Wireless broadband routers
– Single hardware device containing AP, firewall, router, and
DHCP server
Wireless Security

Wireless Networking Components

You might also like