Wireless Chapter 4,5,6
Wireless Chapter 4,5,6
Wireless Chapter 4,5,6
Chapter 4
WLAN
Technology
802.11 standard is defined as a WLAN technology
environment
802.11 wireless medium is a perfect fit for local area
to the medium
Uses half duplex
802.11b
802.11g
802.11n
802.11a
Uses 5 GHz RF spectrum band
devices
Range is approximately 33% that of the 802.11 b/g
technologies
Increasingly difficult to find 802.11a compliant equipment
802.11g
2.4 GHz technologies
Maximum data-rate increase to 54 Mbps
Same range as the 802.11b
Backward compatible with 802.11b
Have 3 clean channels
802.11n
Uses multiple-input, multiple-output (MIMO) technology.
Extends the range and data throughput because it uses multiple receiving
an antenna.
Wireless client
Any host device that can participate in a wireless
network.
Can either be stationary or mobile
Ad-hoc mode
Is the simplest form of a wireless network
Created by connecting two or more wireless clients together in a
peer-to-peer network
Does not include AP
All the clients are equal
Good for small network
Used to exchange files and information b/n devices without the
expense and complexity of purchasing and configuring an AP
The area covered by this network is called IBSS (Independent
Basic Service Set )
INFRASTRUCTURE MODE
Used in larger networks which require a single device that
controls communications in the wireless cell.
Uses AP to control who can talk and when
Individual STAs can not communicate directly with each
other.
To communicate each device must obtain permission from
the AP
The AP ensures that all STAs have equal access to the
medium
The area covered by a single AP is known as BSS or Cell
BSS is the smallest building block of a WLAN
To expand the coverage area, it is possible to connect
multiple BSSs through a Distribution System. This forms an
ESS(extended service set)
BSSs must overlap by ~10% to allow movement b/n the
cells without loss of signal.
This allows the client to connect to the second AP before
disconnecting from the first AP.
Wireless Channel
is broadcast.
It is possible to disable the broadcast feature of the SSID. If
A rouge access point is basically an access point that has been added to one's
network without one's knowledge. One totally has no idea that it is there.
A rogue access point is any unauthorized Wi-Fi device that is not under the
management of the proper network administrators
is a potential open and unsecured gateway straight into the wired infrastructure
example, if a user visits a banking website and tries to deposit money into an
account, a rogue access point can redirect the deposit to an attacker's account.
3
Eavesdropping attack
An eavesdropping attack, hackers listen in on data that flows
through the network.
This gives them access to things like passwords, identifying
details, and credit card numbers.
An eavesdropping attack occurs when a hacker intercepts,
deletes, or modifies data that is transmitted between two
devices.
Eavesdropping, also known as sniffing or snooping, relies on
unsecured network communications to access data in transmit
between devices.
example of eavesdrop is to listen to your neighbors'
argument through a vent in your apartment.
33
Eavesdropping
Access to wireless transmissions is available to anyone within listening range, and therefore strong
encryption is mandatory.
inSSIDer, NetStumbler, and iStumbler. Also known as War driving i.e. the act of looking for
wireless networks, usually while in a moving vehicle using programs like NetStumbler.
(harmless)
Malicious eavesdropping, the unauthorized use of 802.11 protocol analyzers to capture wireless
communications (illegal).
802.11 protocol analyzers used by network administrators for analyzing and troubleshooting
Any clear text communications such as email, FTP, Web pages, instant messages, VoIP packets
What is authentication ?
Authentication is the process of verifying the identity of a
person or device.
Authentication attack allows an attacker to guess a person's user
accounts and tend to use the same user name and password for
each.
Example: use club name, his name etc as user name and
password
35
MAC Spoofing
36
Wireless Hijacking
The attacker configures access point software on a laptop, effectively turning a Wi-Fi
The access point software is configured with the same SSID that is used by a public
users associated with the hotspot AP to roam to the evil twin AP. At this point, the
attacker has effectively hijacked wireless clients at layer 2 from the original AP
an RF jammer can also be used to force any clients to roam to an evil twin AP.
37
Wireless hijacking
38
Some cyber crime committed using WLAN
Cyber terrorism
An act of terrorism committed by the use of cyberspace
or computer network
For instance, a straightforward advertisement on the
Internet, that there will be bomb attacks in certain places
A cyber terrorist is someone who intimidates or forces
the government or organization to spread his social
objectives by initiating a computer-based attack hostile
to computers,
network and the information stored on them
5
Salami Attacks
8
Cyber Squatting
9
Cyber Smearing
11
3.3.1 WLAN Security
One way to limit access to your wireless network is to control exactly which devices can
gain access to your network.
This can be accomplished through filtering of the MAC address.
MAC addresses of all devices that should have access to the network be
included in the database before connection attempts occur.
Preventing user from connecting into the network avoiding from database
46
Authentication on a WLAN
47
Open Authentication
50
5.3.3 Encryption on a WLAN
51
Wired Equivalency protocol (WEP)
52
…Wired Equivalency Protocol (WEP)
14
Wi-Fi Protected Access (WPA)
54
Wireless Intrusion Detection System(WIDS)
55
Wireless Intrusion Prevention System (WIPS)
57
i v e
r F
pt e
c ha
of
nd
E
58
CHAPTER SIX
Mobile (cellular) network
6.1. Mobile Network
The cells in a cellular network vary in size, depending on how many calls are
conducted within that geographic area.
The smallest cells, which might cover only a few city blocks, are those where
there’s the heaviest population density, and thus the largest demand for service.
The largest cells are most often in rural areas with a smaller population per
square mile.
62
Types Of Cells
The different types of cells are given different names according to their size and
function:
Macro cells: Macro cells are large cells that are usually used for remote or sparsely
populated areas. These may be 10 km or possibly more in diameter.
Micro cells: Micro cells are those that are normally found in densely populated areas
which may have a diameter of around 1 km.
Pico cells: Pico cells are generally used for covering very small areas such as
particular areas of buildings, or possibly tunnels where coverage from a larger cell in
the cellular system is not possible.
Obviously for the small cells, the power levels used by the base stations are much
lower and the antennas are not position to cover wide areas.
In this way the coverage is minimized and the interference to adjacent cells is
reduced.
Selective cells: Sometimes cells termed selective cells may be used where full 360
degree coverage is not required. They may be used to fill in a hole in the coverage in
the cellular system, or to address a problem such as the entrance to a tunnel etc.
Umbrella cells: umbrella cell is sometimes used where a heavily used road crosses an
area where there are microcells.
63
Frequency reuse
The key characteristic of a cellular network is the ability to re-
use frequencies to increase both coverage and capacity.
As shown above, adjacent cells must use different frequencies;
however there is no problem with two cells sufficiently far apart
operating on the same frequency.
The elements that determine frequency reuse are the reuse
distance and the reuse factor.
The reuse distance, D is calculated as:
Where R is the cell radius and N is the number of cells per
cluster. Cells may vary in radius from 1 to 30 kilometers. The
boundaries of the cells can also overlap between adjacent cells
and large cells can be divided into smaller cells
64
6.2. Cellular network Structure
66
Subscriber Identity Module (SIM)
67
Base Station (BS) or Base Transceiver Station (BTS)
69
Base Station Control (BSC)
70
Mobile Switching Center (MSC)
71
Roaming
Roaming is the ability for a customer of mobile
communications to automatically make and receive telephone
calls,
send and receive data, or
73
Visitor Location Register (VLR)
74
Public Switched Telephone Network
75
6.3.1. Creating a Secure Environment
76
Authorization
80
6.3.3. Security Technologies
82
Digital certificate
83
Biometrics
Biometrics provides a wide range of techniques for authenticating an
individual based on his or her unique physical characteristics.
Such techniques include fingerprint identification, face recognition, voice
recognition, or iris and retina scanning.
Using biometric techniques, you can ensure that the identification token is
definitely unique.
biometric systems are growing in popularity due to increased security
concerns among all users.
While this use of biometrics does improve security, this type of
authentication does have some drawbacks.
Many of these systems are somewhat intrusive and therefore not widely
accepted by users.
Some biometric technique can control personal activity without individual
interest.
84
digital signature
85
Other Security Measures
Firewall
Firewalls are the most common form of security implemented
within organizations.
A firewall is a security device in the form of computer hardware
or software.
It can help protect your network by acting as an intermediary
between your internal network and outside traffic.
A Firewall is a network security device that monitors and filters
incoming and outgoing network traffic based on an
organization's previously established security policies.
86
Virtual Private Networks (VPNs)
87
se x
t e r
hap
f c
d o
En
88