40
CSE 5/7349 – April 5 th 2006 Wireless Networking

CSE 5/7349 – April 5 th 2006 Wireless Networking

Embed Size (px)

DESCRIPTION

FEC

Citation preview

Page 1: CSE 5/7349 – April 5 th 2006 Wireless Networking

CSE 5/7349 – April 5th 2006

Wireless Networking

Page 2: CSE 5/7349 – April 5 th 2006 Wireless Networking

Compression

Page 3: CSE 5/7349 – April 5 th 2006 Wireless Networking

FEC

Page 4: CSE 5/7349 – April 5 th 2006 Wireless Networking

CRC

Page 5: CSE 5/7349 – April 5 th 2006 Wireless Networking

Modulation

Page 6: CSE 5/7349 – April 5 th 2006 Wireless Networking

Bits / Symbols / Baud

Page 7: CSE 5/7349 – April 5 th 2006 Wireless Networking

DSSS / FHSS

Page 8: CSE 5/7349 – April 5 th 2006 Wireless Networking

Wireless Security History

• Cordless Phones• Baby Monitors• Networking

Page 9: CSE 5/7349 – April 5 th 2006 Wireless Networking

802.11 Components

Page 10: CSE 5/7349 – April 5 th 2006 Wireless Networking

802.11 modes

• Infrastructure mode• Ad-hoc mode (peer-to-peer)

Page 11: CSE 5/7349 – April 5 th 2006 Wireless Networking

Infrastructure mode

Basic Service Set (BSS) – Single cell

Extended Service Set (ESS) – Multiple cells

Access Point

Station

Page 12: CSE 5/7349 – April 5 th 2006 Wireless Networking

Ad-hoc mode

Independent Basic Service Set (IBSS)

Page 13: CSE 5/7349 – April 5 th 2006 Wireless Networking

Open System Authentication

Page 14: CSE 5/7349 – April 5 th 2006 Wireless Networking

MAC Address Locking

Page 15: CSE 5/7349 – April 5 th 2006 Wireless Networking

Interception Range

Basic Service Set (BSS) – Single cell

Station outsidebuilding perimeter.

100 metres

Page 16: CSE 5/7349 – April 5 th 2006 Wireless Networking

Interception

Page 17: CSE 5/7349 – April 5 th 2006 Wireless Networking

Directional Antenna

• Directional antenna provides focused reception.

• D-I-Y plans available.– Aluminium cake tin.– 11 Mbps at 750 meters.

– http://www.saunalahti.fi/~elepal/antennie.html

Page 18: CSE 5/7349 – April 5 th 2006 Wireless Networking

802.11b Security Services

Page 19: CSE 5/7349 – April 5 th 2006 Wireless Networking

Wired Equivalence Privacy

Page 20: CSE 5/7349 – April 5 th 2006 Wireless Networking

WEP – Sending

Page 21: CSE 5/7349 – April 5 th 2006 Wireless Networking

Initialization Vector

Page 22: CSE 5/7349 – April 5 th 2006 Wireless Networking

WEP – Receiving

Page 23: CSE 5/7349 – April 5 th 2006 Wireless Networking

Shared Key Authentication

• When station requests association with Access Point– AP sends random number to station– Station encrypts random number

• Uses RC4, 40 bit shared secret key & 24 bit IV– Encrypted random number sent to AP– AP decrypts received message

• Uses RC4, 40 bit shared secret key & 24 bit IV– AP compares decrypted random number to

transmitted random number

Page 24: CSE 5/7349 – April 5 th 2006 Wireless Networking

Security - Summary

• Shared secret key required for:• Messages are encrypted.• Messages have checksum.• But SSID still broadcast in clear.

Page 25: CSE 5/7349 – April 5 th 2006 Wireless Networking

Security Attacks

Page 26: CSE 5/7349 – April 5 th 2006 Wireless Networking

802.11 Insecurities

Page 27: CSE 5/7349 – April 5 th 2006 Wireless Networking

IV Collision attack

Page 28: CSE 5/7349 – April 5 th 2006 Wireless Networking

Limited WEP keys

Page 29: CSE 5/7349 – April 5 th 2006 Wireless Networking

Brute Force Key Attack

Page 30: CSE 5/7349 – April 5 th 2006 Wireless Networking

128 bit WEP

Page 31: CSE 5/7349 – April 5 th 2006 Wireless Networking

IV weakness

Page 32: CSE 5/7349 – April 5 th 2006 Wireless Networking

Wepcrack

Page 33: CSE 5/7349 – April 5 th 2006 Wireless Networking

Airsnort

Page 34: CSE 5/7349 – April 5 th 2006 Wireless Networking

Safeguards

Page 35: CSE 5/7349 – April 5 th 2006 Wireless Networking

Wireless as Untrusted LAN

• Treat wireless as untrusted.– Similar to Internet.

• Firewall between WLAN and Backbone.• Extra authentication required.• Intrusion Detection

– WLAN / Backbone junction.• Vulnerability assessments

Page 36: CSE 5/7349 – April 5 th 2006 Wireless Networking

Discover Unauthorised Use

• Search for unauthorised access points or ad-hoc networks

Page 37: CSE 5/7349 – April 5 th 2006 Wireless Networking

Location of AP

Page 38: CSE 5/7349 – April 5 th 2006 Wireless Networking

IPSec VPN

Page 39: CSE 5/7349 – April 5 th 2006 Wireless Networking

IEEE 802.11i

Page 40: CSE 5/7349 – April 5 th 2006 Wireless Networking

802.11i – Encryption Enhancements