Chapter 15: Wireless Networking Flashcards
Cons to WiFi
1) DECREASE IN BANDWIDTH B/C MORE DEVICES CONNECTED
2) INVEST IN NW CARDS, INFRASTRUCTURE
3) INTERFERENCE W/ OTHER DEVICES
4) LESS RANGE THAN ADVERTISED (usually half the distance promised)
5) TERRAIN CAN SLOW DOWN SIGNALS
Characteristics of WiFi
1) uses RADIO WAVES to transmit data
2) works at the physical layer of the NW
Techniques to managing a connection
1) DSSS (direct-sequence spread spectrum)
2) FHSS (frequency-hopping spread spectrum)
3) IR (infrared)
4) OFDM (orthogonal frequency-division multiplexing)
WiFi Environment: Extension to an existing wired NW as either HW (HAPs) or SW (SAPs) based access points
HAPs //use device such as wireless router or dedicated wireless access point
SAPs //wireless-enabled system attached to a wired NW, which in essence shares its wireless adapter
WiFi Environment: Multiple access points
allows clients to roam from location to location
WiFi Environment: LAN-to-LAN wireless NW
wired NWs in different locations to be connected through wireless technology
WiFi Environment: 3G or 4G hot spot
provides WiFi access to WiFi enabled devices
Wireless standards
1) 802.11a 5Ghz (freq), 54 Mbps (speed), 75 ft (range)
2) 802.11b 2.4Ghz, 11 Mbps, 150 ft
3) 802.11g 2.4Ghz, 11 Mbps, 150 ft
4) 802.11n 2.4/5Ghz, 54 Mbps, ~100 ft
5) 802.16 (WiMAX) 10-66Ghz, 70-1000 Mbps, 30 miles
6) Bluetooth 2.4Ghz, 1-3 Mbps (1st Gen), 33 ft
About SSID
Service Set Identifier
32 Bytes
Embedded within header of packets
Open NWs, it’s visible
Closed NWs, not visible or “cloaked”
Common Wireless Terms:
GSM Association BSSID Hot Spot Access Point ISM Bandwidth
GSM // Global System for Mobile Communications // international standard for mobile wireless
Association //connecting a client to an access point
BSSID // basic service set identification //MAC address of an access point
Hot Spot //location that provides wireless access to public such as coffee shop or airport
Access Point //HW or SW construct that provides wireless access
ISM band// industrial scientific, and medical band //unlicensed band of frequencies
Bandwidth //speed avilable for devices
Antennas
Yagi antenna
Omnidirectional antenna
Parabolic grid antenna
Yagi antenna //unidirectional, works well transmitting and receiving signals in some directions //typically used when signal is needed from site to site instead of covering a wide area //enhances security by limiting signals to smaller areas
Omnidirectional antenna //emits signals in all directions, but some directions better than others //can transmit data in 2-D well, but not in 3-D
Parabolic grid antenna //takes form of a dish, unidirectional, sends and receives data over one axis //PRO -catches parallel signals and focuses them to a single receiving point, so gets better signal quality and over longer ranges //can receive over a distance of 10 miles
WiFi Authentication Mode: Open System Authentication
//make NW available to wide range of clients
//authentication occurs when an authentication frame is sent from a client to an access point; access point receives frame, verifies SSID, if correct access point sends verification frame back to client, allowing connection to be made
WiFi Authentication Mode: Shared Key Authentication
//each client receives key ahead of time and can connect anytime
//clients send authentication request to access point, ap returns challenge to client, client encrypts challenge using shared key, ap uses same shared key to decrypt challenge, if responses match, client validated and connected
Wireless encryption and authentication protocols:
WEP WPA WPA2 WPA2 Enterprise TKIP AES EAP LEAP RADIUS 802.11i CCMP
WEP//Wired Equivalent Privacy//oldest and weakest
WPA//WiFi Protected Access//successor to WEP, addressed many problems //uses TKIP [Temporal Key Integrity Protocol], MIC [Message Integrity Code], and AES [Advanced Encryption Standard] encryption
WPA2//address WPA probs //uses AES, CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol), EAP [extensible authentication protocol], TKIP, AES [with longer keys]
WPA2 Enterprise//incorporates EAP to strengthen security and scale system up to large enterprise environments
TKIP//enhances WPA over WEP
AES//symmetric-key encryption//used in WPA2 to replace TKIP
EAP //incorpoaated into multiple authentication methods //such as tokent cards, Kerberos, certificates
LEAP //Lightweight Extensible Authentication Protocol //made by cisco
RADIUS //Remote Authentication Dial-in User Service //centralized authentication and authorization mgmt system
802.11i //IEEE standard that species security mechs for 802.11 wireless NWs
CCMP //uses 128bit keys, with 48bit initialization vector (IV) for replay detection
WEP
failed all: //intended to provide security on same level as wired NWs //defeat eavesdropping on communications //check integrity of data as it flows access NW //use shared key to encrypt packets prior to transmission //provide confidentiality, access control
problems: //protocol was designed without input from academic community or public and professional cryptologists //attacker can easily uncover key with ciphertext and plaintext //CRC32 //Cyclic Redundancy Check //integrity checking sis flaws and ez to modify packets //IVs//initialization vectors are only 24 bits, so an entire pools of IVs can be exhausted in short time //vulnerable to DoS attack through messages not authenticated by WEP
// WEP uses IVs a lot; randomized value used with the secret key for data encryption purposes, when these two values are combined, they form a # used once (nonce)