5 - Wireless Technologies
5 - Wireless Technologies
5 - Wireless Technologies
TECHNOLOGIES
After completion of this chapter, you
should be able to :
Describe wireless technology
Describe the various components and structure of a
wireless LAN.
Describe wireless security and mitigation strategies.
Configure an integrated wireless access point and
wireless client.
Definition
Wireless technologies use electromagnetic waves to
carry information between devices.
Electromagnetic wave is the same medium that carries
radio signals through the air.
Electromagnetic Spectrum
Electromagnetic spectrum includes
Radio & Tv broadcast bands
Visible light
Infrared
Radio Frequency
EM SPCTRUM
Wireless Tech & Devices
Infrared
Low energy & cannot penetrate trough walls or other
obstacles.
Used to connect & move data between devices such as
PDA and PCs.
A specialized communication port known as Infrared
Direct Access (IrDA) port uses IR to exchange
information between devices.
Cont..
IR only allows a one-to-one type of connection.
Also used for remote control devices, wireless mice
and wireless keyboard.
Radio Frequency (RF)
RF can penetrate through walls & other obstacles.
Certain areas of RF bands have been set aside for use
unlicensed such as wireless LANs. Range include
900MHz, 2.4GHz & 5GHz frequency ranges.
This ranges known as Industrial Scientific & Medical
(ISM).
Bluetooth
Makes use of the 2.4GHz band.
Limited to low-speed, short-range communications.
One to many communications connecting computer
peripherals such as mice, keyboards and printers.
Wireless LANs
Use of 2.4GHz and 5GHz bands are the modern
wireless LAN that conform to various IEEE 802.11
standards
Transmit at a much higher power level, which gives
them a greater range.
Benefits of Wireless Tech
Mobility-allows for easy connection of both stationary
& mobile clients
Scalability-can be easily expanded to allow more users
to connect & to increase the coverage area.
Flexibility-Provides anytime, anywhere connectivity.
Cost Savings-Equipment costs continue to fall as the
technology matures
Cont..
Reduce Installation Time-Installation of a single piece
of equipment can provide connectivity for a large
number of people.
Reliability in harsh environments-easy to install in
emergency & hostile environments.
Wireless Tech limitations
Interference-Wireless technology is susceptible to
interference from other devices that produce
electromagnetic energies. Includes cordless phones,
microwaves, televisions & others.
Network & Data Security-WLAN tech is designed to
provide access to the data being transmitted, not
security of the data. Additionally it can provide &
unprotected entrance into the wired network.
Cont..
Technology-WLAN tech continues to evolve. WLAN
tech does not currently provide the speed or reliability
of wired LANS.
Types of Wireless Networks
Cont..
WPAN
Smallest wireless network used to connect various peripheral
devices such as mice, keyboards & PDAs to a computer.
All devices are dedicated to a single host with usually use IR or
Bluetooth tech.
Cont..
WLAN
Used to extend the boundaries of the LANs
Use RF technology & conform to the IEEE 802.11 standards.
Why people
Attack WLANs
Steal information
Cont..
One easy way to gain entry to a wireless network is
through the network name, or SSID.
All computers connecting to the wireless network must
know the SSID.
By default, wireless routers and access points broadcast
SSIDs to all computers within the wireless range.
With SSID broadcast activated, any wireless client can
detect the network and connect to it, if no other security
features are in place.
The SSID broadcast feature can be turned off. When it is
turned off, the fact that the network is there is no longer
made public.
Any computer trying to connect to the network must
already know the SSID.
Limiting Access to a WLAN
MAC address filtering
MAC address filtering uses the MAC address to
identify which devices are allowed to connect to the
wireless network.
When a wireless client attempts to connect, or
associate, with an AP it will send MAC address
information.
If MAC filtering is enabled, the wireless router or AP
will look up its MAC address a preconfigured list.
Only devices whose MAC addresses have been pre-
recorded in the router's database will be allowed to
connect.
Cont..
If the MAC address is not located in the database, the
device will not be allowed to connect to or
communicate across the wireless network.
There are some issues with this type of security. For
example, it requires the MAC addresses of all devices
that should have access to the network be included in
the database before connection attempts occur.
A device that is not identified in the database will not
be able to connect.
Additionally, it is possible for an attacker's device to
clone the MAC address of another device that has
access.
Authentication on a WLAN
1)Open Authentication
By default, wireless devices do not require authentication.
Any and all clients are able to associate regardless of who
they are.
This is referred to as open authentication.
Open authentication should only be used on public
wireless networks such as those found in many schools
and restaurants.
It can also be used on networks where authentication will
be done by other means once connected to the network.
Open Authentication
Cont..
2) Pre-shared keys (PSK)
With PSK both the AP and client must be configured with
the same key or secret word.
The AP sends a random string of bytes to the client. The
client accepts the string, encrypts it (or scrambles it)
based on the key, and sends it back to the AP.
The AP gets the encrypted string and uses its key to
decrypt (or unscramble) it.
If the decrypted string received from the client matches
the original string sent to the client, the client is allowed
to connect.
PSK performs one-way authentication, that is, the host
authenticates to the AP.
PSK does not authenticate the AP to the host, nor does it
authenticate the actual user of the host.
Pre-Shared Key
Cont..
3) Extensible Authentication Protocol (EAP)
EAP provides mutual, or two-way, authentication as well
as user authentication.
When EAP software is installed on the client, the client
communicates with a backend authentication server such
as Remote Authentication Dial-in User Service (RADIUS).
This backend server functions separately from the AP
and maintains a database of valid users that can access
the network.
When using EAP, the user, not just the host, must provide
a username and password which is checked against the
RADIUS database for validity. If valid, the user is
authenticated.
Extensible Authentication
Protocol
Authentication & Association
Process
Authentication & Association
Process
Authentication & Association
Process
In conclusion Authentication and MAC filtering may
stop an attacker from connecting to a wireless
network but it will not prevent them from being able
to intercept transmitted data.
Since there are no distinct boundaries on a wireless
network, and all traffic is transmitted through the air,
it is easy for an attacker to intercept, or sniff the
wireless frames.
Encryption is the process of transforming data so that
even if it is intercepted it is unusable.
Encryption on a WLAN
1)Wired Equivalency Protocol (WEP)
Wired Equivalency Protocol (WEP) is an advanced
security feature that encrypts network traffic as it
travels through the air.
WEP uses pre-configured keys to encrypt and decrypt
data.
A WEP key is entered as a string of numbers and letters
and is generally 64 bits or 128 bits long.
WEP also supports 256 bit keys.
To simplify creating and entering these keys, many
devices include a Passphrase option.
The passphrase is an easy way to remember the word or
phrase used to automatically generate a key.
Cont..
In order for WEP to function, the AP, as well as every
wireless device allowed to access the network must
have the same WEP key entered.
Without this key, devices will not be able to
understand the wireless transmissions.
2) Wi-Fi Protected Access(WPA)
WPA also uses encryption keys from 64 bits up to 256
bits.
WPA, unlike WEP, generates new, dynamic keys each
time a client establishes a connection with the AP.
For this reason, WPA is considered more secure than
WEP because it is significantly more difficult to crack.
WPA
Traffic Filtering on a WLAN
Traffic filtering blocks undesirable traffic from entering or
leaving the wireless network.
Filtering is done by the AP as traffic passes through it.
It can be used to remove traffic from, or destined to, a
specific MAC or IP address.
Also block certain applications by port numbers.
By removing unwanted, undesirable and suspicious traffic
from the network, more bandwidth is devoted to the
movement of important traffic and improves the
performance of the WLAN.
For example, traffic filtering can be used to block all
telnet traffic destined for a specific machine, such as an
authentication server. Any attempts to telnet into the
authentication server would be considered suspicious and
blocked.
Planning the WLAN
Determining the type of wireless standard to use
Determining the most efficient layout of devices
An installation and security plan
A strategy for backing up and updating the firmware
of the wireless devices
Wireless Standard
Coverage Area
Bandwidth Existing
WLAN
Requirement STANDARD Implementation
Cost
Bandwidth
The bandwidth available in a BSS must be shared
between all the users in that BSS. Even if the
applications do not require a high-speed connection,
one of the higher-speed technologies may be necessary
if multiple users are connecting at the same time.
Coverage Areas
Different standards support different coverage areas.
The 2.4 GHz signal, used in 802.11 b/g/n technologies,
travels a greater distance than does the 5 GHz signal,
used in 802.11a technologies.
Thus 802.11 b/g/n supports a larger BSS.
Existing Network
The existing network also affects new implementation
of WLAN standards.
For example, the 802.11n standard is backward
compatible with 802.11g and 802.11b but not with 802.11a.
If the existing network infrastructure and equipment
support 802.11a, new implementations must also
support the same standard.
Cost
Total Cost of Ownership (TCO) which includes the
purchase of the equipment as well as installation and
support costs.
In a medium to large business environment, TCO has a
greater impact on the WLAN standard chosen than in
the home or small business environment.
This is because in the medium to large business, more
equipment is necessary and installation plans are
required, increasing cost.
End User Requirement
The best way to learn end-user requirements is to
ask questions.
What throughput is actually required by the
applications running on the network?
How many users will access the WLAN?
What is the necessary coverage area?
What is the existing network structure?
What is the budget?
Installation of Wireless Devices
Installation consists of limited amount of equipment
which can be easily relocated to provide optimum
coverage and throughput.
Determine the optimum number and location of APs
to provide this coverage at the least amount of cost.
In order to accomplish this, a site survey is usually
conducted.
In all cases, it is necessary to consider known sources
of interference such as high-voltage wires, motors,
and other wireless devices when determining the
placement of WLAN equipment.
Site Survey
Installing & Securing the AP
Some of the more basic security measures include:
Change default values for the SSID, usernames and
passwords
Disable broadcast SSID
Configure MAC Address Filtering
Installing & Securing the AP
Some of the more advanced security measures include:
Configure encryption using WEP or WPA
Configure authentication
Configure traffic filtering
Installing & Securing the AP
Backing-up and Restoring
Configuration Files