Wireless Communication Systems Wireless Security
Wireless Communication Systems Wireless Security
Lecture 12
Wireless security
Wireless Topologies & Demographics
WAN
(Wide Area Network)
2.5G - 3G Phone
MAN
(Metropolitan Area Network)
802.11, 802.16, MMDS, LMDS
LAN
(Local Area Network)
802.11 & HyperLan2
PAN
(Personal Area Network)
Bluetooth
General Characteristics of Wireless Technologies
Medium Medium-Long
Range Short
(1000ft w/o A.) Fixed Last Mi
Long
Confidentiality
It means that the non-authenticated party does not examine the data.
Confidentiality is set of rules that limits access on certain types
of information.
Integrity
It is an guarantee that the data which is received by the receiver has not been
change or Modified after the send by the sender Data integrity refers to
maintaining the accuracy of data over its entire life-cycle
Attacks can be
Absence of infrastructure
Ad-hoc networks are supposed to operate independently of any fixed
infrastructure.
Availability
The services provided by the network must be always available (often in a
timely manner), despite of any malfunctioning of the system.
8
WEP
• WEP is a weak security standard. The password it uses can often be
cracked in a few minutes with a basic laptop computer and widely
available software tools. WEP is an old IEEE 802.11 standard from 1999,
which was outdated in 2003.
• WEP uses the stream cipher for confidentiality, and the CRC checksum
for integrity
9
WEP Authentication
• Two methods of authentication can be used with WEP:
1. Open System authentication
2. Shared Key authentication.
Available Tools:
There are readily available tools for most attackers to crack the WEP keys.
Airsnort, Yellowjacket, Airfart & others tools take a lot of packets (several
million) to get the WEP key, on most networks this takes longer than most
people are willing to wait (1 or more days). If the network is very busy, the
WEP key can be cracked & obtained within 30 minutes. Because of the WEP
weakness, wireless sniffing & hijacking techniques can work despite the WEP
encrypted turned on
10
Wi-Fi Protected Access (WPA)
11
Types of Attacks
12
Active attacks
Spoofing
When a malicious node miss-present his identity, so that the sender change the
topology
Modification
When malicious node performs some modification in the routing route, so that
sender sends the message through the long route. This attack cause
communication delay occurred between sender and receiver.
Fabrication
A malicious node generates the false routing message. This means it generate
the incorrect information about the route between devices
13
Active attacks
• Denial of service
A Denial-of-Service attack (DoS) occurs when an attacker continually
bombards a targeted AP with bogus requests, failure messages, and/or other
commands. These cause legitimate users to not be able to get on the network
and may even cause the network to crash.
Network injection
The hacker injects bogus networking re-configuration commands that affect
routers, switches, and intelligent hubs. A whole network can be brought down
in this manner and require rebooting or even reprogramming
14
Passive attacks
Traffic analysis
In the traffic analysis attack, an attacker tries to sense the communication path
between the sender and receiver. An attacker can found the amount of data which
is travel from the route of sender and receiver. There is no modification in data
by the traffic analysis.
Eavesdropping
This is a passive attack, which occurred in the mobile ad-hoc network. The main
aim of this attack is to find out some secret or confidential information from
communication. This secrete information may be privet or public key of sender or
receiver or any secrete data.
Monitoring
In this attack in which attacker can read the confidential data, but he cannot edit
the data or cannot modify the data.
15
Man-in-the-middle attacks
this attack forces AP-connected computers to drop their connections and
reconnect with the hacker’s soft AP
16
Advance attacks
Rushing attack
In rushing attack, when sender send packet to the receiver, then attacker alter
the packet and forward to receiver. Attacker performs duplicate sends the
duplicate to the receiver again and again. Receiver assumes that packets come
from sender so the receiver becomes busy continuously.
17
Advanced attacks
Replay attack
It this attack a malicious node may repeat the data. The attacked
intercept the data and retransmit it. At that time, an attacker an
intercept the password
18
Basic Wireless Security Profiles
Public Access
Telecommuter Enterprise
Traveler
Virtual
Public
Private Special Apps./ Business
Network
Network
Security
(VPN) Traveler