Computer Security in Wireless Networking
Computer Security in Wireless Networking
(WIRELESS LAN)
BY
EDWARD ESEOGHENE
17/Eng02/086
JUNE 2021
APPROVAL PAGE
This work has been approved for the Department of Mathematical Science (Computer
Science), College of Natural and Applied Sciences Afe Babalola University Ado Ekiti ,Ekiti
State
________________ ________________
DR BELLO. Date
(Supervisor)
________________ ________________
Date
(Head of Department)
________________ ________________
External Examiner Date
CERTIFICATION
Edward Eseoghene, undergraduate student in the Department of Computer Science with
Registration Number 17/Eng02/086, has satisfactorily completed the requirements for the
Bachelor of Science (BSc) Degree in Computer Science. The work embodied in this project is
original and has not been submitted in part or in full for any other diploma or degree of this
________________ ________________
EDWARD ESEOGHENE DR BELLO
Student Supervisor
DEDICATION
This work is dedicated to Almighty God, the Alpha and Omega of my life.
ACKNOWLEDGEMENTS
My unalloyed appreciation goes to his able and dynamic Supervisor Dr Bello for his
constructive criticism, cooperation, encouragement and time spent in reading and making
EDWARD ESEOGHENE
17/ENG02/086
ABSTRACT
Wireless communication offer organizations and users many benefits such as portability and
flexibility, increased efficiency and reduced wiring costs. Wireless technologies cover a broad
range of differing capacities oriented toward different users and needs. Wireless local area
network (WLAN) devices, for instance, allow users to move their laptops from place to
place within their offices without the need for wires and without losing network connectivity.
Less wiring means greater flexibility, increased efficiency and reduced wiring costs. Adhoc
networks, such as those enabled by Bluetooth, allow data synchronization with network
system and application sharing between devices. Bluetooth functionally also eliminates
cables for printer and other device for printer and other peripheral device connections.
Handheld devices such as personal digital assistants (PDA) and cell phones allow remote
users to synchronize personal database and provide access to network services such as
wireless e-mail, Web browsing and internet access. Moreover, these technologies can offer
dramatic cost savings and new capacities to diverse applications ranging from retail settings
TABLE OF CONTENTS
CHAPTER ONE
CHAPTER TWO
2.7 Benefits.........………………………………………………………………..........12-23
2.9.2 Privacy............…………..……………………………………………………......16-17
2.9.3 Integrity..............…………..…………………………………………………......17-19
CHAPTER THREE
3.7.2 Authentication.....................................……………………………………….......40-41
CHAPTER FOUR
CHAPTER FIVE
5.2 Recommendation...............................…………………………………………….68-69
5.3 References...................................………………………………………….................69
CHAPTER ONE
1.1 Introduction
Wireless technologies have become increasingly popular in our everyday business and
personal lives. Personal digital assistants (PDA) allow individuals to access calendars, email,
address and phone number lists, and the Internet. Some technologies even offer global
positioning system (GPS) capabilities that can pinpoint the location of the device anywhere in
the world.
Wireless technologies promise to offer even more features and functions in the next few
years.
An increasing number of government agencies, businesses, and home users are using, or
considering using, wireless technologies in their environments. Agencies should be aware the
security risks associated with wireless technologies. Agencies need to develop strategies that
will mitigate risks as they integrate wireless technologies into their computing environments.
This document discusses certain wireless technologies, outlines the associated risks, and
wireless networking, fewer organizations are reporting that they don't know if their wireless
Attacks on wireless networking in computer have being surreptitious in nature, means that
detecting them can be difficult. Sophisticated hacking tools like root kits, loadable kernel
modules and log scrubbers, which enable attackers to cover their tracks and gained privileged
It has also been discovered that a lot of agencies has employed the use of wireless networking
1. The distributed denial of service attacks on Yahoo, eBay and other major Internet
2. The recent case of organization documents that was tampered through wireless
4. A lot of networking engineers has rush into wireless networking without pre
Above are the problems encountered by the use of wireless networking, but with the help of
this project, the low rate of security in wireless networking will decrease.
The purpose of this document is to provide agencies with guidance for establishing secure
wireless networks.1 Agencies are encouraged to tailor the recommended guidelines and
The documents address one of wireless technologies that government agencies will most
likely to employ: wireless local area network (WLAN) The document also addresses the use
of wireless handheld devices. The document does not address technologies such as wireless
radio and other WLAN standards that are not designed to the Institute of Electrical and
Electronics Engineers (IEEE) 802.11 standard. These technologies are out of the scope of this
document.
This document covers details specific to wireless technologies and solutions. The document is
technical in nature; however, it provides the necessary background to fully understand the
Hence, the following list highlights how people with differing backgrounds might use this
networks.
5. Researchers and analysts who are trying to understand the underlying wireless
technologies.
However this project provides an overview of designing software packages that can be use to
protect document or information when using wireless networking. The program will be
In this project, I started my research by bringing together some of the information I got from
many online seminar conducted, base on the issue and challenges of wireless networking
among computer users and wireless networking engineers within and outside the country. I
In addition I relate to the information and interview I have with a member of the world
Computer networking company called CISCO, base on the issues, challenges and security in
wireless networking. Lastly I relate to the interview I got from many networking engineers
organization,
Therefore by the research carried out above with my full knowledge of computer as a
computer professional I then draft out the summary of issues arising on security in wireless
networking.
Wireless technologies, in the simplest sense, enable one or more devices to communicate
technologies use radio frequency transmissions as the means for transmitting data, whereas
wired technologies use cables. Wireless technologies range from complex systems, such as
Wireless Local Area Networks (WLAN) and cell phones to simple devices such as wireless
headphones, microphones, and other devices that do not process or store information. They
also include infrared (IR) devices such as remote controls, some cordless computer keyboards
and mice, and wireless hi-fi stereo headsets, all of which require a direct line of sight between
the transmitter and the receiver to close the link. A brief overview of wireless networks,
Wireless networks serve as the transport mechanism between devices and among devices and
the traditional wired networks (enterprise networks and the Internet). Wireless networks are
many and diverse but are frequently categorized into three groups based on their coverage
range: Wireless Wide Area Networks (WWAN), WLANs, and Wireless Personal Area
Networks (WPAN). WWAN includes wide coverage area technologies such as 2G cellular,
Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM),
and Mobitex. WLAN, representing wireless local area networks, includes 802.11, HiperLAN,
and several others. WPAN represents wireless personal area network technologies such as
Bluetooth and IR. All of these technologies are “tetherless”- they receive and transmit
ranging from the radio frequency (RF) band up to and above the IR band.2 the frequencies in
the RF band cover a significant portion of the EM radiation spectrum, extending from 9
gigahertz (GHz). As the frequency is increased beyond the RF spectrum, EM energy moves
into the IR and then the visible spectrum. This document focuses on WLAN technologies.
CHAPTER TWO
Wireless LANs
This section provides a detailed overview of 802.11 WLAN technologies. The section
includes introductory material on the history of 802.11 and provides other technical
information, including 802.11 frequency ranges and data rates, network topologies,
transmission ranges, and applications. It examines the security threats and vulnerabilities
associated with WLANs and offer various means for reducing risks and securing WLAN
environments.
WLAN technology and the WLAN industry date back to the mid-1980s when the Federal
During the 1980s and early 1990s, growth was relatively slow. Today, however, WLAN
technology is experiencing tremendous growth. The key reason for this growth is the
Motorola developed one of the first commercial WLAN systems with its Altair product.
However, early WLAN technologies had several problems that prohibited its pervasive use.
These LANs were expensive, provided low data rates, were prone to radio interference, and
were designed mostly to proprietary RF technologies. The IEEE initiated the 802.11 project
in 1990 with a scope to develop a Medium Access Control (MAC) and Physical Layer (PHY)
specification for wireless connectivity for fixed, portable, and moving stations within an
area." In 1997, IEEE first approved the 802.11 international interoperability standards.
Then, in 1999, the IEEE ratified the 802.11a and the 802.11b wireless networking
communication standards. The goal was to create a standards-based technology that could
span multiple physical encoding types, frequencies, and applications. The 802.11a standard
technology uses the 5 GHz frequency spectrum and can process data at up to 54Mbps.
Although this section of the document focuses on the IEEE 802.11 WLAN standard, it is
important to note that several other WLAN technologies and standards are available from
which consumers may choose, including HiperLAN and HomeRF. For information on the
HiperLAN Alliance site.10 For more information on HomeRF, visit the HomeRF Working
IEEE developed the 802.11 standards to provide wireless networking technology like the
wired Ethernet that has been available for many years. The IEEE 802.11a standard is the most
widely adopted member of the 802.11 WLAN family. It operates in the licensed 5GHz band
using OFDM technology. The popular 802.11b standard operates in the unlicensed 2.4 GHz,
2.5 GHz Industrial, Scientific, and Medical (ISM) frequency band using a direct sequence
spread-spectrum technology. The ISM band has become popular for wireless communications
speeds of up to 11 Mbits per second. This makes it considerably faster than the original IEEE
802.11 standard (that sends data at up to 2 Mbps) and slightly faster than standard Ethernet.
2.4
802.11 Architecture
The IEEE 802.11 standard permits devices to establish either peer-to-peer (P2P) networks
or networks based on fixed access points (AP) with which mobile nodes can communicate.
Hence, the standard defines two basic network topologies: the infrastructure network and the
ad hoc network. The infrastructure network is meant to extend the range of the wired LAN to
wireless cells. A laptop or other mobile device may move from cell to cell (from AP to AP)
while maintaining access to the resources of the LAN. A cell is the area covered by an AP and
is called a “basic service set” (BSS). The collection of all cells of an infrastructure network is
This first topology is useful for providing wireless coverage of building or campus areas.
By deploying multiple APs with overlapping coverage areas, organizations can achieve broad
network coverage.
WLAN technology can be used to replace wired LANs totally and to extend LAN
infrastructure.
A WLAN environment has wireless client stations that use radio modems to communicate to
an AP. The client stations are generally equipped with a wireless network interface card (NIC)
that consists of the radio transceiver and the logic to interact with the client machine and
software. An AP comprises essentially a radio transceiver on one side and a bridge to the
wired backbone on the other. The AP, a stationary device that is part of the wired
communications between the client stations and between clients and the wired network go
Although most WLANs operate in the "infrastructure” mode and architecture described
above, another topology is also possible. This second topology, the ad hoc network, is meant
to easily interconnect mobile devices that are in the same area (e.g., in the same room). In this
architecture, client stations are grouped into a single geographic area and can be Internet-
worked without access to the wired LAN (infrastructure network). The interconnected
devices in the ad hoc mode are referred to as an independent basic service set (IBSS). The ad
hoc configuration is similar to a peer to-peer office network in which no node is required to
function as a server. As an ad hoc WLAN, laptops, desktops and other 802.11 devices can
A WLAN comprises two types of equipment: a wireless station and an access point. A station,
or client, is typically a laptop or notebook personal computer (PC) with a wireless NIC.12 A
WLAN client may also be a desktop or handheld device (e.g., PDA, or custom device such as
laptops and notebooks except that they use wireless NICs to connect to access points in the
network. The wireless NIC is commonly inserted in the client's Personal Computer Memory
Card International Association (PCMCIA) slot or Universal Serial Bus (USB) port. The NICs
The AP, which acts as a bridge between the wireless and wired networks, typically comprises
a radio, a wired network interface such as 802.3, and bridging software. The AP functions as
a base station for the wireless network, aggregating multiple wireless stations onto the wired
network.
2.6 Range
The reliable coverage range for 802.11 WLANs depends on several factors, including data
rate required and capacity, sources of RF interference, physical area and characteristics,
power, connectivity, and antenna usage. Theoretical ranges are from 29 meters (for 11 Mbps)
However, through empirical analysis, the typical range for connectivity of 802.11 equipment
is approximately 50 meters (about 163 ft.) indoors. A range of 400 meters, nearly /4 mile,
makes WLAN the ideal technology for many campus applications. It is important to
recognize that special high-gain antennas can increase the range to several miles.
APs may also provide a "bridging” function. Bridging connects two or more networks
together and allows them to communicate- to exchange network traffic. Bridging involves
LANs are connected to each other via the LANs respective APs. In multipoint bridging, one
subnet on a LAN is connected to several other subnets on another LAN via each subnet AP.
D, Subnet A's AP would connect to B's, C's, and D's respective APs.
Enterprises may use bridging to connect LANs between different buildings on corporate
campuses. Bridging AP devices are typically placed on top of buildings to achieve greater
antenna reception. The typical distance over which one AP can be connected wirelessly to
another by means of bridging is approximately 2 miles. This distance may vary depending on
2.7 Benefits
User Mobility— Users can access files, network resources, and the Internet without
having to physically connect to the network with wires. Users can be mobile yet retain
Rapid Installation - The time required for installation is reduced because network
connections can be made without moving or adding wires, or pulling them through
example, WLANs are often cited as making LAN installations possible in buildings
Flexibility— Enterprises can also enjoy the flexibility of installing and taking down
WLANs in locations as necessary. Users can quickly install a small WLAN for
application and installation needs and to scale from small peer-to-peer networks to
very large enterprise networks that enable roaming over a broad area.
Because of these fundamental benefits, the WLAN market has been increasing steadily over
the past several years, and WLANs are still gaining in popularity. WLANs are now becoming
airports, hotels, and retail shops are already using technologies to conduct their daily business
operations.
This section discusses the built-in security features of 802.11. It provides an overview of the
inherent security features to better illustrate its limitations and provide a motivation for some
of the recommendations for enhanced security. The IEEE 802.11 specification identified
several services to provide a secure operating environment. The security services are
provided largely by the Wired Equivalent Privacy (WEP) protocol to protect link-level data
during wireless transmission between clients and access points. WEP does not provide end-
to-end security, but only for the wireless portion of the connection.
The three basic security services defined by IEEE for the WLAN environment are as
follows:
1. Authentication- A primary goal of WEP was to provide a security service to verify the
identity of communicating client stations. This provides access control to the network
by denying access to client stations that cannot authenticate properly. This service
addresses the question, "Are only authorized persons allowed to gain access to my
network?”
service, in general, addresses the question, “Are only authorized persons allowed to
view my data?”
3. Integrity— Another goal of WEP was a security service developed to ensure that
messages are not modified in transit between the wireless clients and the access point
in an active attack. This service addresses the question, “Is the data coming into or
It is important to note that the standard did not address other security services such as audit,
authorization, and non repudiation. The security services offered by 802.11 are described in
2.9.1 Authentication
The IEEE 802.11 specification defines two means to “validate” wireless users attempting to
One means, shared-key authentication, is based on cryptography, and the other is not. The
open system authentication technique is not truly authentication; the access point accepts the
mobile station without verifying the identity of the station. It should be noted also that the
authentication is only one-way: only the mobile station is authenticated. The mobile station
With Open System authentication, a client is authenticated if it simply responds with a MAC
address during the two-message exchange with an access point. During the exchange, the
client is not truly validated but simply responds with the correct fields in the message
"challenge- response" scheme based on whether a client has knowledge of a shared secret. In
this scheme, as depicted conceptually in Figure 3-7, a random challenge is generated by the
access point and sent to the wireless client. The client, using a cryptographic key that is
shared with the AP, encrypts the challenge (or “nonce," as it is called in security vernacular)
and returns the result to the AP. The AP decrypts the result computed by the client and allows
access only if the decrypted value is the same as the random challenge transmitted. The
algorithm used in the cryptographic computation and for the generation of the 128-bit
challenge text is the RC4 stream cipher developed by Ron Rivest of MIT. It should be noted
that the authentication method just described is a rudimentary cryptographic technique, and it
does not provide mutual authentication. That is, the client does not authenticate the AP, and
wireless network. It is also worth noting that simple unilateral challenge-response schemes
have long been known to be weak. They suffer from numerous attacks including the infamous
"man-in-the-middle" attack. Lastly, the IEEE 802.11 specification does not require shared-
key authentication.
2.9.2 Privacy
The 802.11 standard supports privacy (confidentiality) through the use of cryptographic
techniques for the wireless interface. The WEP cryptographic technique for confidentiality
also uses the RC4 symmetric-key, stream cipher algorithm to generate a pseudo-random data
sequence. This “key stream” is simply added modulo 2 (exclusive OR-ed) to the data to be
transmitted. Through the WEP technique, data can be protected from disclosure during
transmission over the wireless link. WEP is applied to all data above the 802.11 WLAN
Internet Packet Exchange (IPX), and Hyper Text Transfer Protocol (HTTP).
As defined in the 802.11 standard, WEP supports only a 40-bit cryptographic keys size for the
shared key. However, numerous vendors offer nonstandard extensions of WEP that support
key lengths from 40 bits to 104 bits. At least one vendor supports a key-size of 128 bits. The
104-bit WEP key, for instance, with a 24-bit Initialization Vector (IV) becomes a 128-bit RC4
key. In general, all other things being equal, increasing the key size increases the security of a
flawed designs to prevent long keys from increasing security. Research has shown that key
sizes of greater than 80-bits, for robust designs and implementations, make brute-force
cryptanalysis (code breaking) an impossible task. For 80-bit keys, the number of possible
most WLAN deployments rely on 40-bit keys. Moreover, recent attacks have shown that the
WEP approach for privacy is, unfortunately, vulnerable to certain attacks regardless of key-
size. However, the cryptographic, standards, and vendor WLAN communities have developed
2.9.3 Integrity
The IEEE 802.11 specification also outlines a means to provide data integrity for messages
transmitted between wireless clients and access points. This security service was designed to
reject any messages that had been changed by an active adversary “in the middle.” This
technique uses a simple encrypted Cyclic Redundancy Check (CRC) approach. As depicted
payload prior to transmission. The integrity-sealed packet is then encrypted using the RC4
key stream to provide the cipher-text message. On the receiving end, decryption is performed
and the CRC is recomputed on the message that is received. The CRC computed at the
receiving end is compared with the one computed with the original message. If the CRCs do
not equal, that is, “received in error," this would indicate an integrity violation (an active
message spoofer), and the packet would be discarded. As with the privacy service,
unfortunately, the 802.11 integrity is vulnerable to certain attacks regardless of key size. In
summary, the fundamental flaw in the WEP integrity scheme is that the simple CRC is not a
The IEEE 802.11 specification does not, unfortunately, identify any means for key
management (life cycle handling of cryptographic keys and related material). Therefore,
generating, distributing, storing, loading, escrowing, archiving, auditing, and destroying the
material is left to those deploying WLANs. Key management (probably the most critical
aspect of a cryptographic system) for 802.11 is left largely as an exercise for the users of the
802.11 network. As a result, much vulnerability could be introduced into the WLAN
environment. These vulnerabilities include WEP keys that are non-unique, never changing,
factory-defaults, or weak keys (all zeros, all ones, based on easily guessed passwords, or
other similar trivial patterns). Additionally, because key management was not part of the
original 802.11 specification, with the key distribution unresolved, WEP secured WLANs do
not scale well. If an enterprise recognizes the need to change keys often and to make them
For example, a large campus may have as many as 15,000 APs. Generating, distributing,
loading, and managing keys for an environment of this size is a significant challenge. It is has
been suggested that the only practical way to distribute keys in a large dynamic environment
remain secret. Hence we have a major dichotomy. This dichotomy exists for any technology
This section discusses some known vulnerabilities in the standardized security of the 802.11
WLAN standards. As mentioned above, the WEP protocol is used in 802.11 based WLANS.
WEP in turn uses a RC4 cryptographic algorithm with a variable length key to protect traffic.
Again, the 802.11 standard supports WEP cryptographic keys of 40-bits. However, some
vendors have implemented products with keys 104-bit keys and even 128-bit keys. With the
addition of the 24-bit IV, the actual key used in the RC4 algorithm is 152 bits for the 128 bits
WEP key. It is worthy to note that some vendors generate keys after a keystroke from a user,
which, if done properly, using the proper random processes can result in a strong WEP key.
Other vendors, however, have based WEP keys on passwords that are chosen by users; this
Several groups of computer security specialists have discovered security problems that let
malicious users compromise the security of WLANs. These include passive attacks to decrypt
traffic based on statistical analysis, active attacks to inject new traffic from unauthorized
mobile stations (i.e., based on known plain text), active attacks to decrypt traffic (i.e., based
on tricking the access point), and dictionary-building attacks. The dictionary building attack
1. The use of static WEP keys- many users in a wireless network potentially sharing the
identical key for long periods of time, is well-known security vulnerability. This is in
part due to the lack of any key management provisions in the WEP protocol. If a
computer such as a laptop were to be lost or stolen, the key could become
compromised along with all the other computers sharing that key. Moreover, if every
station uses the same key, a large amount of traffic may be rapidly available to an
2. The IV in WEP, as shown in Figure 3-8, is a 24-bit field sent in the clear text portion
of a message. This 24-bit string, used to initialize the key stream generated by the
RC4 algorithm, is a relatively small field when used for cryptographic purposes.
Reuse of the same IV produces identical key streams for the protection of data, and
the short IV guarantees that they will repeat after a relatively short time in a busy
network. Moreover, the 802.11 standard does not specify how the IVs are set or
changed, and individual wireless NICs from the same vendor may all generate the
same IV sequences, or some wireless NICs may possibly use a constant IV. As a
result, hackers can record network traffic, determine the key stream, and use it to
3. The IV is a part of the RC4 encryption key. The fact that an eavesdropper knows 24-
bits of every packet key, combined with a weakness in the RC4 key schedule, leads to
a successful analytic attack, which recovers the key, after intercepting and analyzing
only a relatively small amount of traffic. This attack is publicly available as an attack
protocol uses a non cryptographic Cyclic Redundancy Check (CRC) to check the
integrity of packets, and acknowledge packets with the correct checksum. The
often introduces vulnerabilities, as is the case for WEP. There is an active attack that
permits the attacker to decrypt any packet by systematically modifying the packet and
CRC sending it to the AP and noting whether the packet is acknowledged. These
kinds of attacks are often subtle, and it is now considered risky to design encryption
possibility of interactions with other protocol levels that can give away information
Note that only one of the four problems listed above depends on a weakness in the
stronger stream cipher. For example, the third problem listed above is a consequence of a
weakness in the implementation of the RC4 stream cipher that is exposed by a poorly
designed protocol.
Some of the problems associated with WEP and 802.11 WLAN securities are summarized in
WEP. There is an active attack that permits the attacker to decrypt any packet by
systematically modifying the packet and CRC sending it to the AP and noting whether the
packet is acknowledged. These kinds of attacks are often subtle, and it is now considered
risky to design encryption protocols that do not include cryptographic integrity protection,
because of the possibility of interactions with other protocol levels that can give away
Security features in vendor products are frequently not enabled. Security features,
albeit poor in some cases, are not enabled when shipped, and users do not enable
IVs are short (or static). 24-bit IVs cause the generated key stream to repeat.
Cryptographic keys are short.40-bit keys are inadequate for any system. It is generally
accepted that key sizes should be greater than 80 bits in length. The longer the key,
Cryptographic keys are shared. Keys that are shared can compromise a system. As the
number of people sharing the key grows, the security risks also grow. A fundamental
RC4 has a weak key schedule and is inappropriately used in WEP. The combination of
revealing 24 key bits in the IV and a weakness in the initial few bytes of the RC4 key
stream leads to an efficient attack that recovers the key. Most other applications of
RC4 do not expose the weaknesses of RC4 because they do not reveal key bits and do
not restart the key schedule for every packet, This attack is available to moderately
sophisticated adversaries.
Packet integrity is poor. CRC32 and other linear block codes are inadequate for
No user authentication occurs. Only the device is authenticated. A device that is stolen
Authentication is not enabled; only simple SSID identification occurs. Identity based
systems are highly vulnerable particularly in a wireless system because signals can be
authentication is required to provide verification that users and the network are
legitimate.
The client does not authenticate the AP. The client needs to authenticate the AP to
CHAPTER THREE
As discussed above, the 802.11 WLAN— or WiFi-industry is burgeoning and currently has
significant momentum. All indications suggest that in the coming years numerous
organizations will deploy 802.11 WLAN technology. Many organizations, including retail
stores, hospitals, airports, and business enterprises- plan to capitalize on the benefits of
"going wireless.” However, although there has been tremendous growth and success,
everything relative to 802.11 WLANs has not been positive. There have been numerous
published reports and papers describing attacks on 802.11 wireless networks that expose
organizations to security risks. This subsection will briefly cover the risks to security- i.e.,
Network security attacks are typically divided into passive and active attacks. These two
broad classes are then subdivided into other types of attacks. All are defined below.
and does not modify its content (i.e., eavesdropping). Passive attacks can be either
eavesdropping or traffic analysis (sometimes called traffic flow analysis). These two
ii. Traffic analysis— The attacker, in a more subtle way, gains intelligence by
communicating parties.
message, data stream, or file. It is possible to detect this type of attack but it may not
be preventable. Active attacks may take the form of one of four types (or combination
ii. Replay- The attacker monitors transmissions (passive attack) and retransmits
The risks associated with 802.11 are the result of one or more of these attacks. The
consequences of these attacks include, but are not limited to, loss of proprietary information,
legal and recovery costs, tarnished image, and loss of network service.
Confidentiality is the property with which information is not made available or disclosed to
requirement for most organizations. Due to the broadcast and radio nature of wireless
network. Adversaries do not have to tap into a network cable to access network resources.
Moreover, it may not be possible to control the distance over which the transmission occurs.
Passive eavesdropping of native 802.11 wireless communications may cause significant risk
to an organization.
An adversary may be able to listen in and obtain sensitive information including proprietary
information, network IDs and passwords, and configuration data. This risk is present because
the 802.11 signals may travel outside the building perimeter or because there may be an
“insider.” Because of the extended range of 802.11 broadcasts, adversaries can potentially
detect transmission from a parking lot or nearby roads. This kind of attack, performed
through the use of a wireless network analyzer tool or snifter, is particularly easy for two
reasons: 1) frequently confidentiality features of WLAN technology are not even enabled,
and 2) because of the numerous vulnerabilities in the 802.11 technology security, as discussed
Wireless packet analyzers, such as Air Snort and WEPcrack, are tools that are readily
available on the Internet today. Air-Snort is one of the first tools created to automate the
process of analyzing networks. Unfortunately, it is also commonly used for breaking into
wireless networks. Air Snort can take advantage of flaws in the key-scheduling algorithm that
was provided for implementation of RC4, which forms part of the original WEP standard. To
accomplish this, AirSnort requires only a computer running the Linux operating system and a
wireless network card. The software passively monitors the WLAN data transmissions and
computes the encryption keys after at least 100 MB of network packets have been sniffed. 15
On a highly saturated network, collecting this amount of data may only take three or four
hours; if traffic volume is low, it may take a few days. For example, a busy data access point
transmitting 3,000bytes at 11 Mbps will exhaust the 24-bit IV space after approximately 10
hours.16 If after ten hours the attacker recovers two cipher texts that have been using the
same key stream, both data integrity and confidentiality may be easily compromised. After
the network packets have been received, the fundamental keys may be guessed in less than
one second.17 Once the malicious user knows the WEP key, that person can read any packet
traveling over the WLAN. Such sniffing tools' wide availability, ease of use, and ability to
compute keys makes it essential for security administrators to implement secure wireless
solutions. Air snort may not be able to take advantage of the enhanced key-scheduling
using a laptop in promiscuous mode, when an access point is connected to a hub instead of a
switch. Hubs generally broadcast all network traffic to all connected devices, which leaves
the traffic vulnerable to unauthorized monitoring. Switches, on the other hand, can be
configured to prohibit certain attached devices from intercepting broadcast traffic from other
specified devices. For example, if a wireless access points were connected to an Ethernet hub,
a wireless device that is monitoring broadcast traffic could intercept data intended for wired
and wireless clients. Consequently, agencies should consider using switches instead of hubs
WLANs risk loss of confidentiality following an active attack as well. Sniffing software as
described above can obtain user names and passwords (as well as any other data traversing
the network) as they are sent over a wireless connection. An adversary may be able to
masquerade as a legitimate user and gain access to the wired network from an AP.
Once "on the network,” the intruder can scan the network using purchased or publicly and
readily available tools. The malicious eavesdropper then uses the user name, password, and
IP address information to gain access to network resources and sensitive corporate data.
Lastly, rogue APs pose a security risk. A malicious or irresponsible user could, physically and
surreptitiously, insert a rogue AP into a closet, under a conference room table, or any other
hidden area within a building. The rogue AP could then be used to allow unauthorized
individuals to gain access to the network. As long as its location is in close proximity to the
then the rogue AP can successfully convince wireless clients of its legitimacy and cause them
to send traffic through it. The rogue AP can intercept the wireless traffic between an
authorized AP and wireless clients. It need only be configured with a stronger signal than the
existing AP to intercept the client traffic. A malicious user can also gain access to the wireless
network through APs that are configured to allow access without authorization.19 It is also
important to note that rogue access points need not always be deployed by malicious users. In
many cases, rogue APs are often deployed by users who want to take advantage of wireless
technology without the approval of the IT department. Additionally, since rogue APs are
frequently deployed without the knowledge of the security administrator, they are often
Data integrity issues in wireless networks are similar to those in wired networks. Because
cryptographic protection of data, integrity can be difficult to achieve. A hacker, for example,
can compromise data integrity by deleting or modifying the data in an e mail from an account
widely distributed among e-mail recipients. Because the existing security features of the
802.11 standard do not provide for strong message integrity, other 3-22 kinds of active
attacks that compromise system integrity are possible. As discussed before, the WEP-based
integrity mechanism is simply a linear CRC. Message modification attacks are possible when
cryptographic checking mechanisms such as message authentication codes and hashes are not
used.
A denial of network availability involves some form of DoS attack, such as jamming,
Jamming occurs when a malicious user deliberately emanates a signal from a wireless device
in order to overwhelm legitimate wireless signals. Jamming may also be inadvertently caused
network. Non-malicious users can also cause a DoS. A user, for instance, may unintentionally
monopolize a wireless signal by downloading large files, effectively denying other users
access to the network. As a result, agency security policies should limit the types and
With the prevalence of wireless devices, more users are seeking ways to connect remotely to
their own organization's networks. One such method is the use of entrusted, third-party
networks. Conference centers, for example, commonly provide wireless networks for users to
connect to the Internet and subsequently to their own organizations while at the conference.
Airports, hotels, and even some coffee franchises are beginning to deploy 802.11 based
publicly accessible wireless networks for their customers, even offering VPN capabilities for
added security.
These untrusted public networks introduce three primary risks: 1) because they are public,
they are accessible by anyone, even malicious users; 2) they serve as a bridge to a user's own
network, thus potentially allowing anyone on the public network to attack or gain access to
the bridged network; and 3) they use high-gain antennas to improve reception and increase
coverage area, thus allowing malicious users to eavesdrop more readily on their signals.
By connecting to their own networks via an entrusted network, users may create
vulnerabilities for their company networks and systems unless their organizations take steps
to protect their users and themselves. Users typically need to access resources that their
organizations deem as either public or private. Agencies may want to consider protecting
their public resources using an application layer security protocol such as Transport Layer
Security (TLS), the Internet Engineering Task Force standardized version of Secure Sockets
Layer (SSL). However, in most agencies, this is unnecessary since the information is indeed
public already. For private resources, agencies should consider using a VPN solution to
secure their connections because this will help prevent eavesdropping and unauthorized
Lastly, as with any network, social engineering and dumpster diving are also concerns.
An enterprise should consider all aspects of network security when planning to deploy the
wireless network.
operational and technical countermeasures can be effective in reducing the risks associated
with WLANs. The following guidelines will not prevent all adversary penetrations, nor will
remove all risks. Additionally, it should be clear that there is no “one size fits all 3-23
solution when it comes to security. Some agencies may be able or willing to tolerate more
risk than others. Also, security comes at a cost: either in money spent on security equipment,
to accept risk because applying various countermeasures may exceed financial or other
constraints.
security policy. A security policy, and compliance therewith, is the foundation on which other
c) Describe who can install access points and other wireless equipment
d) Provide limitations on the location of and physical security for access points
e) Describe the type of information that may be sent over wireless links
g) Describe limitations on how the wireless device may be used, such as location
l) Define the frequency and scope of security assessments to include access point
discovery.
Agencies should ensure that all critical personnel are properly trained on the use of wireless
technology. Network administrators need to be fully aware of the security risks that WLANs
and devices pose. They must work to ensure security policy compliance and to know what
steps to take in the event of an attack. Finally, the most important countermeasures are trained
Physical security is the most fundamental step for ensuring that only authorized users have
access to wireless computer equipment. Physical security combines such measures as access
housing wired networks, facilities supporting wireless networks need physical access
controls. For example, photo identification, card badge readers, or biometric devices can be
used to minimize the risk of improper penetration of facilities. Biometric systems for physical
access control include palm scans, hand geometry, iris scans, retina scans, fingerprint, voice
pattern, signature dynamics, or facial recognition. External boundary protection can include
locking doors and installing video cameras for surveillance around the perimeter of a site to
WLAN environment. If the range extends beyond the physical boundaries of the office
building walls, the extension creates security vulnerability. An individual outside of the
wireless device that picks up the RF emanations. A similar consideration applies to the
strategically within a building so that the range does not exceed the physical perimeter of the
building and allow unauthorized personnel to eavesdrop near the perimeter. Agencies should
use site survey tools (see next paragraph) to measure the range of AP devices, both inside and
outside of the building where the wireless network is located. In addition, agencies should use
wireless security assessment tools (e.g., vulnerability assessment) and regularly conduct
Site survey tools are available to measure and secure AP coverage. The tools, which some
vendors include with their products, measure the received signal strength from the APs.
These measurements can be used to map out the coverage area. However, security
administrators should use caution when interpreting the results because each vendor
interprets the received signal strength differently. Some AP vendors also have special features
that allow control of power levels and therefore the range of the AP. This is useful if the
required coverage range is not broad because, for example, the building or room in which
access to the wireless network is needed happens to be small. Controlling the coverage range
for this smaller building or room may help prevent the wireless room signals from extending
beyond the intended coverage area. Agencies could additionally use directional antennas to
control emanations. However, directional antennas do not protect network links; they merely
Although mapping the coverage area may yield some advantage relative to security, it should
not be seen as an absolute solution. There is always the possibility that an individual might
use a high-gain antenna to eavesdrop on the wireless network traffic. It should be recognized
that only through the use of strong cryptographic means can a user gain any assurance against
true eavesdropping adversaries. The following paragraphs discuss how cryptography (Internet
Protocol Security [IPsec] and VPNs) can be used to thwart many attacks.
Technical countermeasures involve the use of hardware and software solutions to help secure
the operational and security settings on an AP), software patches and upgrades,
authentication, intrusion detection systems (IDS), and encryption. Hardware solutions include
smart cards, VPNs, public key infrastructure (PKI), and biometrics.21 It should be noted that
hardware solutions, which generally have software components, are listed simply as hardware
solutions.
security audits, and adopting effective encryption. These are described in the paragraphs
below.
settings, reset function, automatic network connection function, Ethernet MAC Access
Control Lists (ACL), shared keys, and Simple Network Management Protocol (SNMP)
agents will help eliminate many of the vulnerabilities inherent in a vendor's software default
configuration.
Updating default passwords: Each WLAN device comes with its own default settings, some
example. On some APs, the factory default configuration does not require a password (i.e.,
the password field is blank). Unauthorized users can easily gain access to the device if there
agency's security policy, which should include the requirement for strong (i.e., an
alphanumeric and special character string at least eight characters in length) administrative
passwords. If the security requirement is sufficiently high, an agency should consider using
generate a new code every minute. This code is a one-time use code that is paired with the
user's personal identification number (PIN) for authentication. Another example of two-factor
authentication is pairing the user's smart card with the user's PIN. This type of authentication
requires a hardware device reader for the smart card or an authentication server for the PIN.
Several commercial products provide this capability. However, use of an automated password
depending on the agency's security requirements, number of users, and budget constraints.
Given the need to ensure good password authentication and policies, it is important to note
the critical importance of ensuring that the management interface has the proper
cryptographic protection to prevent the unauthorized disclosure of the passwords over the
management interface. Numerous mechanisms exist that can be exploited to ensure that
Using MAC ACL functionality: A MAC address is a hardware address that uniquely
identifies each computer (or attached device) on a network. Networks use the MAC address
to help regulate communications between different computer NICs on the same network
subnet. Many 802.11 product vendors provide capabilities for restricting access to the WLAN
based on MAC ACLs that are stored and distributed across many APs. The MAC ACL grants
However, the Ethernet MAC ACL does not represent a strong defense mechanism by itself.
Because MAC addresses are transmitted in the clear from a wireless NIC to an AP, the MAC
can be easily captured. Malicious users can spoof a MAC address by changing the actual
MAC address on their computer to a MAC address that has access to the wireless network.
This countermeasure may provide some level of security; however, users should use this with
caution. This may be effective against casual eavesdropping but will not be effective against
determined adversaries.
Users may want to consider this as part of an overall defense-in-depth strategy, adding levels
of security to reduce the likelihood of problems. However, users should weigh the
administrative burden of enabling the MAC ACL (assuming they are using MAC ACLs)
against the true security provided. In a medium-to-large network, the burden of establishing
and maintaining MAC ACLs may exceed the value of the security countermeasure.
Additionally, most products only support a limited number of MAC addresses in the MAC
ACL. The size of the access control list may be insufficient for medium-to-large networks.
Changing default cryptographic keys: The manufacturer may provide one or more keys to
enable shared-key authentication between the device trying to gain access to the network and
the AP. Using a default shared-key setting forms a security vulnerability because many
vendors use identical shared keys in their factory settings. A malicious user may know the
default shared key and use it to gain access to the network. Changing the default shared key
setting to another key will mitigate the risk. For example, the shared key could be changed to
“954617" instead of using a factory default shared key of "111111." No matter what their
security level, agencies should change the shared key from the default setting because it is
easily exploited. In general, agencies should opt for the longest key lengths (e.g., 104 bits).
Finally, a generally accepted principle for proper key management is to change cryptographic
3.7.2 Authentication
In general, effective authentication solutions are a reliable way of permitting only authorized
users to access a network. Authentication solutions include the use of usernames and
passwords; smart cards, biometrics, or PKI; or a combination of solutions (e.g., smart cards
with PKI).27 When relying on usernames and passwords for authentication, it is important to
have policies specifying minimum password length, required password characters, and
password expiration. Smart cards, biometrics, and PKI have their own individual
All agencies should implement a strong password policy, regardless of the security level of
their operations. Strong passwords are simply a fundamental measure in any environment.
Agencies should also consider other types of authentication mechanisms (e.g., smart cards
with PKI) if their security levels warrant additional authentication. These mechanisms may be
integrated into a WLAN solution to enhance the security of the system. However, users
should be careful to fully understand the security provided by enhanced authentication. This
does not in and of itself solve all problems. For example, a strong password scheme used for
accessing parameters on a NIC card does nothing to address the problem with WEP
cryptography.
Resources on public wireless networks have a higher risk of attack since they generally do
not have the same degree of protection as internal resources. Personal firewalls offer some
protections against certain attacks. Personal firewalls are software-based solutions that reside
versions are best suited to low-end users because individual users are able to configure the
firewall themselves and may not follow any specific security guidelines. Centrally managed
remotely manage them. Centrally managed solutions allow organizations to modify client
firewalls to protect against known vulnerabilities and to maintain a consistent security policy
for all remote users. Some of these high-end products also have VPN and audit capabilities.
Although personal firewalls offer some measure of protection, they do not protect against
advanced forms of attack. Depending on the security requirement, agencies may still need
additional layers of protection. Users that access public wireless networks in airports or
conference centers, for example, should use a personal firewall. Personal firewalls also
provide additional protection against rogue access points that can be easily installed in public
places.
CHAPTER FOUR
Wireless network configuration and monitoring channel show an example of how wireless
network software can be design, configured and monitor the use of the network.
The programming language I use in designing the software is Visual Basic programming
language.
In this program the component of visual basic toolbar use are the following:
1. LABEL
2. TEXTFIELD
3. OPTION BUTTON
4. CHECK BOX
5. COMBO BOX
6. COMMAND BUTTON
7. LIST BOX
9. LINE
10. IMAGE
11. FRAME
Fig 1.1 shows the main form called Network Monitoring Channel/Configuration (frm
Wireless Network). The form contain Tab property which contain “Configuration Channel”
To secure the network, network name (SSID) and Network Access Point (A.P) has been
hidden; clicking the show button will make the network name or Access Point visible, but
will request for password as showed in fig 1.2, entering the wrong password will prevent the
Another important features wireless network is the Access Key, here the access key is been
set by network owner. To assign the access key the two fields must match (the key field and
[Link] = 1455
Command3. Visible = True
End Sub
[Link] "30"
[Link] "25"
[Link] "20"
[Link] "15"
[Link] "10"
[Link] "5"
[Link] "Yes"
[Link] "No"
[Link] "Yes, but prompt for key"
[Link] "Yes but alert the owner"
End Sub
[Link] = 1455
Command3. Visible = False
End Sub
Login AP
Option Explicit
Login SSID
Option Explicit
LoginSucceeded = False
Me. Hide
End Sub
This section how the wireless network can be connected also can be secure form
unauthorized access.
Fig 2.1 show how computer indicate and identified the wireless network found within a
specific location, bellow is the full screen of the message box. When the user click on “Show
List" button the form expand and the list of the wireless network detected appear in the list as
When the user click on other network they automatically connected because they are not
secured (fig 2.2), but when the user click on “AlloverWN180Pro wireless network" it prompt
for access key from the network server (fig 2.3 and 2.4), which bring about security in the
wireless network.
Fig 2.5 show a congratulation message as the user enter correct access key, and the computer
End Sub
Login Wireless
Unload Me
End Sub
CHAPTER FIVE
5.1 Conclusion
Wireless communications offer organizations and users many benefits such as portability and
flexibility, increased productivity, and lower installation costs. Wireless technologies cover a
broad range of differing capabilities oriented toward different uses and needs.
Wireless local area network (WLAN) devices, for instance, allow users to move their laptops
from place to place within their offices without the need for wires and without losing network
connectivity. Less wiring means greater flexibility, increased efficiency, and reduced wiring
costs.
Moreover, these technologies can offer dramatic cost savings and new capabilities to diverse
applications ranging from retail settings to manufacturing shop floors to first responders.
However, risks are inherent in any wireless technology. Some of these risks are similar to
those of wired networks; some are exacerbated by wireless connectivity; some are new.
Perhaps the most significant source of risks in wireless networks is that the technology's
underlying communications medium, the airwave, is open to intruders, making it the logical
The loss of confidentiality and integrity and the threat of denial of service (DOS) attacks are
risks typically associated with wireless communications. Unauthorized users may gain access
to agency systems and information, corrupt the agency's data, consume network bandwidth,
degrade network performance, and launch attacks that prevent authorized users from
accessing the network, or use agency resources to launch attacks on other networks.
Specific threats and vulnerabilities to wireless networks and handheld devices include the
following:
All the vulnerabilities that exist in a conventional wired network apply to wireless
technologies.
Sensitive information that is not encrypted (or that is encrypted with poor
cryptographic techniques) and that is transmitted between two wireless devices may
Malicious entities may steal the identity of legitimate users and masquerade as them
may be able to violate the privacy of legitimate users and be able to track their
movements.
Malicious entities may deploy unauthorized equipment (e.g., client devices and access
Handheld devices are easily stolen and can reveal sensitive information.
REFERENCES
Khatod, Anil, (2004). Five Steps To WLAN Security A Layered Approach. Air Defense
[Link]
_A_Layered_Approach
Wireless Networking Basics, NETGEAR, Inc. October 2005, v1.0, October 2005
Goldsmith, Colin, (2004). Wireless Local Area Networking For Device Monitoring,
Lansford, J., (2000). HomeRFTM/SWAP: A Wireless Voice and Data System for the
O'Hara, B. & Petrick, A., (1999). IEEE 802.11 Handbook: A Designer's Companion,
Standards Information Network, IEEE Press, New York, New York, 1999.
2002, [Link]
Wireless Networking Choices for the Broadband Internet Home., White Paper, 2001.
[Link]
Flickenger, Roger Weeks. (2005). Wireless Hacks , 2nd Edition, O'Reilly, 2005
Clark, David, Pogran, Kenneth T. & Wed, David p. (1978). An Introduction to Local
Area Networks. Proceedings of the IEEE, Vol. 66, 11, November 1978.
infrared radiation. Proc. IEEE, vol. 67, pp. 1474–1486, Nov. 1979.
Smyth, P. P., Eardley, P., Dalton, L. K., Wisely, T. D. R., McKee, P. & Wood, D.,
(1995). Optical wireless: A [Link] SPIE Proc. on [26]Wireless Data
Transmission, vol. 2601, Philadelphia, PA, Oct. 23–25, 1995, pp. 212–225.
Rancourt, .J. D., (1993). Safety of Laser Products. Int. Electrotech. Commission,
CEI/IEC825-1: Optical Thin Films. New York: Macmillan.
Carruthers, Jerrey B., (2002). Wireless Infrared Communications. Wiley Encyclopedia of
Telecommunications
[Link] Systems, Inc. (2000).