24
Wireless Networks Wireless Networks Tamus, Zoltán Ádám Tamus, Zoltán Ádám [email protected] http://adaminf.atw.hu http://adaminf.atw.hu

Wireless Networks Tamus, Zoltán Ádám [email protected]

Embed Size (px)

Citation preview

Page 1: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Wireless NetworksWireless NetworksTamus, Zoltán ÁdámTamus, Zoltán Ádám

[email protected]

http://adaminf.atw.huhttp://adaminf.atw.hu

Page 2: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Basics of CommunicationBasics of Communication

TransmitterTransmitter (coding)->Channel->(decoding) Receiver(coding)->Channel->(decoding) Receiver

Page 3: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

The Radio-ChannelThe Radio-Channel

Wireless technologies use electromagnetic Wireless technologies use electromagnetic waves as channelwaves as channel RadioRadio wavewavess (freq. 30 kHz-30 GHz) (freq. 30 kHz-30 GHz) Light (Infra Red) (wavelength ~900 nm)Light (Infra Red) (wavelength ~900 nm)

Page 4: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com
Page 5: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Personal Area NetworksPersonal Area Networks

InterconnectInterconnecting ing devices without wiredevices without wire HeadsetsHeadsets NotebooksNotebooks PDA (Personal Digital Assistant)PDA (Personal Digital Assistant) Mobile phonesMobile phones GPSGPS Peripherals (Keyboard, Mouse, Printer, Game Peripherals (Keyboard, Mouse, Printer, Game

controller etc.) controller etc.)

Page 6: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

BluetoothBluetooth 1998, Special Interest Group (Ericsson, IBM, 1998, Special Interest Group (Ericsson, IBM,

Intel, Nokia, Toshiba)Intel, Nokia, Toshiba) Uses radiofrequency: in the 2.4 GHz band, Uses radiofrequency: in the 2.4 GHz band,

frequency hopping spread spectrum systemfrequency hopping spread spectrum system Max. 1 Mb/sec bandwidthMax. 1 Mb/sec bandwidth Operating range ~10 m, but in high power Operating range ~10 m, but in high power

applications can be extended to 100 mapplications can be extended to 100 m

Personal Area NetworksPersonal Area Networks

Page 7: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Personal Area NetworkPersonal Area Network Bluetooth devicesBluetooth devices

Page 8: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Personal Area NetworkPersonal Area Network

IrDA (Infrared Data IrDA (Infrared Data Association) 1993Association) 1993 Use Infrared lightUse Infrared light Operating range Operating range

max. 1 mmax. 1 m Bandwidth: 4 Bandwidth: 4

Mb/sec.Mb/sec.

Page 9: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Local Area NetworksLocal Area Networks

HomeHome OfficesOffices Public WLAN, Wi-Fi Hot SpotsPublic WLAN, Wi-Fi Hot Spots

HotelsHotels AirportsAirports Net CafesNet Cafeshttp://www.wi-fihotspotlist.com/ http://www.hotspotter.hu/en/

Ad Hoc peer to peerAd Hoc peer to peer

Page 10: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Local Area NetworkLocal Area Network

Typical Typical WLAN WLAN application application in home or in home or small officesmall office

Page 11: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Local Area NetworkLocal Area Network

Network Access in BuildingsNetwork Access in Buildings Desktop PCsDesktop PCs NotebooksNotebooks PDAsPDAs

Page 12: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Local Area NetworksLocal Area Networks IEEE 802.11 standardIEEE 802.11 standard

802.11a802.11a 19991999 5 GHz band5 GHz band Max. 54 Mb/secMax. 54 Mb/sec

802.11b802.11b 2.5 GHz2.5 GHz Max. 11 Mb/secMax. 11 Mb/sec

802.11g 802.11g 2.5 GHz2.5 GHz Max. 54 Mb/secMax. 54 Mb/sec

Page 13: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

SecuritySecurity Eavesdropping & EspionageEavesdropping & Espionage

Wireless technologies use radio waves. Wireless technologies use radio waves. Eavesdroppers can easily pick up Eavesdroppers can easily pick up unencrypted messages by listening the etherunencrypted messages by listening the ether

Rouge Access PointsRouge Access Points An employee of an organization might hook An employee of an organization might hook

up an access point without the permission or up an access point without the permission or even knowledge of IT.even knowledge of IT.

Page 14: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Accidental Associations Accidental Associations A wireless network is setup using the same A wireless network is setup using the same

SSID as your network and within range of your SSID as your network and within range of your wireless device. Connecting to another wireless device. Connecting to another wireless LAN can divulge passwords or wireless LAN can divulge passwords or sensitive document to anyone on the sensitive document to anyone on the neighbouring network neighbouring network

Denial of ServiceDenial of Service Flowing packages to the network take the Flowing packages to the network take the

resourcesresources RF interference with an external transmitterRF interference with an external transmitter

SecuritySecurity

Page 15: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

SecuritySecurity Securing Wireless NetworksSecuring Wireless Networks

WEP (Wired Equivalent Privacy)WEP (Wired Equivalent Privacy) Problems: Easily vulnerable because of the Problems: Easily vulnerable because of the

permanent keys and the short initialization vectorpermanent keys and the short initialization vector

WPA (Wi-Fi Protocol Access)WPA (Wi-Fi Protocol Access) The clients use periodically changed different keysThe clients use periodically changed different keys

VPN (Virtual Private Network)VPN (Virtual Private Network)

Page 16: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

AuthenticationAuthentication SSID (Service Set Identifier)SSID (Service Set Identifier)

Weakness in IEEE 802.11: the SSID is sent Weakness in IEEE 802.11: the SSID is sent without encrypting!without encrypting!

MAC address filteringMAC address filtering MAC (Media Access Control)MAC (Media Access Control) WEP not encodes the MAC field of the frame!WEP not encodes the MAC field of the frame!

SecuritySecurity

Page 17: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Setting up a wireless router Setting up a wireless router Connection to the broadband routerConnection to the broadband router Connecting a PCConnecting a PC

Page 18: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Access to Web-based utility software by Access to Web-based utility software by RouterRouter’’s IP addresss IP address

User Name: User Name: <blank><blank> Password: Password: adminadmin

Configuration Configuration

Page 19: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Setting up Internet ConnectionSetting up Internet Connection

DHCPDHCP Static IPStatic IP PPPoEPPPoE PPTPPPTP

Page 20: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Setting up Wireless NetworkSetting up Wireless Network Mode: B/GMode: B/G

SSID SSID Broadcasting ?Broadcasting ? ChannelChannel

Page 21: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Security SettingsSecurity Settings WEPWEP

Level of WEP encryption: 64-bit or 128-bitLevel of WEP encryption: 64-bit or 128-bit

Page 22: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

WPAWPA WPA2WPA2 WPA2 MixedWPA2 Mixed

Set the Passphrase and Renewal periodSet the Passphrase and Renewal period

Security SettingsSecurity Settings

Page 23: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Access controlAccess control

MAC address MAC address filteringfiltering

Page 24: Wireless Networks Tamus, Zoltán Ádám zoltanadam_tamus@yahoo.com

Security PrecautionsSecurity Precautions

Change the default SSID. Disable SSID Broadcast. Change the default password for the

Administrator account. Enable MAC Address Filtering. Change the SSID periodically. Use the highest encryption algorithm possible.

Use WPA if it is available. Please note that this may reduce your network performance.

Change the WEP encryption keys periodically.