This paper addresses the theory and reality of Wi-Fi security. It provides an overview of security mechanisms and explains how security works in wireless networks. The most important security protocols that are relevant for small office or home office environments are looked upon in more detail. The security of a real-world wireless network is being tested with freely available tools and popular attacking methods. It is demonstrated that old security protocols can no longer be seen as being secure at all. To create a holistic view the idea of Wi-Fi security is then expanded to include the physical level. A series of experiments provides insight on how to make a network more secure with materials and tools available in every household. A WLAN that is nearly unreachable outside the perimeter does not attract any potential hackers. The paper concludes with recommendations on where to place your access point and what can be done to shield it.
Table of Contents
- ACKNOWLEDGEMENTS
- CONTENTS
- LIST OF FIGURES
- LIST OF ABBREVIATIONS
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- METHODOLOGY
- TIMETABLE AND LOG-KEEPING
- THE ARTEFACT
- METHODOLOGY REFLECTION
- WLAN BASICS
- THE IEEE STANDARDS
- RELATIONSHIP BETWEEN THE WI-FI ALLIANCE AND THE IEEE
- WLAN ARCHITECTURE
- Independent/Ad-Hoc
- Infrastructure
- SECURITY
- SECURITY OBJECTIVES
- WLAN SECURITY
- WEP ARCHITECTURE
- How WEP works
- WEP-why it doesn't work
- WEP Summary
- NEW SECURITY: 802.111 AND WPA
- Temporal Key Integrity Protocol (TKIP)
- What is WPA?
- Counter Mode with CBC-MAC and Robust Secure Networks
- Mixed Mode - Transitional Security Network (TSN)
- 802.11i Summary
- INTERIM AND EXTRA SECURITY SOLUTIONS
- VPN and IPSec
- SSL and SSH
- Other alternatives
- A BAD SECURITY EXAMPLE: NINTENDO DS
- WIRELESS LAN PENETRATION TEST – AN EXPERIMENT
- ASSEMBLING THE GEAR
- GATHERING BASIC INFORMATION
- ATTACKING WEP
- GETTING PAST THE MAC FILTER
- GETTING NETWORK SETTINGS
- CONCLUSION
- FREQUENCIES AND THEIR USE
- PHYSICAL LAYER SECURITY
- 2.4 GHz WLAN technology
- 5GHz WLAN technology
- Advantages and Disadvantages of the frequencies
- HOW WLAN SIGNAL STRENGTH IS MEASURED
- HOW THE SIGNAL IS AFFECTED
- Straight-Line Losses
- Interference
- Practical Test: Microwave ovens versus WLANS
- ANTENNAS AND THEIR IRRADIATION PATTERNS
- Dipole Antennas
- Directional Antennas
- Antenna size matters
- PHYSICAL LAYER SECURITY
- EXPERIMENTS
- GENERAL ISSUES
- Hardware and Software Configuration
- Measuring the WLAN signal strength
- Windows and Netstumbler
- Linux and Wavemon
- AVOIDING INTERFERENCE
- MAKING THE TEST RESULTS COMPARABLE
- EXPERIMENTS AND RESULTS
- Signal loss for obstacles
- Using a home-made reflector
- Other means to shield the Access Point
- RECOMMENDATIONS FOR PLACING THE ACCESS POINT TO INCREASE SECURITY
- GENERAL ISSUES
- CRITICAL EVALUATION
- EVALUATING THE OBJECTIVES
- EVALUATING OF THE PROCESS AND PERSONAL REFLECTION
- CONCLUSION
- REFERENCES
- BIBLIOGRAPHY
- APPENDICES
- PROJECT ORGANIZATION RELATED
- PROJECT PROPOSAL
- PROJECT SPECIFICATION
- GANT CHART
- BRAINSTORMING LOG
- UNREALIZED ARTEFACT IDEAS
- PROJECT LOGBOOK (DISCONTINUED)
- INFORMATION GATHERING RELATED
- INTERVIEW TRANSCRIPT, TRANSLATED INTO ENGLISH
- INTERVIEW TRANSCRIPT, ORGINAL VERSION, GERMAN
- WARWALK THROUGH WREXHAM
- PHYSICAL LAYER RELATED
- 2.4GHZ CHANNELS AND FREQUENCY OVERVIEW
- 5 GHZ CHANNELS AND FREQUENCY OVERVIEW
- EZ-12 PARABOLIC REFLECTOR TEMPLATE (ERSKINEAPE, 2005)
- PROJECT ORGANIZATION RELATED
Objectives and Key Themes
This project aims to investigate the security of wireless local area networks (WLANs) in small office/home office (SOHO) environments, taking a holistic approach. The project examines the security vulnerabilities and potential threats to WLANs in SOHO settings, analyzing existing security protocols like WEP and WPA, and exploring the effectiveness of different security measures. It also considers physical layer security by examining the impact of signal strength, antenna types, and interference on WLAN security. Key themes explored in this work include:- WLAN security in SOHO environments
- Security vulnerabilities and threats
- Existing security protocols (WEP, WPA)
- Physical layer security (signal strength, antenna types, interference)
- Practical experiments and security testing
Chapter Summaries
This chapter introduces the topic of WLAN security in SOHO environments, outlining the project's objectives and methodology. It highlights the importance of a holistic approach that encompasses both technical and physical aspects of security. The chapter provides an overview of the project's scope and the key themes that will be investigated.
This chapter presents a review of existing literature on WLAN security, examining various security threats, vulnerabilities, and solutions. It provides a theoretical foundation for understanding the complexities of securing WLANs in SOHO environments.
This chapter outlines the methodology used in the project, detailing the project timetable, log-keeping practices, and the artefact developed. It also reflects on the chosen methodology and its strengths and weaknesses.
This chapter delves into the fundamentals of WLAN technology, explaining the IEEE standards, the relationship between the Wi-Fi Alliance and the IEEE, and the different WLAN architectures. This information is essential for understanding the security challenges associated with WLANs.
This chapter focuses on security issues related to WLANs, including the objectives of WLAN security, an overview of WLAN security protocols, and a detailed analysis of the WEP (Wired Equivalent Privacy) protocol. It explores the limitations of WEP and the reasons why it is considered inadequate for robust security.
This chapter introduces newer security protocols like 802.11i and WPA (Wi-Fi Protected Access), emphasizing their advancements over WEP. It explains the Temporal Key Integrity Protocol (TKIP), the principles of WPA, and the Counter Mode with CBC-MAC and Robust Secure Networks (CCMP) encryption algorithm. The chapter also discusses the transitional security network (TSN) and provides a summary of the 802.11i standard.
This chapter explores interim and extra security solutions that can enhance WLAN security. It examines VPN (Virtual Private Network) and IPSec (Internet Protocol Security), as well as SSL (Secure Sockets Layer) and SSH (Secure Shell). The chapter also explores other security alternatives and their potential benefits.
This chapter uses the Nintendo DS as an example to illustrate the vulnerabilities and security shortcomings that can exist in real-world devices. It highlights the importance of considering security implications in the design and development of consumer electronics.
This chapter presents a detailed account of a practical wireless LAN penetration test experiment. It outlines the steps taken, the tools used, and the techniques employed to assess the security vulnerabilities of a WLAN. The experiment provides valuable insights into real-world WLAN security challenges.
This chapter explores the different frequency bands used for WLAN communication, including the 2.4 GHz and 5 GHz bands. It discusses the advantages and disadvantages of each frequency band and how they can impact WLAN security. The chapter also explores the relationship between frequency bands and physical layer security.
This chapter focuses on how WLAN signal strength is measured and how the signal is affected by various factors, including straight-line losses, interference, and obstacles. It examines the impact of these factors on WLAN security and provides practical examples like the interference caused by microwave ovens.
This chapter provides a comprehensive overview of antennas used in WLAN systems and their irradiation patterns. It explains the characteristics of dipole antennas and directional antennas and discusses the importance of antenna size in relation to WLAN security.
This chapter describes a series of experiments conducted to investigate the impact of obstacles and other factors on WLAN signal strength. It outlines the hardware and software configuration used, the measurement techniques employed, and the results obtained. The experiments provide valuable insights into the practical challenges of securing WLANs in real-world environments.
This chapter offers recommendations for strategically placing the access point to enhance WLAN security. It discusses the importance of minimizing signal losses, avoiding interference, and considering the physical environment. The chapter provides practical guidance for optimizing WLAN security through careful access point placement.
This chapter evaluates the project's objectives and the effectiveness of the chosen methodology. It reflects on the successes and challenges encountered during the project and offers insights into the project's overall impact.
Keywords
This project focuses on the security of wireless local area networks (WLANs) in a small office/home office (SOHO) environment. Key keywords include: WLAN security, SOHO, WEP, WPA, 802.11i, physical layer security, signal strength, antennas, interference, penetration testing, vulnerabilities, threats, and security protocols. The project examines various security aspects, including technical and physical layer security, and utilizes practical experiments to evaluate the effectiveness of different security measures.- Arbeit zitieren
- Christian Wimmer (Autor:in), 2006, Wireless LAN Security in a SOHO Environment, München, GRIN Verlag, https://www.hausarbeiten.de/document/115535