This paper addresses the theory and reality of Wi-Fi security. It provides an overview of security mechanisms and explains how security works in wireless networks. The most important security protocols that are relevant for small office or home office environments are looked upon in more detail. The security of a real-world wireless network is being tested with freely available tools and popular attacking methods. It is demonstrated that old security protocols can no longer be seen as being secure at all. To create a holistic view the idea of Wi-Fi security is then expanded to include the physical level. A series of experiments provides insight on how to make a network more secure with materials and tools available in every household. A WLAN that is nearly unreachable outside the perimeter does not attract any potential hackers. The paper concludes with recommendations on where to place your access point and what can be done to shield it.
Inhaltsverzeichnis (Table of Contents)
- ACKNOWLEDGEMENTS
- CONTENTS
- LIST OF FIGURES
- LIST OF ABBREVIATIONS
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- METHODOLOGY
- TIMETABLE AND LOG-KEEPING
- THE ARTEFACT
- METHODOLOGY REFLECTION
- WLAN BASICS
- THE IEEE STANDARDS
- RELATIONSHIP BETWEEN THE WI-FI ALLIANCE AND THE IEEE
- WLAN ARCHITECTURE
- Independent/Ad-Hoc
- Infrastructure
- SECURITY
- SECURITY OBJECTIVES
- WLAN SECURITY
- WEP ARCHITECTURE
- How WEP works
- WEP-why it doesn't work
- WEP Summary
- NEW SECURITY: 802.111 AND WPA
- Temporal Key Integrity Protocol (TKIP)
- What is WPA?
- Counter Mode with CBC-MAC and Robust Secure Networks
- Mixed Mode - Transitional Security Network (TSN)
- 802.11i Summary
- INTERIM AND EXTRA SECURITY SOLUTIONS
- VPN and IPSec
- SSL and SSH
- Other alternatives
- A BAD SECURITY EXAMPLE: NINTENDO DS
- WIRELESS LAN PENETRATION TEST – AN EXPERIMENT
- ASSEMBLING THE GEAR
- GATHERING BASIC INFORMATION
- ATTACKING WEP
- GETTING PAST THE MAC FILTER
- GETTING NETWORK SETTINGS
- CONCLUSION
- FREQUENCIES AND THEIR USE
- PHYSICAL LAYER SECURITY
- 2.4 GHz WLAN technology
- 5GHz WLAN technology
- Advantages and Disadvantages of the frequencies
- HOW WLAN SIGNAL STRENGTH IS MEASURED
- HOW THE SIGNAL IS AFFECTED
- Straight-Line Losses
- Interference
- Practical Test: Microwave ovens versus WLANS
- ANTENNAS AND THEIR IRRADIATION PATTERNS
- Dipole Antennas
- Directional Antennas
- Antenna size matters
- PHYSICAL LAYER SECURITY
- EXPERIMENTS
- GENERAL ISSUES
- Hardware and Software Configuration
- Measuring the WLAN signal strength
- Windows and Netstumbler
- Linux and Wavemon
- AVOIDING INTERFERENCE
- MAKING THE TEST RESULTS COMPARABLE
- EXPERIMENTS AND RESULTS
- Signal loss for obstacles
- Using a home-made reflector
- Other means to shield the Access Point
- RECOMMENDATIONS FOR PLACING THE ACCESS POINT TO INCREASE SECURITY
- GENERAL ISSUES
- CRITICAL EVALUATION
- EVALUATING THE OBJECTIVES
- EVALUATING OF THE PROCESS AND PERSONAL REFLECTION
- CONCLUSION
- REFERENCES
- BIBLIOGRAPHY
- APPENDICES
- PROJECT ORGANIZATION RELATED
- PROJECT PROPOSAL
- PROJECT SPECIFICATION
- GANT CHART
- BRAINSTORMING LOG
- UNREALIZED ARTEFACT IDEAS
- PROJECT LOGBOOK (DISCONTINUED)
- INFORMATION GATHERING RELATED
- INTERVIEW TRANSCRIPT, TRANSLATED INTO ENGLISH
- INTERVIEW TRANSCRIPT, ORGINAL VERSION, GERMAN
- WARWALK THROUGH WREXHAM
- PHYSICAL LAYER RELATED
- 2.4GHZ CHANNELS AND FREQUENCY OVERVIEW
- 5 GHZ CHANNELS AND FREQUENCY OVERVIEW
- EZ-12 PARABOLIC REFLECtor Template (ERSKINEAPE, 2005)
- PROJECT ORGANIZATION RELATED
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This project aims to provide a comprehensive overview of wireless LAN security in a SOHO (Small Office/Home Office) environment. It explores the various security threats and vulnerabilities associated with wireless networks, analyzes existing security protocols and technologies, and proposes practical solutions to enhance security in SOHO settings. The project also includes a practical experiment involving a wireless LAN penetration test to demonstrate the effectiveness of different security measures.
- Wireless LAN security in SOHO environments
- Vulnerabilities and threats associated with wireless networks
- Security protocols and technologies (WEP, WPA, WPA2, VPN, IPSec)
- Physical layer security considerations (signal strength, interference, antenna placement)
- Practical implementation and testing of security measures
Zusammenfassung der Kapitel (Chapter Summaries)
The project begins with an introduction that outlines the scope and objectives of the study. Chapter 2 provides a comprehensive literature review, examining existing research on wireless LAN security, particularly in SOHO environments. Chapter 3 details the methodology employed, including the project timetable, the artefact (a practical penetration test), and a reflection on the methodology itself.
Chapter 4 delves into the fundamentals of WLAN technology, covering the IEEE standards, the relationship between the Wi-Fi Alliance and the IEEE, and the different WLAN architectures (independent/ad-hoc and infrastructure). Chapter 5 focuses on security, exploring security objectives, WLAN security protocols (WEP, WPA, WPA2), and interim security solutions like VPN and IPSec. It also examines a real-world example of poor security: the Nintendo DS.
Chapter 6 presents a practical wireless LAN penetration test, detailing the process of assembling the necessary gear, gathering basic information about the target network, attacking WEP, bypassing MAC filtering, and obtaining network settings. Chapter 7 explores the physical layer of WLAN security, discussing the different frequencies used for WLAN communication, how signal strength is measured, and how the signal is affected by factors like straight-line losses and interference.
Chapter 8 presents the results of experiments conducted to investigate the impact of obstacles and antenna placement on WLAN signal strength. Chapter 9 critically evaluates the project's objectives and the methodology employed, while Chapter 10 provides a concluding summary of the findings and recommendations for enhancing wireless LAN security in SOHO environments.
Schlüsselwörter (Keywords)
The keywords and focus themes of the text include wireless LAN security, SOHO environments, WEP, WPA, WPA2, VPN, IPSec, physical layer security, signal strength, interference, antenna placement, penetration testing, and security vulnerabilities.
- Quote paper
- Christian Wimmer (Author), 2006, Wireless LAN Security in a SOHO Environment, Munich, GRIN Verlag, https://www.grin.com/document/115535
-
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X.