Secured WiFi

download Secured  WiFi

of 6

Transcript of Secured WiFi

  • 8/7/2019 Secured WiFi

    1/6

    Secure Building of WI-FI

    SECURE BUILDING OF WI-FI

    Done by

    R. Arun II MCAP. Sangeetha II M.Sc (IT)

    St Josephs College of Arts & ScienceCuddalore 607001.

    [email protected] No: 8870327927

    INTRODUCTION

    The main objective of this research

    paper is to build secure WI-FI connections.Since every institutions, workplaces &

    organizations preferring and switching

    over to WI-FI connections we have to

    make sure that it is secure.

    This research paper is based on the

    observations & findings that were made

    for the past one year while implementing

    the WI-FI connections. Here we listed out

    what are all common exploits & probable

    solutions to tackle that the problems.

    Wireless Internet access is a huge

    convenience that we have got used to, but

    it is important to secure them. Most

    internet users do not even realize that

    connecting their system to web through

    Wi-Fi routers can make them more

    vulnerable to hackers.

    SECURITY THREATS TO WI-FINETWORKS:

    There is no physical protection of

    the wireless network. The risk of the data

    sharing is high as packets are sent through

    the airwaves, and an attacker can easily

    use various wireless sniffing tools. Most

    wireless devices use a broad spectrum, so

    it is very easy to identify the signals,

    which makes all the more vulnerable to

    hackers. There is no need to re-login andrestart network applications. WLANs do

    raise the issue of the security due to other

    inherent features such as radio waves

    being easier to intercept than physical

    wires.

    COMMON EXPLOITS OF

    WIRELESS NETWORKS

    In general, attacks on wireless

    networks fall into four basic categories:

    Passive Attacks

    Active Attacks

    War Driving

    Jamming

    PASSIVE ATTACKS

    A passive attack occurs when

    someone eavesdrops on the networks

    traffics. Armed with a wireless network

    adapter that supports promiscuous mode,

    eavesdroppers can capture network traffic

    for analysis using easily available tools.

    ACTIVE ATTACKS

    Once an attacker has gained

    sufficient information from passive attack,

    they can lunch an active attack against the

    network. There are a potentially large

    number of active attack can be lunched

    against a wireless network. These include,

    but are not limited to, unauthorized access,

    spoofing, denial of service, and flooding,

    as well as the introducing of malware.

    R Arun II MCA Page 1

    mailto:[email protected]:[email protected]
  • 8/7/2019 Secured WiFi

    2/6

    Secure Building of WI-FI

    WAR DRIVING

    War driving, also called access

    point mapping, is the act of locating and

    possibly exploiting connections to wireless

    local area networks while driving around acity or elsewhere. With an omnidirectional

    antenna and a geophysical positioning

    system (GPS), the war driver can

    systematically map the locations of

    802.11b wireless access points.

    JAMMING

    Jamming is one of many exploits

    used compromise the wireless

    environment. If an attacker truly wanted tocompromise your LAN and wireless

    security, the most effective approach

    would be to send random unauthenticated

    packets to every wireless station in the

    network.

    HACKERS DO THE FOLLOWING

    STEPS FOR HACKING WIRELESS

    NETWORKS.

    Analyze network to attack

    Crack WEP key

    Sniff network

    Denial of Service attacks (DoS)

    Hacker trying to hack a computer

    Wireless networks are extremely

    vulnerable to DoS attacks. It can slow the

    network to crawling speeds or actually

    force it to quit working. In the Brute ForceDoS attack method, a huge flood of

    packets can use up all of the networks

    resources and force it to shut down, or a

    very strong radio signal that totally

    dominates the airwaves can render access

    points and radio cards useless.

    As wireless networks send information via

    radio waves on public frequencies, thus

    they are susceptible to vulnerable.

    A hacker can initiate a packet-based brute

    force DoS attack by using other systems

    on the network to send the useless packets

    to the server. This adds significant

    overhead on the network and takes away

    useable bandwidth from legitimate users.

    SECURE BUILDING OF WI-FI

    NETWORKS

    Since wireless is a shared medium,

    everything that is transmitted or received

    over a wireless network can be

    intercepted. Encryption and authentication

    are always considered when developing a

    wireless networking system. The goal of

    adding these security features is to make

    wireless traffic as secure as wired traffic.

    Here are some simple ways to secure your

    Wi-Fi network and prevent its misuse

    Authentication through the open

    system and shared key

    authentication types.

    Data confidentiality through Wired

    Equivalent Privacy (WEP)

    USING A JAMMER DEVICE

    A Wi-Fi Jammer is designed for

    blocking wireless LAN networks and

    Bluetooth devices. It could cut off of the

    connections with Wireless Routers or

    Wireless Access Points. It works on

    2.4~2.5GHz, could be used in any secure

    and privacy locations The Wi-Fi jammer is

    applicable for blocking laptops, desktopcomputers, PDAs and so on. It could help

    R Arun II MCA Page 2

    http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci341007,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci896478,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci341007,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci896478,00.html
  • 8/7/2019 Secured WiFi

    3/6

    Secure Building of WI-FI

    you prevent unauthorized people leak out

    confidential information. The Bluetooth

    connections will be cut off also after turn

    on Wi-Fi jammer.

    STOP PUBLICLY BROADCASTING

    YOUR (SSID)

    The broadcast works like an

    invitation to the hackers whore searching

    for just that opportunity. In Wi-Fi

    networking, the wireless access point or

    router typically broadcasts the network

    name (SSID) over the air at regular

    intervals. Broadcasting was designed for

    mobile hotspots where Wi-Fi clients may

    roam in and out of range. In the home, this

    feature is unnecessary, and it increases the

    likelihood someone will try to log in to

    your home network. If you turn off SSID

    broadcasting, you can keep casual users

    away from seeing your network.

    MAC ADDRESS FILTERING

    Each piece of hardware connected

    to a network has physical address or MAC.

    Access points and routers keep track of the

    MAC addresses for all devices that

    connect to them. You can restrict or allow

    access to your network by filtering MAC

    addresses.

    Turn on WPA / WEP Encryption

    If the information sent back and forth over

    your Wi-Fi network isnt adequately

    encrypted, a hacker can easily tap into thenetwork and monitor your activity. One of

    the best ways to secure your Wi-Fi

    network is through encryption.

    There are primarily two encryption Wi-Fi

    standards

    Wireless Equivalent Protocol

    (WEP)

    Wi-Fi Protected Access (WPA).

    WIRED EQUIVALENT PRIVACY

    (WEP)

    WEP utilizes a symmetric

    algorithm known as a stream cipher,

    for encryption. A symmetric algorithm is

    one that relies on the concept of a single

    shared key (as opposed to a public

    key) that is used at one end to encrypt

    plaintext (the data) into cipher text (the

    encrypted data), and at the other end to

    decrypt it - convert the cipher text back to

    plaintext. Thus, the sender and the receiver

    share the same key, and it must be kept

    secret.

    WI-FI PROTECTED ACCESS (WPA)

    Wi-Fi Protected Access is a

    specification of standards-based,

    interoperable security enhancements that

    strongly increase the level of data

    protection and access control for existing

    and future wireless LAN systems.

    Designed to run on existing hardware as a

    software upgrade, Wi-Fi Protected Access

    is derived from and will be forward-compatible with the upcoming IEEE

    802.11i standard. When properly installed,

    it will provide wireless LAN users with a

    high level of assurance that their data will

    remain protected and that only authorized

    network users can access the network

    To meet these goals, security

    enhancements needed to be made.

    R Arun II MCA Page 3

  • 8/7/2019 Secured WiFi

    4/6

    Secure Building of WI-FI

    WPA

    Its more secure and alternative to

    WEP. However, since it is newer, it is not

    as widely supported.

    WPA2Its newest type of wireless

    encryption; it provides the highest level of

    encryption available. WPA2 encryption

    should be your first choice if your wireless

    router, all of your wireless computers and

    devices support it.

    Jammer device

    VIRTUAL PRIVATE NETWORKS(VPN)

    Virtual Private Network

    technology (VPN) has been used to secure

    communications among remote locations

    via the Internet since the 1990s. A

    familiar and already widely used

    technology in the enterprise, it can readily

    be extended to Wi-Fi WLAN segments on

    existing wired networks. Although VPNs

    were originally developed to providepoint-to-point encryption for long Internet

    connections between remote users and

    their corporate networks, they have

    recently been deployed in conjunction with

    Wi-Fi WLANs. When a WLAN client

    uses a VPN tunnel, communications

    data remains encrypted until it reaches

    the VPN gateway, which sits behind

    the wireless AP. Thus, intruders are

    effectively blocked from intercepting all

    network communications. Since the VPN

    encrypts the entire link from the PC to the

    VPN gateway in the heart of the

    corporate network, the wireless network

    segment between the PC and the AP is

    also encrypted. This is why VPNs have

    been recommended to help secure Wi-Fi

    While VPNs are generally considered

    an enterprise solution, integrated products

    that offer VPN pass-through

    connections, firewalls and routers are

    available to accommodate

    telecommuters who work from home.

    Although they provide excellent security,

    VPNs are not self-managing. User

    credentials and, often, VPN software

    must be distributed to each client.However, when properly installed, VPNs

    extend the high level of security they

    provide on wired networks to WLANs. In

    fact, some Wi-Fi vendors themselves have

    utilized VPNs in networks to secure their

    own internal Wi-Fi networks

    TEMPORAL KEY INTEGRITY

    PROTOCOL (TKIP)

    It is an enhanced data encryption.

    Wi-Fi Pr ot ec te d Access utilizes it s

    Temporal Key In te gr i ty Pro t oco l

    (TKIP). TKIP provides important data

    encryption enhancements including a

    per-packet key mixing function

    WEP VULNEBERALITIES:

    WEP is the original wirelessencryption standard, which is now

    outdated. The main problem with it is that

    it can be easily cracked. Cracking a

    wireless network means defeating the

    encryption so that you can establish a

    connection without being invited. If you

    use WEP encryption, change your

    encryption key regularly.

    DO NOT AUTO-CONNECT TO OPEN

    WI-FI NETWORKS

    R Arun II MCA Page 4

  • 8/7/2019 Secured WiFi

    5/6

    Secure Building of WI-FI

    If you connect to every available

    Wi-Fi network automatically, you will

    inevitably end up connecting to dummy

    Wi-Fi networks designed specifically to

    catch unsuspecting users. Most computers

    provide a Wi-Fi setting that will configureyour computer to automatically connect to

    any open Wi-Fi network without notifying

    you. Never select the connect to available

    Wi-Fi networks automatically setup

    option under your Network Connections

    window.

    ASSIGNING STATIC IP ADDRESSES

    TO DEVICES

    Dynamic IP allocation also works

    to the advantage of attackers, who can

    easily obtain valid IP addresses from

    networks DHCP pool. Turn off DHCP on

    the router or access point, set a fixed IP

    address range instead and then configure

    each connected device to match. Using a

    private IP address range (like 10.0.0.x)

    prevents computers from being directly

    reached from the Internet.

    ENSURE ACCESS POINTS ARE

    PLACED SECURELY

    The performance of a Wi-Fi home

    network greatly depends on signal strength

    of the wireless router or wireless access

    point (base station). In the Centre of a

    room/office etc. to minimize its signal

    strength outside the office.

    ADVANTAGES

    There are real and measurable

    benefits to using a wireless network

    versus a standard wired network. For a

    home installation customer, the greatestbenefit is that there are no wires needed:

    you dont need to drill holes in walls and

    floors; you dont need to drag cables or

    hide them under rugs. One Wi-Fi access

    point can provide network access for

    any typically sized home. And if you

    live in a rental or a historical building,

    you may not be allowed to drill holes-

    that makes wireless your only solution

    Its flexible: With a wireless networkyou and your staff can have

    uninterrupted access to people,

    information and tools as you and they

    move through the workplace with your

    mobile PC

    Its Mobility: As you change your

    business operations your wireless network

    can change with you

    Its fast:From 11 to 54 Mbps throughput

    and advanced roaming capabilities

    provide reliable access to e-mail, the

    Internet, file sharing and other network

    resources away from the desk

    Its cost-effective: Expand and extend

    your existing network by simply

    adding more adapters and access points.

    Planning is a no brainier as you need to

    buy only what you need

    LIMI T A TIONS

    HIGH CONSUMPTION OF

    ELECTRICITY

    Wi-Fi technologies are power

    hungry and suck out your electricity like

    water. This presents a clear disadvantage

    for users of laptops and other battery

    dependent devices. The battery industry isstill grappling with technology which will

    R Arun II MCA Page 5

  • 8/7/2019 Secured WiFi

    6/6

    Secure Building of WI-FI

    enable them to manufacture long lasting,

    compact sized and light weight batteries.

    RADIO WAVE CONFLICTS

    If you are using your Wi-Fi nearother radiation emitting devices such as

    microwave ovens, cordless phones, the

    resulting conflicts between devices and

    networks tend to slow down your Wi-Fi

    device. In older versions of Wi-Fi the

    conflicts were so high that if the user were

    to go near the microwave the data transfer

    would immediately stop

    DATA SAFETY

    The greatest challenge faced by Wi-Fi

    providers today is how to prevent outsiders

    from accessing your data. Before investing

    in Wi-Fi check with the hardware guys

    about precautions to save your data.

    Currently the Wi-Fi Protected Access

    technology is used to secure data transfer

    and encryption over networks.

    FUTURE TRENDS

    IEEE 802.11a

    The 802.11a supplement to 802.11

    was published in 1999. It uses Orthogonal

    Frequency Division Multiplexing (OFDM)

    to provide data rates to 54 Mbps in the 5

    GHz U-NII bands.

    IEEE 802.11g

    The 802.11g task group is

    working on a supplement to the 802.11

    standard that defines a technology for

    operation at 2.4 GHz that offers higher

    data rates (up to 22 Mbps) using

    OFDM, while remaining backwards

    compatible to 802.11b.When

    compared to 802.11a, 802.11g offers the

    advantages of lower cost, backwards

    compatibility to existing 802.11b

    equipment, and less path loss than

    802.11a. This translates into higher data

    rates for a given range, or increased range

    for a given data rate

    CONCLUSION

    Our future depends on what we do

    in the present - Mahatma Gandhi

    Wi-Fi provides freedom: freedom

    to physically move around your home

    or business and still stay connected to

    the Internet or local network; freedom to

    grow and move an office or business

    without having to install new cables andwires; Plus, it is cool, and it is fun as

    those in the know say, Once you go

    wireless, you will never want to use a

    cable again.

    Wi-Fi use is growing fast in homes,

    public access areas and businesses- both

    large and small. The Wi-Fi Alliance is

    active with many industry organizations

    and is working closely with

    manufacturers to make sure that

    existing Wi-Fi gear is compatible

    with wireless technologies developed in

    future.

    REFERENCES

    Overview of IEEE 802.11 Security,

    ww w .techonli n e.co m

    w w w .lib-a s c .ekm.o r g

    w w w .wi-fi.o r g

    w w w .howstuffworks.com

    www.about.com

    R Arun II MCA Page 6

    http://www.techonline.com/http://www.lib-asc.ekm.org/http://www.wi-fi.org/http://www.wikipedia.org/http://www.about.com/http://www.techonline.com/http://www.lib-asc.ekm.org/http://www.wi-fi.org/http://www.wikipedia.org/http://www.about.com/