Agenda
Introduction
Wi-Fi Technologies
Wi-Fi Architecture
Wi-Fi Network Elements
How a Wi-Fi Network Works
Wi-Fi Network Topologies
Wi-Fi Configurations
Applications of Wi-Fi
Wi-Fi Security
Advantages/ Disadvantages of Wi-Fi
Introduction
IEEE 802.11b
IEEE 802.11a
IEEE 802.11g
IEEE 802.11b
IEEE 802.11a
Introduced in 2001
Operates at 5 GHz (less popular)
54 Mbps (theoretical speed)
15-20 Mbps (Actual speed)
50-75 feet range
More expensive
Not compatible with 802.11b
IEEE 802.11g
Introduced in 2003
Combine the feature of both standards
(a,b)
100-150 feet range
54 Mbps Speed
2.4 GHz radio frequencies
Compatible with b
DSSS
Direct sequence signaling technique divides the 2.4 GHz band into
11 22-MHz channels. Adjacent channels overlap one another
partially, with three of the 11 being completely non-overlapping. Data
is sent across one of these 22 MHz channels without hopping to
other channels.
with
collision
Power Management
Fragmentation
CRC checksum
Wi-Fi cards -
Safeguards -
AP-based topology
Peer-to-peer topology
AP is not required.
Client devices within
a
cell
can
communicate directly
with each other.
It is useful for setting
up of a wireless
network quickly and
easily.
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Configurations
Wi-Fi Applications
Home
Small Businesses or SOHO
Large Corporations & Campuses
Health Care
Wireless ISP (WISP)
Travellers
Eavesdropping
Man-in-the-middle attacks
Denial of Service
Eavesdropping
MITM Attack
1.
2.
3.
Attacker spoofes a
disassociate message
from the victim
The victim starts to
look for a new access
point, and the attacker
advertises his own AP
on a different channel,
using the real APs
MAC address
The attacker connects
to the real AP using
victims MAC address
Denial of Service
Frequency jamming
Not very technical, but works
Spoofed deauthentication / disassociation messages
can target one specific user
SYN Flooding
Wi-Fi Security
User Authentication
Server Authentication
Privacy
Authentication
Solution
Authentication (cont..)
Server Authentication
IEEE 802.11i
User Authentication
802.1x
EAP
48 bit IV
per packet key mixing function
WPA-PSK
WPA Enterprise
Data is encrypted
Denial of Service
802.11i
Data encryption
802.1x
AES protocol is used
Advantages
Mobility
Ease of Installation
Flexibility
Cost
Reliability
Security
Use unlicensed part of the radio spectrum
Roaming
Speed
Limitations
Interference
Degradation in performance
High power consumption
Limited range