A survey on mobile phone related issues in Wi-Fi calling
|
|
|
- Margaret Hancock
- 10 years ago
- Views:
Transcription
1 A survey on mobile phone related issues in Wi-Fi calling Andrew Kipkebut 1, Timothy sawe 2 Department of Mathematics and computing, Kabarak University, Nakuru, Kenya. Department of Mathematics and computing, Kabarak University, Nakuru Kenya Abstract: Wi-Fi is an industry name for wireless local area network (WLAN) communication technology based on the Institute of Electrical and Electronics Engineers (IEEE) wireless standards. It uses 2.4 GHz UHF and 5 GHz SHF radio waves. It is a system of wirelessly connecting devices allowing connection between devices without the use of cables. Many devices including smart phones can use Wi-Fi in their operations. Wi-Fi Calling uses Wi-Fi to provide better mobile phone coverage. It is based on a Smart Wi-Fi Application that is pre-loaded onto a phone. Wi-Fi Calling enables you make calls and send texts via Wi-Fi when you re out of cell signal range provided Wi-Fi is available. Wireless networks are more often than not physically exposed, so the chances of intrusion in these networks are as well high. This paper investigates mobile phone Wi-Fi calling related issues.a finding from this paper has indicated positive effects on the use of Wi-Fi calling hence consequently a need for more in-depth and longitudinal research into the issues related to this splendid technology. Keywords: Wi-Fi Calling, WLAN, IEEE, GHz, Smartphones, Hot Spots. One can use advanced software to detect and request connection to Hotspots. Figure 1: Wi-Fi in action(source 2008 howstuffworks.com ) To start a Wireless connection for a phone, it is important that the wireless router is plugged into the internet connection and that all the required settings are properly installed as shown Figure 2. I. INTRODUCTION Wi-Fi Calling uses Wi-Fi to provide better mobile phone coverage. It is based on a Smart Wi-Fi application an example is Kineto software that is pre-loaded onto a smart phone. Currently one can use Wi-Fi calling in iphone, Android, and other Smartphone e.g. Samsung Galaxy S2, HTC one, Motorola Defy among others. Wi-Fi calling allows you to make and receive calls, access unlimited highspeed data, send and receive messages over a wireless internet connections[1]. Using Wi-Fi calling is easy and cheaper to use. You simply connect to an available Wi-Fi network of your choice, confirm Wi-Fi calling is enabled on your phone, and continue to use all of your favorite device features. The Apps for Wi-Fi calling provide a great way to save money and make calls from anywhere with a Wi-Fi connection. II. LITERATURE REVIEW Wi-Fi is increasingly becoming the preferred mode of internet connection all over the world. To access this type of connection, one must have a wireless adapter on their computer as shown in Figure.1. Wi-Fi provides wireless connectivity by emitting frequencies between 2.4GHz to 5GHz based on the amount of data on the network. Areas which are enabled with Wi-Fi connectivity are known as Figure 2: A Wi-Fi phone (Source howstuffworks) The major advantage of Wi-Fi is that it is compatible with almost every operating system, game devices, Phones, projectors and advanced printer. The 3G radio is disabled when Wi-Fi calling is active in order to maintain longlasting battery life on the smartphone[2] as shown in Figure
2 This technology provides enhanced coverage and seamless delivery of voice, data and messaging. It can also reduce your telephony costs. Unlike other kinds of FMC, Wi-Fi calling does not interrelate with the organization s private branch exchange (PBX). This makes deployment relatively quick and easy. The input requirements for Wi-Fi calling include the following[4]. Figure. 3- Kineto smartphone using a Wi-Fi calling app.(source Kineto.com) III. HOW WI-FI CALLING WORKS The inclination toward communications junction is continually accelerating, with multiple services leveraging common infrastructures. One example is fixed mobile convergence (FMC), which enables users to rely on a single device or handset for all their communications needs[3]. FMC eliminates the requirement for both fixed and mobile phones and enables a single device to use both wireless local and wide area networks. Unlicensed Mobile Access (UMA), also referred to as Generic Access Network (GAN), is a variety of FMC that enables the convergence of fixed, mobile and Internet-based telephony[4]. Essentially UMA known familiarly as Wi-Fi calling enables a mobile phone to connect over a Wi-Fi network and hand off seamlessly to a GSM cellular network if the caller moves beyond the Wi-Fi range as shown in Figure. 4. A. UMA-enabled dual mode handsets (with GSM and Wi-Fi radios). Unlicensed Mobile Access or UMA, is the commercial name used by mobile carriers for external IP access into their core networks. The phones should be able to switch seamlessly between the two signals. More recently, the system has been called Wi-Fi Calling by a number of handset manufacturers, including Apple and Samsung, a move that is being mirrored by carriers like T-Mobile USA. B. A broadband Wi-Fi network It should be capable of handling voice service of which most of them do. If not, a configuration of the existing network may be required to optimally support Wi-Fi calling. C. A Wi-Fi Calling plan. Normally service providers offer different plan options to meet the varying needs of organizations and individual employees, including an access-only plan, a plan for unlimited calling to your local area code, and one for unlimited national calling. In a nutshell how Wi-Fi calling is as creating an IP extension of the carrier s wireless network. Essentially, the Internet becomes a transport medium for voice calls. When a dual mode handset encounters a Wi-Fi access point that it recognizes, it establishes an IP connection with the access point. The handset then establishes a session with the UMA Network Controller (UNC), which serves as the gateway between the Internet and the wireless network. After authentication and security protocols have been exchanged, the handset is connected to the wireless network. Once the connection is established, the call is transferred seamlessly to the Wi-Fi network. The handover process is completely transparent to the user, just as when a user passes from one wireless network cell to another. Depending on the subscriber s plan, Wi-Fi calling can zero rate calls to the local area code. Data streams, including , SMS, MMS and WAP browsing, are also passed between the handset and the UNC. As well as decreasing wireless data usage, this can result in superior performance. IV. WI-FI SECURITY THREATS Figure. 4: Unlicensed mobile Access ( UMA) devices support a seamless hand offs between a Wi-Fi and a GSM cellular network without user intervention.(source 2010 Rogers communication) Despite the productivity, convenience and cost advantage that Wireless LAN offers, the radio waves used in wireless networks create a risk where the network can be hacked. In this paper we will narrow down to three examples of important threats to WI-FI calling. 174
3 A. Denial of Service attack In this kind of attack, the intruder floods the network with either valid or invalid messages affecting the availability of the network resources. Due to the nature of the radio transmission, the WLAN are very vulnerable against denial of service attacks. The relatively low bit rates of WLAN can easily be overwhelmed and leave them open to denial of service attacks[5]. By using a powerful enough transceiver, radio interference can easily be generated that would enable WLAN to communicate using radio path. B. Spoofing and Session Hijacking This normally happens when an the attacker gains access to privileged data and resources in the network by assuming the identity of a valid user [6] This may occur because networks do not authenticate the source address, which is Medium Access Control (MAC) address of the frames. Attackers may therefore spoof MAC addresses and hijack sessions. Moreover, does not require an Access Point to prove it is actually an Access Point. This facilitates attackers who may masquerade as Access Point. To eliminate spoofing, proper authentication and access control mechanisms need to be placed in the WLAN. C. Eavesdropping Eavesdropping is secretly listening to the private conversation of others without their consent, as defined by Black's Law Dictionary[7]. Eavesdropping involves attack against the confidentiality of the data that is being transmitted across the network. Wi-Fi calling is susceptible to these kind of attacks since by their nature, wireless LANs intentionally radiates network traffic into space. This makes it impossible to control who can receive the signals in any wireless LAN installation. In the wireless network, eavesdropping by the third parties is the most significant threat because the attacker can intercept the transmission over the air from a distance, away from the premise of an organization. V. WIRED EQUIVALENT PRIVACY (WEP) Wired Equivalent Privacy, a deprecated wireless network security standard, is a security protocol for wireless networks. The biggest problem with WEP is when the installer doesn't enable it initially. Even bad security is generally better than no security. Normally when people do use WEP, they forget to change their keys/passwords periodically. Having many clients in a wireless network potentially sharing the identical key for long periods of time is a well-known security vulnerability. If you keep your key long enough, someone can grab all the frames he needs to crack it. Wired Equivalent Privacy (WEP) is a standard encryption for wireless networking. It is a user authentication and data encryption system from IEEE used to overcome the security threats. Basically, WEP provides security to WLAN by encrypting the information transmitted over the air, so that only the receivers who have the correct encryption key can decrypt the information. The following section explains the technical functionality of WEP as the main security protocol for WLAN. A. How WEP Works? When deploying WLAN, it is important to understand the ability of WEP to improve security. WEP uses a preestablished shared secret key called the base key, the RC4 encryption algorithm and the CRC-32 (Cyclic Redundancy Code) checksum algorithm as its basic building blocks. WEP supports up to four different base keys, identified by KeyIDs [8] Each of these base keys is a group key called a default key, meaning that the base keys are shared among all the members of a particular wireless network. Some implementations also support a set of nameless perlink keys called key-mapping keys. The WEP specification does not permit the use of both key i.e. mapping keys and default keys simultaneously, and most deployments share a single default key across all of the devices. WEP tries to achieve its security goal in a very simple way. It operates on MAC Protocol Data Units (MPDUs), the packet fragments. To protect the data in an MPDU, WEP first computes an integrity check value (ICV) over to the MPDU data. This is the CRC-32 of the data. WEP appends the ICV to the end of the data, growing this field by four bytes. The ICV allows the receiver to detect if data has been corrupted in flight or the packet is an outright forgery. Next, WEP selects a base key and an initialization vector (IV), which is a 24-bit value. WEP constructs a per-packet RC4 key by concatenating the IV value and the selected shared base key. WEP then uses the per-packet key to RC4, and encrypt both the data and the ICV. The IV and KeyID identifying the selected key are encoded as a four-byte string and pre-pended to the encrypted data. WPA2 (an improvement on Wi-Fi Protected Access) is a much better alternative to WEP. WPA2 uses Advanced Encryption Standard for encryption. Taking into consideration of the vulnerabilities and flaws in WEP, the Wi-Fi Alliance, created the Wi-Fi Protected Access (WPA) standard which is a subset of the i. WPA was designed to improve upon the security feature deficits of WEP. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. Figure. 5 depicts a WEP-encoded MPDU[9]. Figure. 5: Encoded MPDU(Source Penton Media, Inc. 2002). 175
4 The IEEE standard defines the WEP base key size as consisting of 40 bits, so the per-packet key consists of 64 bits once it is combined with the IV. The difference in key length does not matter in the overall security. An attacker can compromise its privacy goals with comparable effort regardless of the key size used. B. Weaknesses of WEP WEP has undergone much scrutiny and criticism that it may be compromised. What makes WEP vulnerable? The major WEP flaws can be summarized into three categories:[9] 1) No forgery protection:there is no forgery protection provided by WEP. Even without knowing the encryption key, an adversary can change packets in arbitrary, undetectable ways, deliver data to unauthorized parties, and masquerade as an authorized user. Even worse, an adversary can also learn more about the encryption key with forgery attacks than with strictly passive attacks. 2) No protection against replays: WEP does not offer any protection again replays. An adversary can create forgeries without changing any data in an existing packet, simply by recording WEP packets and then retransmitting later. Replay, a special type of forgery attack, can be used to derive information about the encryption key and the data it protects. 3) Reusing initialization vectors: By reusing initialization vectors, WEP enables an attacker to decrypt the encrypted data without the need to learn the encryption key or even resorting to high-tech techniques. While often dismissed as too slow, a patient attacker can compromise the encryption of an entire network after only a few hours of data collection. A report done by a team at the University of California's computer science department [10] presented the insecurity of WEP which expose WLAN to several types of security breaches. The ISAAC (Internet Security, Applications, Authentication and Cryptography) team which released the report quantifies two types of weaknesses in WEP. The first weakness emphasizes on limitations of the Initialization Vector (IV). The value of the IV often depends on how vendor chose to implement it because the original protocol did not specify how this value is derived. The second weakness concerns on RC4's Integrity Check Value (ICV), a CRC-32 checksum that is used to verify whether the contents of a frame have been modified in transit. At the time of encryption, this value is added to the end of the frame. As the recipient decrypts the packet, the checksum is used to validate the data. Because the ICV is not encrypted, however, it is theoretically possible to change the data payload as long as you can derive the appropriate bits to change in the ICV as well. This means data can be tampered and falsified. VI. PRACTICAL SOLUTIONS FOR SECURING WLAN Despite the risks and vulnerabilities associated with wireless networking, there are certainly circumstances that demand their usage. Even with the WEP flaws, it is still possible for users to secure their WLAN to an acceptable level. This could be done by implementing the following actions to minimize attacks into the main networks : A. Changing Default SSID Service Set Identifier (SSID) is a unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to a particular WLAN. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID[11]. In fact, it is the only security mechanism that the access point requires to enable association in the absence of activating optional security features. Not changing the default SSID is one of the most common security mistakes made by WLAN administrators. This is equivalent to leaving a default password in place. B. Utilize VPN A VPN is a much more comprehensive solution in a way that it authenticates users coming from an untrusted space and encrypts their communication so that someone listening cannot intercept it. Wireless AP is placed behind the corporate firewall within a typical wireless implementation. This type of implementation opens up a big hole within the trusted network space. A secure method of implementing a wireless AP is to place it behind a VPN server. This type of implementation provides high security for the wireless network implementation without adding significant overhead to the users. If there is more than one wireless AP in the organization, it is recommended to run them all into a common switch, then connecting the VPN server to the same switch. Then, the desktop users will not need to have multiple VPN dial-up connections configured on their desktops. They will always be authenticating to the same VPN server no matter which wireless AP they have associated with. Figure. 6 shows secure method of implementing a wireless AP. Figure. 6: Securing a wireless AP[12] 176
5 C. Utilize Static IP By default, most wireless LANs utilize DHCP (Dynamic Host Configuration Protocol) to more efficiently assign IP addresses automatically to user devices. A problem is that DHCP does not differentiate a legitimate user from a hacker. With a proper SSID, anyone implementing DHCP will obtain an IP address automatically and become a genuine node on the network. By disabling DHCP and assigning static IP addresses to all wireless users, you can minimize the possibility of the hacker obtaining a valid IP address. This limits their ability to access network services. On the other hand, someone can use an packet analyzer to sniff the exchange of frames over the network and learn what IP addresses are in use. This helps the intruder in guessing what IP address to use that falls within the range of ones in use. Thus, the use of static IP addresses is not fool proof, but at least it is a deterrent. Also keep in mind that the use of static IP addresses in larger networks is very cumbersome, which may prompt network managers to use DHCP to avoid support issues. D. Access Point Placement WLAN access points should be placed outside the firewall to protect intruders from accessing corporate network resources. Firewall can be configured to enable access only by legitimate users based on MAC and IP addresses. However, this is by no means a final or perfect solution because MAC and IP addresses can be spoofed even though this makes it difficult for a hacker to mimic. Try orienting antennas to avoid covering areas outside the physically controlled boundaries of the facility. By steering clear of public areas, such as parking lots, lobbies, and adjacent offices, the ability for an intruder to participate on the wireless LAN can be significantly reduced. This will also minimize the impact of someone disabling the wireless LAN with jamming techniques. radio-based devices can degrade the performance of Wi-Fi connectivity. This is because the family of Wi-Fi protocols with the frequency of 2.4GHz is shared with many other types of services such as microwaves, baby monitors, cordless phones and many home communication devices[13]. Since the primary requirement for Wi-Fi calling is Wi-Fi enabled phone, this effect may affect the performance of the call. C. Quality of Service(QoS) of Wi-Fi calling As much as Wi-Fi calling improve the quality of service in the area of coverage, there are some Wi-Fi calling issues that negatively affect the quality of service. Since Wi-Fi calling enabled phones use multiple signals, calls may be more prone to disconnect when the handset transition from Wi-Fi to standard GSM network. While using Wi-Fi in calling, the range from the access point is important. Moving beyond the range may lead to dropped calls. Furthermore, phone handover from Wi-Fi to GSM is not supported for international calls. The international Wi-Fi calls must be completed on Wi-Fi. D. Phone Battery Drain Wi-Fi calling will need no other option but to turn on Wi-Fi. Enabling Wi-Fi on cell phones drains the battery fast because it always looks for possible connections, network and information. Though power Saving Mode protocol is supposed to prevent the Wi-Fi from consuming the power too quickly, a study has proved otherwise[14]. The study found out that when a variety of access points use this mode, the setup wasted power and unfairly prioritized some devices over others. There are applications though that can be installed on the smartphones to manage the battery strength on the phone. An application such as JuiceDefender(Android) and mybatteylife(iphone) by KVapps helps in battery management by adjusting settings of phones automatically based on several factors. VII. PHONE RELATED ISSUES IN WIFI CALLING A. Compatibility Wi-Fi calling is not available to all phones. The Wi-Fi calling functionality is supported on the device. The Wi-Fi calling service providers such as T-mobile(US), Kinetos and Rogers(Canada) provide phones which have the Wi-Fi functionality embedded on the device. Unlike other applications, Wi-Fi calling functionality must be coded within the operating system of the device and not installed onto the phone. This gives the service providers the exclusive ownership of the Wi-Fi calling facility. The service providers should provide mobile phones which have Wi-Fi calling facility. B. Interference. It has been proved that most of the home appliances such as Bluetooth devices, microwaves, neighbours Wi-Fi or even obstructions from buildings and humans can affect the performance of Wi-Fi enabled devices. A study by Epitiro, a UK based research shows that interference from other VIII. TOOLS FOR PROTECTING WLAN There are some products that can minimize the security threats of WLAN such as: A. AirDefense It is a commercial wireless LAN intrusion protection and management system that discovers network vulnerabilities, detects and protects a WLAN from intruders and attacks, and assists in the management of a WLAN. AirDefense also has the capability to discover vulnerabilities and threats in a WLAN such as rogue APs and ad hoc networks. Apart from securing a WLAN from all the threats, it also provides a robust WLAN an example of such tools is Motorola s AirDefense Services Platform (ADSP) simplifies the management, monitoring and protection of WLAN environments. B. Isomair Wireless Sentry This product from Isomair Ltd. automatically monitors the air space of the enterprise continuously using unique and 177
6 sophisticated analysis technology to identify insecure access points, security threats and wireless network problems. This is a dedicated appliance employing an Intelligent Conveyor Engine (ICE) to passively monitor wireless networks for threats and inform the security managers when these occur. It is a completely automated system, centrally managed, and will integrate seamlessly with existing security infrastructure. No additional man -time is required to operate the system. C. Wireless Security Auditor(WSA) This is IBM prototype of wireless LAN security running on Linux on IPAQ PDA which helps network administrators to close vulnerability by automatically auditing a wireless network for proper security configuration an example of such tool is Elcomsoft Wireless Security Auditor simple and cheap. Not surprisingly, it has become one of the most widely deployed and popular wireless standards. Travelers and mobile workers frequently turn to free Wi-Fi internet connections in hotels, airports, conference centres and business facilities. These Wi-Fi connections are particularly risky as they are often set up without proper security settings. There is a growing trend of hackers setting up mock Wi-Fi hotspots in public places, in order to capture and record data. The introduction of Wi-Fi calling makes cell phone coverage available almost anywhere. However the WLAN vulnerabilities remain a challenge to the realization of Wi-Fi calling which is primarily caused by WEP as its security protocol. However, these problems can be solved with standards, such as i.Users can protect their conversations by practicing the suggested actions that are mentioned in this paper, based on the cost and the level of security that they wish. IX. CONCLUSION Since Wi-Fi operates in unlicensed spectrum; it is easy to be deployed by anyone, anywhere; and the required hardware is X. REFERENCES [1] T-Mobile Inc, About Wi-Fi calling, 2014, support.tmobile.com/docs/doc [2] Andrew Von Nagy, Kineto Smart Wi-Fi Calling on T-Mobile, 2011, [3] Ljubljana Fixed-mobile convergence with survey of numbering related issues, 2008, Page 2, f. [4] Rogers Inc, Wi-Fi Calling for business- An executive overview Rogers White paper, Pg 4, Fi_Calling_whitepaper_Dec2_EN.pdf. [5] M. Handley, E. Rescorla, "Internet Denial-of-Service Considerations", 2006 RFC 4732 [6] Mirkovic, J., Jevtic, N. & Reiher, P. A practical IP (Spoofing Defense through Route-based Filtering, Technical report, 2006, University of Delaware. [7] Bryan A. Garner, Black's Law Dictionary, 8th Edition [8] Chetan Nanjunda Mathur and K.P. Subbalakshmi, A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices Vol. 5, 2007, I. J. Network Security, Pg [9] Rafidah Abdul Hamid, Wireless LAN: Security Issues and Solutions, GIAC Security Essentials Certification (GSEC) SANS Institute, 2003, version 1.4b [10] Borisov, Nikita, Goldberg, Ian and Wagner, David. Security of the WEP Algorithm. 13 Dec URL: cs.berkeley.edu/isaac/wep- faq.html (3 Dec. 2002). [11] Cisco, An Overview of the Voice Over IP Wireless Network, g/5_0_1/english/administration/guide/7921wrnt.pdf. [12] Penton Media, Inc. Use a VPN for Wireless Security. 20 Dec URL: Dec. 2002). [13] Epitiro Technologies Limited, A study into the Effect of the Air mile on consumer broadband performance Page 6. [14] Eric Rozner, Ramachandran Ramjee, Vishnu Navda, Shravan Rayanchu NAPman: Network-Assisted Power Management for WiFi Devices. International Conference on Mobile Systems, Applications and Services (MobiSys), San Francisco, CA, June
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview
1 ROGERS WHITE PAPER Wi-fi calling for business An Executive Overview page 2 2 TABLE OF CONTENTS Introduction 3 What Is Wi-Fi Calling? 4 How Does It Work? 5 What Are the Business Benefits? 7 What Are the
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
WLAN and IEEE 802.11 Security
WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Go Wireless. Open up new possibilities for work and play
Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Figure 1. The Motorola SB4200 cable modem
Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
Wireless LAN Security
An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Although a variety of wireless network
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance
WHITEPAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007
Wireless Network Security Pat Wilbur Wireless Networks March 30, 2007 Types of Attacks Intrusion gain unauthorized access to a network in order to use the network or Internet connection Types of Attacks
