BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2



Similar documents
CS549: Cryptography and Network Security

How To Secure Wireless Networks

Link Layer and Network Layer Security for Wireless Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security in IEEE WLANs

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Security Awareness. Wireless Network Security

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Testing a Wireless LAN

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Developing Network Security Strategies

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

CS 356 Lecture 29 Wireless Security. Spring 2013

Authentication and Security in IP based Multi Hop Networks

Certified Wireless Security Professional (CWSP) Course Overview

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

About the Authors Preface Acknowledgements List of Acronyms

Wireless Security with Cyberoam

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Link Layer and Network Layer Security for Wireless Networks

Industrial Communication. Securing Industrial Wireless

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Recommended Wireless Local Area Network Architecture

Security in Wireless Local Area Network

WLAN Authentication and Data Privacy

How To Manage An Wireless Network At A University

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

How To Protect A Wireless Lan From A Rogue Access Point

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Best Practices for Outdoor Wireless Security

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

An Overview of ZigBee Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Cisco Wireless Control System (WCS)

Configuring Security Solutions

BSc (Hons) Sofware Engineering. Examinations for / Semester 2

Wireless Network Standard and Guidelines

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

The next generation of knowledge and expertise Wireless Security Basics

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

Wireless LAN Security: Securing Your Access Point

Wireless Remote Video Monitoring

WIRELESS NETWORKING SECURITY

chap18.wireless Network Security

Huawei WLAN Authentication and Encryption

Chapter 2 Wireless Networking Basics

MSC-131. Design and Deploy AirDefense Solutions Exam.

Topics in Network Security

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Security Requirements for Wireless Local Area Networks

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

CISCO WIRELESS CONTROL SYSTEM (WCS)

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

How To Get A Power Station To Work With A Power Generator Without A Substation

Chapter 6 CDMA/802.11i

Access Point Configuration


VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

EAP N Wall Mount Access Point / WDS AP / Universal Repeater

Wardriving: an experience in the city of La Plata

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

The Wireless Network Road Trip

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Wireless (In)Security Trends in the Enterprise

Wireless Encryption Protection

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Implementing Security for Wireless Networks

Wireless Mobile Workforce

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

IdentiFi and Eduroam Roaming Wireless Service Integration CONFIGURATION GUIDE

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

Transcription:

BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time: 15 minutes Instructions to Candidates: 1. Answer any four questions out of the six questions. 2. Always start a new question on a fresh page. 3. All questions carry equal marks. 4. Total marks: 100 This question paper contains 6 questions and 7 pages. Page 1 of 7

QUESTION 1: (25 MARKS) ANSWER ANY 4 QUESTIONS Consider a number of wireless devices (nodes) which are connected to the Internet via a single access point (AP). (a) Give three reasons why security is more of a concern in this type of wireless network? (b) List the three main goals of information security. (c) Explain how CSMA/CA is used with Wireless LANs. (d) Explain the differences between war driving and war flying. (e) Which two conditions have favoured adoption of 802.11g over 802.11a? (f) Describe the different steps adopted by an attacker during wireless hacking process. (10 marks) Page 2 of 7

QUESTION 2: (25 MARKS) The 802.11 security architecture and protocol is called Wired Equivalent Privacy (WEP) and it is responsible for providing authentication, confidentiality and data integrity in 802.11 networks. (a) Briefly, explain the differences between Open System Authentication and Shared Key Authentication, as used in WEP. Which one is more secure? (4 + 1 marks) (b) The absence of any key establishment protocol in WEP led to multiple problems. List any three problems. (c) Explain the purpose of using beacons while connecting to wireless LANs. (1 mark) (d) What are the two WEP key lengths? (e) Explain what is meant by the term Initialisation Vector (IV). (f) WEP has been known to have various security vulnerabilities, leading to its failure. i. Describe any three vulnerabilities of using WEP. ii. Briefly explain how FMS attack can be performed and give any one common tool used by attackers. iii. However, even today WEP encryption is still used in some networks. Explain how to best make use of WEP in such networks. (6 + 3 + 3 marks) Page 3 of 7

QUESTION 3: (25 marks) (a) Give one reason why WPA2 encryption is preferred over WEP? (b) By using an appropriate diagram, describe how the 802.1x authentication model is mapped to Wi-Fi. (8 marks) (c) What do the following acronyms stand for? i. RADIUS ii. EAPOL (2 + 2 marks) (d) Give two salient features of using AES in counter mode for WPA2. (e) One of the main reasons in using EAP is the ability to leverage multiple types of authentication mechanisms. List any two such authentication mechanisms. (f) Consider the following a list of loopholes found in WEP. Explain how WPA fix each of these loopholes: i. No protection against replay attacks. ii. No support for a station to authenticate a network. iii. Exposing the master key to attacks like FMS (due to generation of perpacket key) (2 + 2 + 3 marks) Page 4 of 7

QUESTION 4: (25 marks) Radio Frequency Identification (RFID) is about devices and technology that use radio signals to exchange identifying data. (a) Give two typical uses of RFID systems. (b) Explain the difference between active and passive tags. (c) Explain how complacency can cause serious security problems to businesses adopting RFID technology. (d) Describe two common techniques that fraudsters can adopt in order to temporarily disable RFID tags. (e) Briefly describe any two types of radio frequency manipulation attacks. (f) Briefly explain on the following attacks to RFID systems: i. Relay attack ii. Side channel attack (g) Unauthorized tag reading has often been a security challenge for RFID systems. Describe two mechanisms that can be adopted to enforce confidentiality during transmission of RFID components. Page 5 of 7

QUESTION 5: (25 MARKS) (a) Consider the branch of a Wireless Mesh Network (WMN) where a mobile station MS is within the transmission range of TAP 3 and relies on it to get Internet connectivity. i. Explain the function of a TAP. ii. Give two advantages of adopting WMNs. iii. Why is the security of multi-hop routing important in WMNs? iv. Explain any one technique that an adversary can use to attack the routing mechanism in this scenario. v. Give two reasons why WMNs are not ready for wide-scale deployment. (2 + 2 + 2 + 2 + 2 marks) (b) Vehicular Communications (VC), which is still a research area, is expected to play a central role in the effort to create safer and more efficient driving conditions after a few decades. i. Briefly, describe three security vulnerabilities of VC. ii. Why is privacy an issue in vehicular networks, considering that today's vehicles have license plates? iii. Network volatility is one of the most significant operational challenges to vehicular communications, thus making security a hard problem. Discuss. (6 + 2 + 3 marks) (c) Briefly explain how denial of service attacks are performed on mobile nodes by attackers. Also, describe how Mobile IP prevents such denial of service attacks. (2 + 2 marks) Page 6 of 7

QUESTION 6: (25 MARKS) An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas, such as coffee shops and airports, to provide Internet accessibility. However, this proliferation has also engendered growing security concerns. (a) By the use of a diagram, describe the typical architecture for Wi-Fi hotspots. (8 marks) (b) List three security vulnerabilities of the controller in Wi-Fi hotspots. (c) In terms of Wi-Fi hotspot security, explain what a service theft attack is. (d) Differentiate between active session hijacking and passive session hijacking. (4 mark) (e) Discuss on the defensive security mechanisms that can be employed in order to better secure public Wi-Fi hotspots. (7 marks) ***END OF QUESTION PAPER*** Page 7 of 7