Wireless Local Area
Networks
CS5440 Wireless Access Networks
Dilum Bandara
[email protected]
Some slides extracted from Dr. Muid Mufti, ID Technologies
Outlines
Motivation
IEEE 802.11
Practical issues
Security
2
Wireless Technology Landscape
3
Wireless Local Area Network (WLAN)
As a cable replacement
Motivating factors
Mobility
Old buildings
Rapid deployment
Rapid reconfiguration
Small devices
Applications
4
Why Not Wireless Ethernet?
Ethernet is simple, widely used, & cheap
But
Collision detection
Not possible in wireless
Would require a full duplex radio
Receiver sensitivity
Carrier sense
Hidden stations
Mobility
Power saving
5
Elements of a WLAN
Client
Access point – base station
Modes
Ad-hoc
infrastructure
6
Source: www.technologyuk.net
WLAN Topologies
Peer-to-peer
Access point based
Point-to-multipoint bridge
Source: www.cisco.com 7
IEEE 802.11 Standard
Standard for MAC & Physical Layer for WLANs
8
IEEE 802.11 Standards
DSSS – Direct Sequence Spread Spectrum
OFDM – Orthogonal Frequency-Division Multiplexing
MIMO – Multiple Input Multiple Output
9
IEEE 802.11 Versions
802.11 – 1997
2 Mbps max
2.4 GHz band
20 m – Indoor
100 m – outdoor
Wide range of Physical layers
IR, UHF Narrowband, spread spectrum
802.11a – 1999
54 Mbps max
5.1 - 5.8GHz band
35 m – indoor
10
120 m – outdoor
IEEE 802.11 Versions (Cont.)
802.11b – 1999
11 Mbps max
2.4 GHz band
35 m – indoor
140 m – outdoor
802.11g – 2003
Most current deployments
54 Mbps max
2.4 GHz band
38 m – indoor
140 m – outdoor
11
IEEE 802.11 Versions (Cont.)
802.11n – 2009
Current industry adopted specification
320 Mbps
2.4/5 GHz band
MIMO
Enhanced security
70 m – indoor
250 m – outdoor
802.11ac – 2012 (approved in Jan 2014)
0.5+ Gbps (per links)
5 GHz band
MIMO, 256 - QAM 12
Comparison
Source: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht-wireless 13
Comparison
14
15
Source: http://www.os2warp.be/index2.php?name=wifi1
IEEE 802.11 Topologies
Independent Basic Service Set (IBSS) – ad-hoc
Basic Service Set (BSS)
Extended Service Set (ESS)
SSID – Service Set ID
BSSID – MAC of AP
ESSID – 32-byte String
16
Services
Station services
Authentication
De-authentication
Privacy
Delivery of data
Distribution services
Association
Disassociation
Reassociation
Distribution
Integration
17
Association in 802.11
1: Association request
2: Association response
3: Data traffic
Client AP
18
Reassociation in 802.11 – Roaming
1: Reassociation request
3: Reassociation response
5: Send buffered frames New AP
Client 2: verify
6: Data traffic previous
association
• 802.11 – Roaming algorithm not defined
• 802.11f – Inter Access Point Protocol (IAPP) Old AP
4: send
• 802.11r – Fast roaming buffered
• Still no solution for roaming across different domains frames
19
Roaming Among Wi-Fi Hotspots
Hotspots may be operated by different providers
WISP – Wireless Internet Service Provider
WISPr – best practices for WISPs
Authentication through web browser
Source: www.truconnect.com/blog/how-to-create-a-wi-fi-hotspot-with-a-mifi-device/ 20
Issues – Hidden Terminal
B doesn’t know C exist
21
Issues – Exposed Terminal
A can’t communicate with D while B & C are
communicating
22
Handshake Protocol
Address hidden & exposed terminal problems
RTS – Request To Send frame
CTS – Clear To Send frame
23
Virtual Channel Sensing in CSMA/CA
C (in range of A) receives RTS & based on information in
RTS creates a virtual channel busy NAV
NAV – Network Allocation Vector
NAV indicates how long a station must defer from accessing
medium
Saves power
D (in range of B) receives CTS & creates a shorter NAV 24
802.11 Overhead
Random
RTS/CTS Data Transmission/ACK
backoff
Channel contention resolved using backoff
Nodes choose random backoff interval from [0, CW]
Count down for this interval before transmission
Backoff & (optional) RTS/CTS handshake before
transmission of data frame
25
Fragmentation in 802.11
High wireless error rates long packets have less
probability of being successfully transmitted
Solution
MAC layer fragmentation with stop-and-wait protocol on
fragments 26
Physical Layer
DSSS
SYNC - Receiver uses to acquire incoming signal & synchronize receiver’s carrier
SFD – Start of Frame Delimiter
Signal – Which modulation scheme
11 channels – North America
13 channels – Europe
27
28
Source: wikipedia.org
802.11 Wireless MAC
Support broadcast, multicast, & unicast
Uses ACK & retransmission to achieve reliability for
unicast frames
No ACK/retransmission for broadcast or multicast
frames
Distributed & centralized MAC access
Distributed Coordination Function (DCF)
Point Coordination Function (PCF)
29
IEEE 802.11 Mobility
Standard defines following mobility types
No-transition – no movement or moving within a local BSS
BSS-transition – station movies from one BSS in one ESS to another
BSS within the same ESS
ESS-transition – station moves from a BSS in one ESS to a BSS in a
different ESS (continues roaming not supported)
- Address to destination
mapping
- seamless integration ESS 1
of multiple BSS ESS 2
30
Why Security is More of a Concern in
Wireless?
No inherent physical protection
Physical connections between devices are replaced by logical
associations
Broadcast communications
Eavesdropping – transmissions can be overheard by anyone in
range
Bogus message – anyone can transmit
DoS – Jamming/interference
Replaying previously recorded messages
31
Further Issues
Access point configuration
Default community strings, default passwords
Evil twin access points
Stronger signal, capture user authentication
Renegade access points
Unauthorised wireless LANs
32
Authentication & Privacy
To prevent unauthorized access & eavesdropping
Realized by authentication service prior to access
Open system authentication
Station wanting to authenticate sends authentication management
frame
Receiving station sends back frame for successful authentication
Supported in WEP
Shared-key authentication
Secret, shared key received by all stations by a separate, 802.11
independent channel
Stations authenticate by a shared knowledge of the key properties
33
MAC ACLs & SSID Hiding
Access points have Access Control Lists (ACL)
List of allowed MAC addresses
E.g., allow access to
00:01:42:0E:12:1F
00:01:42:F1:72:AE
00:01:42:4F:E2:01
But MAC addresses are sniffable & spoofable
AP beacons without SSID
A client knowing a SSID may join AP
A client send PROBE REQUEST with SSID, AP
MUST send a RESPONSE with its SSID
34
802.11b Security Services
2 security services
1. Authentication
Shared Key Authentication
2. Encryption
Wired Equivalence Privacy (WEP)
35
Wired Equivalence Privacy (WEP)
Shared key between stations & an AP
Extended Service Set (ESS)
All APs will have same shared key
No key management
Shared key entered manually into
Stations
APs
Key management nightmare in large wireless LANs
36
WEP – Shared Key Authentication
When station requests association with an AP
AP sends random no to station
Station encrypts random no
Uses RC4, 40-bit shared secret key & 24-bit initialization vector
RC4 – software stream cipher
Encrypted random no sent to AP
AP decrypts received message
AP compares decrypted random no to transmitted random no
If numbers match, station has shared secret key
RC4 subsequently used for data encryption
Checksum for integrity
But management traffic still broadcast in clear containing
SSID 37
WEP – Shared Key Authentication
Source: technet.microsoft.com
38
Wi-Fi Protected Access (WPA)
Works with 802.11b, a, & g
Works with legacy hardware
Fixes WEP’s problems
802.1x user-level authentication
Temporal Key Integrity Protocol (TKIP)
RC4 session-based dynamic encryption keys
Per-packet key derivation
Unicast & broadcast key management
48-bit initialization vector with new sequencing method
Counter replay attacks
Michael 64-bit Message Integrity Code (MIC)
Optional AES support to replace RC4
39
WPA & 802.1x
802.1x is a general purpose network access control
mechanism
WPA has 2 modes
1. Pre-shared mode, uses pre-shared keys
2. Enterprise mode, uses Extensible Authentication Protocol (EAP)
with a RADIUS server making the authentication decision
EAP is a transport for authentication, not authentication itself
EAP allows arbitrary authentication methods
For example, Windows supports
40
802.11i – WPA2
Full implementation
Adopted in September 2004
Replaced WPA with WPA2-AES in 2004
Backwards compatible with WPA
Uses AES-CCMP
Advanced Encryption Standard – Counter Mode with
Cipher Block Chaining Message Authentication Code
Protocol (CCMP)
Very Strong
41
WPA2 (Cont.)
Robust Security Network (RSN) protocol for
establishing secure communications
Based on a mode of AES, with 128-bits keys & 48 bit
IV
Adds dynamic negotiation of authentication &
encryption algorithms
Allows for future changes
Requires new hardware
42
RSN Protocol
Wireless NIC sends a Probe Request
Access point sends a Probe Response with an
RSN Information Exchange (IE) frame
Wireless NIC requests authentication via one of
the approved methods
Access point provides authentication for the
wireless NIC
Wireless NIC sends an Association Request with
an RSN Information Exchange (IE) frame
Access point send an Association Response
43
WLAN Network Planning
Network planning target
Maximize system performance with limited resources
Including
coverage
throughput
capacity
interference
roaming
security
Planning process
Requirements for project management personnel
Site investigation
Computer-aided planning practice
Testing & verifying planning 44
Field Measurements
Basic tools – power levels, throughput, error rate
Laptop, tablet, & PDA
Utility come with radio card
Supports channel scan, station search
Indicate signal level, SNR, transport rate
Advanced tools – detailed protocol data flows
Special designed for field measurement
Support PHY & MAC protocol analysis
Integrated with network planning tools
Examples
Procycle™ from Softbit, Oulu, Finland
SitePlaner™ from WirelessValley, American
45
Capacity Planning – Example
802.11b can have 6.5 Mbps rate throughput due to
CSMA/CA MAC protocol
PHY & MAC management overhead
More users connected, less capacity offered
Example of supported users in different application cases
Environment Traffic content Traffic Load No of simultaneous users
11Mbps 5.5Mbps 2Mbps
Corporation Web, Email, File 150 kbits/user 40 20 9
Wireless LAN transfer
Branch Office All application via 300 kbits/user 20 10 4
Network WLAN
Public Access Web, Email, VPN 100 kbits/user 60 30 12
tunneling
46
Frequency Planning
Interference from other WLAN systems or cells
IEEE 802.11 operates at uncontrolled ISM band
14 channels of 802.11 are overlapping, only 3 channels are
disjointed, e.g., Ch 1, 6, & 11
Throughput decreases with less channel spacing
Example of frequency allocation in multi-cell network
6
11Mb if/frag 512
Mbit/s
3 2Mb if/frag 512
2Mb if/frag 2346
2
0
Offset Offset Offset Offset Offset Offset
25MHz 20MHz 15MHz 10MHz 5MHz 0MHz 47
WLAN Technology Problems
Data Speed
Effective throughput is still not enough
Better with IEEE 802.11g/n
Interference
Works in ISM band
Share same frequency with microwave oven, Bluetooth, & others
Security
Current WEP algorithm is weak – usually not ON!
Roaming
No industry standard is available & propriety solution aren’t
interoperable
Inter-operability
Only few basic functionality are interoperable, other vendor’s
features can’t be used in a mixed network 48
WLAN Implementation Problems
Lack of wireless networking experience for most IT
engineer
Lack of well-recognized operation process on network
implementation
Selecting access points with “best guess” method
Unaware of interference from/to other networks
Weak security policy
As a result, a WLAN may have
Poor performance (coverage, throughput, capacity, & security)
Unstable service
Customer dissatisfaction
49
Summary
Emerged as a replacement for wired LAN
IEEE 802.11g is popular
Many IEEE 802.11n devices are being deployed
Data rate & security continue to improve
Only a small subset of the available channels
can be effectively used
No roaming access across different domains
50