Unit 4
Unit 4
Wireless Security
Data integrity
WTLS achieves data integrity by using message authentication to ensure
that the data sent between a client and gateway is not modified.
Privacy
WTLS uses encryption to ensure that the data cannot be read by an
unauthorized middleman or third party.
Authentication
WTLS uses digital certificates to authenticate the parties involved in a
transaction or communication.
Denial-of-service (DoS) protection
WTLS detects and rejects replayed messages and messages that are not
successfully verified to prevent DoS attacks.
Wireless LAN
A wireless LAN (WLAN) is a type of Local Area Network (LAN) that
uses wireless communication to connect any type of network client or
device.
History
A professor at the University of Hawaii who’s name was Norman
Abramson, developed the world’s first wireless computer
communication network. In 1979, Gfeller and u. Bapst published a paper
in the IEE proceedings reporting an experimental wireless local area
network using diffused infrared communications. The first of the IEEE
workshops on Wireless LAN was held in 1991.
WLAN Architecture
Components in Wireless LAN architecture as per IEEE standards are as
follows:
1. Stations: Stations consist of all the equipment that is used to connect
all wireless LANs. Each station has a wireless network controller.
2. Base Service Set(BSS): It is a group of stations communicating at the
physical layer.
3. Extended Service Set(ESS): It is a group of connected Base Service
Set(BSS).
4. Distribution Service (DS): It connects all Extended Service
Set(ESS).
Types of WLANs
Working of WLAN
WLAN transmits data over radio signals and the data is sent in the form
of a packet. Each packet consists of layers, labels, and instructions with
unique MAC addresses assigned to endpoints. This enables routing data
packets to correct locations.
1. Router WRT300N 1
2. Laptop laptop 3
By using these devices we’ll have to create a network like shown in the
representation:
Step 2: Configuring laptops to make them wireless. First, click on the
laptop0 and turn off its power to change the ports basically we are
going to replace the wired port with the wireless port which
is WPC300N.
Replace with WPC300N and make sure to turn it ON.
Repeat the same procedure with Laptop1 and Laptop 2.
after that, we will assign IP addresses and a default gateway to
the laptops.
Step 3: Configure the Router with an IP address and Generate a
Security key.
First, click on Router and Go to GUI.
Then click on a setup where you will find the IP address assigned
to 192.168.0.1 and subnet mask[255.255.255.0].
Then disable the DHCP server because we have to configure
statically.
Then Save the settings.
Then move to the wireless option.
set Network Name(SSID) is HomeNetwork.
Save the settings.
Then we set the security key.
Click on wireless security and select security mode as WEP.
Then we’ll generate KEY by entering 10 digit Hexa-numeric value.
eg: 0123456789.
save the settings.
Step 4: Now we will configure the laptops using the IP addressing
table given below:
S.NO Device IPv4 Address Subnet Mask Default Gateway
Encryption
All wireless networks should be secured by effective encryption
standards. Older versions of wireless encryption such as WEP and WPA
should not be used because they are easily hacked using widely available
key cracking tools. Both home and business wireless networks should
use WPA2 or WPA3 encryption to secure their data. WPA2 uses strong
Advanced Encryption Standard (AES) encryption and effectively
protects data transmitted over wireless networks. However, WPA2 can
be vulnerable to password attacks such a Dictionary Attacks and
Password List attacks. Dictionary attacks use automated software to
quickly try thousands of common passwords to access the wireless
network. Password List attacks are similar to Dictionary Attacks, but
they use lists of common passwords available on the Dark Web. WPA3
is the latest developed standard for wireless encryption (Wireless
security protocols, n.d.). WPA3 also uses AES encryption and has
protections that prevent Dictionary and Password List attacks.
Wireless piggybacking is a wireless attack that can be mitigated using
encryption. Piggybacking is when unauthorized users connect to the
wireless network. This real-world threat can occur when the network is
not adequately secured using a robust encryption standard such as
WPA2/WPA3. Piggybacking often occurs when a person uses a
neighbor’s Wi-Fi without permission or parks outside a business
location to connect to the business’s wireless network without
permission. Encryption must be paired with a strong password to ensure
effectiveness. The use of strong passwords can be an inconvenience to
users. Therefore, users often create passwords that are composed of
simple words that are easy to remember. These easy-to-remember
passwords are also easy to crack using tools such as Aircrack-ng and
BoopSuite. Therefore, strong wireless passwords should be used for
both business and home networks.
Firewalls
A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block specific
traffic based on a defined set of security rules (firewall) There are two
categories of firewalls: software firewalls and hardware firewalls.
Software firewalls is a program that is installed on a computer that
inspects and filters data that may be malicious. Hardware firewalls are
separate devices that inspect and filter data before it gets to the
network.
Firewalls can be either stateful or stateless. Stateful firewalls scrutinize
multiple aspects of network traffic, including the context of the traffic.
These firewalls analyze the communication channels and characteristics
of the data to determine what traffic is permitted. Stateless firewalls, on
the other hand, inspect the packets alone without considering the
context. Stateless firewalls are generally less expensive and are faster
than stateful firewalls.
Firewalls on wireless networks can help prevent attacks such
as malware and viruses by stopping this malicious traffic before it enters
the network or device. Firewalls should also be deployed on mobile
devices such as phones. Attacks in which other devices attempt to
connect to a phone or mobile device can be thwarted with a properly
configured mobile firewall.
Restrict Wireless Access using MAC Address Filtering
Access to wireless networks can be restricted through the use of MAC
address filtering. Since every device has a MAC address, the network
can be configured only to allow connections from specifically authorized
devices. MAC address filtering enables the organizations to allow
connections from devices that meet required security requirements and
pre-screen for malware or viruses threats. Organizations may even
choose to enable company-owned devices and prevent personally owned
devices from connecting to the network. Restrictions such a these can
be a powerful method to reduce the attack surface of a wireless network.
Wireless Network Design
The wireless network should be designed to limit the ability to access
the network from outside an organization’s workspace. Wireless
networks must meet the users’ needs but can also be configured to
restrict the ability of intruders to gain access to the wireless signal. This
can be accomplished by positioning the wireless access points in the
center of the building or strategic locations within the workspace and
adjusting the signal strength so that the wireless signal does not reach
outside the building.
SSID Broadcasting
The Service Set Identifier (SSID) is the broadcasted name of the
wireless network. It is common for manufacturers to use the same SSID
for all wireless routers that they produce. Therefore, it is essential to
change the default SSID so that the router manufacturer is not disclosed.
SSID broadcasting can be disabled so that the network is not
discoverable. This can be helpful because it will prevent the causal user
from attempting to connect to the network. However, disabling the
SSID is not a real security measure because it does nothing more than
hiding the network name.
For a home environment, most often you have a router, a switch, and an
AP embedded in one box, making it really usable for this purpose.
Working of Repeaters
Initially the source system transmits the signals. This source systems
can be a mobile phone, laptop or radio.
This transmitted signal from the source system travels in air if it’s
wireless network or through the cable if it is wired network. As the
signal goes away from the source it’s strength gets weak.
The signal received to the repeater is not the actual signal sent by
source system but a weak signal. Therefore repeater amplifies this
weak signal to get it strengthen.
The strengthen signal is now being sent from the repeater to its
destination. This signal is more stronger and can travel at longer
distance. In short, it extends the network without losing the quality
of signal.
Repeaters are therefore used in various wireless technologies such
as Wi-Fi and wired technologies such as ethernet.
WORKSTATION SECURITY
Use firewalls
Use MFA
Limit user permissions