Ch-04 Wireless LAN
Ch-04 Wireless LAN
CE-TE-MC
Suvarna Chaure
Assistant Professor
Dept. of Computer Engineering,
SIES Graduate School of Technology
Outline
• Overview of wireless LAN
• Bluetooth
• IEEE 802.11
• Wi-Fi Security
2
Characteristics of wireless LANs
Advantages
• Flexibility: very flexible within the reception area
• Planning: Ad-hoc networks without previous planning possible
• Design: (almost) no wiring difficulties (e.g. historic buildings, firewalls)
• Robustness: more robust against disasters like, e.g., earthquakes, fire - or users pulling a plug...
• Cost
Disadvantages
• Quality of Service: typically very low bandwidth compared to wired networks
(1-10 Mbit/s)
• Proprietary Solutions: many proprietary solutions, especially for higher bit-rates, standards
take their time (e.g. IEEE 802.11)
• Restrictions: products have to follow many national restrictions if working wireless, it takes a
vary long time to establish global solutions like, e.g., IMT-2000
• Safety and Security
Design goals for wireless LANs
AP wired network
AP
ad-hoc network
6
Source: Schiller
Infrastructure vs. Ad hoc WLANs
6
Mobile Communication Technology according to IEEE
WiFi
Local wireless networks 802.11a 802.11h
WLAN 802.11 802.11i/e/…/w
802.11b 802.11g
ZigBee
Personal wireless nw 802.15.4 802.15.4a/b
WPAN 802.15 802.15.5
802.15.1 802.15.2 802.15.3 802.15.3a/b
Bluetooth
Wireless distribution networks
WMAN 802.16 (Broadband Wireless Access) WiMAX
+ Mobility
802.20 (Mobile Broadband Wireless Access)
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
Bluetooth
Idea
Universal radio interface for ad-hoc wireless connectivity
Interconnecting computer and peripherals, handheld devices, PDAs, cell phones –
replacement of IrDA
Embedded in other devices, goal: 5€/device (2005: 40€/USB bluetooth)
Short range (10 m), low power consumption, license-free 2.45 GHz ISM
Voice and data transmission, approx. 1 Mbit/s gross data rate
1999:
Ericsson mobile
communications AB reste
denna sten till minne av
Harald Blåtand, som fick
ge sitt namn åt en ny
teknologi för trådlös, mobil
kommunikation.
P
S
One unit acts as master and the others as slaves for the
lifetime of the piconet S
M P
Master determines hopping pattern, slaves have to
synchronize SB S
P SB
Each piconet has a unique hopping pattern
Addressing
Active Member Address (AMA, 3 bit)
Parked Member Address (PMA, 8 bit) P
S
SB
SB
S
SB M P
SB SB
SB S
SB SB P SB
SB SB
Radio
AT: attention sequence OBEX: SDP: service discovery protocol
object exchange RFCOMM: radio frequency comm.
TCS BIN: telephony control protocol specification – binary
BNEP: Bluetooth network encapsulation protocol
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.16
Frequency selection during data transmission
625 µs
M S M S M S M
t
M S M S M
t
fk fk+1 fk+6
M S M
t
DV audio (10) header (1) payload (0-9) 2/3 FEC CRC (2)
(bytes)
SLAVE 1
f1 f7 f9 f13 f19
SLAVE 2
f5 f17 f21
MASTER A C C F H
SLAVE 1 B D E
SLAVE 2 G G
multiplexing
RFCOMM, SDP, telephony control
Group abstraction
Create/close group, add/remove member
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 7.24
Security
User input (initialization)
PIN (1-16 byte) Pairing PIN (1-16 byte)
OBEX
Exchange of objects, IrDA replacement
WAP
Interacting with applications on cellular phones
Protocol
Generic Access Profile
Service Discovery Application Profile
s
Cordless Telephony Profile
Headset Profile
Profiles
Dial-up Networking Profile Fax Additional Profiles Advanced
Audio Distribution PAN
Profile
Audio Video Remote Control Basic
LAN Access Profile
Printing
Generic Object Exchange Profile
Basic Imaging
Object Push Profile Extended Service Discovery Generic
File Transfer Profile Audio Video Distribution Hands Free
Synchronization Profile Hardcopy Cable Replacement
STA2
IBSS2
STA5
31
Difference Between Wired and Wireless
32
Effect of mobility on protocol stack
Application
new applications and adaptations
Transport
congestion and flow control
Network
addressing and routing
Link
media access and handoff
Physical
transmission errors and interference
33
802.11-based Wireless LANs
Architecture and Physical Layer
802.11- in the TCP/IP stack
fixed terminal
mobile terminal
server
infrastructure network
access point
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
35
802.11 - Layers and functions
PLCP Physical Layer Convergence Protocol
clear channel assessment signal (carrier sense)
MAC
access mechanisms, fragmentation, PMD
encryption Physical Medium Dependent modulation, coding
MAC Management
synchronization, roaming, MIB, power PHY Management
management channel selection, MIB
Station Management
coordination of all management functions
LLC
DLC
Management
MAC MAC Management
PLCP
Station
PHY
PHY Management
PMD
36
IEEE 802.11
Wireless LAN standard defined in the unlicensed spectrum (2.4 GHz and 5
GHz U-NII bands)
• DBPSK modulation for 1 Mbps (Differential Binary Phase Shift Keying), DQPSK for 2
Mbps (Differential Quadrature PSK)
• preamble and header of a frame is always transmitted with 1 Mbps, rest of
transmission 1 or 2 Mbps
• chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code)
• max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
Infrared
• 850-950 nm, diffuse light, typ. 10 m range
• carrier detection, energy detection, synchronization
38
FHSS PHY packet format
• Synchronization
synch with 010101... pattern
• SFD (Start Frame Delimiter)
0000110010111101 start pattern
• PLW (PLCP_PDU Length Word)
length of payload incl. 32 bit CRC of payload, PLW < 4096
• PSF (PLCP Signaling Field)
data of payload (1 or 2 Mbit/s)
• HEC (Header Error Check)
CRC with x16+x12+x5+1
80 16 12 4 16 variable bits
synchronization SFD PLW PSF HEC payload
21
802.11-based Wireless LANs
MAC functional spec - DCF
802.11 - MAC layer I - DFWMAC
Traffic services
• Asynchronous Data Service (mandatory)
exchange of data packets based on “best-effort”
support of broadcast and multicast
• Time-Bounded Service (optional)
implemented using PCF (Point Coordination Function)
Access methods
• DFWMAC-DCF CSMA/CA (mandatory)
collision avoidance via randomized „back-off“ mechanism
minimum distance between consecutive packets
ACK packet for acknowledgements (not for broadcasts)
• DFWMAC-DCF w/ RTS/CTS (optional)
Distributed Foundation Wireless MAC
avoids hidden terminal problem
• DFWMAC- PCF (optional)
access point polls terminals according to a list
802.11 - MAC layer II
Priorities
• defined through different inter frame spaces
• no guaranteed, hard priorities
SIFS (Short Inter Frame Spacing)
• highest priority, for ACK, CTS, polling response
PIFS (PCF IFS)
• medium priority, for time-bounded service using PCF
DIFS (DCF, Distributed Coordination Function IFS)
• lowest priority, for asynchronous data service
DIFS DIFS
PIFS
SIFS
medium busy contention next frame
t
direct access if
medium is free ≥ DIFS
contention window
802.11 - CSMA/CA access method I (randomized back-off mechanism)
DIFS DIFS
direct access if t
medium is free ≥ DIFS slot time
• station ready to send starts sensing the medium (Carrier Sense based on CCA,
Clear Channel Assessment)
• if the medium is free for the duration of an Inter-Frame Space (IFS), the station can
start sending (IFS depends on service type)
• if the medium is busy, the station has to wait for a free IFS, then the station must
additionally wait a random back-off time (collision avoidance, multiple of slot-time)
• if another station occupies the medium during the back-off time of the station, the
back-off timer stops (fairness)
802.11 - competing stations - simple version
DIFS DIFS DIFS DIFS
boe bor boe bor boe busy
station1
boe busy
station2
busy
station3
busy medium not idle (frame, ack etc.) boe elapsed backoff time
DIFS
data
sender
SIFS
ACK
receiver
DIFS
other data
stations
t
waiting time contention
802.11 - DFWMAC
• Sending unicast packets
• station can send RTS with reservation parameter after waiting for DIFS (reservation
determines amount of time the data packet needs the medium)
• acknowledgement via CTS after SIFS by receiver (if ready to receive)
• sender can now send data at once, acknowledgement via ACK
• other stations store medium reservations distributed via RTS and CTS
DIFS
RTS data
sender
SIFS SIFS SIFS
CTS ACK
receiver
DIFS
RTS frag1 frag2
sender
SIFS SIFS SIFS SIFS SIFS
CTS ACK1 ACK2
receiver
NAV (RTS)
NAV (CTS)
NAV (frag1) DIFS
other NAV (ACK1) data
stations
t
contention
WLAN 29/09/20
30
• cannot guarantee a maximum access delay or minimum transmission bandwidth
• To provide a time-bounded service, the standard specifies a point coordination function
(PCF) on top of the standard DCF mechanisms. Using PCF requires an access point that
controls medium access and polls the single nodes.
• Ad-hoc networks cannot use this function so, provide no QoS but ‘best effort’ in IEEE 802.11
WLANs.
• The point co-ordinator in the access point splits the access time into super
frame periods A super frame comprises a contentionfree period and a contention
period.
Point Coordination Function (PCF)
• Alternative access method implemented on top of DCF
• Polling by centralized polling master (point coordinator)
• Uses PIFS when issuing polls
• PIFS smaller than DIFS
• Can seize medium and lock out all asynchronous traffic while it issues polls and
receives responses
E.g. wireless network configured so number of stations with time-sensitive traffic
controlled by point coordinator
• Remaining traffic contends for access using CSMA
• Point coordinator polls in round-robin to stations configured for polling
• When poll issued, polled station may respond using SIFS
• If point coordinator receives response, it issues another poll using PIFS
• If no response during expected turnaround time, coordinator issues poll
Superframe
• Point coordinator would lock out asynchronous traffic by issuing polls
• Superframe interval defined
• During first part of superframe interval, point coordinator polls round-robin to all stations
configured for polling
• Point coordinator then idles for remainder of superframe
• Allowing contention period for asynchronous access
• At beginning of superframe, point coordinator may seize control and issue polls for given
period
• Time varies because of variable frame size issued by responding stations
• Rest of superframe available for contention-based access
• At end of superframe interval, point coordinator contends for access using PIFS
• If idle, point coordinator gains immediate access
• Full superframe period follows
• If busy, point coordinator must wait for idle to gain access
• Results in foreshortened superframe period for next cycle
DFWMAC-PCF I
t0 t1
SuperFrame
stations‘ NAV
NAV
DFWMAC-PCF II
t2 t3 t4
PIFS SIFS
D3 D4 CFend
point
coordinator SIFS
U4
wireless
stations
stations‘ NAV
NAV contention free period t
contention
period
802.11 - Frame format
• Types
control frames, management frames, data frames
• Sequence numbers
important against duplicated frames due to lost ACKs
• Addresses
receiver, transmitter (physical), BSS identifier, sender (logical)
• Miscellaneous
sending time, checksum, frame control, data
bytes 2 2 6 6 6 2 6 0-2312 4
Frame Duration Address Address Address Sequence Address
Data CRC
Control ID 1 2 3 Control 4
beacon interval
B B B B
access
point
busy busy busy busy
medium
t
value of the timestamp B beacon frame
beacon interval
B1 B1
station1
B2 B2
station2
The standard random backoff algorithm is applied to the beacon frames so only
one beacon wins.
Power management
• Idea: switch the transceiver off if not needed
• States of a station: sleep and awake
• Timing Synchronization Function (TSF)
stations wake up at the same time
• Infrastructure
• Traffic Indication Map (TIM)
list of unicast receivers transmitted by AP
• Delivery Traffic Indication Map (DTIM)
list of broadcast/multicast receivers transmitted by AP
• Ad-hoc
• Ad-hoc Traffic Indication Map (ATIM)
announcement of receivers by stations buffering frames
more complicated - no central AP
collision of ATIMs possible (scalability?)
Power saving with wake-up patterns (infrastructure)
D B T T d D B
access
point
busy busy busy busy
medium
p d
station
t
T TIM D DTIM awake
data transmission
B broadcast/multicast p PS poll d
to/from the station
Power saving with wake-up patterns (ad-hoc)
ATIM
window beacon interval
B1 A D B1
station1
B2 B2 a d
station2
t
B beacon frame random delay A transmit ATIM D transmit data
802.11e MIB
PHY
QoS enhancements
DSSS FH IR
OFDM
802.11b
5,11 Mbps
802.11a
6,9,12,18,24
802.11g 36,48,54 Mbps
20+ Mbps
56
Wi-Fi Security
Wi-Fi security is about keeping your wireless internet, like Wi-Fi, safe from hackers or
unauthorized users. It uses passwords and special encryption methods to make sure
only allowed people can access it and that the data sent over it is protected. This helps
prevent outsiders from stealing or seeing your information, like your messages or what
websites you visit.
Wi-Fi Security
How Does Wireless Security Work?
Wireless security works by using passwords and encryption to protect your internet
connection. There are different types of encryption, like WPA2 or WPA3, which are just
methods to make the data more secure. Such protocols work by implementing security
measures like encryption and authentication.
•Authentication: Ensures that only those users and devices whose identities have been
properly verified can join the network.
Types of Wireless Security Protocols
Wireless security protocols play a crucial role in protecting sensitive information and
ensuring privacy when connected to the internet using WiFi. In this section, we are
taking a close look at the most commonly used wireless security protocols (WEP, WPA)
WEP(Wired Equivalent Privacy)
• WEP, or wired equivalent privacy, is a security algorithm presented by the Institute of
Electrical and Electronics Engineers (IEEE) as part of the IEEE 802.11 internet standard
that was ratified in 1997.
• WEP was created to secure and ensure data confidentiality at the same level that a
traditional wired network offered. Wireless connections transmit data through radio
waves, which can be intercepted. WEP was designed to encrypt this data so that even if it
were to be intercepted, such as through a MiiM attack, the threat actor would not be able
to decipher its contents.
• Due to U.S. government-imposed restrictions on the exportation of cryptographic
technology, WEP key sizes were initially limited to a 40-bit key (called WEP-40) for the
64-bit WEP protocol. As these restrictions were lifted, the extended 128-bit WEP
protocol using the 104-bit key (WEP-104) was introduced. WEP uses the RC4 stream
cipher for confidentiality and the CRC-32 checksum for integrity.
WEP(Wired Equivalent Privacy)
• The 64-bit WEP key uses a string of 10 hexadecimal (base 16) alphanumeric
characters with each character representing 4 bits, while the 128-bit WEP key uses a
string of 26 hexadecimal alphanumeric characters. These characters are either numbers
between 0 and 9 or letters between A and F.
• Using WEP, all traffic is encrypted as a single key, meaning that it uses a static key. This
key is used to connect computers to a wireless-security-enabled network. Computers
connected to this network can exchange encrypted messages.
Problems with WEP
WPA(Wi-Fi Protected Access)
• WPA was a significant enhancement over WEP, but as the core components were made
so they could be rolled out through firmware upgrades on WEP-enabled devices, they
still relied onto exploited elements.
• WPA, just like WEP, after being put through proof-of-concept and applied public
demonstrations turned out to be pretty vulnerable to intrusion. The attacks that posed
the most threat to the protocol were however not the direct ones, but those that were
made on Wi-Fi Protected Setup (WPS) — auxiliary system developed to simplify the
linking of devices to modern access points.
WPA(Wi-Fi Protected Access)
Security Issues with WPA
• Key shared ahead of time If users rely on a weak password or passphrase, WPA and
WPA2 are still susceptible to password cracking attempts.
• Insufficient upfront secrecy
• Due to the lack of forward secrecy offered by WPA and WPA2, an adversary may be able
to passively and covertly gather all packets encrypted with that PSK transmitted in the
past and even in the future once they ascertain the pre-shared key.
• Tactics known as denial of service, in which an attacker overloads the network with
messages, impairing the availability of network resources
• Eavesdropping is the practice of unauthorised third parties intercepting data being
transferred across secure networks. Spoofing and session hijacking are methods by
which an attacker obtains access to network resources and data by impersonating a
legitimate user.
Difference Between WEP and WPA
Wireless LAN Threats
• Wireless security issues are considered as the primary security issues of mobile computing.
These are related to wireless networks. These issues occur when the hackers intercept the
radio signals. Most wireless networks are dependent on other private networks, which are
managed by others, so after these issues, the users have less control of security procedures.
These security issues are:
• Denial of Service (DOS) attacks
• Traffic Analysis
• Eavesdropping
• Session Interception and Messages Modification
• Spoofing
Securing Wireless Network
• The biggest issue in mobile computing is the credential verification of users. Because the
users share the username and passwords, it may become a significant threat to security. Due
to this sensitive issue, most companies are very reluctant to implement mobile computing.
Some recommendations can be followed by companies or mobile users to keep their mobile
devices and the data stored in the devices secure.
•The company should hire qualified personnel.
•You should install security hardware and software.
•You should ensure that the data stored in the mobile devices are encrypted and audited.
•Educate the users on proper mobile computing ethics and security issues.
•You must ensure that the mobile devices are configured with a power-on authentication to
prevent unauthorized access if lost or stolen.
•You must ensure that anti-virus software is installed on mobile devices.
•Make sure that the firewall client is installed on mobile devices.
•Make your mobile devices encrypted with a strong password.
•Encrypt your data stored in the secondary storage devices such as Memory Sticks, Data card,
removable USB etc.
•Ensure that the Bluetooth, Wi-Fi, etc. enabled mobile devices are turned off when you are not
using them.
•Make periodic backups of your mobile devices on a data server.
Thank You!
([email protected])
97