International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN

Size: px
Start display at page:

Download "International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN"

Transcription

1 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN WIRELESS USB AND SECURITY OF USER DATA Department of Computer Science and Applications Panjab University SSG Regional Centre Hoshiarpur (Pb.) ABSTRACT: The Wireless USB is high-speed wireless personal interconnects technology to meet the needs of various users. Wireless USB is a high speed and high-bandwidth communication protocol. It has a capacity of sending data 480Mbit/s at distance up to 3 meters. In this paper security algorithms for Wireless USB are discussed. Experiments have been conducted to check the password strength. Nowadays almost all the Wireless USB devices are using WEP, WPA, WPA2, WPA-PSK, WPA2-PSK security protocols. But these protocols are prone to various threats. So security of the user data also depends upon the strength of the passwords. Experiments show how the security also depends upon the strength of the passwords. If it is weak then it can be easily found. Other available wireless technology such as Bluetooth, ZigBee, Wi-Fi and WiMAX are also discussed in this paper. Keywords: Wireless USB, Bluetooth, ZigBee, WiMAX [1] INTRODUCTION Wireless USB protocol is created by the Wireless USB promotion group. Wireless USB is a high speed, short-range and high-bandwidth communication protocol [1]. The Universal Serial Bus (USB) is very successful in PC history. It is the de facto interconnect for PCs, consumer electronics (CE) and mobile devices. Wireless USB is based on wired USB, so this technology can easily migrated with wired USB solutions [2]. It has a capacity of sending data 480Mbit/s at distance up to 3 meters. Further it can send data with a speed of 11Mbits/s up to 10 meters. Its working frequency range is 3.1 GHz to 10.6 GHz. Main goals of this 183

2 WIRELESS USB AND SECURITY OF USER DATA protocol is to meet the needs of mobile devices, consumer electronics and pc peripherals. Wireless USB is mainly used in printers, scanners, game devices and portable media players [1][3]. A main use of Wireless USB devices in case of offices and homes is given below in the table 1: Table 1 Wireless USB Devices in case of Home a) MP3 Players b) Gaming Consoles c) External Hard Disks d) Digital Cameras and Camcorders e) Set Top Boxes and Home Entertainment Wireless USB Devices in case of Office a) Scanner b) Printers c) Personal Digital Assistance(PDA) d) PC camera e) Speakers [2] WORKING OF WIRELESS USB It works on the top of traditional Wired USB. Main component of the Wireless USB is radio and antenna system. Wireless USB mainly uses Ultra-wideband (UWB) technology which operates in frequency range of 3.1 to 10.6 GHz. Main advantage of UWB is the low power consumption., So it is useful in portable devices. Key feature of the UWB is that it transforms the information over on a large bandwidth. Therefore it can share spectrum with the other users also. Main application areas of UWB are sensor data collection and tracking applications [4][5]. Wireless USB uses Hub and Spoke topology. In this topology wireless host sits at the centre and the connected devices sits at the end of the spoke as shown in the figure 1 given below. Figure 1 Hub & Spoke Topology Wireless USB follows polled, TDMA based protocol. Each Data transfer has three parts, token, data and handshake. UWB has also two layers PHY and MAC. PHY layer checks header and main functions of MAC layer are encryption/ decryption and synchronization [1] [11]. [3] ADVANTAGES OF WIRELESS USB: 184

3 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN A Main disadvantage of wired USB is that use of wires is restrictive. Once wires are plugged in a device, we cannot move that device freely. Users which are using wireless USB can move freely from one place to other. It is difficult to handle multiple wires simultaneously if they are connected to same device. If we want to remove a component or want to reconfigure it then it creates hassles. But this problem is not there in case of Wireless USB. Currently main wireless available solutions are Bluetooth and Wi-Fi. But Bluetooth cannot be used in internet applications which need high speed internet connectivity. Disadvantage of Wi-Fi is that Wi-Fi technology is very expansive and Wi-Fi devices consume much power. Main Benefits of Wireless USB are: 1. It provides speed up to 480 Mbps as compared to Bluetooth technology. 2. It has low cost implementation as compared to Wi-Fi. 3. It is compatible with majority of USB drivers and firm wares. 4. Its plug and play feature reduces time and money of the users. Its plug and play capability is similar like wired USB. 5. Wireless USBs are compatible with majority of wired devices [3]. [4] OTHER MAIN WIRELESS TECHNOLOGIES: The Wireless technology and networks allow devices to communicate with each without needing wires. Main wireless technologies are given below: a) Bluetooth (IEEE ) Bluetooth technology is used to transfer data over short distances. This technology is used in many consumer devices ex in smart phones and tablets. Nowadays many wireless speakers use this technology. It is a low power wireless technology and can be used to stream audio and transfer of data over small distances. Bluetooth technology has two flavors: a) Low Energy (LE) b) Basic Rate/Enhanced Data Rate (BR/EDR). Bluetooth technology is supported by many operating systems such as windows, Linux, Android and IOS [6]. b) ZigBee (IEEE ) ZigBee is gaining popularity these days. ZigBee is less expansive as compared to other wireless personal area networks. It is an open global standard designed specifically for M2M networks. ZigBee has a low latency and low duty cycle which increases the battery life of devices. For security purposes this protocol offers 128-bit AES encryption. It can also be used in mesh networks [7]. c) Wi-Fi (IEEE ) Wi-Fi is based on IEEE standards. Mainly it is used in devices such as smart phones, tablets, digital cameras, printers and smart-tvs. In Wi-Fi network radio waves are used transmit the data within the range of the network. Main two components of this technology are WLAN and wireless access points. It operates in 2.4GHz radio band [8]. d) WiMAX (IEEE ) WiMAX means Worldwide Interoperability for Microwave Access. It was initially designed to provide 30 to 40 megabits/s data rates. This technology can be used both indoors and outdoors [9]. 185

4 WIRELESS USB AND SECURITY OF USER DATA [6] A COMPARISON OF VARIOUS AVAILABLE WIRELESS TECHNOLOGIES Some of the available wireless technologies are shown in the table given below: Paramete r Bluetooth Distance m(ap p.) Frequency Range 2.4 to G Hz ZigB ee m 2.4 GHz Wi- Fi m 2.4 or 5 GHz WiM AX 50-km radius from base station 2 to 11 GHz and 10 to 66 GHz Wirele ss USB m GHz Bandwidth 2 Mbps 20Kbp s Kbps 54 Mbps 30 Mbs - 40Mbs 110Mbs - 480Mbs Modulatio n Schema GFSK, 8DPSK DSSS, BPSK, OQPS K OFD M MIM O- SOFD MA MB- OFDM Figure 2 Various Wireless Technologies Main parameters which are chosen for the comparison of the wireless technologies are Distance, Frequency Range, Bandwidth and Modulation Schema. For short distance communication between the two devices Bluetooth, ZigBee and Wi-Fi and Wireless USB can be used. WiMAX technology covers the large area as compared to these technologies. Frequency Ranges of the different technologies are also shown in the table. Data transfer speed of the Wireless USB is high as compared to other technologies [6][7][8][9]. [6] WIRELESS USB SECURITY Wireless USB is based on ultra wide band (UWB). In any wireless technology data is transferred in open air, so there is possibility that this data is available to other wireless users also. Malicious users can use this data and information for their benefit. There security is an important issue in case of wireless USB. Encryption algorithms are used to make secure association between wireless USB and host computer. User data is encrypted before it is transferred into the air. First time association between wireless USB device and host computer must be trusted. It means only authorized devices are allowed to communicate with each other. Unauthorized users will be prevented from the communication. Similarly in an environment when there are multiple wireless USB devices and multiple Wireless USB hosts are there, then there is need that which devices are allowed to communicate with each other. Due to short range nature of the wireless USB users must be in close proximity of the wireless USB network [10]. According to Amazon some of the well-known wireless USB devices and security protection protocols used by these are given below: S.N. Wireless USB Security 186

5 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN Panda PAU09 WEP 64/128bit, WPA, WPA2 (TKIP+AES) encryption 2. BrosTrend AC1 WPA2- Personal 3. NET-DYN 300M 4. TP-Link AC450 Archer T1U 5. Edimax EW- 7811Un WPA/WPA2/WEP 64/128-bit WEP, WPA/WPA2, and WPA- PSK/WPA2-PSK encryption standards 64/128 bit WEP Encryption and WPA-PSK, WPA2-PSK Figure 3 Various Wireless Security Protocols From the table it is clear that almost all the Wireless USB devices are using WEP, WPA, WPA2, WPA-PSK, WPA2-PSK security protocols. Wireless USB security settings in case of TPLINK are shown below. Figure 4 Security Settings in TPLINK In case of TPLINK users have following choices for security: None, using WEP, WPA/WPA2, and WPA-PSK/WPA2-PSK. Main wireless security protocols which are supported by these devices are: Wired Equivalent Privacy (WEP): This protocol was introduced in 1997 along with standards. It was used to provide confidentiality. It uses three types of encryption 64-bit, 128- bit and 256-bit. Majority of router uses 128-bit encryption algorithm. But sooner much vulnerability was found in WEP[12]. Security researchers used these vulnerabilities to crack WEP easily. Later many upgrades and fixes for these protocols were given, but still this protocol is easy to penetrate. But many older devices and routers still use this security protocol. So it is better to activate it than co protection at all. Working of WEP: WEP perform Cyclic Redundancy Check operation on plaintext, and then this CRC value is concatenated with plaintext. Secret key value is concatenated with Initialization Vector (IV). 187

6 WIRELESS USB AND SECURITY OF USER DATA Then with the help of RC4 keystream is generated. Plaintext and CRC value then XOR ed with keystream to generate ciphertext. The same Intialization Vector (IV) is then added before ciphertext. This data with frame header is then transmitted over the air. Drawbacks of WEP: main drawbacks of WEP are small initialization vector and weak RC4 algorithm [13]. Wi-Fi Protected Access (WPA): WPA Protocol was introduced to overcome the vulnerabilities of WEP. It was intermediate remedy to wireless network. This security protocol provides strong security of data as compared to WEP. But for using WPA all the devices must be configured for WPA. Working of WPA: WPA security protocol use Temporal Key Integrity Protocol (TKIP) for encryption. KIP has four additional algorithms. a) A per packet key mixing function b) rekeying mechanism c) extended initialization vector d) message integrity check For strong authentication WPA use 802.1x and Extensible Authentication Protocol (EAP)[17]. Drawbacks of WPA: passphrase is prone to dictionary attack, vulnerabilities in TKIP protocol [13]. WPA2: WPA2 standard is successor to WPA. This protocol was introduced in This standard is used widely nowadays. It uses Temporal Key Integrity Protocol (TKIP) for message integrity. WEP uses Cyclic Redundancy Check (CRC). TKIP is much stronger than CRC. WPA2 replaces the RC4 cipher and TKIP with two stronger encryption and authentication mechanisms: the Advanced Encryption Standard (AES) and Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), respectively. Drawbacks of WPA2: AES 128 bit protocol is breakable. WPA2 is prone to deauthentication, Disassociation, and DoS(Denial of service) attacks [15][16]. WPA-PSK: Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) is a variation of WPA security protocol. It can be used in home as well as in small office networks. It is used to authenticate and validate Wi-Fi connection. In this case password can have 8 to 63 characters. Based on this 256 character key is generated which is shared by both the devices for encryption and decryption. If WPA-PSK is used with TKIP then dynamic 128 bit encryption key is generated for each packet. WPA-PSK can also be used with AES. Drawbacks of WPA-PSK: Using WPA-PSK with TKIP is vulnerable. Password can be cracked during the four way handshake [16]. From the above discussion it is clear that all the above said protocols need strong passwords for the security of the wireless network. Checking the strength of passwords: We have conducted various experiments for checking the password strength of wireless network. Main steps of Methodology are shown in the figure 5 given below. 188

7 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN Figure 5 Research Methodology Wi-Fi Monitoring: Main tools which can be used for this purpose are NetStumbler, NetSurveyor andwirelessnetview etc. Traffic Analysis: After discovering the wireless network free tool Wireshark can be used to analyze the traffic. Other tools are NetStumbler, Wi-Fi Inspector and Kismet etc. Traffic Capturing: Wireshark, CommView for WiFi tools can be used for traffic capturing. Attacking : To attack a host various wireless attacks such as de-authentication attack, denial of service attack, MITM attack and fragmentation attack etc can be used. Stealing Information: Main tools which can be used are Aircrack,AirSnort,Cain & Able,Kismet and NetStumbler etc. Experiments are conducted using dictionary attack. Case a: In case of simple password. (WPA2- PSK) Password Length: 8, only numbers 1 to 8 are used. We have the following snapshot: Figure 6 Case b: When password consist of only 8 characters 189

8 WIRELESS USB AND SECURITY OF USER DATA Figure 7 Case c: When password length is 11 characters. Combination of 8 characters and 3 numbers is used. Figure 8 Case d: Password length is 11. It is combination of 8 characters, 1special characters and 2 numbers. Figure 9 Cracking of the password also depends upon the computation power of the system. For example if we are using Aircrack ng on i3 processor then it try 1100Keys /s. But when same experiment was repeated for i7 processor then it can try 5500Keys/s. 190

9 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN S.N. Key Characters Result Case 1: Numbers from 1 to 8 Key found Case 2: 8 characters Key found Case 3: 8 characters and 3 numbers Key found Case 4: 8 characters, 1special characters and 2 Key found numbers Figure 10 [6] CONCLUSION From the experiments figure 10 it is clear that users should use strong passwords. If the password length is big, but it only consist of numbers or characters then it is still easily breakable. But if the password is strong, if it consist of combination of characters, numbers and special characters then it is very difficult to break. For example in Case d it took around 25 minutes to find out the key. According to [18] rules for the strong passwords are: It should contain at least 12 alphanumeric characters. It should have upper and lower case letters. It must contain at least one number (0-9). It must contain at least one special character. Currently wireless USB devices offer same functions as wired USB devices but without needing wires. Use of Wireless USB is very easy for the users. These devices also save time of the users. But at the same time wireless USB are prone to various threats. In order to increase the security users should choose strong passwords for their USB device. And password should be changed time to time. Defending Against various Attacks: a) In case of only WEP option turn on the WEP. b) In case of WEP and WPA using WPA. c) In case of WPA and WPA2 using WPA2. d) Choosing strong passwords e) Changing password in case if it is lost or compromised. f) Changing the password after certain time period. REFERENCES [1] [2] [3] Wireless-Radio-Communication-Protocol [4] [5] [6] [7] [8] [9] 191

10 WIRELESS USB AND SECURITY OF USER DATA [10] [11] [12] F. Sheldon, J. Weber, S. Yoo, W. Pan, The Insecurity of Wireless Networks. IEEE Computer Society, vol. 10, no. 4, July/August, 2012, pp [13] Waliullah, Md, and Diane Gan. "Wireless LAN security threats & vulnerabilities." International Journal of Advanced Computer Science and Applications 5, no. 1 (2014) [14] Arana, Paul. "Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)." INFS 612 (2006): 1-6. [15] Arana, Paul. "Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)." INFS 612 (2006): 1-6. [16] Tsitroulis, Achilleas & Lampoudis, Dimitris & Tsekleves, Emmanuel. (2014). Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security [17] [18] 192

Configuring Wireless Security Settings on the RV130W

Configuring Wireless Security Settings on the RV130W Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

05 - WLAN Encryption and Data Integrity Protocols

05 - WLAN Encryption and Data Integrity Protocols 05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012 NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE

More information

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion

More information

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Lazaridis Ioannis, Pouros Sotirios, Veloudis Simeon DEI College, Thessaloniki, Greece Abstract: This paper presents

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Chapter 3 Wireless Configuration

Chapter 3 Wireless Configuration Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.

More information

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Procedure: You can find the problem sheet on the Desktop of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.

More information

WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK

WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK S.DEEPTHI 1 G.MARY SWARNALATHA 2 PAPARAO NALAJALA 3 Assoc. Professor, Dept. of Electronics &Communication Engineering at Institute of Aeronautical Engineering,

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Security of WiFi networks MARCIN TUNIA

Security of WiFi networks MARCIN TUNIA Security of WiFi networks MARCIN TUNIA Agenda 1. Wireless standards 2. Hidden network and MAC filtering protection bypassing 3. Encryption independent attacks 4. Attacks on WEP 5. Attacks on WPA/WPA2 6.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring a VAP on the WAP351, WAP131, and WAP371 Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of

More information

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU Mc Graw mim CONTENTS Foreword Acknowledgments Introduction xvn xlx XX1 Hacking 802.11

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

AC Wireless Dual Band Gigabit Router. Highlights

AC Wireless Dual Band Gigabit Router. Highlights AC 1900 Wireless Dual Band Gigabit Router Highlights Superfast Wi-Fi 600Mbps on 2.4GHz + 1300Mbps on 5GHz totals 1.9Gbps Wi-Fi speeds Maximum Range 3 dual band detachable antennas provide maximum Omni-directional

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007) WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Configuring the Wireless Parameters (CPE and WBS)

Configuring the Wireless Parameters (CPE and WBS) Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.

More information

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

Wireless Security i. Lars Strand lars (at) unik no June 2004

Wireless Security i. Lars Strand lars (at) unik no June 2004 Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for

More information

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Outline Network Security EECE 412 Link & end-to-end protocols SSL/TLS WPA Copyright 2004 Konstantin Beznosov 2 Networks Link and End-to-End Protocols

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Section 4 Cracking Encryption and Authentication

Section 4 Cracking Encryption and Authentication Section 4 Cracking 802.11 Encryption and Authentication In the previous section we showed the vulnerabilities of Open Wireless LANs. In this section we ll show some of the techniques and tools used to

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

AC1200 Wireless Dual Band Gigabit Router

AC1200 Wireless Dual Band Gigabit Router A Wireless Dual Band Gigabit Router Upgrade to Faster AC Wi-Fi and Gigabit Connections 300Mbps + 867Mbps Dual Band Wi-Fi Gigabit Ports USB 2.0 Port Highlights Household Wi-Fi at Streaming Speeds Optimum

More information

HACKING & INFORMATION SECURITY Presents: - With TechNext

HACKING & INFORMATION SECURITY Presents: - With TechNext HACKING & INFORMATION SECURITY Presents: - With TechNext We Are The Speakers Sudarshan Pawar Cer.fied Security Expert(C.S.E.) Cer.fied Informa.on Security Specialist (C.I.S.S.) Security Xplained (TechNext

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Wi-Fi Scanner. Glossary. LizardSystems

Wi-Fi Scanner. Glossary. LizardSystems Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES

More information

A Study Wireless Communication Domain

A Study Wireless Communication Domain A Study Wireless Communication Domain Sangram Routray 1, Sanjib k. Nayak 2 Lalit M. Satapathy 1 1 Department of Electronics and Communication Engg. KIST,Bhubaneswar 2 Department of Computer science and

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

Add performance and security to your business' wireless network with the Intellinet High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point.

Add performance and security to your business' wireless network with the Intellinet High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point. High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point 450 Mbps Wireless N (2.4 GHz) + 1300 Mbps Wireless AC (5 GHz), WDS, Wireless client isolation, 27.5 dbm, wall-mount Part No.: 525787 Add performance

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE

Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

CUA-854 Wireless-G Long Range USB Adapter with Antenna. User s Guide

CUA-854 Wireless-G Long Range USB Adapter with Antenna. User s Guide CUA-854 Wireless-G Long Range USB Adapter with Antenna User s Guide Table of Contents Chapter 1. Introduction...5 1.1. About CUA-854...5 1.2. Key Features...5 1.3. Package Included...5 Chapter 2. Connect

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide

SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the

More information

Wireless MAXg Technology

Wireless MAXg Technology Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,

More information

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and

More information

Physical and Link Layer Attacks

Physical and Link Layer Attacks Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber

More information

AV2000 Gigabit Powerline ac Wi-Fi Kit

AV2000 Gigabit Powerline ac Wi-Fi Kit AV2000 Gigabit Powerline ac Wi-Fi Kit AC1200 Wi-Fi that Breaks Through Walls HomePlug AV2 2000Mbps 2x2 MIMO Technology Wi-Fi Auto-Sync Highlights 2 2 MIMO for More Throughput over Powerline Wi-Fi Auto-Sync

More information

AV1000 Gigabit Powerline ac Wi-Fi Kit

AV1000 Gigabit Powerline ac Wi-Fi Kit AV1000 Gigabit Powerline ac Wi-Fi Kit AC750 Wi-Fi to Power Up Your Network HomePlug AV2 1000Mbps 300Mbps + 433Mbps Dual Band Wi-Fi Wi-Fi Auto-Sync Highlights HomePlug AV2 Standard Compliant Wi-Fi Auto-Sync

More information

Configuring the Client Adapter

Configuring the Client Adapter CHAPTER 5 This chapter explains how to configure profile parameters. The following topics are covered in this chapter: Overview, page 5-2 Setting General Parameters, page 5-3 Setting Advanced Parameters,

More information

Naveen Kumar. 1 Wi-Fi Technology

Naveen Kumar. 1 Wi-Fi Technology Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks Advanced Security and Mobile Networks W.Buchanan (1) 9. GSM/3G Unit 7: Mobile Networks. Wireless. Security. Mobile IP. Mobile Agents. Spread spectrum. Military/Emergency Networks 8. Ad-hoc 7. Mobile Networks

More information

Wireless LAN USB Super G 108 Mbit. Manual

Wireless LAN USB Super G 108 Mbit. Manual Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly

More information

Yealink T41S Wireless Settings

Yealink T41S Wireless Settings Yealink T41S Wireless Settings Wireless Network Yealink T41S Wireless Settings Overview Wi-Fi is a popular wireless networking technology that uses radio waves to provide wireless High speed Internet and

More information

Wireless Local Area Networks (WLAN)

Wireless Local Area Networks (WLAN) Department of Computer Science Institute for System Architecture, Chair for Computer Networks Wireless Local Area Networks (WLAN) Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de

More information

802.11ac Wireless Access Point Model WAC104

802.11ac Wireless Access Point Model WAC104 Point Model WAC104 User Manual October 2016 202-11698-01 350 E. Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register

More information

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

SERIAL BUS COMMUNICATION PROTOCOLS USB

SERIAL BUS COMMUNICATION PROTOCOLS USB DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-20: SERIAL BUS COMMUNICATION PROTOCOLS USB 1 USB Host Applications Connecting flash memory cards, pen-like memory devices, digital camera, printer,

More information

C1200. Wireless Dual Band Gigabit Router. Upgrade to Faster AC Wi-Fi and Gigabit Connections. USB 2.0 Port. Gigabit Ports

C1200. Wireless Dual Band Gigabit Router. Upgrade to Faster AC Wi-Fi and Gigabit Connections. USB 2.0 Port. Gigabit Ports A Wireless Dual Band Gigabit Router Upgrade to Faster AC Wi-Fi and Gigabit Connections 300Mbps + 867Mbps Dual Band Wi-Fi Gigabit Ports USB 2.0 Port Highlights Household Wi-Fi at Streaming Speeds Optimum

More information

AC1350 Wi-Fi Range Extender AV1300 Powerline Edition

AC1350 Wi-Fi Range Extender AV1300 Powerline Edition AC1350 Wi-Fi Range Extender AV1300 Powerline Edition AC1350 Wi-Fi for the Whole Home TL-WPA8630 KIT HomePlug AV2 1300Mbps 2x2 MIMO Technology Wi-Fi Auto-Sync Highlights Fast Dual Band Wi-Fi for Every Need

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Analyzing Wireless Security in Columbia, Missouri

Analyzing Wireless Security in Columbia, Missouri Analyzing Wireless Security in Columbia, Missouri Matthew Chittum Clayton Harper John Mixon Johnathan Walton Abstract The current state of wireless security in most areas can be estimated based on trends

More information

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies 1 Connected devices communication to the Local Network and Gateway 1 st to i th

More information

The WiMAX Technology

The WiMAX Technology Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania

More information

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

A network is two or more computers, or other electronic devices, connected together so that they can exchange data. Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

AC Wireless Tri-Band Gigabit Router. Highlights

AC Wireless Tri-Band Gigabit Router. Highlights AC 3200 Wireless Tri-Band Gigabit Router Highlights Tri-Band technology Three separate Wi-Fi bands for connecting more devices to your network without a drop in performance Up to 3200Mbps Wi-Fi speed 600Mbps

More information

CITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule

CITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule 1 next CITS3002 help3002 CITS3002 schedule The IEEE-802.11 Wireless LAN protocol We'll next examine devices implementing the IEEE-802.11 family of wireless networking protocols, and get an appreciation

More information

Security and Authentication for Wireless Networks

Security and Authentication for Wireless Networks University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-21-2004 Security and Authentication for 802.11 Wireless Networks Michel Getraide

More information

CONTENTS IN DETAIL INTRODUCTION

CONTENTS IN DETAIL INTRODUCTION CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...

More information

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ... Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde

More information

Wireless Security Algorithms

Wireless Security Algorithms (NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless

More information

AC1750 Wireless Dual Band Gigabit Router

AC1750 Wireless Dual Band Gigabit Router AC1750 Wireless Dual Band Gigabit Router 1750Mbps Wi-Fi Speed for Home Entertainment 450Mbps + 1300Mbps Dual Band Wi-Fi Beamforming Technology for Better Coverage USB 3.0 Port Highlights Faster, More Reliable

More information

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking

More information

Table of Contents. Chapter1 About g Wireless LAN USB Adapter...1

Table of Contents. Chapter1 About g Wireless LAN USB Adapter...1 Table of Contents Chapter1 About 802.11g Wireless LAN USB Adapter...1 1-1 Features and Benefits... 1 1-2 Applications... 2 1-3 Product Kit... 3 1-4 About IEEE 802.11g Wireless LAN USB Adapter LED Indicators...

More information

AC Touch Screen Wi-Fi Gigabit Router. Highlights

AC Touch Screen Wi-Fi Gigabit Router. Highlights AC 1900 Touch Screen Wi-Fi Gigabit Router Highlights Game and Stream with AC1900 Speed Stream 4K HD video and game online without lag over dual 2.4GHz and 5GHz bands Intuitive Touchscreen Display Effortlessly

More information