International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN
|
|
- Zoe Walton
- 6 years ago
- Views:
Transcription
1 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN WIRELESS USB AND SECURITY OF USER DATA Department of Computer Science and Applications Panjab University SSG Regional Centre Hoshiarpur (Pb.) ABSTRACT: The Wireless USB is high-speed wireless personal interconnects technology to meet the needs of various users. Wireless USB is a high speed and high-bandwidth communication protocol. It has a capacity of sending data 480Mbit/s at distance up to 3 meters. In this paper security algorithms for Wireless USB are discussed. Experiments have been conducted to check the password strength. Nowadays almost all the Wireless USB devices are using WEP, WPA, WPA2, WPA-PSK, WPA2-PSK security protocols. But these protocols are prone to various threats. So security of the user data also depends upon the strength of the passwords. Experiments show how the security also depends upon the strength of the passwords. If it is weak then it can be easily found. Other available wireless technology such as Bluetooth, ZigBee, Wi-Fi and WiMAX are also discussed in this paper. Keywords: Wireless USB, Bluetooth, ZigBee, WiMAX [1] INTRODUCTION Wireless USB protocol is created by the Wireless USB promotion group. Wireless USB is a high speed, short-range and high-bandwidth communication protocol [1]. The Universal Serial Bus (USB) is very successful in PC history. It is the de facto interconnect for PCs, consumer electronics (CE) and mobile devices. Wireless USB is based on wired USB, so this technology can easily migrated with wired USB solutions [2]. It has a capacity of sending data 480Mbit/s at distance up to 3 meters. Further it can send data with a speed of 11Mbits/s up to 10 meters. Its working frequency range is 3.1 GHz to 10.6 GHz. Main goals of this 183
2 WIRELESS USB AND SECURITY OF USER DATA protocol is to meet the needs of mobile devices, consumer electronics and pc peripherals. Wireless USB is mainly used in printers, scanners, game devices and portable media players [1][3]. A main use of Wireless USB devices in case of offices and homes is given below in the table 1: Table 1 Wireless USB Devices in case of Home a) MP3 Players b) Gaming Consoles c) External Hard Disks d) Digital Cameras and Camcorders e) Set Top Boxes and Home Entertainment Wireless USB Devices in case of Office a) Scanner b) Printers c) Personal Digital Assistance(PDA) d) PC camera e) Speakers [2] WORKING OF WIRELESS USB It works on the top of traditional Wired USB. Main component of the Wireless USB is radio and antenna system. Wireless USB mainly uses Ultra-wideband (UWB) technology which operates in frequency range of 3.1 to 10.6 GHz. Main advantage of UWB is the low power consumption., So it is useful in portable devices. Key feature of the UWB is that it transforms the information over on a large bandwidth. Therefore it can share spectrum with the other users also. Main application areas of UWB are sensor data collection and tracking applications [4][5]. Wireless USB uses Hub and Spoke topology. In this topology wireless host sits at the centre and the connected devices sits at the end of the spoke as shown in the figure 1 given below. Figure 1 Hub & Spoke Topology Wireless USB follows polled, TDMA based protocol. Each Data transfer has three parts, token, data and handshake. UWB has also two layers PHY and MAC. PHY layer checks header and main functions of MAC layer are encryption/ decryption and synchronization [1] [11]. [3] ADVANTAGES OF WIRELESS USB: 184
3 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN A Main disadvantage of wired USB is that use of wires is restrictive. Once wires are plugged in a device, we cannot move that device freely. Users which are using wireless USB can move freely from one place to other. It is difficult to handle multiple wires simultaneously if they are connected to same device. If we want to remove a component or want to reconfigure it then it creates hassles. But this problem is not there in case of Wireless USB. Currently main wireless available solutions are Bluetooth and Wi-Fi. But Bluetooth cannot be used in internet applications which need high speed internet connectivity. Disadvantage of Wi-Fi is that Wi-Fi technology is very expansive and Wi-Fi devices consume much power. Main Benefits of Wireless USB are: 1. It provides speed up to 480 Mbps as compared to Bluetooth technology. 2. It has low cost implementation as compared to Wi-Fi. 3. It is compatible with majority of USB drivers and firm wares. 4. Its plug and play feature reduces time and money of the users. Its plug and play capability is similar like wired USB. 5. Wireless USBs are compatible with majority of wired devices [3]. [4] OTHER MAIN WIRELESS TECHNOLOGIES: The Wireless technology and networks allow devices to communicate with each without needing wires. Main wireless technologies are given below: a) Bluetooth (IEEE ) Bluetooth technology is used to transfer data over short distances. This technology is used in many consumer devices ex in smart phones and tablets. Nowadays many wireless speakers use this technology. It is a low power wireless technology and can be used to stream audio and transfer of data over small distances. Bluetooth technology has two flavors: a) Low Energy (LE) b) Basic Rate/Enhanced Data Rate (BR/EDR). Bluetooth technology is supported by many operating systems such as windows, Linux, Android and IOS [6]. b) ZigBee (IEEE ) ZigBee is gaining popularity these days. ZigBee is less expansive as compared to other wireless personal area networks. It is an open global standard designed specifically for M2M networks. ZigBee has a low latency and low duty cycle which increases the battery life of devices. For security purposes this protocol offers 128-bit AES encryption. It can also be used in mesh networks [7]. c) Wi-Fi (IEEE ) Wi-Fi is based on IEEE standards. Mainly it is used in devices such as smart phones, tablets, digital cameras, printers and smart-tvs. In Wi-Fi network radio waves are used transmit the data within the range of the network. Main two components of this technology are WLAN and wireless access points. It operates in 2.4GHz radio band [8]. d) WiMAX (IEEE ) WiMAX means Worldwide Interoperability for Microwave Access. It was initially designed to provide 30 to 40 megabits/s data rates. This technology can be used both indoors and outdoors [9]. 185
4 WIRELESS USB AND SECURITY OF USER DATA [6] A COMPARISON OF VARIOUS AVAILABLE WIRELESS TECHNOLOGIES Some of the available wireless technologies are shown in the table given below: Paramete r Bluetooth Distance m(ap p.) Frequency Range 2.4 to G Hz ZigB ee m 2.4 GHz Wi- Fi m 2.4 or 5 GHz WiM AX 50-km radius from base station 2 to 11 GHz and 10 to 66 GHz Wirele ss USB m GHz Bandwidth 2 Mbps 20Kbp s Kbps 54 Mbps 30 Mbs - 40Mbs 110Mbs - 480Mbs Modulatio n Schema GFSK, 8DPSK DSSS, BPSK, OQPS K OFD M MIM O- SOFD MA MB- OFDM Figure 2 Various Wireless Technologies Main parameters which are chosen for the comparison of the wireless technologies are Distance, Frequency Range, Bandwidth and Modulation Schema. For short distance communication between the two devices Bluetooth, ZigBee and Wi-Fi and Wireless USB can be used. WiMAX technology covers the large area as compared to these technologies. Frequency Ranges of the different technologies are also shown in the table. Data transfer speed of the Wireless USB is high as compared to other technologies [6][7][8][9]. [6] WIRELESS USB SECURITY Wireless USB is based on ultra wide band (UWB). In any wireless technology data is transferred in open air, so there is possibility that this data is available to other wireless users also. Malicious users can use this data and information for their benefit. There security is an important issue in case of wireless USB. Encryption algorithms are used to make secure association between wireless USB and host computer. User data is encrypted before it is transferred into the air. First time association between wireless USB device and host computer must be trusted. It means only authorized devices are allowed to communicate with each other. Unauthorized users will be prevented from the communication. Similarly in an environment when there are multiple wireless USB devices and multiple Wireless USB hosts are there, then there is need that which devices are allowed to communicate with each other. Due to short range nature of the wireless USB users must be in close proximity of the wireless USB network [10]. According to Amazon some of the well-known wireless USB devices and security protection protocols used by these are given below: S.N. Wireless USB Security 186
5 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN Panda PAU09 WEP 64/128bit, WPA, WPA2 (TKIP+AES) encryption 2. BrosTrend AC1 WPA2- Personal 3. NET-DYN 300M 4. TP-Link AC450 Archer T1U 5. Edimax EW- 7811Un WPA/WPA2/WEP 64/128-bit WEP, WPA/WPA2, and WPA- PSK/WPA2-PSK encryption standards 64/128 bit WEP Encryption and WPA-PSK, WPA2-PSK Figure 3 Various Wireless Security Protocols From the table it is clear that almost all the Wireless USB devices are using WEP, WPA, WPA2, WPA-PSK, WPA2-PSK security protocols. Wireless USB security settings in case of TPLINK are shown below. Figure 4 Security Settings in TPLINK In case of TPLINK users have following choices for security: None, using WEP, WPA/WPA2, and WPA-PSK/WPA2-PSK. Main wireless security protocols which are supported by these devices are: Wired Equivalent Privacy (WEP): This protocol was introduced in 1997 along with standards. It was used to provide confidentiality. It uses three types of encryption 64-bit, 128- bit and 256-bit. Majority of router uses 128-bit encryption algorithm. But sooner much vulnerability was found in WEP[12]. Security researchers used these vulnerabilities to crack WEP easily. Later many upgrades and fixes for these protocols were given, but still this protocol is easy to penetrate. But many older devices and routers still use this security protocol. So it is better to activate it than co protection at all. Working of WEP: WEP perform Cyclic Redundancy Check operation on plaintext, and then this CRC value is concatenated with plaintext. Secret key value is concatenated with Initialization Vector (IV). 187
6 WIRELESS USB AND SECURITY OF USER DATA Then with the help of RC4 keystream is generated. Plaintext and CRC value then XOR ed with keystream to generate ciphertext. The same Intialization Vector (IV) is then added before ciphertext. This data with frame header is then transmitted over the air. Drawbacks of WEP: main drawbacks of WEP are small initialization vector and weak RC4 algorithm [13]. Wi-Fi Protected Access (WPA): WPA Protocol was introduced to overcome the vulnerabilities of WEP. It was intermediate remedy to wireless network. This security protocol provides strong security of data as compared to WEP. But for using WPA all the devices must be configured for WPA. Working of WPA: WPA security protocol use Temporal Key Integrity Protocol (TKIP) for encryption. KIP has four additional algorithms. a) A per packet key mixing function b) rekeying mechanism c) extended initialization vector d) message integrity check For strong authentication WPA use 802.1x and Extensible Authentication Protocol (EAP)[17]. Drawbacks of WPA: passphrase is prone to dictionary attack, vulnerabilities in TKIP protocol [13]. WPA2: WPA2 standard is successor to WPA. This protocol was introduced in This standard is used widely nowadays. It uses Temporal Key Integrity Protocol (TKIP) for message integrity. WEP uses Cyclic Redundancy Check (CRC). TKIP is much stronger than CRC. WPA2 replaces the RC4 cipher and TKIP with two stronger encryption and authentication mechanisms: the Advanced Encryption Standard (AES) and Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), respectively. Drawbacks of WPA2: AES 128 bit protocol is breakable. WPA2 is prone to deauthentication, Disassociation, and DoS(Denial of service) attacks [15][16]. WPA-PSK: Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) is a variation of WPA security protocol. It can be used in home as well as in small office networks. It is used to authenticate and validate Wi-Fi connection. In this case password can have 8 to 63 characters. Based on this 256 character key is generated which is shared by both the devices for encryption and decryption. If WPA-PSK is used with TKIP then dynamic 128 bit encryption key is generated for each packet. WPA-PSK can also be used with AES. Drawbacks of WPA-PSK: Using WPA-PSK with TKIP is vulnerable. Password can be cracked during the four way handshake [16]. From the above discussion it is clear that all the above said protocols need strong passwords for the security of the wireless network. Checking the strength of passwords: We have conducted various experiments for checking the password strength of wireless network. Main steps of Methodology are shown in the figure 5 given below. 188
7 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN Figure 5 Research Methodology Wi-Fi Monitoring: Main tools which can be used for this purpose are NetStumbler, NetSurveyor andwirelessnetview etc. Traffic Analysis: After discovering the wireless network free tool Wireshark can be used to analyze the traffic. Other tools are NetStumbler, Wi-Fi Inspector and Kismet etc. Traffic Capturing: Wireshark, CommView for WiFi tools can be used for traffic capturing. Attacking : To attack a host various wireless attacks such as de-authentication attack, denial of service attack, MITM attack and fragmentation attack etc can be used. Stealing Information: Main tools which can be used are Aircrack,AirSnort,Cain & Able,Kismet and NetStumbler etc. Experiments are conducted using dictionary attack. Case a: In case of simple password. (WPA2- PSK) Password Length: 8, only numbers 1 to 8 are used. We have the following snapshot: Figure 6 Case b: When password consist of only 8 characters 189
8 WIRELESS USB AND SECURITY OF USER DATA Figure 7 Case c: When password length is 11 characters. Combination of 8 characters and 3 numbers is used. Figure 8 Case d: Password length is 11. It is combination of 8 characters, 1special characters and 2 numbers. Figure 9 Cracking of the password also depends upon the computation power of the system. For example if we are using Aircrack ng on i3 processor then it try 1100Keys /s. But when same experiment was repeated for i7 processor then it can try 5500Keys/s. 190
9 International Journal of Computer Engineering and Applications, Volume XII, Issue III, March 18, ISSN S.N. Key Characters Result Case 1: Numbers from 1 to 8 Key found Case 2: 8 characters Key found Case 3: 8 characters and 3 numbers Key found Case 4: 8 characters, 1special characters and 2 Key found numbers Figure 10 [6] CONCLUSION From the experiments figure 10 it is clear that users should use strong passwords. If the password length is big, but it only consist of numbers or characters then it is still easily breakable. But if the password is strong, if it consist of combination of characters, numbers and special characters then it is very difficult to break. For example in Case d it took around 25 minutes to find out the key. According to [18] rules for the strong passwords are: It should contain at least 12 alphanumeric characters. It should have upper and lower case letters. It must contain at least one number (0-9). It must contain at least one special character. Currently wireless USB devices offer same functions as wired USB devices but without needing wires. Use of Wireless USB is very easy for the users. These devices also save time of the users. But at the same time wireless USB are prone to various threats. In order to increase the security users should choose strong passwords for their USB device. And password should be changed time to time. Defending Against various Attacks: a) In case of only WEP option turn on the WEP. b) In case of WEP and WPA using WPA. c) In case of WPA and WPA2 using WPA2. d) Choosing strong passwords e) Changing password in case if it is lost or compromised. f) Changing the password after certain time period. REFERENCES [1] [2] [3] Wireless-Radio-Communication-Protocol [4] [5] [6] [7] [8] [9] 191
10 WIRELESS USB AND SECURITY OF USER DATA [10] [11] [12] F. Sheldon, J. Weber, S. Yoo, W. Pan, The Insecurity of Wireless Networks. IEEE Computer Society, vol. 10, no. 4, July/August, 2012, pp [13] Waliullah, Md, and Diane Gan. "Wireless LAN security threats & vulnerabilities." International Journal of Advanced Computer Science and Applications 5, no. 1 (2014) [14] Arana, Paul. "Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)." INFS 612 (2006): 1-6. [15] Arana, Paul. "Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2)." INFS 612 (2006): 1-6. [16] Tsitroulis, Achilleas & Lampoudis, Dimitris & Tsekleves, Emmanuel. (2014). Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security [17] [18] 192
Configuring Wireless Security Settings on the RV130W
Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional
More informationWireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationWireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities
Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More information05 - WLAN Encryption and Data Integrity Protocols
05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationNWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012
NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE
More informationSeminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht
Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion
More informationVulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal
Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Lazaridis Ioannis, Pouros Sotirios, Veloudis Simeon DEI College, Thessaloniki, Greece Abstract: This paper presents
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationThe 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013
The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional
More informationChapter 3 Wireless Configuration
Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.
More informationProcedure: You can find the problem sheet on the Desktop of the lab PCs.
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.
More informationWIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK
WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK S.DEEPTHI 1 G.MARY SWARNALATHA 2 PAPARAO NALAJALA 3 Assoc. Professor, Dept. of Electronics &Communication Engineering at Institute of Aeronautical Engineering,
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationSecurity of WiFi networks MARCIN TUNIA
Security of WiFi networks MARCIN TUNIA Agenda 1. Wireless standards 2. Hidden network and MAC filtering protection bypassing 3. Encryption independent attacks 4. Attacks on WEP 5. Attacks on WPA/WPA2 6.
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationWireless LAN Security. Gabriel Clothier
Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationConfiguring a VAP on the WAP351, WAP131, and WAP371
Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of
More informationHACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim
HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU Mc Graw mim CONTENTS Foreword Acknowledgments Introduction xvn xlx XX1 Hacking 802.11
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationAC Wireless Dual Band Gigabit Router. Highlights
AC 1900 Wireless Dual Band Gigabit Router Highlights Superfast Wi-Fi 600Mbps on 2.4GHz + 1300Mbps on 5GHz totals 1.9Gbps Wi-Fi speeds Maximum Range 3 dual band detachable antennas provide maximum Omni-directional
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationAdd a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)
Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to
More informationWPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network
WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationWPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)
WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More information2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp
2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationConfiguring the Wireless Parameters (CPE and WBS)
Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.
More informationCOMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2
COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationWireless Security i. Lars Strand lars (at) unik no June 2004
Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for
More informationLink & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Outline Network Security EECE 412 Link & end-to-end protocols SSL/TLS WPA Copyright 2004 Konstantin Beznosov 2 Networks Link and End-to-End Protocols
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationSection 4 Cracking Encryption and Authentication
Section 4 Cracking 802.11 Encryption and Authentication In the previous section we showed the vulnerabilities of Open Wireless LANs. In this section we ll show some of the techniques and tools used to
More informationChapter 17. Wireless Network Security
Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand
More informationAC1200 Wireless Dual Band Gigabit Router
A Wireless Dual Band Gigabit Router Upgrade to Faster AC Wi-Fi and Gigabit Connections 300Mbps + 867Mbps Dual Band Wi-Fi Gigabit Ports USB 2.0 Port Highlights Household Wi-Fi at Streaming Speeds Optimum
More informationHACKING & INFORMATION SECURITY Presents: - With TechNext
HACKING & INFORMATION SECURITY Presents: - With TechNext We Are The Speakers Sudarshan Pawar Cer.fied Security Expert(C.S.E.) Cer.fied Informa.on Security Specialist (C.I.S.S.) Security Xplained (TechNext
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationA Study Wireless Communication Domain
A Study Wireless Communication Domain Sangram Routray 1, Sanjib k. Nayak 2 Lalit M. Satapathy 1 1 Department of Electronics and Communication Engg. KIST,Bhubaneswar 2 Department of Computer science and
More informationWiMAX Security: Problems & Solutions
(JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a
More informationAdd performance and security to your business' wireless network with the Intellinet High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point.
High-Power Wireless AC1750 Dual-Band Gigabit PoE Access Point 450 Mbps Wireless N (2.4 GHz) + 1300 Mbps Wireless AC (5 GHz), WDS, Wireless client isolation, 27.5 dbm, wall-mount Part No.: 525787 Add performance
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationMobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE
Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you
More informationNetworking. Prof. Abdul Hameed
Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing
More informationSecurity in IEEE Networks
Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationDigital Entertainment. Networking Made Easy
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
More informationNetwork Communications Standards. Applied Information Technology
Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as
More informationCUA-854 Wireless-G Long Range USB Adapter with Antenna. User s Guide
CUA-854 Wireless-G Long Range USB Adapter with Antenna User s Guide Table of Contents Chapter 1. Introduction...5 1.1. About CUA-854...5 1.2. Key Features...5 1.3. Package Included...5 Chapter 2. Connect
More informationSecuring a Wireless LAN
Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access
More informationSAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More informationWorldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System
Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and
More informationPhysical and Link Layer Attacks
Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber
More informationAV2000 Gigabit Powerline ac Wi-Fi Kit
AV2000 Gigabit Powerline ac Wi-Fi Kit AC1200 Wi-Fi that Breaks Through Walls HomePlug AV2 2000Mbps 2x2 MIMO Technology Wi-Fi Auto-Sync Highlights 2 2 MIMO for More Throughput over Powerline Wi-Fi Auto-Sync
More informationAV1000 Gigabit Powerline ac Wi-Fi Kit
AV1000 Gigabit Powerline ac Wi-Fi Kit AC750 Wi-Fi to Power Up Your Network HomePlug AV2 1000Mbps 300Mbps + 433Mbps Dual Band Wi-Fi Wi-Fi Auto-Sync Highlights HomePlug AV2 Standard Compliant Wi-Fi Auto-Sync
More informationConfiguring the Client Adapter
CHAPTER 5 This chapter explains how to configure profile parameters. The following topics are covered in this chapter: Overview, page 5-2 Setting General Parameters, page 5-3 Setting Advanced Parameters,
More informationNaveen Kumar. 1 Wi-Fi Technology
Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless
More informationAdvanced Security and Mobile Networks
Advanced Security and Mobile Networks W.Buchanan (1) 9. GSM/3G Unit 7: Mobile Networks. Wireless. Security. Mobile IP. Mobile Agents. Spread spectrum. Military/Emergency Networks 8. Ad-hoc 7. Mobile Networks
More informationWireless LAN USB Super G 108 Mbit. Manual
Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly
More informationYealink T41S Wireless Settings
Yealink T41S Wireless Settings Wireless Network Yealink T41S Wireless Settings Overview Wi-Fi is a popular wireless networking technology that uses radio waves to provide wireless High speed Internet and
More informationWireless Local Area Networks (WLAN)
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Wireless Local Area Networks (WLAN) Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de
More information802.11ac Wireless Access Point Model WAC104
Point Model WAC104 User Manual October 2016 202-11698-01 350 E. Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationSERIAL BUS COMMUNICATION PROTOCOLS USB
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-20: SERIAL BUS COMMUNICATION PROTOCOLS USB 1 USB Host Applications Connecting flash memory cards, pen-like memory devices, digital camera, printer,
More informationC1200. Wireless Dual Band Gigabit Router. Upgrade to Faster AC Wi-Fi and Gigabit Connections. USB 2.0 Port. Gigabit Ports
A Wireless Dual Band Gigabit Router Upgrade to Faster AC Wi-Fi and Gigabit Connections 300Mbps + 867Mbps Dual Band Wi-Fi Gigabit Ports USB 2.0 Port Highlights Household Wi-Fi at Streaming Speeds Optimum
More informationAC1350 Wi-Fi Range Extender AV1300 Powerline Edition
AC1350 Wi-Fi Range Extender AV1300 Powerline Edition AC1350 Wi-Fi for the Whole Home TL-WPA8630 KIT HomePlug AV2 1300Mbps 2x2 MIMO Technology Wi-Fi Auto-Sync Highlights Fast Dual Band Wi-Fi for Every Need
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer
Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also
More informationAnalyzing Wireless Security in Columbia, Missouri
Analyzing Wireless Security in Columbia, Missouri Matthew Chittum Clayton Harper John Mixon Johnathan Walton Abstract The current state of wireless security in most areas can be estimated based on trends
More informationWireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies
Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies 1 Connected devices communication to the Local Network and Gateway 1 st to i th
More informationThe WiMAX Technology
Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania
More informationA network is two or more computers, or other electronic devices, connected together so that they can exchange data.
Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More informationAC Wireless Tri-Band Gigabit Router. Highlights
AC 3200 Wireless Tri-Band Gigabit Router Highlights Tri-Band technology Three separate Wi-Fi bands for connecting more devices to your network without a drop in performance Up to 3200Mbps Wi-Fi speed 600Mbps
More informationCITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule
1 next CITS3002 help3002 CITS3002 schedule The IEEE-802.11 Wireless LAN protocol We'll next examine devices implementing the IEEE-802.11 family of wireless networking protocols, and get an appreciation
More informationSecurity and Authentication for Wireless Networks
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-21-2004 Security and Authentication for 802.11 Wireless Networks Michel Getraide
More informationCONTENTS IN DETAIL INTRODUCTION
CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...
More informationInterworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...
Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde
More informationWireless Security Algorithms
(NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless
More informationAC1750 Wireless Dual Band Gigabit Router
AC1750 Wireless Dual Band Gigabit Router 1750Mbps Wi-Fi Speed for Home Entertainment 450Mbps + 1300Mbps Dual Band Wi-Fi Beamforming Technology for Better Coverage USB 3.0 Port Highlights Faster, More Reliable
More informationToday s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.
Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking
More informationTable of Contents. Chapter1 About g Wireless LAN USB Adapter...1
Table of Contents Chapter1 About 802.11g Wireless LAN USB Adapter...1 1-1 Features and Benefits... 1 1-2 Applications... 2 1-3 Product Kit... 3 1-4 About IEEE 802.11g Wireless LAN USB Adapter LED Indicators...
More informationAC Touch Screen Wi-Fi Gigabit Router. Highlights
AC 1900 Touch Screen Wi-Fi Gigabit Router Highlights Game and Stream with AC1900 Speed Stream 4K HD video and game online without lag over dual 2.4GHz and 5GHz bands Intuitive Touchscreen Display Effortlessly
More information