Wireless Networked Systems

Size: px
Start display at page:

Download "Wireless Networked Systems"

Transcription

1 Wireless Networked Systems CS 795/895 - Spring 2013 Lec #5: Medium Access Control High Throughput, Security Tamer Nadeem Dept. of Computer Science

2 High Throughput Networks (802.11n) Slides adapted from Wireless Networking, J. Bernardini Page 2 Spring 2013 CS 795/895 - Wireless Networked Systems

3 802.11n Overview n Enhancements PHY new features MAC new features Page 3 Spring 2013 CS 795/895 - Wireless Networked Systems

4 802.11n PHY Enhancements Page 4 Spring 2013 CS 795/895 - Wireless Networked Systems

5 PHY Key Features MIMO Technology o Enable 2x2 MIMO operation in 20 MHz => 100 Mbps o Up to 4x4 MIMO => 200 Mbps HT Channel Technology o Bandwidth extension option: Using double channel (40 MHz) to achieve higher data rate Page 5 Spring 2013 CS 795/895 - Wireless Networked Systems

6 MIMO - Overview Page 6 Spring 2013 CS 795/895 - Wireless Networked Systems

7 MIMO - Overview Page 7 Spring 2013 CS 795/895 - Wireless Networked Systems

8 MIMO - Multiple-input Multiple-output Ø Mapping of a data stream to multiple parallel data streams and demapping multiple received data streams into a single data stream Ø Sending signals on multiple Tx antenna at the same carrier frequency o Transmitting independent streams of data Space Division Multiplexing (SDM) => increases throughput o Beamforming technology/coding across the antenna Space-Time Coding (STC) => increase range / robustness Transmitter x Receiver MIMO Tx Rx MIMO 2 3 2x x x4 Page 8 Spring 2013 CS 795/895 - Wireless Networked Systems

9 MIMO Multiple Data Streams Page 9 Spring 2013 CS 795/895 - Wireless Networked Systems

10 Antenna Beamforming and Diversity Beamforming (beam steering) employs two transmit antennas to deliver the best multipath signal Diversity (receive combining) uses two receive antennas to capture the best multipath signal MIMO uses multiple transmitters, receivers and antennas to send multiple signals over the same channel, multiplying spectral efficiency. Page 10 Spring 2013 CS 795/895 - Wireless Networked Systems

11 Transmit Beamforming (TxBF) n optional feature Multiple transmitter antennas focus the signal to a receiver Used by radar; phased-array antenna systems Transmitter is the beamformer Receiver is the beamformee Maximum transmission range, fixed power/antenna Std n Feedback from the beamformee allows the beamformer to adjust the antennas (steering matrix) and signal to improve SNR Four forms of TxBF: one implicit method and three explicit methods. Tx Rx Page 11 Spring 2013 CS 795/895 - Wireless Networked Systems

12 Transmit Beamforming (TxBF) Implicit TxBF: o The steering matrix is created by the transmitter o Radio calibration is required by the transmitter to calibrate the difference between its transmit and receive chains. o Radio calibration is achieved using feedback from the receiver. Explicit TxBF: o The receiver make a direct channel estimate and sending this feedback to the transmitter. o The steering matrix can be calculated by either the transmitter or receiver. o Three types of feedback: ² Channel state information: the receiver sends channel information to the transmitter to compute the steering matrix ² Non-compressed beamforming: the receiver calculates and sends the steering matrix to the transmitter ² Compressed beamforming: the receiver sends a compressed steering matrix to the transmitter Page 12 Spring 2013 CS 795/895 - Wireless Networked Systems

13 Beamforming Calibration a) STA A initiates the frame exchange sequence by sending an unsteered PPDU to STA B. The PPDU includes a training request (TRQ= 1) in a +HTC MPDU. b) STA B sends a sounding PPDU in response to the training request from STA A. c) On receiving the sounding PPDU, STA A uses the resulting channel estimate to compute steering matrices, and uses these to send a steered PPDU back to STA B. Page 13 Spring 2013 CS 795/895 - Wireless Networked Systems

14 MIMO Advantage Page 14 Spring 2013 CS 795/895 - Wireless Networked Systems

15 802.11n HT Channel Technology n uses OFDM (just as ag) n has option to use 20 MHz and 40 MHz channels n can use can combine channels for Channel Bonding n can use variable Guard Interval (GI) n can use various Modulation and Coding Schemes (MCS) Page 15 Spring 2013 CS 795/895 - Wireless Networked Systems

16 Non-HT and HT Channels a/g use 20 MHz OFDM channels, each of 52 subcarriers 48-subcarriers transmit data 4-subcarriers transmit pilot tones for calibrations n can use either 20 MHz or 40 MHz channels Each HT 20 MHz channel has 56 subcarriers 52-subcarriers transmit data 4-subcarriers transmit pilot tones for transmitter-receiver calibrations Each HT 40 MHz channel has 114 subcarriers 108-subcarriers transmit data 6-subcarriers transmit pilot tones for transmitter-receiver calibrations Page 16 Spring 2013 CS 795/895 - Wireless Networked Systems

17 Channel Bonding 40 MHz channels are formed by bonding two 20MHz channels When bonding two channels there no need for a guard band 5 GHz UNNI band allows twenty three 20 MHz channels to be bonded 2.4 GHz ISM band allows only one bonding of two 20 MHz channels (only 3 nonoverlapping channels) Page 17 Spring 2013 CS 795/895 - Wireless Networked Systems

18 Guard Interval (GI) Digital Symbol is a collection of bits If the bits overlap Inter-symbol Interference (ISI) is experienced ag uses a 800 ns guard interval between symbols n can use a 800 ns or 400 ns guard interval between symbols 400 ns GI improves throughput by 10% The 400 ns GI should only be used in a good RF environment Page 18 Spring 2013 CS 795/895 - Wireless Networked Systems

19 Modulation and Coding Schemes (MCS) n defines data rates as Modulation and Coding Schemes (MCS) MCS are based upon Modulation technique (BPSK, QPSK, 16-QAM, 64-QAM) Spatial streams (1, 4) Channel size (20 MHz, 40 MHz) Guard Interval (400 ns, 800 ns) n requires Eight mandatory 20 MHz MCSs Total of 78 MCSs Data rates vary from 6.5 Mbps to 600 Mbps Page 19 Spring 2013 CS 795/895 - Wireless Networked Systems

20 HT PHY and MPDU frame is a MAC Protocol Data Unit (MPDU) The payload is the MAC service Unit (MSDU) (layer 7-3 data) MPDU is made up of the header and body At the PHY layer is the Physical Layer Protocol Data Unit (PPDU) PPDU = MPDU + PHY preamble-header n defines three PHY preamble-headers Legacy format, HT Mixed, HT Greenfield CCRI J. Bernardini 20 Page 20 Spring 2013 CS 795/895 - Wireless Networked Systems

21 HT PPDU Formats Non-HT Legacy Mandatory for n Only 20 MHz channels Same format as ag HT Mixed Two part preamble First part can be decoded by ag Second part can not be decoded by ag HT Greenfield Preamble can not be decoded by ag Can use both 20 MHz and 40 MHz channels Page 21 Spring 2013 CS 795/895 - Wireless Networked Systems

22 802.11n MAC Enhancements Page 22 Spring 2013 CS 795/895 - Wireless Networked Systems

23 802.11n New MAC Features Frame Aggregation MSDU/PPDU RIFS: Reduced Inter-frame spacing Block ACK Protection Mechanisms Page 23 Spring 2013 CS 795/895 - Wireless Networked Systems

24 802.11n Frame Aggregation Motivation: Amortize PLCP & MAC overhead Page 24 Spring 2013 CS 795/895 - Wireless Networked Systems

25 802.11n Frame Aggregation A-MSDU Scheme: Multiple MSDUs are bundled to form a MPDU which could consist of multiple sub frames either from multiple sources or for multiple destinations. The PHY header, MAC header and FCS are appended to form PSDU. All MSDU are intended to be received by the same receiver. Sub frames have same sequence number and traffic identifier (TID) (priority). The maximum length of an A-MSDU frame can be 3839 or 7955 bytes Page 25 Spring 2013 CS 795/895 - Wireless Networked Systems

26 802.11n Frame Aggregation A-MPDU Scheme: Multiple MPDUs with a common PHY header are packed as an A-MPDU which can contain several MSDUs and/or A-MSDUs. Selective retransmission due to the presence of individual FCS for each MPDU All the MPDUs in an A-MPDU have same traffic identifier (TID). The maximum length size of an A-MPDU frame is 64 Kbytes. Page 26 Spring 2013 CS 795/895 - Wireless Networked Systems

27 802.11n Interframe Space Page 27 Spring 2013 CS 795/895 - Wireless Networked Systems

28 802.11n HTP Burst Trans. Page 28 Spring 2013 CS 795/895 - Wireless Networked Systems

29 802.11n Block ACK Page 29 Spring 2013 CS 795/895 - Wireless Networked Systems

30 802.11n Block ACK Immediate BlockACK Suitable for High-bandwidth, low latency traffic Delayed BlockACK Suitable for applications that tolerate moderate latency. Page 30 Spring 2013 CS 795/895 - Wireless Networked Systems

31 and n Comparison Page 31 Spring 2013 CS 795/895 - Wireless Networked Systems

32 Summary Page 32 Spring 2013 CS 795/895 - Wireless Networked Systems

33 Network Security Wireless Networking J. Bernardini Page 33 Spring 2013 CS 795/895 - Wireless Networked Systems

34 The Security Risk: RF Leakage Page 34 Spring 2013 CS 795/895 - Wireless Networked Systems

35 Infrastructure mode The association process Unauthenticated and unassociated Authenticated and unassociated Authenticated and associated " All access points transmit a beacon management frame at fixed interval. " A client listens for beacon to identify the access points, and selects the BSS to join. " The client and the access point perform a mutual authentication by exchanging several management frames (talk later) " The client sends an association request frame, and the access point responds with an association response frame. " The client can transmit data frames on the network. 35

36 WEP (Wired Equivalent Privacy) (encrypted traffic) The industry s solution: WEP (Wired Equivalent Privacy) Share a single cryptographic key among all devices Encrypt all packets sent over the air, using the shared key Goals : Confidentiality : Protection against eavesdropping Access Control : Restrict accessibility Data Integrity : Correctness of data Page 36 Spring 2013 CS 795/895 - Wireless Networked Systems

37 RC4 and Stream Ciphers RC4 encryption is Vernam Cipher RC4 is a stream cipher Generates pseudo random keystream from the key( IV Key) Encryption key Plain text data byte Pseudo-random number generator Cipher text byte Page 37 Spring 2013 CS 795/895 - Wireless Networked Systems

38 WEP Protocol Mobile station shares key with Access Point Transmitting a message M - Compute checksum (CRC32) of M and append it to M - Generate keystream using RC4(IV,Key) - Xor <M,C(M)> with keystream - Transmit IV and cipher text Upon receiving Reverse steps IV original unencrypted packet checksum key RC4 IV encrypted packet 24 bits Page 38 Spring 2013 CS 795/895 - Wireless Networked Systems

39 A Property of RC4 Keystream leaks, under known-plaintext attack Suppose we intercept a ciphertext C, and suppose we can guess the corresponding plaintext P Let Z = RC4(K, IV) be the RC4 keystream Since C = P Z, we can derive the RC4 keystream Z by P C = P (P Z) = Z This is not a problem... unless keystream is reused! If IV s repeat, confidentiality is at risk If we send two ciphertexts (C, C ) using the same IV, then the xor of plaintexts leaks (P P = C C ), which might reveal both plaintexts If there is redundancy, this may reveal both plaintexts Or, if we can guess one plaintext, the other is leaked Lesson: If RC4 isn t used carefully, it becomes insecure Page 39 Spring 2013 CS 795/895 - Wireless Networked Systems

40 Attack #1: Keystream Reuse WEP didn t use RC4 carefully The problem: IV s frequently repeat The IV is often a counter that starts at zero Hence, rebooting causes IV reuse Also, there are only 16 million possible IV s, so after intercepting enough packets, there are sure to be repeats Attackers can eavesdrop on traffic An eavesdropper can decrypt intercepted ciphertexts even without knowing the key Some implemented IV selection strategies: Random: Collision probability P n two packets will share same IV after n packets is P 2 = 1/2 24 for n = 2 and P n = P n 1 +(n 1)(1 P n 1 )/ 2 24 for n > 2. o 50% chance of a collision exists already after only 4823 packets!!! Page 40 Spring 2013 CS 795/895 - Wireless Networked Systems

41 How to get plaintext? IP traffic predictable - well defined structures and message content Login sequences and Welcome messages Sniffing Authentication challenge - plain and cipher text both Sending packets from outside - ping Broadcast packets in both encrypted and unencrypted form - for some implementations Page 41 Spring 2013 CS 795/895 - Wireless Networked Systems

42 Attack from both ends Internet Attacker sends data Attacker AP MS AP encrypts plaintext data Attacker Page 42 Spring 2013 CS 795/895 - Wireless Networked Systems

43 Attack #2: Spoofed Packets Attackers can inject forged traffic Learn RC4(K, IV) using previous attack Since the checksum is unkeyed, you can then create valid ciphertexts that will be accepted by the receiver Attackers can bypass access control All computers attached to wireless net are exposed Forgery Attack Recv-Addr, Src-Addr, Dest-Addr are all unprotected On packets from a STA to the AP, corrupt the Dest-Addr The AP will decrypt data and send it to the forged destination Page 43 Spring 2013 CS 795/895 - Wireless Networked Systems

44 Attack #3: Reaction Attacks P RC4(K) P RC4(K) 0x0101 ACK TCP ACKnowledgement appears TCP checksum on received (modified) packet is valid P & 0x0101 has exactly 1 bit set Attacker can recover plaintext (P) without breaking RC4 Page 44 Spring 2013 CS 795/895 - Wireless Networked Systems

45 Standard Security Mechanisms and Wired Equivalent Privacy (WEP) protocol Key Management Authentication Mechanisms Open System Authentication Shared Key Authentication Access Control Mechanism Closed Network Access Control Access Control Lists 45 Page 45 Spring 2013 CS 795/895 - Wireless Networked Systems

46 Shared Key Authentication Authentication Spoofing 1. Eavesdropping P and C 2. WEP_K_IV_PR = P XOR C size of the stream=size of the authentication frame 3. Send Request to the Access Point, get challenge R 4. CR = WEP_K_IV_PR XOR R and new CRC 5. Follow steps, setup authentication 46 Page 46 Spring 2013 CS 795/895 - Wireless Networked Systems

47 Robust Security Network (RSN) i defines a set of features to establish a RSN association (RSNA) between stations (STAs) Enhanced data encapsulation mechanism CCMP Optional: TKIP Key management and establishment Four-way handshake and group-key handshake Enhanced authentication mechanism for STAs Pre-shared key (PSK); IEEE 802.1x/EAP methods Page 47 Spring 2013 CS 795/895 - Wireless Networked Systems

48 Page 48 Spring 2013 CS 795/895 - Wireless Networked Systems 48 Robust Security Network (RSN) Out of scope of i standard Wireless Station Access Point Authentication Server EAP-TLS EAP 802.1X (EAPoL) RADIUS UDP/IP

49 Robust Security Network (RSN) Operational phases Station Access Point Security Capabilities Discovery 802.1x authentication RADIUS/EAP Authentication Server 802.1x Key Management RADIUS-based Key Distribution Data Protection Page 49 Spring 2013 CS 795/895 - Wireless Networked Systems

50 Robust Security Network (RSN) Discovery message exchange Station Probe Request Access Point Probe Response + RSN IE Open System Auth Open System (success) Association Requst + RSN IE Association Response (success) Page 50 Spring 2013 CS 795/895 - Wireless Networked Systems

51 Robust Security Network (RSN) 802.1x Authentication Centralize network admission policy decisions at the AS Mutual authentication of STA and AS The AS and station derive a Master Key (MK) A Pairwise Master Key (PMK) is derived from MK The AS distributed PMK to the AP In PSK authentication, the authentication phase is skipped PMK = PSK Page 51 Spring 2013 CS 795/895 - Wireless Networked Systems

52 Robust Security Network (RSN) 802.1x key management Station Access Point Authentication Server Use RADIUS to push PMK from AS to AP Use PMK and 4-way Handshake To derive, bind, and verify PTK Use Group Key Handshake to send GTK from AP to station Page 52 Spring 2013 CS 795/895 - Wireless Networked Systems

53 Robust Security Network (RSN) 4-Way Handshake Station EAPoL-Key( ANonce ) Access Point PTK=EAPoL-PRF(PMK, ANonce SNonce AP MAC Addr STA MAC Addr) EAPoL-Key(SNonce, MIC, STA RSN IE) Install TK EAPoL-Key(ANonce, MIC, AP RSN IE, encrypted(gtk)) EAPoL-Key(Unicast, MIC) Derive PTK Install TK Page 53 Spring 2013 CS 795/895 - Wireless Networked Systems

54 Data Encapsulation: Temporal Key Integrity Protocol (TKIP) Optional IEEE802.11i protocol for data confidentiality and integrity TKIP is designed explicitly for implementation on WEP legacy hardware Designed as a wrapper around WEP Can be implemented in software Reuses existing WEP hardware Runs WEP as a sub-component TKIP three new features: A cryptographic message integrity code (MIC) A new IV sequencing discipline The transmitter increments the sequence number with each packet it sends A per-packet key mixing function Page 54 Spring 2013 CS 795/895 - Wireless Networked Systems

55 Temporal Key Integrity Protocol (TKIP) TKIP frame processing Temporal key Transmitter address TKIP sequence counter (TSC) MIC key Source & destination addresses, priority, and payload Phase 1 Key mixing TSC2-TSC5 MICHAEL TTAK Frame payload + MIC Phase 2 Key mixing TSC0-TSC1 TSC0-TSC5 Fragmentation (if required) WEP IV WEP secret key Clear text frames WEP Processing Encrypted and authenticated frames for transmission Page 55 Spring 2013 CS 795/895 - Wireless Networked Systems

56 Temporal Key Integrity Protocol (TKIP) TKIP encapsulation Encrypted MAC Header IV/Key ID Extended IV Data MIC WEP ICV FCS TSC1 WEP Seed TSC0 Rsvd Ext IV Key ID TSC2 TSC3 TSC4 TSC5 Page 56 Spring 2013 CS 795/895 - Wireless Networked Systems

57 Counter Mode with CBC-MAC (CCMP) Both encryption and MIC use AES Uses counter Mode (CTR) to encrypt the payload and MIC Uses CBC-MAC to compute a MIC on the plaintext header and the payload Both encryption and authentication use the same key Encryption Header Payload MIC Authenticated Page 57 Spring 2013 CS 795/895 - Wireless Networked Systems

58 Counter Mode with CBC-MAC (CCMP) CCMP data processing Plaintext frame MAC header Data Packet # Temporal key Key Id Additional authentication data A2 Create nonce CCMP header CCM encryption MAC header CCMP header Data MIC FCS Page 58 Spring 2013 CS 795/895 - Wireless Networked Systems

59 Questions Page 59 Spring 2013 CS 795/895 - Wireless Networked Systems

05 - WLAN Encryption and Data Integrity Protocols

05 - WLAN Encryption and Data Integrity Protocols 05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

CWNP PW Certified Wireless Analysis Professional. Download Full Version : CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g

More information

Troubleshooting WLANs (Part 2)

Troubleshooting WLANs (Part 2) SharkFest 17 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 8. November 2017 Breaking News: Including KRACK!!! Rolf Leutert Leutert NetServices Switzerland

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Link Security A Tutorial

Link Security A Tutorial Link Security A Tutorial Fortress Technologies, Inc. Slide 1 Five basic security services Data confidentiality Data integrity Access control and access rights Authentication/Roaming Non-repudiation These

More information

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Outline Network Security EECE 412 Link & end-to-end protocols SSL/TLS WPA Copyright 2004 Konstantin Beznosov 2 Networks Link and End-to-End Protocols

More information

Configure n on the WLC

Configure n on the WLC Configure 802.11n on the WLC Document ID: 108184 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions 802.11n An Overview How Does 802.11n Provide Greater Throughput

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Security and Authentication for Wireless Networks

Security and Authentication for Wireless Networks University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-21-2004 Security and Authentication for 802.11 Wireless Networks Michel Getraide

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Overview of Security

Overview of Security Overview of 802.11 Security Bingdong Li Present for CPE 601 2/9/2011 Sources: 1 Jesse Walker (Intel) & 2. WinLab 1 Agenda Introduction 802.11 Basic Security Mechanisms What s Wrong? Major Risks Recommendations

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

WIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security

WIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security Objectives: 1) Understanding the basic operations of WLANs 2) WLAN security 3) Wireless body area networks (IEEE 802.15.6) Readings: 1. Kurose & Ross, Computer Networking: A Top-Down Approach (6th Edition),

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Student Workbook. Presentation Graphics Notes Areas Glossary. Presenter Keith R. Parsons, CWNE #3

Student Workbook. Presentation Graphics Notes Areas Glossary. Presenter Keith R. Parsons, CWNE #3 Student Workbook Presentation Graphics Notes Areas Glossary Presenter Keith R. Parsons, CWNE #3 Page left intentionally blank. 802.11n Planning and Optimization Workshop Outline Section I: 802.11 Fundamentals

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent

More information

WHITE PAPER n Demystified. Key considerations for n-abling the Wireless Enterprise

WHITE PAPER n Demystified. Key considerations for n-abling the Wireless Enterprise WHITE PAPER 802.11n Demystified Key considerations for n-abling the Wireless Enterprise Introduction IEEE 802.11n is a next generation wireless technology that delivers spectacular improvements in the

More information

COSC4377. Chapter 8 roadmap

COSC4377. Chapter 8 roadmap Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Physical and Link Layer Attacks

Physical and Link Layer Attacks Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber

More information

Security in Data Link Protocols

Security in Data Link Protocols Security in 802.11 Data Link Protocols Gianluca Dini Dept. of Ingegneria dell Informazione University of Pisa, Italy Via Diotisalvi 2, 56100 Pisa gianluca.dini@ing.unipi.it If you believe that any security

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so

More information

Wireless Security i. Lars Strand lars (at) unik no June 2004

Wireless Security i. Lars Strand lars (at) unik no June 2004 Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for

More information

Status of P Sub-Specification

Status of P Sub-Specification Status of P1451.5 802.11 Sub-Specification June 7, 2004 Ryon Coleman Senior Systems Engineer 802.11 Subgroup rcoleman@3eti.com Agenda 1. IEEE 802.11 Architecture 2. Scope within the 1451 Reference Model

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

WPA-GPG: Wireless authentication using GPG Key

WPA-GPG: Wireless authentication using GPG Key Università degli Studi di Bologna DEIS WPA-GPG: Wireless authentication using GPG Key Gabriele Monti December 9, 2009 DEIS Technical Report no. DEIS-LIA-007-09 LIA Series no. 97 WPA-GPG: Wireless authentication

More information

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert SharkFest 18 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch Introduction 2 Rolf Leutert,

More information

Analysis of Security or Wired Equivalent Privacy Isn t. Nikita Borisov, Ian Goldberg, and David Wagner

Analysis of Security or Wired Equivalent Privacy Isn t. Nikita Borisov, Ian Goldberg, and David Wagner Analysis of 802.11 Security or Wired Equivalent Privacy Isn t Nikita Borisov, Ian Goldberg, and David Wagner WEP Protocol Wired Equivalent Privacy Part of the 802.11 Link-layer security protocol Security

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1 Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless

More information

Security in Data Link Protocols

Security in Data Link Protocols Security in 802.11 Data Link Protocols Gianluca Dini!"#$%&'(&)*+"+*",-.&/"001)*(',2.3-'*" University of Pisa, Italy Via Diotisalvi 2, 56100 Pisa gianluca.dini@ing.unipi.it!"#$%&#'()*(+(#,-.,#./$#0(1&2*,$#32%')(4#1./#

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 16504 First edition 2011-11-15 Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space Technologies

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Emerging IEEE Standards

Emerging IEEE Standards 1 Luke Qian a As the popularity of IEEE 802.11 wireless LANs (WLANs) grows rapidly, many new 802.11 wireless standards are emerging. New 802.11 standards are being developed in two major categories: specifications

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

802.11n. Taking wireless to the next level. Carlo Terminiello Consulting SE Wireless & Mobility European Technology Marketing

802.11n. Taking wireless to the next level. Carlo Terminiello Consulting SE Wireless & Mobility European Technology Marketing 802.11n Taking wireless to the next level Carlo Terminiello Consulting SE Wireless & Mobility European Technology Marketing ctermini@cisco.com 802.11n PVT 2008 Cisco, All rights reserved. Cisco Partners

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

The security of existing wireless networks

The security of existing wireless networks Security and Cooperation in Wireless Networks Cellular networks o o GSM UMTS WiFi LANs Bluetooth Security in Wireless Networks Wireless networks are more vulnerable to security issues: Broadcast communications

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Advanced WiFi Attacks Using Commodity Hardware

Advanced WiFi Attacks Using Commodity Hardware Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous

More information

Laboratory of Nomadic Communication. Quick introduction to IEEE

Laboratory of Nomadic Communication. Quick introduction to IEEE Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview

More information

Securing Your Wireless LAN

Securing Your Wireless LAN Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Overview of Emerging IEEE Protocols for MAC and Above

Overview of Emerging IEEE Protocols for MAC and Above Overview of Emerging IEEE 802.11 Protocols for MAC and Above Sunghyun Choi Multimedia & Wireless Networking Laboratory (MWNL) School of Electrical Engineering Seoul National University schoi@snu.ac.kr

More information

The Final Nail in WEP s Coffin

The Final Nail in WEP s Coffin 1/19 The Final Nail in WEP s Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy 2/19 WEP is the 802.11 standard for encryption.

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Chaos Communication Congress (CCC), 27 December 2017 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Nullcon, 2 March 2018 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that s secure? Seems so! No attacks

More information

Wi-Fi Scanner. Glossary. LizardSystems

Wi-Fi Scanner. Glossary. LizardSystems Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES

More information

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018 KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef @vanhoefm BlueHat IL, 24 January 2018 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned

More information

Guide to Deploying n Wireless LANs To learn more about n in the Enterprise visit

Guide to Deploying n Wireless LANs To learn more about n in the Enterprise visit N E T W ORKS U P E RVIS ION Table of Contents Overview....................................................................... 2 802.11n Basics Layer 1 Enhancements... 3 MIMO.......................................................................

More information

What you will learn. Summary Question and Answer

What you will learn. Summary Question and Answer What you will learn General overview of 802.11 Authentication Methods WEP Overview Key Hierarchy Encryption/Decryption WPA Overview Key Hierarchy Encryption/Decryption WPA2 Overview Encryption/Decryption

More information

4Gon Tel: +44 (0) Fax: +44 (0)

4Gon  Tel: +44 (0) Fax: +44 (0) This document describes the benefit of adopting 802.11n technology in a Meraki wireless network. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki is a registered trademark of Meraki,

More information

Stream Ciphers. Stream Ciphers 1

Stream Ciphers. Stream Ciphers 1 Stream Ciphers Stream Ciphers 1 Stream Ciphers Generate a pseudo-random key stream & xor to the plaintext. Key: The seed of the PRNG Traditional PRNGs (e.g. those used for simulations) are not secure.

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

HP A-MSR Router Series WLAN. Command Reference. Abstract

HP A-MSR Router Series WLAN. Command Reference. Abstract HP A-MSR Router Series WLAN Command Reference Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended for network planners,

More information

Throughput Analysis of IEEE802.11n using OPNET

Throughput Analysis of IEEE802.11n using OPNET Throughput Analysis of IEEE802.11n using OPNET Abdulaziz M. Ghaleb, David Chieng, Alvin Ting, Kae Hsiang Kwong, MIMOS Berhad, Malaysia. {abdulaziz.saleh, ht.chieng, kee.ting, kh.kwong}@mimos.my Keywords

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Configuring the Wireless Parameters (CPE and WBS)

Configuring the Wireless Parameters (CPE and WBS) Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.

More information

Converged Access: Wireless AP and RF

Converged Access: Wireless AP and RF This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient

More information

Day 1: Wi-Fi Technology Overview

Day 1: Wi-Fi Technology Overview Duration: 5days Hands on: Wireshark based real-life Wi-Fi packet trace analysis Demos : Alethea Wicheck multi-sta emulator for understanding performance of Wi-Fi APs and to study impact of multiple clients

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018 Improved KRACK Attacks Against WPA2 Implementations Mathy Vanhoef @vanhoefm OPCDE, Dubai, 7 April 2018 Overview Key reinstalls in 4-way handshake New KRACKs Practical impact Lessons learned 2 Overview

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

CITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule

CITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule 1 next CITS3002 help3002 CITS3002 schedule The IEEE-802.11 Wireless LAN protocol We'll next examine devices implementing the IEEE-802.11 family of wireless networking protocols, and get an appreciation

More information

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Lazaridis Ioannis, Pouros Sotirios, Veloudis Simeon DEI College, Thessaloniki, Greece Abstract: This paper presents

More information

CSE 713: Wireless Networks Security Principles and Practices. Ad hoc networks security and sensor networks security (1 hour)

CSE 713: Wireless Networks Security Principles and Practices. Ad hoc networks security and sensor networks security (1 hour) CSE 713: Wireless Networks Security Principles and Practices Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Lecture 2 February 6, 2017 Outline TKIP and AES-CCMP (1 hour) Break

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Configuring Parameters

Configuring Parameters Configuring the 802.11n Parameters, page 1 Configuring 802.11h Parameters, page 4 Configuring the 802.11n Parameters Information About Configuring the 802.11n Parameters This section provides instructions

More information

PW0-270_formatted. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.

PW0-270_formatted.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1. PW0-270_formatted Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ CWNA PW0-270 Certified Wireless Analysis Professional (CWAP) Version: 5.0 CWNA PW0-270

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

11ax MU-MIMO; how is it different from 11ac?

11ax MU-MIMO; how is it different from 11ac? 11ax MU-MIMO; how is it different from 11ac? Dr. Srikanth Subramanian, CKO, Nanocell Networks www.nanocellnetworks.com srikanth.s@nanocellnetworks.com 802.11ac MU-MIMO AP with maximum 8 streams and STAs

More information

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai

More information

Chapter 4 WIRELESS LAN

Chapter 4 WIRELESS LAN Chapter 4 WIRELESS LAN Distributed Computing Group Mobile Computing Summer 2002 Overview Design goals Characteristics IEEE 802.11 Architecture Protocol PHY MAC Roaming Security a, b, d, etc. Short intermezzo

More information