Unformatted text preview: Project 2 Wardriving
20072 4050-403 Concepts of Wireless Data Networks Professor: Bo Yuan
Group 1: Member 1 Member 2 Member 3 Member 4 07 Abstract With the use of wireless networking technologies in the home rising steadily, the necessity to educate users about the risks involved with wireless networking, and solutions to those risks is essential. During our experiment we drove through some residential neighborhoods and observed the wireless networks that existed, this provided us with a good data sample we were able to analyze and draw conclusions about the general safety of the average home wireless network. We were surprised to conclude the there are still a large number of home networks that remain unprotected or improperly configured. Data Collection For our WarDriving project we used the software Network Stumbler version 0.4.0, which discovers wireless LAN's using the 802.11 protocol. In conjunction with NetStumbler, we used a standard GPS receiver to capture the coordinates (latitude, longitude) of the discovered access points. The program NetStumbler was run on a Toshiba laptop from the IT cage. We also used an Orinoco Gold wireless 802.11B card that was connected to a 6dB gain antenna to capture the wireless points. We covered an area of approximately 14 miles, covering housing developments along East River Road and Scottsville West Henrietta Road, in Henrietta New York. We conducted our Wardrive on November 1, 2007, from approximately 3:30 to 4:30 pm. During the wardrive, it was severely overcast, but the results did not seem to be affected by the weather. Also, we averaged a speed of approximately 20 mph throughout the experiment. Data Analysis Part A Wardrive path Below is the path we chose for the project, it is a relatively residential path to ensure many homes and thus many samples for the data collection. Figure 1.0 is the fully zoomed out view, while Figure 1.1, 1.2, and 1.3 are zoomed in closer for easier identification of the route. Figure 1.0 Full wardrive path Figure 1.1 Wardrive path (part 1) Figure 1.2 Wardrive path (part 2) Figure 1.3 Wardrive path (part 3) Part B Percentage breakdown After compiling the data we were able to make several calculations for analytical purposes of the data set. 1. Default SSID's vs. Unique SSID's Of the 597 wireless networks discovered during the war drive, all but 14 (2%) of them had unique SSID's. A graph of this can be seen in the figure below. 2. Open vs. Encrypted Of the 597 samples collected during the project, an alarming 167 (27%) of them had open encryption! A visual representation can be seen below. 3. Adhoc vs. Access Point Of the 597 samples collected, only 5 (1%) of them were running Adhoc networks, the reaming 99% of the networks housed some brand of access point. The visual representation of this data can be seen below. 4. 11 Mbps vs. 54 Mbps Of the 597 samples collect 108 (18%) of the networks were operating at 11 Mbps while the remaining 489 (82%) were operating at 54 Mbps. 5. Manufacturer breakdown According to our sample, people generally prefer to use Linksys access points for their home wireless networks, about 43%. The incredible conclusion from this data is the wide range devices used by other manufacturers, while the largest portion was Linksys, Dlink, Netgear, Apple, and many other brands of products were discovered. A detailed breakdown of the manufacturers can be seen below. 97, 16% 37, 6% 84, 14% Dlink Linksys Netgear Apple 35, 6% Belkin Siemens Buffalo Other 252, 43% 22, 4% 26, 4% 39, 7% Interesting Findings After gathering and analyzing the data there are a few observations that we found to be quite interesting. First and foremost, the sheer number of wireless access points that we found after wardriving are quite astounding. This simple fact shows the breakthrough of wireless communication and how it has impacted the typical home network. Individuals no longer want to have internet access be restricted by wires. Another interesting discovery was the fact that more than of the SSID's collected were unsecured. We knew that there was going to be some unsecured access points but not 27% worth. Last but not least, the data showed that about 108(18%) of the recorded access points supported a max data rate of only 11Mbps, which suggests that they are using the 802.11b protocol. Conclusion Overall, we believe the wardriving project was a great experience. Many of us have never done wardriving before so this project allowed us to discover and understand the process of wardriving. There was definitely a sense of anticipation and excitement during the wardrive. It was quite fascinating to look at the details of a newly recorded access point that we would pick up while driving. We had a few expectations leading into the wardrive and while most of them were met there were a few elements that we didn't expect. Starting the wardrive we knew that there would be unsecured access points, however, after analyzing the data that number was much larger than we expected. In the end, we found 162 open/unsecured access points. This was about 27% of our total number of recorded APs, something we did not expect. Looking at the project as a whole, we believe it is probably the most "fun" out of the three. In terms of improvements, it would have been nice if we were told how to filter among secured networks. All the APs recorded by us displayed as either `Open' or `WEP' in terms of security. It would not differentiate between WEP, WPA, or WPA2 security protocols. This issue hindered us from creating statistics regarding the different wireless security schemes. References ...
View Full Document
This note was uploaded on 04/21/2008 for the course VNSA 403 taught by Professor Yuan during the Winter '07 term at RIT.
- Winter '07