Day 6.docx - Wireless A wireless local-area network(LAN uses radio waves Types of Wireless Technologies Wi-Fi Wi-Fi uses the IEEE 802.11 specification

Day 6.docx - Wireless A wireless local-area network(LAN...

This preview shows page 1 - 3 out of 16 pages.

Wireless A wireless local-area network (LAN) uses radio waves Types of Wireless Technologies Wi-Fi Wi-Fi uses the IEEE 802.11 specification Bluetooth Bluetooth uses a low-power signal with a maximum range of 50 feet but with sufficient speed to enable transmission of high-fidelity music and streaming video. WiMAX dedicated wireless broadband systems also exist, offering fast Web surfing without connecting to cable or DSL. Wireless LAN A wireless local area network (WLAN) links two or more devices over a short distance using a wireless distribution method, Cellular Network A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver Spread Spectrum Essentially, spread spectrum refers to the concept of splitting information over a series of radio channels or frequencies. Wireless Security Issues Open System Authentication It consists of a simple authentication request containing the station ID and an authentication response containing success or failure data. Shared Key Authentication Shared Key Authentication is a standard challenge and response mechanism that makes use of WEP and a shared secret key to provide authentication. Ad-Hoc Mode It consists of at least two wireless endpoints where there is no access point involved in their communication. Infrastructure Mode It consists of a number of wireless stations and access points.
Image of page 1
Wired Equivalent Privacy Protocol (WEP) A key scheduling flaw has been discovered in WEP, so it is now considered to be insecure because a WEP key can be cracked in a few minutes with the aid of automated tools. Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) WPA provides users with a higher level of assurance that their data will remain protected by using the Temporal Key Integrity Protocol (TKIP) for data encryption. 802.1x authentication has been introduced in this protocol to improve user authentication. Wi-Fi Protected Access 2 (WPA2), based on IEEE 802.11i stronger cryptography (e.g., Advanced Encryption Standard or AES) stronger authentication control A “Parking Lot” Attack As a result, attackers can implement a “parking lot” attack, where they actually sit in the organization’s parking lot and try to access internal hosts via the wireless network Shared Key Authentication Flaw Shared key authentication can easily be exploited through a passive attack by eavesdropping on both the challenge and the response between the access point and the authenticating client. Such an attack is possible because the attacker can capture both the plaintext (the challenge) and the ciphertext (the response). WEP uses the RC4 stream cipher as its encryption algorithm. A stream cipher works by generating a keystream (i.e., a sequence of pseudo-random bits) based on the shared secret key, together with an initialization vector (IV). The keystream is then XORed against the plaintext to produce the ciphertext.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 16 pages?

  • Spring '16
  • Computer network, IP address, Virtual private network, Transmission Control Protocol, Computer network security

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes