802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Receiver-Initiated Channel Hopping (RICH) Makis Tzamaloukas Computer and Communications Research Group (CCRG)
CPET 260 – Network I Wireless Networks Bluetooth.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Wireless Networking (WLAN) Reina Trujillo Nathan Ekenberg.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
Wireless LAN (WLAN) Networks
WLAN b a Johan Montelius
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
CWNA Guide to Wireless LANs, Second Edition
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
PRESENTATION ON WI-FI TECHNOLOGY
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
WLAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless Technologies
Outline What is Wireless LAN Wireless Transmission Types
Instructor Materials Chapter 6 Building a Home Network
Communication Networks: Technology & Protocols
Security and Wireless LANs
Wireless LANs Wireless proliferating rapidly.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
CSE 4905 Network Security Overview
CS 457 – Lecture 7 Wireless Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
basics Richard Dunn CSE July 2, 2003.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson

Overview What is , a, b and g Defines the MAC layer and physical layer for wireless data communication between mobile stations in a wireless local area network b finalized in 1999 and is the most successful of all wireless LANs a and b provide higher data rate g products launched only a few months ago. Three physical layers specified(802.11): Infrared Frequency hopping spread spectrum Direct sequence spread spectrum , b and g operate around 2 GHz frequency a operates around 5GHz frequency. CSMA-CA ( Carrier Sense Multiple Access - Collision Avoidance)

Ad-Hoc Mode Vs Infrastructure Mode The Independent base station mode has no central access point. Only Single hopping of data All nodes talk to one central access point Mobility limited to area covered by the access point

Neither Secure nor Robust Protocol designed to be a commodity which is commercially successful. List of different Attacks MANAGEMENT FRAMES ARE NOT AUTHENTICATED! Denial of Service Flooding (CSMA/CA) De-authentication RF interference based attacks Insertion Attack Insertion Attack Man In the Middle Attacks Insert a New Access Point in the network Route all traffic through your node Encryption attack Collecting data and decrypting the information contained, made possible due to the weakness in the WEP Encryption specified in

Primary Privacy Issue Medium Accessible to All “Sniffing”Protection? The only protection against “sniffing” is an optional encryption of data called WEP (wired equivalent privacy). But the protocol is flawed and data can be decrypted. The weakness is well documented and has been published for every one to read. Decrypted Date Hacking Tools on a PDA

Jamming Physical Layer Communication Step 1:Jammer senses the network and waits. Step 2:Jammer’s synchronized receiver transmits fake data for a small time duration Result expected: The frame appears corrupted at the receiver (CRC Check fails) The Jammer is stealthy. Node B Node A Jammer

Receiver Design Receiver design and performance can play an important role in hidden node problem. The requirements on the jammer to have a high probability of success depends on the overall noise rejection of the receiver and its behavior in the presence of a signal spread using the same spreading sequence.

Down conversion to Base band Target Receiver Design A Zero IF receiver with two stages of down conversion is being simulated based on the Intersil’s Prism™ wireless lan solution for x

Conclusion wireless is a highly successful protocol, which is not designed to be robust or secure. Ad-Hoc mode possible with only a single hop of data. Knowledge of spreading sequence could make jamming present wireless networks easy and the source of jamming difficult to detect. Understanding of the behavior of wireless receivers under the proposed jamming technique requires comprehensive simulation and actual testing of the results.