
Before we go deeper into wireless security, better we had a brief information about wireless technology. Wireless technology has helped to simplify networking by enabling multiple computer users to simultaneously share resources in a home or business without additional or intrusive wiring.
Wireless networking enables the same capabilities and comparable speeds of a wired 10BASE-T network without the difficulties associated with laying wire, drilling into walls, or stringing Ethernet cables throughout an office building
or home. Laptop users have the freedom to roam anywhere in the office building or home without having to hunt down a connector cable or available jack.
Reasons to choose wireless networking over traditional wired networks include:
Wireless Network Components
IEEE Wireless Networking Specifications - 802.11 Specifications
The 802.11 specifications were developed specifically for Wireless Local Area Networks (WLANs) by the IEEE and include four subsets of Ethernet-based protocol standards: 802.11, 802.11a, 802.11b, and 802.11g.
Ad Hoc (Peer-to-Peer) Mode vs.Infrastructure Mode
The 802.11 specification defines two types of operational modes: ad hoc (peer-to-peer) mode and infrastructure mode.
Ad-Hoc

Infrastructure mode

Wireless Security
Security is an obvious concern with any network, wired or wireless. Because communication over a traditionally wired network is, by its very nature, over physical wires, security is often built into the physical environment itself.
WLANs operate over radio signals, so the same security users, the enabling of the built-in security known as Wireless Equivalent Privacy (WEP) is sufficient for their home or small to medium office WLAN.
Wired Equivalent Privacy (WEP) uses 64- and 128-bit encryption and is the cipher scheme designated for use in 802.11b networking. WEP encrypts the data transmitted over a WLAN, protecting the once vulnerable communication between
the client and access point. When combined with traditional security measures (password protection, authentication, encryption, virtual private networks), WEP can be very effective.
Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the WEP protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive files that are not encrypted.
For OSA to work, the service set identifier (SSID) of the computer should match the SSID of the wireless access point. The SSID is a sequence of characters that uniquely names a wireless local area network (WLAN). The process occurs in three steps. First, the computer sends a request for authentication to the access point. Then the access point generates an authentication code, usually at random, intended for use only during that session. Finally, the computer accepts the authentication code and becomes part of the network as long as the session continues and the computer remains within range of the original access point.
If it is necessary to exchange encrypted data between a WEP network access point and a wireless-equipped computer, a stronger authentication process called Shared Key Authentication (SKA) is required.
Security Safeguards Over Wireless Networks
Transmissions over wireless networks can be intercepted by any suitable device within the transmission radius. If a network intruder is able to attach to an unsecured AP, she can get access to the wireless network and the Internet connection.
Media-access control (MAC) address filtering can be used to limit access to only identifiable network cards with approved MAC addresses. A MAC address is a hardware code unique to each PC and network device. This system is not foolproof, however, because MAC addresses are broadcast in the clear, so an intruder may be able to spoof them.
Encryption is used to ensure that only authorized receivers can understand transmitted data. Typically, a key is required to encrypt and decrypt information. WPA is an encryption security standard for wireless networks.
WPA
Wi-Fi Protected Access (WPA and WPA2) is a certification program created by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. This protocol was created in response to several serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).

The WPA protocol implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into WPA. TKIP could be implemented on pre-WPA wireless network interface cards that began shipping as far back as 1999 through firmware upgrades. Because the changes required fewer modifications on the client than on the wireless access point, most pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have since discovered a flaw in TKIP that relied on older weaknesses to retrieve the keystream from short packets to use for re-injection and spoofing.

Change Common Passwords Frequently:
Most of the top manufacturers have default passwords for all of their equipment. Users should be diligent in changing any default passwords and to change them on a regular basis in order to avoid detection.
Limit MAC Addresses:
Some access points allow users to specify exactly which Media Access Control (MAC) addresses can communicate with the network. A MAC address is a
hardware address that uniquely identifies each node of a network. Every network adapter in the world has a unique MAC address. By strictly specifying only those MAC addresses that can attach to a network, unauthorized users can be denied access.
Disable DHCP:
By default, some access points respond directly to Dynamic Host Configuration Protocol (DHCP) requests or allow the forwarding of DHCP requests from clients. DHCP is a protocol for assigning IP addresses dynamically on a network. However,with DHCP enabled on a WLAN, and without proper security measures enabled, a user can connect automatically to the network. Change Subnet Default: Some access points default to the IP subnet of 192.168.x.x. When disabling DHCP and using static IP addresses, users should also change their default IP subnet value.
Move Access Point in Front of Firewalls or DMZs:
The best solution for keeping prying eyes away from a corporate network is to move the access point off of the corporate LAN and in front of a firewall or on a DMZ (demilitarized zone) port. With the access point in front of a firewall, intruders will not have access to the corporate LAN. All corporate wireless users will require the installation and use of a virtual private network (VPN) client to create a secure tunnel into the corporate LAN. This may require additional administrative support from IT personnel, but the extra security is well worth the effort.
Wireless networking enables the same capabilities and comparable speeds of a wired 10BASE-T network without the difficulties associated with laying wire, drilling into walls, or stringing Ethernet cables throughout an office building
or home. Laptop users have the freedom to roam anywhere in the office building or home without having to hunt down a connector cable or available jack.
Reasons to choose wireless networking over traditional wired networks include:
- Running additional wires or drilling new holes in a home or office could be prohibited (because of rental regulations), impractical (infrastructure limitations), or too expensive
- Flexibility of location and data ports is required
- Roaming capability is desired; e.g., maintaining connectivity from almost anywhere inside a home or business
- Network access is desired outdoors; e.g., outside a home or office building
Wireless Network Components
- Access Point - The access point is a device that links a wireless network to a wired LAN. It increases the effective range of a wireless network and provides additional network management and security features.
- PC Card - A wireless PC card enables laptop users to connect wirelessly to the LAN.
- PCI Adapter - Just as a wireless access PC card allows portable and laptop computers access to the LAN, a wireless access PCI adapter allows desktop PC users access to the LAN.
- Router - A router is a device used for sharing a single Internet connection across multiple computers.
IEEE Wireless Networking Specifications - 802.11 Specifications
The 802.11 specifications were developed specifically for Wireless Local Area Networks (WLANs) by the IEEE and include four subsets of Ethernet-based protocol standards: 802.11, 802.11a, 802.11b, and 802.11g.
- 802.11 - 802.11 operated in the 2.4 GHz range and was the original specification of the 802.11 IEEE standard. This specification delivered 1 to 2 Mbps using a technology known as phase-shift keying (PSK) modulation.
- 802.11a - 802.11a operates in the 5 - 6 GHz range with data rates commonly in the 6 Mbps, 12 Mbps, or 24 Mbps range.
- 802.11b - The 802.11b standard (also known as Wi-Fi) operates in the 2.4 GHz range with up to 11 Mbps data rates and is backward compatible with the 802.11 standard. 802.11b uses a technology known as complementary code keying (CCK) modulation.
- 802.11g - 802.11g is the most recent IEEE 802.11 draft standard and operates in the 2.4 GHz range with data rates as high as 54 Mbps over a limited distance.
Ad Hoc (Peer-to-Peer) Mode vs.Infrastructure Mode
The 802.11 specification defines two types of operational modes: ad hoc (peer-to-peer) mode and infrastructure mode.
Ad-Hoc
- In ad hoc mode, the wireless network is relatively simple and consists of 802.11 network interface cards (NICs). The networked computers communicate directly with one another without the use of an access point.
- In ad hoc mode, also known as Independent Basic Service Set (IBSS) or peer-to-peer mode, all of the computers and workstations connected with a wireless NIC card can communicate with each other via radio waves without an access point. Ad hoc mode is convenient for quickly setting up a wireless network in a meeting room, hotel conference center, or anywhere else sufficient wired infrastructure does not exist.

Infrastructure mode
- In infrastructure mode, the wireless network is composed of a wireless access point(s) and 802.11 network interface cards (NICs).
- In infrastructure mode, all mobile and wireless client devices and computers communicate with the access point, which provides the connection from the wireless radio frequency world to the hard-wired LAN worldA basic wireless infrastructure with a single access point is called a Basic Service Set (BSS). When more than one access point is connected to a network to form a single sub-network, it is called an Extended Service Set (ESS).

Wireless Security
Security is an obvious concern with any network, wired or wireless. Because communication over a traditionally wired network is, by its very nature, over physical wires, security is often built into the physical environment itself.
WLANs operate over radio signals, so the same security users, the enabling of the built-in security known as Wireless Equivalent Privacy (WEP) is sufficient for their home or small to medium office WLAN.
Wired Equivalent Privacy (WEP) uses 64- and 128-bit encryption and is the cipher scheme designated for use in 802.11b networking. WEP encrypts the data transmitted over a WLAN, protecting the once vulnerable communication between
the client and access point. When combined with traditional security measures (password protection, authentication, encryption, virtual private networks), WEP can be very effective.
Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the WEP protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive files that are not encrypted.
For OSA to work, the service set identifier (SSID) of the computer should match the SSID of the wireless access point. The SSID is a sequence of characters that uniquely names a wireless local area network (WLAN). The process occurs in three steps. First, the computer sends a request for authentication to the access point. Then the access point generates an authentication code, usually at random, intended for use only during that session. Finally, the computer accepts the authentication code and becomes part of the network as long as the session continues and the computer remains within range of the original access point.
If it is necessary to exchange encrypted data between a WEP network access point and a wireless-equipped computer, a stronger authentication process called Shared Key Authentication (SKA) is required.
Security Safeguards Over Wireless Networks
Transmissions over wireless networks can be intercepted by any suitable device within the transmission radius. If a network intruder is able to attach to an unsecured AP, she can get access to the wireless network and the Internet connection.
Media-access control (MAC) address filtering can be used to limit access to only identifiable network cards with approved MAC addresses. A MAC address is a hardware code unique to each PC and network device. This system is not foolproof, however, because MAC addresses are broadcast in the clear, so an intruder may be able to spoof them.
Encryption is used to ensure that only authorized receivers can understand transmitted data. Typically, a key is required to encrypt and decrypt information. WPA is an encryption security standard for wireless networks.
WPA
Wi-Fi Protected Access (WPA and WPA2) is a certification program created by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. This protocol was created in response to several serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).

The WPA protocol implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into WPA. TKIP could be implemented on pre-WPA wireless network interface cards that began shipping as far back as 1999 through firmware upgrades. Because the changes required fewer modifications on the client than on the wireless access point, most pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have since discovered a flaw in TKIP that relied on older weaknesses to retrieve the keystream from short packets to use for re-injection and spoofing.
Number of common precautions that a WLAN user can take to limit a network to hacker attacks, vandalism, and corporate espionage.

Change Common Passwords Frequently:
Most of the top manufacturers have default passwords for all of their equipment. Users should be diligent in changing any default passwords and to change them on a regular basis in order to avoid detection.
Limit MAC Addresses:
Some access points allow users to specify exactly which Media Access Control (MAC) addresses can communicate with the network. A MAC address is a
hardware address that uniquely identifies each node of a network. Every network adapter in the world has a unique MAC address. By strictly specifying only those MAC addresses that can attach to a network, unauthorized users can be denied access.
Disable DHCP:
By default, some access points respond directly to Dynamic Host Configuration Protocol (DHCP) requests or allow the forwarding of DHCP requests from clients. DHCP is a protocol for assigning IP addresses dynamically on a network. However,with DHCP enabled on a WLAN, and without proper security measures enabled, a user can connect automatically to the network. Change Subnet Default: Some access points default to the IP subnet of 192.168.x.x. When disabling DHCP and using static IP addresses, users should also change their default IP subnet value.
Move Access Point in Front of Firewalls or DMZs:
The best solution for keeping prying eyes away from a corporate network is to move the access point off of the corporate LAN and in front of a firewall or on a DMZ (demilitarized zone) port. With the access point in front of a firewall, intruders will not have access to the corporate LAN. All corporate wireless users will require the installation and use of a virtual private network (VPN) client to create a secure tunnel into the corporate LAN. This may require additional administrative support from IT personnel, but the extra security is well worth the effort.















