SlideShare a Scribd company logo
WIRELESS
TECHNOLOGY
EXCERPTS FROM CWNA/CWSP
A QUICK INTRODUCTION
OUTLINE OF THIS PRESENTATION
▸Components
▸Measurements
▸Communication / Signal
▸Security
▸Questions and/or Applause
RADIO FREQUENCY CREATION
HOW A SIGNAL IS
CREATED1. Data is sent to the Transmitter, which creates the wireless medium.
2. Transmitter is responsible for the modulation of the signal (carrier signal)
and the signal strength (Amplitude/Power).
3. The Antenna radiates the carrier signal in a pattern specific to the type of
antenna and receive signals from air to propagate it back to the transmitter
SIGNAL DEMYSTIFIED
MEASUREMENTS
▸Equivalent Isotropic Radiated Power (EIRP) - Highest signal
strength that is transmitted from a particular antenna.
▸Antennas tend to focus the RF signal, altering the effective
output.
▸Decibel (dB) - a unit of comparison, NOT a unit of power.
▸identifies the difference between 2 values.
▸A relative expression and a measurement in change of
power
SIGNAL DEMYSTIFIED
MEASUREMENTS CONTINUED
▸Decibel notations:
▸dBi (decibel isotropic) - comparison of an antenna to an
isotropic radiator (think antenna gain).
▸dBd (decibel dipole) - comparison of an antenna to a
dipole antenna (omnidirectional).
▸dBi = dBd + 3
▸dBm - a signal comparison to 1 milliwatt of power.
SIGNAL DEMYSTIFIED
MEASUREMENTS MATH EXAMPLES
▸Problem: 2.4GHz AP transmitting at 100mW, Laptop is 100m
(0.1Km) from AP.
▸Solution: Laptop receives 0.000001mW or if we use FSPL
formula -> dB = 32.4 + (20log10(2400)) + (20log10(0.1)) or
80.004dB ~ 80dB of signal loss.
▸dBm: 0dBm = 1mW then what would 100mW be?
▸dBm = 10 X log10(PmW) or +20dBm
▸the reverse formula is: PmW = 10(dBm/10)
RF SIGNAL
UNDERSTANDING SOME KEY METHODS
AND WAVE FUNCTIONS
▸Manipulation of signal is called Keying Method.
▸Aptitude Shift-Keying (ASK)
▸Frequency Shift-Keying (FSK)
▸Phase Shift-Keying (PSK)
RF SIGNAL
UNDERSTANDING SOME KEY METHODS
AND WAVE FUNCTIONS
▸All RF signals will experience some type of degradation.
▸Absorption - loss of attenuation due to various materials
▸Reflection - diversion or bouncing of a signal
▸Scattering - multiple reflections of signal in various directions
▸Refraction - bending of a signal as it passes through a medium of different
density.
▸Diffraction - bending of a signal around an object
▸Free Space Path Loss - loss of signal strength caused by natural
broadening of the waves (Beam Divergence)
SIGNAL PROPAGATION
RF TRANSMISSION METHODS
▸Narrowband
▸uses very little bandwidth
▸more susceptible to interference and intentional jamming
▸Spread Spectrum
▸wide range of bandwidth
▸less susceptible to jamming and interference
SIGNAL PROPAGATION
TYPES OF SPREAD SPECTRUM
▸Frequency Hopping Spread Spectrum (FHSS)
▸Components:
▸Hopping sequence - predefined pattern of frequencies
▸Dwell time - measure of time of signal transmission
▸Hop time - measure of time between transmission signal
change
▸Modulation (Gaussian Frequency Shift-Keying) GFSK
FREQUENCY HOPPING SPREAD
SPECTRUM COMPONENTS
SIGNAL PROPAGATION
TYPES OF SPREAD SPECTRUM
▸Direct Sequence Spread Spectrum (DSSS)
▸Signal transmission is spread across the range of frequencies
that make up that channel.
▸The process of spreading the data is known as: Data Encoding.
▸Modulation
▸Differential Binary Phase Shift-Keying (DBPSK)
▸Differential Quadrature Phase Shift-Keying (DQPSK)
SIGNAL PROPAGATION
ORTHOGONAL FREQUENCY DIVISION
MULTIPLEXING (OFDM)
▸Most popular and used in either 5GHz or 2.4GHz range
▸Looks like Spread Spectrum, but it uses subcarriers (52
separate closely and precisely spaced frequencies)
▸More resistant to ISI and negative effects from multi-path
interference.
▸Utilizes harmonics overlap to cancel unwanted signals.
▸Modulation is BPSK or QPSK (at higher rates uses 16-QAM
or 64-QAM).
OFDM
2.4GHZ CHANNEL
OVERLAY DIAGRAM
2.4GHZ CHANNEL
OVERLAY DIAGRAM
SECURITY
THE CHALLENGE
▸Unauthorized access
▸open systems for customers and consumers
▸data and information is in the open and easy to view both
in promiscuous mode and in attack mode
▸Rogue AP’s
▸redirect traffic
▸out-signal the original transmission
CONNECTIVITY
PROCESS OF GETTING CONNECTED
▸It’s a 4 step process
1. Authentication
‣ Open - no verification of identity (null authentication)
‣ Varied - open to join but data encrypted to outside
‣ Private - some type of encryption / shared key
2. Association
‣ becoming a part of the BSS
SECURITY
TYPES OF PROTECTION
▸Access Control
▸MAC address filtering
▸Restrictions
▸Encryption
▸Wireless Equivalent Protection (WEP)
▸Wi-Fi Protected Access (WPA)
▸Wi-Fi Protected Access v2 (WPA2)
▸SSID Cloaking
SECURITY
VULNERABILITIES AND ATTACKS
▸Leaving the Default access (Passwords, set-up)
▸open Authentication and/or Authorization
▸Use of SNMP-managed devices (Simple Network Management
Protocol) in unsecured mode
▸Improper configuration of gateways, extenders, bridged devices,
etc.
▸MAC Spoofing and MAC Layer Attacks
▸session hijacking, MITM, DoS and Disassociation(s)
SECURITY
ENCRYPTION TYPES AND DEFINITION
▸Static WEP
▸Layer 2 encryption using RC4 streaming cipher
▸64-bit and 128-bit encryption (24-bit IV)
▸Weakness
▸IV Collision attacks - 24-bit IV is in clear text and repeats itself after 16 million.
▸RC4 Key-scheduling Algorithm uses 24-bit IV
▸Reinjection Attack
▸Bit-Flip Attack - ICV considered weak and packet can be compromised
SECURITY
ENCRYPTION TYPES AND DEFINITION
CONT.
▸Wi-Fi Protected Access (WPA)
▸Temporal Key Integrity Protocol (TKIP) - 40-bit encryption
and 128-bit key. Generates keys dynamically for each
packet, avoiding some collisions.
▸Message Integrity Check (MIC) - avoids the capturing,
changing and resending the packets. Also uses the MIC
as a seed for the mathematic encryption keys.
SECURITY
ENCRYPTION TYPES AND DEFINITION
CONT.
▸Wi-Fi Protected Access 2 (WPA2)
▸Advanced Encryption Standard (AES)
▸AES-CCMP
▸Counter Mode with Cipher Block Chaining Authentication
Code Protocol (CCMP)
▸Message Integrity Check (MIC) - avoids the capturing,
changing and resending the packets. Also uses the MIC as
a seed for the mathematic encryption keys.

More Related Content

What's hot

Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhsstanu_jaswal
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
Harshit Gupta
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
Dr Rajiv Srivastava
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
mohammedalimahdi
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
Tauseef khan
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)
SSGMCE SHEGAON
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
Jim Jenkins
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
Dr. Ghanshyam Singh
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
Inocentshuja Ahmad
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eadpeer
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
Farzad Nuseeb
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication system
Mohit Chimankar
 
FHSS
FHSSFHSS
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 
SPREAD SPECTRUM
SPREAD SPECTRUMSPREAD SPECTRUM
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
Himanshu Shekhar
 
Spread Spectrum System
Spread Spectrum SystemSpread Spectrum System
Spread Spectrum System
Deepak Chandra Pant
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
Rohit Choudhury
 

What's hot (20)

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhss
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9e
 
An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication system
 
FHSS
FHSSFHSS
FHSS
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
SPREAD SPECTRUM
SPREAD SPECTRUMSPREAD SPECTRUM
SPREAD SPECTRUM
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
 
Spread Spectrum System
Spread Spectrum SystemSpread Spectrum System
Spread Spectrum System
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 

Viewers also liked

Louise Cohen | CREATE YOUR OWN modular collection
Louise Cohen | CREATE YOUR OWN modular collectionLouise Cohen | CREATE YOUR OWN modular collection
Louise Cohen | CREATE YOUR OWN modular collection
polyvalent designer at www.louisecohen.nl
 
Chefs catalog coupon
Chefs catalog couponChefs catalog coupon
Chefs catalog couponMaterazzi3
 
Lost in elysium
Lost in elysiumLost in elysium
Lost in elysium
Jay Lee
 
Flat Technology Short Presentation
Flat Technology Short PresentationFlat Technology Short Presentation
Flat Technology Short Presentation
ab153
 
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
cloudcontroller
 
Altc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dhAltc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dhClaire B
 
Lesdag 3 ouderfactoren
Lesdag 3 ouderfactorenLesdag 3 ouderfactoren
Lesdag 3 ouderfactorenCVO-SSH
 
Social Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious KidSocial Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious Kid
My Precious Kid LLC
 
Lesdag 3 charles taylor michel foucault
Lesdag 3 charles taylor   michel foucaultLesdag 3 charles taylor   michel foucault
Lesdag 3 charles taylor michel foucaultCVO-SSH
 
Ir
IrIr
Pictures of students in sw 475
Pictures of students in sw 475Pictures of students in sw 475
Pictures of students in sw 475pegart
 
Zorg En Welzijn Projecten In Beeld
Zorg En Welzijn   Projecten In BeeldZorg En Welzijn   Projecten In Beeld
Zorg En Welzijn Projecten In BeeldClairtje01
 
Roberto espe 1 finanzas
Roberto espe 1 finanzasRoberto espe 1 finanzas
Roberto espe 1 finanzas
carlos0509
 
Roberto Llumiquinga
Roberto LlumiquingaRoberto Llumiquinga
Roberto Llumiquingacarlos0509
 
LCIA Training Section 1
LCIA Training Section 1LCIA Training Section 1
LCIA Training Section 1asriasky
 
Posscon 2011 Drupal Workshop
Posscon 2011 Drupal WorkshopPosscon 2011 Drupal Workshop
Posscon 2011 Drupal WorkshopOS Solutions
 
Magie sau fenta mishto?
Magie sau fenta mishto?Magie sau fenta mishto?
Magie sau fenta mishto?
Valentin Vesa
 
Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]CVO-SSH
 

Viewers also liked (20)

Louise Cohen | CREATE YOUR OWN modular collection
Louise Cohen | CREATE YOUR OWN modular collectionLouise Cohen | CREATE YOUR OWN modular collection
Louise Cohen | CREATE YOUR OWN modular collection
 
Chefs catalog coupon
Chefs catalog couponChefs catalog coupon
Chefs catalog coupon
 
Lost in elysium
Lost in elysiumLost in elysium
Lost in elysium
 
Flat Technology Short Presentation
Flat Technology Short PresentationFlat Technology Short Presentation
Flat Technology Short Presentation
 
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
How Edmodo Uses Splunk For Real-Time Tag-Based Reporting of AWS Billing and U...
 
Altc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dhAltc 2010 paper_0188_cb_dh
Altc 2010 paper_0188_cb_dh
 
Lesdag 3 ouderfactoren
Lesdag 3 ouderfactorenLesdag 3 ouderfactoren
Lesdag 3 ouderfactoren
 
Social Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious KidSocial Media By Kay Green, My Precious Kid
Social Media By Kay Green, My Precious Kid
 
Lesdag 3 charles taylor michel foucault
Lesdag 3 charles taylor   michel foucaultLesdag 3 charles taylor   michel foucault
Lesdag 3 charles taylor michel foucault
 
Stockholm shopping guide
Stockholm shopping guideStockholm shopping guide
Stockholm shopping guide
 
Sfe time robbers
Sfe time robbersSfe time robbers
Sfe time robbers
 
Ir
IrIr
Ir
 
Pictures of students in sw 475
Pictures of students in sw 475Pictures of students in sw 475
Pictures of students in sw 475
 
Zorg En Welzijn Projecten In Beeld
Zorg En Welzijn   Projecten In BeeldZorg En Welzijn   Projecten In Beeld
Zorg En Welzijn Projecten In Beeld
 
Roberto espe 1 finanzas
Roberto espe 1 finanzasRoberto espe 1 finanzas
Roberto espe 1 finanzas
 
Roberto Llumiquinga
Roberto LlumiquingaRoberto Llumiquinga
Roberto Llumiquinga
 
LCIA Training Section 1
LCIA Training Section 1LCIA Training Section 1
LCIA Training Section 1
 
Posscon 2011 Drupal Workshop
Posscon 2011 Drupal WorkshopPosscon 2011 Drupal Workshop
Posscon 2011 Drupal Workshop
 
Magie sau fenta mishto?
Magie sau fenta mishto?Magie sau fenta mishto?
Magie sau fenta mishto?
 
Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]Introductiedag 11 12 [compatibiliteitsmodus]
Introductiedag 11 12 [compatibiliteitsmodus]
 

Similar to Bar camp presentation

Spread Spectrum Modulation
Spread Spectrum ModulationSpread Spectrum Modulation
Spread Spectrum Modulation
Lipsa Dash
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
Deepika Patil
 
NoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalNoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalSiggi Finnsson
 
Wireless and mobile communication (09ab).pptx
Wireless and mobile communication (09ab).pptxWireless and mobile communication (09ab).pptx
Wireless and mobile communication (09ab).pptx
Imtiaz129004
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptx
DeepakBaghel50
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
Pritish kumawat
 
UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
Matrusri Engineering College
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
 
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Yuval Ron
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemesHira Shaukat
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
Prof. Dr. Noman Islam
 
AJAL ASC Chap2 revIew
AJAL ASC Chap2 revIewAJAL ASC Chap2 revIew
AJAL ASC Chap2 revIew
AJAL A J
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)
Abhishek Sainkar
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
raosg
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationshobanavsm
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
IJERA Editor
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
JPINFOTECH JAYAPRAKASH
 

Similar to Bar camp presentation (20)

Spread Spectrum Modulation
Spread Spectrum ModulationSpread Spectrum Modulation
Spread Spectrum Modulation
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
 
NoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalNoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 Final
 
Wireless and mobile communication (09ab).pptx
Wireless and mobile communication (09ab).pptxWireless and mobile communication (09ab).pptx
Wireless and mobile communication (09ab).pptx
 
SPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptxSPREAD SPECTRUM MODULATION.pptx
SPREAD SPECTRUM MODULATION.pptx
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
 
UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
Case study: Implementing a Personal Area Network MAC Protocol for Inaudible S...
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemes
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
AJAL ASC Chap2 revIew
AJAL ASC Chap2 revIewAJAL ASC Chap2 revIew
AJAL ASC Chap2 revIew
 
Signal and system (1)
Signal and system (1)Signal and system (1)
Signal and system (1)
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communication
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Wireless
WirelessWireless
Wireless
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 

More from Shai Levit

Business research for NETW_440 Network Architecture
Business research for NETW_440 Network ArchitectureBusiness research for NETW_440 Network Architecture
Business research for NETW_440 Network Architecture
Shai Levit
 
15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...
Shai Levit
 
Wire Framing
Wire FramingWire Framing
Wire Framing
Shai Levit
 
Psychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr SystemPsychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr System
Shai Levit
 

More from Shai Levit (6)

Business research for NETW_440 Network Architecture
Business research for NETW_440 Network ArchitectureBusiness research for NETW_440 Network Architecture
Business research for NETW_440 Network Architecture
 
15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...15min teaching demo for consideration as an adjunct professor at a local Univ...
15min teaching demo for consideration as an adjunct professor at a local Univ...
 
WSRM_WriteUp
WSRM_WriteUpWSRM_WriteUp
WSRM_WriteUp
 
Wire Framing
Wire FramingWire Framing
Wire Framing
 
Wire framing
Wire framingWire framing
Wire framing
 
Psychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr SystemPsychiatric Nurse Practitioners Emr System
Psychiatric Nurse Practitioners Emr System
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Bar camp presentation

  • 2. A QUICK INTRODUCTION OUTLINE OF THIS PRESENTATION ▸Components ▸Measurements ▸Communication / Signal ▸Security ▸Questions and/or Applause
  • 3. RADIO FREQUENCY CREATION HOW A SIGNAL IS CREATED1. Data is sent to the Transmitter, which creates the wireless medium. 2. Transmitter is responsible for the modulation of the signal (carrier signal) and the signal strength (Amplitude/Power). 3. The Antenna radiates the carrier signal in a pattern specific to the type of antenna and receive signals from air to propagate it back to the transmitter
  • 4. SIGNAL DEMYSTIFIED MEASUREMENTS ▸Equivalent Isotropic Radiated Power (EIRP) - Highest signal strength that is transmitted from a particular antenna. ▸Antennas tend to focus the RF signal, altering the effective output. ▸Decibel (dB) - a unit of comparison, NOT a unit of power. ▸identifies the difference between 2 values. ▸A relative expression and a measurement in change of power
  • 5. SIGNAL DEMYSTIFIED MEASUREMENTS CONTINUED ▸Decibel notations: ▸dBi (decibel isotropic) - comparison of an antenna to an isotropic radiator (think antenna gain). ▸dBd (decibel dipole) - comparison of an antenna to a dipole antenna (omnidirectional). ▸dBi = dBd + 3 ▸dBm - a signal comparison to 1 milliwatt of power.
  • 6. SIGNAL DEMYSTIFIED MEASUREMENTS MATH EXAMPLES ▸Problem: 2.4GHz AP transmitting at 100mW, Laptop is 100m (0.1Km) from AP. ▸Solution: Laptop receives 0.000001mW or if we use FSPL formula -> dB = 32.4 + (20log10(2400)) + (20log10(0.1)) or 80.004dB ~ 80dB of signal loss. ▸dBm: 0dBm = 1mW then what would 100mW be? ▸dBm = 10 X log10(PmW) or +20dBm ▸the reverse formula is: PmW = 10(dBm/10)
  • 7. RF SIGNAL UNDERSTANDING SOME KEY METHODS AND WAVE FUNCTIONS ▸Manipulation of signal is called Keying Method. ▸Aptitude Shift-Keying (ASK) ▸Frequency Shift-Keying (FSK) ▸Phase Shift-Keying (PSK)
  • 8. RF SIGNAL UNDERSTANDING SOME KEY METHODS AND WAVE FUNCTIONS ▸All RF signals will experience some type of degradation. ▸Absorption - loss of attenuation due to various materials ▸Reflection - diversion or bouncing of a signal ▸Scattering - multiple reflections of signal in various directions ▸Refraction - bending of a signal as it passes through a medium of different density. ▸Diffraction - bending of a signal around an object ▸Free Space Path Loss - loss of signal strength caused by natural broadening of the waves (Beam Divergence)
  • 9. SIGNAL PROPAGATION RF TRANSMISSION METHODS ▸Narrowband ▸uses very little bandwidth ▸more susceptible to interference and intentional jamming ▸Spread Spectrum ▸wide range of bandwidth ▸less susceptible to jamming and interference
  • 10.
  • 11. SIGNAL PROPAGATION TYPES OF SPREAD SPECTRUM ▸Frequency Hopping Spread Spectrum (FHSS) ▸Components: ▸Hopping sequence - predefined pattern of frequencies ▸Dwell time - measure of time of signal transmission ▸Hop time - measure of time between transmission signal change ▸Modulation (Gaussian Frequency Shift-Keying) GFSK
  • 13. SIGNAL PROPAGATION TYPES OF SPREAD SPECTRUM ▸Direct Sequence Spread Spectrum (DSSS) ▸Signal transmission is spread across the range of frequencies that make up that channel. ▸The process of spreading the data is known as: Data Encoding. ▸Modulation ▸Differential Binary Phase Shift-Keying (DBPSK) ▸Differential Quadrature Phase Shift-Keying (DQPSK)
  • 14. SIGNAL PROPAGATION ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) ▸Most popular and used in either 5GHz or 2.4GHz range ▸Looks like Spread Spectrum, but it uses subcarriers (52 separate closely and precisely spaced frequencies) ▸More resistant to ISI and negative effects from multi-path interference. ▸Utilizes harmonics overlap to cancel unwanted signals. ▸Modulation is BPSK or QPSK (at higher rates uses 16-QAM or 64-QAM).
  • 15. OFDM
  • 18. SECURITY THE CHALLENGE ▸Unauthorized access ▸open systems for customers and consumers ▸data and information is in the open and easy to view both in promiscuous mode and in attack mode ▸Rogue AP’s ▸redirect traffic ▸out-signal the original transmission
  • 19. CONNECTIVITY PROCESS OF GETTING CONNECTED ▸It’s a 4 step process 1. Authentication ‣ Open - no verification of identity (null authentication) ‣ Varied - open to join but data encrypted to outside ‣ Private - some type of encryption / shared key 2. Association ‣ becoming a part of the BSS
  • 20. SECURITY TYPES OF PROTECTION ▸Access Control ▸MAC address filtering ▸Restrictions ▸Encryption ▸Wireless Equivalent Protection (WEP) ▸Wi-Fi Protected Access (WPA) ▸Wi-Fi Protected Access v2 (WPA2) ▸SSID Cloaking
  • 21. SECURITY VULNERABILITIES AND ATTACKS ▸Leaving the Default access (Passwords, set-up) ▸open Authentication and/or Authorization ▸Use of SNMP-managed devices (Simple Network Management Protocol) in unsecured mode ▸Improper configuration of gateways, extenders, bridged devices, etc. ▸MAC Spoofing and MAC Layer Attacks ▸session hijacking, MITM, DoS and Disassociation(s)
  • 22. SECURITY ENCRYPTION TYPES AND DEFINITION ▸Static WEP ▸Layer 2 encryption using RC4 streaming cipher ▸64-bit and 128-bit encryption (24-bit IV) ▸Weakness ▸IV Collision attacks - 24-bit IV is in clear text and repeats itself after 16 million. ▸RC4 Key-scheduling Algorithm uses 24-bit IV ▸Reinjection Attack ▸Bit-Flip Attack - ICV considered weak and packet can be compromised
  • 23. SECURITY ENCRYPTION TYPES AND DEFINITION CONT. ▸Wi-Fi Protected Access (WPA) ▸Temporal Key Integrity Protocol (TKIP) - 40-bit encryption and 128-bit key. Generates keys dynamically for each packet, avoiding some collisions. ▸Message Integrity Check (MIC) - avoids the capturing, changing and resending the packets. Also uses the MIC as a seed for the mathematic encryption keys.
  • 24. SECURITY ENCRYPTION TYPES AND DEFINITION CONT. ▸Wi-Fi Protected Access 2 (WPA2) ▸Advanced Encryption Standard (AES) ▸AES-CCMP ▸Counter Mode with Cipher Block Chaining Authentication Code Protocol (CCMP) ▸Message Integrity Check (MIC) - avoids the capturing, changing and resending the packets. Also uses the MIC as a seed for the mathematic encryption keys.

Editor's Notes

  1. IR - FCC regulation on a device that intentionally generates and emits RF energy by radiation or induction.
  2. Why use Decibels as a measuring mechanism at all?