SlideShare a Scribd company logo
1 of 86
Prepared by:
Eng.Mohamed Attia A. Aref
Eng.Mohamed Hafez Hamed
Suez Canal University
Faculty of Engineering
Department of Electrical Engineering
(Communications and Electronics)
Presentation Outline
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
The term 'Wi-Fi’
It`s short for "wireless fidelity," however this is not the
case.
Wi-Fi is simply a trademarked term for any "wireless
local area network (WLAN) products that are based on
the (IEEE) 802.11 standards."
The Wi-Fi Alliance (WFA)
It`s a global, non-profit industry association of more
than 300 member companies that owns and controls
the Wi-FI CERTIFIED logo, a registered trademark.
The Wi-Fi Alliance (WFA)
the Wi-Fi Alliance’s testing and certification programs
help ensure the interoperability of WLAN products
based on the IEEE 802.11 specification.
Any products that are tested and approved as "Wi-Fi
Certified" (a registered trademark) by the Wi-Fi
Alliance are certified as interoperable with each other,
even if they are from different manufacturers
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
What is Wi-Fi?
Wi-Fi is the basic standard for Wireless Internet access
technology
It`s primarily used to create a Local Area Network (LAN),
which allows users within the network to connect
wirelessly.
It uses high frequency radio signals to transmit and
receive data over distances of a few hundred meters
It operates at frequencies of 2.4 GHz or 5 GHz
It use 802.11 networking standards
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
Elements of a WI-FI Network
Access Point (AP) - The AP is a wireless LAN
transceiver or “base station” that can connect one or many
wireless devices simultaneously to the Internet.
Elements of a WI-FI Network
Wi-Fi cards(Wi-Fi network adapter) - They
accept the wireless signal and relay information. They can
be internal and external. (e.g. PCMCIA Card for Laptop
and PCI Card for Desktop PC)
How a Wi-Fi Network Works
• A Wi-Fi hotspot is created by installing an access point (or
several access points )to an internet connection.
• An access point acts as a base station.
• When Wi-Fi enabled device encounters a hotspot the device
can then connect to that network wirelessly.
• A single access point can support up to 30 users and can
function within a range of 100 – 150 feet indoors and up to
300 feet outdoors.
• Many access points can be connected to each other via
Ethernet cables to create a single large network.
Do I need any license to use
802.11 device ?
 No , 2.4 GHz and 5.0 GHz are public
available frequency !!!
Network Topologies
• AP-based topology (Infrastructure Mode)
• Peer-to-peer topology (Ad-hoc Mode)
• Point-to-multipoint bridge topology
AP-based topology
Peer-to-peer topology (Ad-hoc Mode)
Point-to-multipoint bridge topology
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
Wi-Fi Standards
802.11
IEEE created the first WLAN standard in 1997. They
called it 802.11.
It works in radio signaling frequency - 2.4 GHz
only supported a maximum bandwidth of 2 Mbps - too
slow for most applications.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
802.11
The standard: Positioning
802.11 architecture
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
802.11 frame format
Frame Control field
Protocol Version field:
2 bits indicate which version of 802.11 Mac is
contained in the rest of frame
Type& Subtype field:
-The Type and Subtype fields together identify the
function of the frame.
- There are three frame types: control, data, and
management.
-Each of the frame types has several defined subtypes.
Control
Which are used to control access to the medium (e.g.
ACK,RTS,CTS and Power Save …)
Management
Which are transmitted the same as data frames to exchange
management information (e.g. Beacon, Probe Request ,Probe
Response, Association request , Association response …)
Data
Which are used for data transmission
(e.g. Data, Null Data, Data_CF_Ack , ….)
Subtype
description
Subtype value
b7 b6 b5 b4
Type
description
Type value
b3 b2
Association
request
0000 Management 00
Probe request 0100 Management 00
Beacon 1000 Management 00
RTS 1011 Control 01
CTS 1100 Control 01
ACK 1101 Control 01
Null (no data) 0100 Data 10
ToDS field:
When bit is set indicate that destination frame is for DS
FromDS field:
When bit is set indicate frame coming from DS
More fragment field:
It is set to 1 in all data or management type frames that have
another fragment of the current to follow. It is set to 0 in all other frames.
Retry field:
Any retransmitted frames set this bit to 1 to aid the receiving station
in eliminating duplicate frames.
Power management field:
It is used to indicate the power management mode of the
station(power save/active).
More Data field:
When set means that AP have more buffered data for a
station in Power Save mode
WEP field:
When set indicate that in the Frame Body field there are
data needs to processed by WEP(wired equivalent
privacy) algorithm.
Order(Rsvd) field:
It is set when frames and fragment is being transferred
using the Strictly Ordered service class.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
802.11b
Released in July 1999
• Operates at 2.4GHz radio spectrum
It support four possible data rates: 1 Mbps, 2 Mbps,
5.5 Mbps, and 11 Mbps.
802.11b
• 100 -175 feet range
• Most popular, Least Expensive
Based on DSSS procedure
Compatible with IEEE802.11 DSSS standard
Interference from mobile phones and Bluetooth
devices which can reduce the transmission speed.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
802.11a
802.11a was created at the same time of 802.11b
Operates at 5 GHz to provide higher bandwidth
supports bandwidth of 6 to 54 Mbps
802.11a
50-80 feet range
More expensive
based on an Orthogonal Frequency Division Multiplex
(OFDM) procedure
Not compatible with 802.11b
Due to their relatively high costs the major
applications are in the LAN-to-LAN link area where the
bandwidth requirements are highest
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
802.11g
It released in In 2002 and 2003
802.11g attempts to combine the best of both 802.11a and
802.11b
it uses the 2.4 GHz frequency for greater range
802.11g supports data rate up to 54 Mbps
100-150 feet range
802.11g is backwards compatible with 802.11b, meaning
that 802.11g access points will work with 802.11b
wireless network adapters and vice versa.
802.11g 802.11a 802.11b
2.4 GHz 5.8 GHz 2.4 GHz
Operating
Frequency
54Mbps up to 54Mbps 1, 2, 5.5, 11Mbps
Transfer Rate
(theoretical)
20 - 30 Mbps (average) 20 - 36 Mbps (average) 4Mbps (average) Transfer Rate
(throughput)
Complimentary Code
Keying (CCK), OFDM
Orthogonal Frequency
Division Multiplexing
(OFDM)
Direct Sequence Spread
Spectrum (DSSS)
Mechanism
3 (1, 6, 11) 12 (all non-overlapping) 11 (3 non-overlapping)
Channels
Available
175ft. 80ft. 175ft. Maximum
Range
Other 2.4GHz devices,
like cordless phones,
may disrupt connection
Not compatible with
802.11b, 802.11g
Other 2.4GHz devices,
like cordless phones,
may disrupt connection
Compatibility
802.11g 802.11a 802.11b
• fastest maximum speed
• supports more
simultaneous users
• Faster than 802.11b and
better range than
802.11a
• signal range is best and
is not easily obstructed
• fastest maximum speed
• supports more
simultaneous users
• regulated frequencies
prevent signal
interference from other
devices
• provide more bandwidth
• lowest cost
• signal range is best
and is not easily
obstructed
Advantages
• costs more than
802.11b
• appliances may
interfere on the
unregulated signal
frequency
• Less range than 802.11b
• Not as widely
implemented
• highest cost
• shorter range signal that
is more easily obstructed
• slowest maximum
speed
• supports fewer
simultaneous
users
• appliances may
interfere on the
unregulated
frequency band
Disadvantages
Laptop computers Laptop computers,
PDAs, cell phones
Laptop computers,
PDAs, cell phones
Devices
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
I. Data interception
Is the practice of listening in on the
transmissions of various wireless
network users.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
II. Network intrusion(Cracking)
An unsecured wireless network gives
hackers the perfect gateway to an business
or organization's internal network.
the hacker steal or destroy information on
the network instead of free Internet access.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
III.Radio jamming
means sending out radio signals so as to
interfere with traffic.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
IV.Denial of service
attacks make the network unusable by
sending out false requests.
The 802.11 standard's network access
method is based on the CSMA/CA protocol
 CSMA/CA access method
every machine is free to communicate at
any given time
The station that wants to transmit listens to
the network.
IV.Denial of service
I. The station transmits a "Ready To Send " message
(containing information on the amount of data that it wishes to
send, and its transmission speed.
III. The receiver (generally an access point) responds with a
"Clear To Send" message (CTS), and then the station starts
sending data.
V. When all the data sent by the station has been received, the
receiver sends an acknowledgement notice (ACK).
 CSMA/CA access method
A hacker sent packets requesting for a
station to become disassociated from the
network.
This false requests make the network
unusable
IV.Denial of service
 So,What Are The Solutions For
Wireless Network Security ?
 Are This Solutions Effective?
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
SOLUTION #1
Disable SSID Broadcast
the wireless access point or router
typically broadcasts the network name
SSID (Service Set Identifier)over the air.
The purpose of the SSID is to broadcast
the availability of the wireless network
and invite devices within range of the
signal to connect.
Disable SSID Broadcast
S.#1
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
SOLUTION #2
Mac Address Filtering
MAC address ?
MAC address
Media Access Control address.
A unique hardware number that identifies
each device on a network. A device can be a
computer, printer,
S.#2
Mac Address Filtering
• Give my access point a list of allowed clients by
their Mac Address…
• allows only machines with specific MAC
addresses to access the network.
S.#2
Are This Solution Effective?
• The MAC address is the front of every packet
sent, Anyone with packet sniffing (network
monitor) software instantly sees all the
authorized MAC addresses for the wireless
network. They capture even one packet,
they've got the MAC address that they can
spoof.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
SOLUTION #3
Encryption
Encryption
Turn on encryption to scramble your data!
 Two common options for
encryption:
 WEP
WPA / WPA2
S.#3
Encryption
 Two common options for
encryption:
 WEP
 WPA / WPA2
S.#3
Wired Equivalent Privacy (WEP)
Is a security protocol, specified in the IEEE
Wireless Fidelity (Wi-Fi) standard, 802.11b, that
is designed to provide a wireless local area
network (WLAN) with a level of security and
privacy comparable to what is usually expected
of a wired LAN.
WEP uses the stream cipher RC4
S.#3
Standard 64-bit WEP uses a 40 bit key which is
concatenated with a 24-bit initialization vector
(IV) to form the RC4 traffic key
RC4 keystream XORed with plaintext
Wired Equivalent Privacy (WEP)
S.#3
WEP Encryption / Decryption
Are This Solutions Effective?
A WEP connection can be cracked with
readily available software within minutes.
Thus WEP is broken!!!
WEP Encryption Continued…
• Most systems that support encryption will
support WEP…
• People still might use it because of the lack of
hardware support for other encryptions
• WEP is better than an open access point
Encryption
 Two common options for
encryption:
 WEP
 WPA / WPA2
S.#3
• WPA / WPA2 is the other type of encryption
• WPA (Wi-Fi Protected Access)
• WPA uses TKIP (Temporal Key Integrity
Protocol) along with RC4 encryption which
changes the key often enough to make it secure
Wi-Fi Protected Access (WPA)
WPA Encryption Continued…
• WPA2 uses AES (Advanced Encryption
Standard)encryption it doesn't use the RC4
encryption
• WPA2 is a more industrial strength form of WPA
encryption it uses AES encryption
• AES is much more hardware and processor
intensive and so relatively newer hardware will
only be able to run WPA2
Solutions to “open” WiFi
WPA Encryption Keys…
• With WPA we either have:
• A static, pre-shared key or
• Keys which are being assigned by a centralized
server to receive a key users authenticate
themselves with their own password and
credentials.
Solutions to “open” WiFi
WPA Encryption Keys…
• WPA in the home environment:
• It is mostly the case that you’ll be using a single
pre-shared key, which is completely safe as long as
the passphrase that generates the key is safe up to
63 characters long!
Solutions to “open” WiFi
WPA Encryption Keys…
Example of a bad passphrase:
2everybody0canhavea0ccesstomywifi7
Example of a good passphrase:
oU[z[@=5UV)L5K- PXg^Sl(X>bD}%M3k
gjLTX(S6]YVd+7;Q^pN?TM)m.)'{x#s%
WPA Encryption Continued…
• How to deal with older hardware:
• Older hardware, which is not as strong, will tend
to be using the RC4 encryption
• RC4 has been made safe by changing its keys all
the time using TKIP, the Temporal Key Integrity
Protocol.
• TKIP makes RC4 safe where it wasn't safe before
in WEP legacy-style encryption.
So in Summary …
• Newer hardware that is stronger might be capable of
using a different cryptography technology called AES.
• The lowest common denominator will be WPA with a
pre-shared key using TKIP technology encryption, which
drives RC4.
Outlines
1. Definitions
2. What is Wi-Fi?
3. Wi-Fi Network
4. Wi-Fi standards
* 802.11
Standard Position
Standard Architecture
Frame Format
* 802.11b
* 802.11a
* 802.11g
5. Security risks
I. Data interception
III. Network intrusion
V. Radio jamming
VII. Denial of service
6. Security Solutions
I. Solution # 1
II. Solution # 2
III. Solution # 3
7. WI-FI&WIMAX comparison
WI-FI&WIMAX comparison
END

More Related Content

What's hot (20)

Wi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE ConceptWi fi - Technology @ IEEE Concept
Wi fi - Technology @ IEEE Concept
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
wifi ppt
wifi pptwifi ppt
wifi ppt
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
WIFI[autosaved]
WIFI[autosaved]WIFI[autosaved]
WIFI[autosaved]
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
wi-fi ppt
wi-fi pptwi-fi ppt
wi-fi ppt
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
Wifi technology
Wifi technologyWifi technology
Wifi technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wi-Fi Evolution
Wi-Fi EvolutionWi-Fi Evolution
Wi-Fi Evolution
 

Similar to WIFI Technology

Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi ArchitectureArnab Ghosal
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Zameer Abdul Azeez Mulla
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifiAnil Pokhrel
 
Brief introduction of wi max technology
Brief introduction of wi max technologyBrief introduction of wi max technology
Brief introduction of wi max technologyMd. Tamim Haider
 
The In-Depth Knowledge about Technology 802.pptx
The In-Depth Knowledge about Technology 802.pptxThe In-Depth Knowledge about Technology 802.pptx
The In-Depth Knowledge about Technology 802.pptxmamtachhetri191
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimaxRubab Fatima
 

Similar to WIFI Technology (20)

Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Wi-Fi Architecture
Wi-Fi ArchitectureWi-Fi Architecture
Wi-Fi Architecture
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Capitulo 5
Capitulo 5Capitulo 5
Capitulo 5
 
Wi fi
Wi fiWi fi
Wi fi
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wi-Fi and Wi-max
Wi-Fi and Wi-maxWi-Fi and Wi-max
Wi-Fi and Wi-max
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
Brief introduction of wi max technology
Brief introduction of wi max technologyBrief introduction of wi max technology
Brief introduction of wi max technology
 
The In-Depth Knowledge about Technology 802.pptx
The In-Depth Knowledge about Technology 802.pptxThe In-Depth Knowledge about Technology 802.pptx
The In-Depth Knowledge about Technology 802.pptx
 
Presentation of-wimax
Presentation of-wimaxPresentation of-wimax
Presentation of-wimax
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

WIFI Technology

  • 1. Prepared by: Eng.Mohamed Attia A. Aref Eng.Mohamed Hafez Hamed Suez Canal University Faculty of Engineering Department of Electrical Engineering (Communications and Electronics)
  • 2. Presentation Outline 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 3. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 4. The term 'Wi-Fi’ It`s short for "wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked term for any "wireless local area network (WLAN) products that are based on the (IEEE) 802.11 standards."
  • 5. The Wi-Fi Alliance (WFA) It`s a global, non-profit industry association of more than 300 member companies that owns and controls the Wi-FI CERTIFIED logo, a registered trademark.
  • 6. The Wi-Fi Alliance (WFA) the Wi-Fi Alliance’s testing and certification programs help ensure the interoperability of WLAN products based on the IEEE 802.11 specification. Any products that are tested and approved as "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are certified as interoperable with each other, even if they are from different manufacturers
  • 7. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 8. What is Wi-Fi? Wi-Fi is the basic standard for Wireless Internet access technology It`s primarily used to create a Local Area Network (LAN), which allows users within the network to connect wirelessly. It uses high frequency radio signals to transmit and receive data over distances of a few hundred meters It operates at frequencies of 2.4 GHz or 5 GHz It use 802.11 networking standards
  • 9. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 10. Elements of a WI-FI Network Access Point (AP) - The AP is a wireless LAN transceiver or “base station” that can connect one or many wireless devices simultaneously to the Internet.
  • 11. Elements of a WI-FI Network Wi-Fi cards(Wi-Fi network adapter) - They accept the wireless signal and relay information. They can be internal and external. (e.g. PCMCIA Card for Laptop and PCI Card for Desktop PC)
  • 12. How a Wi-Fi Network Works • A Wi-Fi hotspot is created by installing an access point (or several access points )to an internet connection. • An access point acts as a base station. • When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. • A single access point can support up to 30 users and can function within a range of 100 – 150 feet indoors and up to 300 feet outdoors. • Many access points can be connected to each other via Ethernet cables to create a single large network.
  • 13.
  • 14.
  • 15. Do I need any license to use 802.11 device ?  No , 2.4 GHz and 5.0 GHz are public available frequency !!!
  • 16. Network Topologies • AP-based topology (Infrastructure Mode) • Peer-to-peer topology (Ad-hoc Mode) • Point-to-multipoint bridge topology
  • 20. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 22. 802.11 IEEE created the first WLAN standard in 1997. They called it 802.11. It works in radio signaling frequency - 2.4 GHz only supported a maximum bandwidth of 2 Mbps - too slow for most applications.
  • 23. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 26. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 28. Frame Control field Protocol Version field: 2 bits indicate which version of 802.11 Mac is contained in the rest of frame
  • 29. Type& Subtype field: -The Type and Subtype fields together identify the function of the frame. - There are three frame types: control, data, and management. -Each of the frame types has several defined subtypes.
  • 30. Control Which are used to control access to the medium (e.g. ACK,RTS,CTS and Power Save …) Management Which are transmitted the same as data frames to exchange management information (e.g. Beacon, Probe Request ,Probe Response, Association request , Association response …) Data Which are used for data transmission (e.g. Data, Null Data, Data_CF_Ack , ….)
  • 31. Subtype description Subtype value b7 b6 b5 b4 Type description Type value b3 b2 Association request 0000 Management 00 Probe request 0100 Management 00 Beacon 1000 Management 00 RTS 1011 Control 01 CTS 1100 Control 01 ACK 1101 Control 01 Null (no data) 0100 Data 10
  • 32. ToDS field: When bit is set indicate that destination frame is for DS FromDS field: When bit is set indicate frame coming from DS More fragment field: It is set to 1 in all data or management type frames that have another fragment of the current to follow. It is set to 0 in all other frames.
  • 33. Retry field: Any retransmitted frames set this bit to 1 to aid the receiving station in eliminating duplicate frames. Power management field: It is used to indicate the power management mode of the station(power save/active). More Data field: When set means that AP have more buffered data for a station in Power Save mode
  • 34. WEP field: When set indicate that in the Frame Body field there are data needs to processed by WEP(wired equivalent privacy) algorithm. Order(Rsvd) field: It is set when frames and fragment is being transferred using the Strictly Ordered service class.
  • 35. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 36. 802.11b Released in July 1999 • Operates at 2.4GHz radio spectrum It support four possible data rates: 1 Mbps, 2 Mbps, 5.5 Mbps, and 11 Mbps.
  • 37. 802.11b • 100 -175 feet range • Most popular, Least Expensive Based on DSSS procedure Compatible with IEEE802.11 DSSS standard Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.
  • 38. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 39. 802.11a 802.11a was created at the same time of 802.11b Operates at 5 GHz to provide higher bandwidth supports bandwidth of 6 to 54 Mbps
  • 40. 802.11a 50-80 feet range More expensive based on an Orthogonal Frequency Division Multiplex (OFDM) procedure Not compatible with 802.11b Due to their relatively high costs the major applications are in the LAN-to-LAN link area where the bandwidth requirements are highest
  • 41. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 42. 802.11g It released in In 2002 and 2003 802.11g attempts to combine the best of both 802.11a and 802.11b it uses the 2.4 GHz frequency for greater range 802.11g supports data rate up to 54 Mbps 100-150 feet range 802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa.
  • 43. 802.11g 802.11a 802.11b 2.4 GHz 5.8 GHz 2.4 GHz Operating Frequency 54Mbps up to 54Mbps 1, 2, 5.5, 11Mbps Transfer Rate (theoretical) 20 - 30 Mbps (average) 20 - 36 Mbps (average) 4Mbps (average) Transfer Rate (throughput) Complimentary Code Keying (CCK), OFDM Orthogonal Frequency Division Multiplexing (OFDM) Direct Sequence Spread Spectrum (DSSS) Mechanism 3 (1, 6, 11) 12 (all non-overlapping) 11 (3 non-overlapping) Channels Available 175ft. 80ft. 175ft. Maximum Range Other 2.4GHz devices, like cordless phones, may disrupt connection Not compatible with 802.11b, 802.11g Other 2.4GHz devices, like cordless phones, may disrupt connection Compatibility
  • 44. 802.11g 802.11a 802.11b • fastest maximum speed • supports more simultaneous users • Faster than 802.11b and better range than 802.11a • signal range is best and is not easily obstructed • fastest maximum speed • supports more simultaneous users • regulated frequencies prevent signal interference from other devices • provide more bandwidth • lowest cost • signal range is best and is not easily obstructed Advantages • costs more than 802.11b • appliances may interfere on the unregulated signal frequency • Less range than 802.11b • Not as widely implemented • highest cost • shorter range signal that is more easily obstructed • slowest maximum speed • supports fewer simultaneous users • appliances may interfere on the unregulated frequency band Disadvantages Laptop computers Laptop computers, PDAs, cell phones Laptop computers, PDAs, cell phones Devices
  • 45. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 46. I. Data interception Is the practice of listening in on the transmissions of various wireless network users.
  • 47. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 48. II. Network intrusion(Cracking) An unsecured wireless network gives hackers the perfect gateway to an business or organization's internal network. the hacker steal or destroy information on the network instead of free Internet access.
  • 49. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 50. III.Radio jamming means sending out radio signals so as to interfere with traffic.
  • 51. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 52. IV.Denial of service attacks make the network unusable by sending out false requests. The 802.11 standard's network access method is based on the CSMA/CA protocol
  • 53.  CSMA/CA access method every machine is free to communicate at any given time The station that wants to transmit listens to the network. IV.Denial of service
  • 54. I. The station transmits a "Ready To Send " message (containing information on the amount of data that it wishes to send, and its transmission speed. III. The receiver (generally an access point) responds with a "Clear To Send" message (CTS), and then the station starts sending data. V. When all the data sent by the station has been received, the receiver sends an acknowledgement notice (ACK).  CSMA/CA access method
  • 55.
  • 56. A hacker sent packets requesting for a station to become disassociated from the network. This false requests make the network unusable IV.Denial of service
  • 57.  So,What Are The Solutions For Wireless Network Security ?  Are This Solutions Effective?
  • 58. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 60. the wireless access point or router typically broadcasts the network name SSID (Service Set Identifier)over the air. The purpose of the SSID is to broadcast the availability of the wireless network and invite devices within range of the signal to connect. Disable SSID Broadcast S.#1
  • 61. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 63. MAC address ? MAC address Media Access Control address. A unique hardware number that identifies each device on a network. A device can be a computer, printer, S.#2
  • 64. Mac Address Filtering • Give my access point a list of allowed clients by their Mac Address… • allows only machines with specific MAC addresses to access the network. S.#2
  • 65. Are This Solution Effective? • The MAC address is the front of every packet sent, Anyone with packet sniffing (network monitor) software instantly sees all the authorized MAC addresses for the wireless network. They capture even one packet, they've got the MAC address that they can spoof.
  • 66. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 68. Encryption Turn on encryption to scramble your data!  Two common options for encryption:  WEP WPA / WPA2 S.#3
  • 69. Encryption  Two common options for encryption:  WEP  WPA / WPA2 S.#3
  • 70. Wired Equivalent Privacy (WEP) Is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. WEP uses the stream cipher RC4 S.#3
  • 71. Standard 64-bit WEP uses a 40 bit key which is concatenated with a 24-bit initialization vector (IV) to form the RC4 traffic key RC4 keystream XORed with plaintext Wired Equivalent Privacy (WEP) S.#3
  • 72. WEP Encryption / Decryption
  • 73.
  • 74. Are This Solutions Effective? A WEP connection can be cracked with readily available software within minutes. Thus WEP is broken!!!
  • 75. WEP Encryption Continued… • Most systems that support encryption will support WEP… • People still might use it because of the lack of hardware support for other encryptions • WEP is better than an open access point
  • 76. Encryption  Two common options for encryption:  WEP  WPA / WPA2 S.#3
  • 77. • WPA / WPA2 is the other type of encryption • WPA (Wi-Fi Protected Access) • WPA uses TKIP (Temporal Key Integrity Protocol) along with RC4 encryption which changes the key often enough to make it secure Wi-Fi Protected Access (WPA)
  • 78. WPA Encryption Continued… • WPA2 uses AES (Advanced Encryption Standard)encryption it doesn't use the RC4 encryption • WPA2 is a more industrial strength form of WPA encryption it uses AES encryption • AES is much more hardware and processor intensive and so relatively newer hardware will only be able to run WPA2
  • 79. Solutions to “open” WiFi WPA Encryption Keys… • With WPA we either have: • A static, pre-shared key or • Keys which are being assigned by a centralized server to receive a key users authenticate themselves with their own password and credentials.
  • 80. Solutions to “open” WiFi WPA Encryption Keys… • WPA in the home environment: • It is mostly the case that you’ll be using a single pre-shared key, which is completely safe as long as the passphrase that generates the key is safe up to 63 characters long!
  • 81. Solutions to “open” WiFi WPA Encryption Keys… Example of a bad passphrase: 2everybody0canhavea0ccesstomywifi7 Example of a good passphrase: oU[z[@=5UV)L5K- PXg^Sl(X>bD}%M3k gjLTX(S6]YVd+7;Q^pN?TM)m.)'{x#s%
  • 82. WPA Encryption Continued… • How to deal with older hardware: • Older hardware, which is not as strong, will tend to be using the RC4 encryption • RC4 has been made safe by changing its keys all the time using TKIP, the Temporal Key Integrity Protocol. • TKIP makes RC4 safe where it wasn't safe before in WEP legacy-style encryption.
  • 83. So in Summary … • Newer hardware that is stronger might be capable of using a different cryptography technology called AES. • The lowest common denominator will be WPA with a pre-shared key using TKIP technology encryption, which drives RC4.
  • 84. Outlines 1. Definitions 2. What is Wi-Fi? 3. Wi-Fi Network 4. Wi-Fi standards * 802.11 Standard Position Standard Architecture Frame Format * 802.11b * 802.11a * 802.11g 5. Security risks I. Data interception III. Network intrusion V. Radio jamming VII. Denial of service 6. Security Solutions I. Solution # 1 II. Solution # 2 III. Solution # 3 7. WI-FI&WIMAX comparison
  • 86. END

Editor's Notes

  1. <number>