This document discusses wireless network security. It outlines uses and benefits of wireless networks, but also security issues like war driving and rogue networks. It evaluates potential security solutions like MAC address filtering, changing the SSID, and WEP encryption. However, it concludes that while wireless networks are convenient, current security measures are insufficient for sensitive environments given vulnerabilities like WEP attacks and the sharing of encryption keys across networks. Improved security is needed as wireless adoption increases.
Uses
ď‚— Key driversare mobility and accessibility
ď‚— Easily change work locations in the office
ď‚— Internet access at airports, cafes, conferences, etc.
4.
Benefits
ď‚— Increased productivity
ď‚—Improved collaboration
ď‚— No need to reconnect to the network
ď‚— Ability to work in more areas
ď‚— Reduced costs
ď‚— No need to wire hard-to-reach areas
5.
Security Issues andSolutions
ď‚— Sniffing and War Driving
ď‚— Rogue Networks
ď‚— Policy Management
ď‚— MAC Address
ď‚— SSID
ď‚— WEP
6.
War Driving
ď‚— Defaultinstallation allow any wireless NIC to access
the network
ď‚— Drive around (or walk) and gain access to wireless
networks
ď‚— Provides direct access behind the firewall
ď‚— Heard reports of an 8 mile range using a 24dB gain
parabolic dish antenna.
7.
Rogue Networks
ď‚— Networkusers often set up rogue wireless LANs to
simplify their lives
ď‚— Rarely implement security measures
ď‚— Network is vulnerable to War Driving and sniffing and
you may not even know it
8.
Policy Management
ď‚— Accessis binary
ď‚— Full network access or no network access
ď‚— Need means of identifying and enforcing access
policies
9.
MAC Address
ď‚— Cancontrol access by allowing only defined MAC
addresses to connect to the network
ď‚— This address can be spoofed
ď‚— Must compile, maintain, and distribute a list of valid
MAC addresses to each access point
ď‚— Not a valid solution for public applications
10.
Service Set ID(SSID)
ď‚— SSID is the network name for a wireless network
 WLAN products common defaults: “101” for 3COM
and “tsunami” for Cisco
ď‚— Can be required to specifically request the access
point by name (lets SSID act as a password)
ď‚— The more people that know the SSID, the higher
the likelihood it will be misused.
ď‚— Changing the SSID requires communicating the
change to all users of the network
11.
Wired Equivalent Privacy(WEP)
ď‚— Designed to be computationally efficient, self-
synchronizing, and exportable
ď‚— Vulnerable to attack
ď‚— Passive attacks to decrypt traffic based on statistical analysis
ď‚— Active attacks to inject new traffic from unauthorized mobile
stations, based on known plaintext
 Dictionary-building attack that, after analysis of a day’s worth of
traffic, allows real-time automated decryption of all traffic
ď‚— All users of a given access point share the same encryption
key
ď‚— Data headers remain unencrypted so anyone can see the
source and destination of the data stream
12.
Conclusion
ď‚— Wireless LANsvery useful and convenient, but current
security state not ideal for sensitive environments.
ď‚— Cahners In-Stat group predicts the market for wireless
LANs will be $2.2 billion in 2004, up from $771 million
in 2000.
ď‚— Growing use and popularity require increased focus on
security