Question

In: Computer Science

Why is anonymity different in TWN and WLAN? Why is WEP an ideal candidate for an...

Why is anonymity different in TWN and WLAN?

Why is WEP an ideal candidate for an FMS attack?

Solutions

Expert Solution

Wireless networks have become common place in the past several years in homes and offices.
Wireless networks have had a significant impact in our society by enabling:
• Individuals to transport laptops and other devices to and from meetings in office
buildings, increasing employee productivity.
• Devices within close range to synchronize without a physical connection.
• Mobile users to receive email, text messages, etc. while on the move.
• Connection to the internet, throughout a home, without the time consuming and difficult
task of running cable through the structure of the home.
There are several different sets of communication standards, enabling wireless networking in
these different scenarios, for different types of devices. In the home and office, laptops utilize
Wireless Local Area Network (WLAN) technologies to connect to wired networks, experiencing
the full capabilities of network and internet access. Devices may synchronize themselves over
very short ranges to other devices or networked desktops, using the Bluetooth standard. Mobile
devices like smart phones and personal digital assistants (PDAs) communicate, using cellular
technology. In this document, we have chosen to limit our discussion to the first type of wireless
technology, the Wireless Local Area Network (WLAN) technologies.
We begin or discussion of WLAN technologies in Section 2 by discussing the functionality and
current standards that apply to WLANs. Once this foundation has been laid, we describe the
vulnerabilities of these networks in Section 3. In Section 4, we explain how, when a network is
vulnerable, you can detect that it is under attack. In Section 5, the possible defenses for attacksdiscussed. In Section 6, legal implications, which may help mitigate attacks are explored.
Finally, we close in Section 6, looking to the future of WLANs.The Wired Equivalent Privacy (WEP) standard was introduced with the 802.11 standards,
but by 2001 a number of weaknesses had been discovered in the standard, leading to the
adoption of new standards (WPA). The cryptographic weakness in WEP was, in part,
intentional. At the time of WEP’s introduction, cryptographic keys for export to
international markets was limited to 40 bit keys. To further compound the weakness
presented by short keys, the WEP standard uses a single, static shared key without a
dynamic key update method. Some WEP implementations include longer keys of 128,
152, or 256 bits, but these are non-standard and therefore incompatible.
2.2.2.WiFi Protected Access (WPA)
The WiFi Protected Access (WPA) standard, addresses all deficiencies found in the WEP
standard. This standard was introduced by the WiFi Alliance in 2003 to bridge the
security gaps of WEP8
, prior to the formal adoption of the 802.11i (WPA2) standard.
WPA is a subset of the 802.11i standard (WPA2). The WPA security standard is designed
to secure all versions of 802.11 devices, including 802.11a, 802.11b and 802.11g,
described above.
WPA can frequently be installed on WiFi certified devices as a software upgrade. Access
Points (AP) require a software upgrade. Client workstations require a software upgrade
to their network interface card (NIC) and possibly an additional upgrade to their
operating system (OS). Enterprises may choose to use a Remote Authentication Dial-In
User Service (RADIUS) authentication server. In homes, by utilizing a shared password
mode, users may avoid the additional setup and support of a RADIUS authentication
server.WPA supports a strong encryption algorithm and user authentication. The WPA standard
employs Temporal Key Integrity Protocol (TKIP) for encryption, using 128 bit keys that
are dynamically generated.
In a corporate environment, keys are generated leveraging the 802.1X authentication
protocol with Extensible Authentication Protocol (EAP). The 802.1X protocol, adopted
by the IEEE in August of 2001, is a network access control method used on both wired
and wireless networks. The 802.1X protocol’s use of EAP, enables the support of a
variety of user credential types, including username/password, smart cards, secure IDs, or
any other type of user identification. Clients and Access Points (AP) authenticate against
the RADIUS server which validates client access to the network, as well as, enabling
connected clients to know they are talking to valid APs once they are on the network.
In a home environment, “pre-shared keys” (PSK) or passwords are used to provide TKIP
encryption.
In the WPA standard, if enterprise security is employed, a user supplies credentials to the
RADIUS server which authenticates the user, or if enterprise security is NOT employed,
supplies a manually entered password on the client device and Access Point. Once a user
is authenticated, a unique master or “pair-wise” key is created for the session. TKIP
distributes the key to the client and Access Point (AP), using the pair-wise key to
generate unique data encryption keys to encrypt every data packet that is sent during the
session. A Message Integrity Check (MIC), when enterprise security (RADIUS) is
employed, prevents a “man in the middle” alteration of packets by requiring both the
sender and receiver to compute and compare the MIC, assuming an attack and discarding
the packet if the MIC doesn’t match.4.3. WLAN Scanners
Two tools that appear to be most commonly used by hobbyists and WarDrivers are Net
Stumbler and Kismet23. Net Stumbler appears to be the most popular scanner used on
Microsoft Windows. Net Stumbler works by sending 802.11 probes that actively scan by
sending out requests every second and reporting on the responses. AP’s by default, respond to
these probes, but can be configured not to and to stay silent. We installed Net Stumbler on a
Windows XP machine and captured signal strengths at a coffee shop in Seattle.
Figure 1: Available Networks in range Figure 2: Signal Strength for the "victrola"
network
Net Stumbler also has integrated support for a GPS unit allowing a WarDriver to easily build
a wireless hot-spot map. As a bit of a social experiment we drove about the Capitol Hill


Related Solutions

Market yourself to a potential employer by convincing them you are an ideal candidate for a...
Market yourself to a potential employer by convincing them you are an ideal candidate for a position. Demonstrate your understanding of the related duties and responsibilities, explain your suitability, and describe the benefits of employing you. Although it doesn't necessarily have to be a position that's currently posted, the job should be one you aspire to hold after graduation (or as a step up from your current post).  
1.-Define the combustor loading parameter. Why is the exponential factor different to ideal scenario?
1.-Define the combustor loading parameter. Why is the exponential factor different to ideal scenario?
Why is Daphne Major an ideal study site AND the birds an ideal subject?
Why is Daphne Major an ideal study site AND the birds an ideal subject?
5.5. Why do we designate one of the candidate keys of a relation to be the...
5.5. Why do we designate one of the candidate keys of a relation to be the primary key? 5.6. Discuss the characteristics of relations that make them different from ordinary tables and files. 5.7. Discuss the various reasons that lead to the occurrence of NULL values in relations.
Why is Tableau ideal for exploratory data analysis?
Why is Tableau ideal for exploratory data analysis?
Explain Plagiarism, Confidentiality, and Anonymity in research and give one example for each.
Explain Plagiarism, Confidentiality, and Anonymity in research and give one example for each.
Why is variation in a candidate measure within population important to assessing the measure validity?
Why is variation in a candidate measure within population important to assessing the measure validity?
What is ideal body weight? Why do some (ok most) people associate ideal weight with how...
What is ideal body weight? Why do some (ok most) people associate ideal weight with how they look? Why are we so fixated with looking thin?
15. When all devices in an 802.11 WLAN are within range of each other and the...
15. When all devices in an 802.11 WLAN are within range of each other and the access point, the frame exchange protocol is sufficient to establish reliable data delivery. TRUE or FALSE 17. DCF (distributed coordination function)uses a binary exponential backoff, which means that if a station attempts to transmit after a series of repeated collisions, then the delay time (backoff) is doubled after each collision. TRUE or FALSE
A political candidate has an advertising budget of $250,000. The candidate wishes to allocate the advertising...
A political candidate has an advertising budget of $250,000. The candidate wishes to allocate the advertising money among four media outlined in the table below. The candidate’s goal is to reach the largest possible audience. To ensure the candidate reaches a diverse audience, the table also displays a minimum and maximum level of ads that should be placed. Use Excel’s solver to assist the candidate in spending its advertising budget by selecting an effective media mix. Medium     Audience Cost...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT