This paper addresses the theory and reality of Wi-Fi security. It provides an overview of security mechanisms and explains how security works in wireless networks. The most important security protocols that are relevant for small office or home office environments are looked upon in more detail. The security of a real-world wireless network is being tested with freely available tools and popular attacking methods. It is demonstrated that old security protocols can no longer be seen as being secure at all. To create a holistic view the idea of Wi-Fi security is then expanded to include the physical level. A series of experiments provides insight on how to make a network more secure with materials and tools available in every household. A WLAN that is nearly unreachable outside the perimeter does not attract any potential hackers. The paper concludes with recommendations on where to place your access point and what can be done to shield it.
Table of Contents
1. INTRODUCTION
2. LITERATURE REVIEW
3. METHODOLOGY
3.1. TIMETABLE AND LOG-KEEPING
3.2. THE ARTEFACT
3.3. METHODOLOGY REFLECTION
4. WLAN BASICS
4.1. THE IEEE STANDARDS
4.2. RELATIONSHIP BETWEEN THE WI-FI ALLIANCE AND THE IEEE
4.3. WLAN ARCHITECTURE
4.3.1. Independent / Ad-Hoc
4.3.2. Infrastructure
5. SECURITY
5.1. SECURITY OBJECTIVES
5.2. WLAN SECURITY
5.3. WEP ARCHITECTURE
5.3.1. How WEP works
5.3.2. WEP – why it doesn’t work
5.3.3. WEP Summary
5.4. NEW SECURITY: 802.11I AND WPA
5.4.1. Temporal Key Integrity Protocol (TKIP)
5.4.2. What is WPA?
5.4.3. Counter Mode with CBC-MAC and Robust Secure Networks
5.4.4. Mixed Mode – Transitional Security Network (TSN)
5.4.5. 802.11i Summary
5.5. INTERIM AND EXTRA SECURITY SOLUTIONS
5.5.1. VPN and IPSec
5.5.2. SSL and SSH
5.5.3. Other alternatives
5.6. A BAD SECURITY EXAMPLE: NINTENDO DS
6. WIRELESS LAN PENETRATION TEST – AN EXPERIMENT
6.1. ASSEMBLING THE GEAR
6.2. GATHERING BASIC INFORMATION
6.3. ATTACKING WEP
6.4. GETTING PAST THE MAC FILTER
6.5. GETTING NETWORK SETTINGS
6.6. CONCLUSION
7. PHYSICAL LAYER SECURITY
7.1. FREQUENCIES AND THEIR USE
7.1.1. 2.4 GHz WLAN technology
7.1.2. 5GHz WLAN technology
7.1.3. Advantages and Disadvantages of the frequencies
7.2. HOW WLAN SIGNAL STRENGTH IS MEASURED
7.3. HOW THE SIGNAL IS AFFECTED
7.3.1. Straight-Line Losses
7.3.2. Interference
7.3.3. Practical Test: Microwave ovens versus WLANs
7.4. ANTENNAS AND THEIR IRRADIATION PATTERNS
7.4.1. Dipole Antennas
7.4.2. Directional Antennas
7.4.3. Antenna size matters
8. EXPERIMENTS
8.1. GENERAL ISSUES
8.1.1. Hardware and Software Configuration
8.1.2. Measuring the WLAN signal strength
8.1.3. Windows and Netstumbler
8.1.4. Linux and Wavemon
8.2. AVOIDING INTERFERENCE
8.3. MAKING THE TEST RESULTS COMPARABLE
8.4. EXPERIMENTS AND RESULTS
8.4.1. Signal loss for obstacles
8.4.2. Using a home-made reflector
8.4.3. Other means to shield the Access Point
8.5. RECOMMENDATIONS FOR PLACING THE ACCESS POINT TO INCREASE SECURITY
9. CRITICAL EVALUATION
9.1. EVALUATING THE OBJECTIVES
9.2. EVALUATING OF THE PROCESS AND PERSONAL REFLECTION
10. CONCLUSION
Project Goals & Core Themes
This project aims to investigate the security landscape of wireless networks in SOHO (Small Office/Home Office) environments, specifically addressing the inherent vulnerabilities of widely used protocols like WEP. By combining theoretical analysis with practical penetration testing and physical layer experiments, the work seeks to provide actionable guidelines for enhancing network security through strategic access point placement and shielding techniques.
- Vulnerability analysis of WEP, WPA, and 802.11i security protocols.
- Conducting a hands-on penetration test to demonstrate real-world exploitation.
- Exploring physical layer security via signal measurement and interference mitigation.
- Developing practical, low-cost methods for securing WLANs using household materials.
Excerpt from the Book
6. Wireless LAN penetration test – an experiment
A Wireless LAN Penetration Test is not much different from a normal hack, but the main difference is that the people whose WLAN you are attacking, actually know what is going on and agree with it.
For my practical tests I asked a friend of mine if I could try to hack into his wireless network. We agreed on a few basic rules:
- The penetration test will be passive, meaning that I will not flood the network or attack individual stations in order to produce more traffic. People should still be able to use the internet.
- In order to produce enough traffic, downloads will be running while the test is being done, so I can get enough packets.
- Information acquired during my test will be made anonymous.
- The penetration test is successful as soon as I can surf the Internet.
- No further information other than the fact that there is a WLAN will be provided, the rest has to be gathered
Summary of Chapters
1. INTRODUCTION: Outlines the rise of mobile computing and the corresponding increase in wireless security risks, establishing the motivation for the study.
2. LITERATURE REVIEW: Examines the evolution of wireless security standards, from the flawed WEP protocol to more robust solutions like WPA and 802.11i.
3. METHODOLOGY: Details the research approach, including brainstorming, literature review, penetration testing, and experimental signal measurement.
4. WLAN BASICS: Provides a foundational overview of IEEE 802.11 standards and the architecture of wireless networks.
5. SECURITY: Discusses core security objectives (CIA triad) and analyzes specific mechanisms, including WEP, WPA, VPNs, and physical security considerations.
6. WIRELESS LAN PENETRATION TEST – AN EXPERIMENT: Documents a practical penetration test on a real-world network, demonstrating how easily outdated security measures can be bypassed.
7. PHYSICAL LAYER SECURITY: Investigates how environmental factors and physical antenna placement impact signal leakage and security.
8. EXPERIMENTS: Reports on experimental testing of signal loss caused by obstacles and the effectiveness of homemade reflectors in securing an access point.
9. CRITICAL EVALUATION: Reflects on the research objectives, the limitations of the study, and the personal learning experience of the author.
10. CONCLUSION: Summarizes the findings, emphasizing that security is an ongoing, holistic process and that the human factor remains a primary vulnerability.
Keywords
Wireless LAN, WLAN Security, SOHO, WEP, WPA, 802.11i, Penetration Testing, Physical Layer Security, Wardriving, Signal Interference, Access Point Placement, Cryptography, Network Privacy, CIA Triad, SSID
Frequently Asked Questions
What is the primary focus of this research paper?
The paper focuses on identifying security vulnerabilities in wireless networks within SOHO environments and providing practical methods to enhance their protection against unauthorized access.
Which security protocols are evaluated in this study?
The study evaluates WEP, WPA, 802.11i, and discusses additional layers such as VPN, IPSec, SSL, and SSH.
What is the central research question?
The core research explores whether standard home/small office wireless networks are secure enough and how they can be fortified using existing technology and physical security techniques.
What scientific methods were employed?
The author used a combination of literature review, a structured penetration test, and empirical experiments regarding signal propagation and interference.
What does the main body of the paper cover?
It covers WLAN fundamentals, current security protocols, the mechanics of hacking, physical layer security, and practical experimental results on signal shielding.
Which keywords best describe this work?
Keywords include WLAN, WEP, WPA, Penetration Testing, Physical Layer Security, and SOHO environments.
Why did the author conduct an experiment with microwave ovens?
To demonstrate the impact of external interference on signal stability and availability, highlighting that environmental factors directly affect network reliability and performance.
What is the significance of the "homemade reflector" experiment?
The experiment demonstrates that users can significantly influence the signal radiation pattern—and thus the security perimeter of their network—using low-cost, household materials.
- Citar trabajo
- Christian Wimmer (Autor), 2006, Wireless LAN Security in a SOHO Environment, Múnich, GRIN Verlag, https://www.grin.com/document/115535