Academia.eduAcademia.edu

WiFi Security

With rapid progress in the field of radio technology, Wireless networks have grown to have many beneficial features, the main one is MOBILITY. The downside of these networks is susceptibility to attacks, which has persisted since the very beginning. Therefore, it is a major concern to secure these networks! This paper focuses on securing WiFi networks both domestic & Industrial.

Wi-Fi Security (Electronics & Communication Engineering) SAL Institute of Technology & Engineering Research, Ahmedabad Tamanna Goware tsgoware@gmail.com Abstract Technology is making rapid progress and making things easier. As innovative thinking is increasing day by day, new methods for Wi-Fi networking and security have evolved out of which Meta paper is the latest which is my paper presentation topic. In last decade wireless networks gained a substantial momentum. One of the most beneficial features of wireless networks is that they support user mobility in a convenient way. The downside is that wireless networks are more susceptible to attacks than their wired counterparts. This increased vulnerability mainly stems from the lack of physical connections and the broadcast nature of the radio communication. It is therefore important to provide appropriate security measures for Wi-Fi networks, which ensure robustness of their operation even in case of malicious attack. In this paper I’m focusing on security of Wi-Fi networks. The paper is organized as follows: 1. 2. Background: -What is Wi-Fi? -Connectivity -Purpose Why security is needed? Types of security: -Industrial installations 3. 4. -Home (Domestic) installation Latest Technology in Wi-Fi network security Conclusion 1. Introduction Wi-Fi (802.11b) or wireless fidelity is a standard technology for wireless access to local networks. Principle: To establish quick radio links between terminals connected to broadband networks. Wi-Fi is a wireless (radio) access technology, which is used for the interconnection of terminals or devices such as laptops, PDA’s, etc. The user connects to the internet or to his company’s intranet and has access to numerous applications based on data transfer. This technology thus enjoys a true complementaritiy with ADSL networks and corporate LAN’s. Wi-Fi operates at 11Mbps range in theory and operates in an unlicensed range of 2.4 GHz. A Wi-Fi terminal has a range of around 100 meters and provides access to a rather wide perimeter. The maximum number of users is 32 per access point. Wi-Fi is standardized internationally. This technology makes it possible for equipment to interoperate completely, whatever brand or type of terminal. Products conforming on Wi-Fi standard have been on the market since three years now and there are nearly 30million devices in use world wide. 3. Modes of Operation: There are mainly two modes of operation of: 1. Infrastructure Mode: In this mode there are two entities that communicate Access point and Clients. 2. Ad-hoc mode: In this mode all the entities are independent of each other and are called clients. Ad-hoc networks Ad-hoc networks can pose a security threat. Ad-hoc networks are defined as peer-to-peer networks between wireless computers that do not have an access point in between them. While these types of networks usually have little protection, encryption methods can be used to provide security. Figure 1- Block diagram of Wi-Fi network 2. Hotspots Airports, stations, café’s, offices, conference centers, shopping malls, etc are heavily frequented places also called hotspots. They welcome users whose need for broadband access is becoming more and more important. With the installation of Wi-Fi terminals in these heavily traveled areas, these people on the move can access to their messaging center, to internet sites or to all shared applications of their company from their portable PC’s or with their PDA’s with same agronomy as in the office. The security hole provided by Ad-hoc networking is not the Ad-hoc network itself but the bridge it provides into other networks, usually in the corporate environment, and the unfortunate default settings in most versions of Microsoft Windows to have this feature turned on unless explicitly disabled. Thus the user may not even know they have an unsecured Ad-hoc network in operation on their computer. If they are also using a wired or wireless infrastructure network at the same time, they are providing a bridge to the secured organizational network through the unsecured Ad-hoc connection. Bridging is in two forms. A direct bridge, which requires the user actually configure a bridge between the two connections and is thus unlikely to be initiated unless explicitly desired, and an indirect bridge which is the shared resources on the user computer. The indirect bridge provides two security hazards. The first is that critical organizational data obtained via the secured network may be on the user's end node computer drive and thus exposed to discovery via the unsecured Ad-hoc network. The second is that a computer virus or otherwise undesirable code may be placed on the user's computer via the unsecured Ad-hoc connection and thus has a route to the organizational secured network. In this case, the person placing the malicious code need not "crack" the passwords to the organizational network; the legitimate user has provided access via a normal and routine log-in. The mal factor simply needs to place the malicious code on the unsuspecting user's end node system via the open (unsecured) Ad-hoc networks. The use of Wi-Fi on industrial as well as domestic scale has increased rapidly in last couple of years. These networks have thus given hackers opportunities to gain unauthorized access to corporate computer system and their data. Wireless hackers pose a security threat because the encryption mechanism originally developed for Wi-Fi networks, known as wired Equivalent Privacy has been broken. Wi-Fi depends on cryptographic methods to enable security; mainly WEP and WPA (Wi-Fi Protected Access). Two terms Privacy and Authentication are very important to understand the security. Privacy: Data transmitted in the network should not be readable by other except those communicating. Authentication: Only clients who know a shared secret may connect to the network. WEP was the first cryptographic protocol developed for Wi-Fi to enable privacy and authentication. WEP was not secure after all. To rectify security issues with WEP, the Wi-Fi Alliance shifted to a new cryptographic protocol, WPA. Since then a common practice of securing a WPA enabled network with passwords has been discovered to be vulnerable to an offline dictionary attack. Even though WPA itself is thought to be secure, apart from dictionary attack it was a quick fix to the problems in WEP. WPA is a subset of Robust Security Network (RNS) which was introduced in an early draft of a security standard developed by Institute of Electrical & Electronics Engineers (IEEE) denoted 802.11b. 4. Importance of Security Wireless networks are forcing organizations to completely rethink how they secure their networks and devices to prevent attacks and misuse that expose critical assets and confidential data. By their very nature, wireless networks are difficult to roll out, secure and manage, even for the most savvy network administrators. Wireless networks offer great potential for exploitation for two reasons; they use the airwaves for communication, and wireless-enabled laptops are ubiquitous. To make the most of their security planning, enterprises need to focus on threats that pose the greatest risk. Wireless networks are vulnerable in a myriad of ways, some of the most likely problems being rogue access points (APs) and employee use of mobile devices without appropriate security precautions, but malicious hacking attempts and denial-of-service (DoS) attacks are certainly possible as well. Unlike traditional wired networks in which communications travel along a shielded copper wire pair or optical cable, wireless radio frequency (RF) signals literally traverse the open air. As a result, RF signals are completely exposed to anybody within range and subject to fluctuating environmental factors that can degrade performance and make management an administrative nightmare. Whether authorized or not, wireless access points and their users are subject to malicious activity and employee misuse. Additional wireless access security challenges come through the use of wireless-enabled devices by employees, the growing amount of confidential data residing on those devices, and the ease with which end users can engage in risky wireless behavior. The value of connectivity typically outweighs concerns about security, as users need to get work done while at home or while traveling. Survey data from the leading research group, Gartner, shows that at least 25 percent of business travelers connect to hotspots, many of which are insecure, while traveling. Furthermore, about two-thirds of those who use hotspots connect to online services via Wi-Fi at least once a day highlighting the need for extending wireless security outside of the enterprise. To ensure effective, automated wireless threat protection, companies and government organizations should implement a complete wireless security solution covering assets across the enterprise that enables them to discover vulnerabilities, assess threats, prevent attacks, and ensure ongoing compliance - in the most secure, easy-to-use and cost-effective manner available. IT departments must have a pre-emptive plan of action to prevent malicious attacks and employee misuse which compromise an organization's data privacy and enforce security policies for wireless use - both inside and outside their facilities. Whether or not a company has authorized the use of wireless or has a 'no wireless' policy, their networks, data, devices and users are exposed and at risk. 5. Securing a Wi-Fi Connection: Wi-Fi networks allow people to wirelessly connect devices to the internet such as smart phones, gaming consoles, tablets and laptops. Because Wi-Fi networks are simple to setup, many people install their own Wi-Fi at home. However many home Wi-Fi networks are configured insecurely allowing strangers or unauthorized people to easily access home network or anonymously abuse the internet connection. To ensure a safe and secure home Wi-Fi network, following are the few simple steps: 1. Administration: Wi-Fi network is controlled by something called an Access point. This is a physical device can be bought from local electronics store or can be built in internet router. The Access point is what wirelessly connects devices to internet. One of the first steps of securing Wi-Fi network is limiting who can administer access point and how it can accessed. For many Wi-Fi networks the default administration login and password is well known. In fact, these default accounts can often be found listed on the internet. So, be sure to change the default administration login and password to something that is known. For administrative access to Wi-Fi access point, it is recommended to disable wireless access and instead require a physical network connection, such as using Ethernet cable. If it is must have wireless administrative access then disable HTTP access and enable the required HTTPS access which supports encryption. 2. Setting Wi-Fi Network Name: Another option need to configure is the name of Wi-Fi network (Often called SSID). This is the name, devices will see when it search for local Wi-Fi networks. It is recommended to change default WiFi network name. Give network a unique name so that it can be easily identified and distinguished, but make sure it does not contain any personal information. Also, there is a little value in configuring Wi-Fi network as hidden. Today most WiFi scanning tools or any skilled attacker can easily discover all the details of a hidden network. 3. Encryption & Authentication: The next step is to ensure that only known people and trusted people can connect to and uses Wi-Fi network and that those connections are encrypted. We need to be sure that neighbors or nearby strangers cannot connect to or monitor Wi-Fi network. Fortunately these dangers are easily mitigated by simply enabling strong security on Wi-Fi access point. Currently the best option is to use the security mechanism WPA2. By simply enabling this require a password for people to connect to Wi-Fi network, and once authenticated those connections are encrypted. Be sure not to use older outdated methods, such as WEP, or no security at all, which is called an open Wi-Fi network. An open Wi-Fi network allows anyone to connect to Wi-Fi network without any authentication. The recommended encryption method for WPA2 is AES only, versus other options such as TKIP or TKIP+AES. When configuring the password people will try to connect to Wi-Fi network, make sure it is different from the administrator password and the password cannot be guessed easily, it is recommended that it should be at least 20 characters long. Remember that anyone having the password will have access to Wi-Fi network, so from time to time it is required to be changed. Finally it is recommended to turn off or disable WPS (Wi-Fi Protected Setup). WPS is a specification designed to ease the process of securely setting up Wi-Fi access point. 4. Open DNS: Once Wi-Fi connection is configured, one of the last steps recommended is to configuring network to use Open DNS as DNS server. When type a name to a browser, DNS is how browser knows which server on the internet to connect to. Open DNS is a free service that helps ensuring to connect only to safe websites. In addition open DNS gives the ability to manage where the websites family can connect to. It is possible to filter and block objectionable material, this is a great resource. The Open DNS website walks through step by step how to configure Wi-Fi access point to use Open DNS. 6. RF shielding Another method of shielding or protecting the Wi-Fi network is through Meta paper, which is the latest technology in which cellulose papers are used for blocking electromagnetic waves. This technology is also referred to as RF shielding. It’s practical in some cases to apply specialized wall paint and window film to a room or building to significantly attenuate wireless signals, which keeps the signals from propagating outside a facility. This can significantly improve wireless security because it’s difficult for hackers to receive the signals beyond the controlled area of an enterprise. Indoor wireless LANs transmit radio frequency (RF) signals that often propagate outside the physically controlled area of a building (a security risk), and RF signals originating from outside the facility penetrate the walls and interfere with the operation of the wireless LAN (resulting in performance reduction). As a result, the idea of applying a RF shield around the perimeter of the building is a worth considering. a. Basic shielding concepts A RF shield highly attenuates RF signals going out of and coming into the building, resulting in significant improvements to security and performance. Shielding in test labs: Serious wireless product developers have been shielding rooms to provide a “quiet” chamber (Faraday cage) for testing wireless products in the absence of external RF signals. The implementation of a Faraday cage requires specialized construction of the walls of a room, which makes the approach not feasible for general operation of wireless LANs. It’s rarely cost-effective, obviously, to rebuild the walls to enclose the entire building in a Faraday cage. Shielding for general spaces: The use of special RF shielding paint and window film is a good alternative for protecting larger rooms and even buildings. There are several varieties of paint and window film available, with attenuation ranging from 40dB to 80dB for the frequencies that wireless LANs use. You simply paint the walls and apply film to the windows, and the additional attenuation does a good job of shielding the building. b. Advantages of shielding An attenuation of 80dB substantially reduces the possibility that someone outside the shielded area can connect to or even detect the wireless network located inside the facility. If a wireless LAN exist inside your building with an access point near an exterior wall, in this situation (with no RF shielding applied), the signal levels propagating just outside the building near the access point will likely be around -50dBm, which is plenty high enough for a client device located outside the building to detect and connect to the wireless network. As with most indoor wireless LANs, this poses a security risk because an unauthorized person sitting in the parking lot can easily “see” the network. This opens the door to various security attacks. With application of 80dB wall paint in this scenario, the signals measured from the same outside location will drop to approximately -130dBm, which is well below the receive sensitivity of an 802.11/Wi-Fi client device radio. The outcome is that the client device outside the facility will not be able to detect or connect to the network. Thus, the application of shielding gives your building “skin” that offers a layer of security on top of existing security mechanisms, such as encryption and authentication. A similar improvement occurs regarding the reduction in RF interference. Imagine, for instance, that a neighbor has a wireless LAN. The signal level of the neighboring wireless LAN measured inside your facility may be as high as 40dBm (assuming their access point is really close). With 80dB wall paint applied, the signal levels from the neighboring wireless LAN will drop to approximately -120dBm which is also below the receive sensitivity of 802.11/Wi-Fi client devices. Consequently, the shielding eliminates typical RF interference originating from outside the building, which allows your wireless LAN to operate at higher performance levels. In addition, the attenuation of external signals helps preclude the origination of denial-ofservice (DoS) attacks from outside the building. c. Implementing shielding Following points requires attention while shielding a room or building for improving wireless LAN security and performance. 1. Define security requirements. The application of RF shielding paint can be fairly costly, so seriously think about why you need it. Determine the level of risk if someone from outside the building is able to detect and possibly connect to your wireless LAN. Certainly encryption and authentication go a long way in providing sounds security, but you’d be surprised by how well seasoned hackers can outsmart even the better security mechanisms. You should perform a security assessment with emphasis on penetration testing to determine whether a security risk from outside the building exists. 2. Determine impacts of RF interference. If your wireless LAN must provide optimum performance, then the reduction of external RF interference through shielding may be valuable. Assess existing RF interference through the use of a spectrum analyzer, and identify the magnitude of signals originating from outside the facility. It gets a bit tricky to predict the real impacts of this interference on performance, so you’ll probably need to do some capacity testing using the actual network with and without the anticipated levels of external interference. Keep in mind that you’ll likely not benefit from reducing external interference if there are substantial sources of RF interference originating from inside the building (unless you isolate the interference by shielding interior walls). If you can’t bear a DoS attack on the wireless LAN, then shielding may be a good solution regardless of the existing interference. 3. Consider the cost of applying the shielding. A RF shielding paint cost about 20 times the cost of standard wall paint. Based on security requirements and the impacts of existing RF interference, you must determine if the cost of re-painting the perimeter of the building (or room for smaller applications) is worthwhile. As with standard paints, a gallon of RF shielding paint will cover about 600 square feet. Multiple coats may be necessary, however, to achieve maximum attenuation. 4. Apply the shielding. You can easily apply shielding paint and window film. Paint application is completed with standard rollers and brushes, and clean up is often done with just water. Window film is generally a peel-andstick application. Be certain to follow the manufacturer’s instructions to ensure proper use. After implementing the shielding, perform testing inside and outside of the building to confirm signal attenuation results. This may also be a good time to re-run penetration tests to ensure that your facility is “bullet proof.” 7. Conclusion: Thus it could be conclude that with the increase in use of Wi-Fi technology in near past the security of networks of domestic as well as enterprises has gain importance. The Wi-Fi security depends upon cryptographic methods based on robust security network (RSN) which include WEP and WPA based on 802.11b. Out of this WEP has become out dated as its encryption code could be easily cracked by any scanning tools and by skillful hacker whereas WPA (Wi-Fi Protected Access) is the newer version, with strong encryption and authentication. WPA2 with AES is the latest trend in the security of Wi-Fi access point for Domestic use. For the industrial Wi-Fi security the spaces are to be secured for not allowing external access in case authentication is leaked by the user to unauthorized person. The RF Shielding method is used to attenuate the Electromagnetic waves so that access would not be available outside the facility areas. It is based on principle of Faraday’s Cage. Various paints and films made of lead and silver commercially called Meta paper could be applied on the walls and windows for RF shielding. This is the latest technology which is quite economical for bulk use. References: 1. www.ehow.com 2. www.wikipedia.com 3. www.itblog.com 4. www.fadooengineers.com 5. Monthly newsletter for computer users January 2012 6. Report on Wi-Fi security by Kjell. J.Hole (University of Bergen) 7. Report on Wi-Fi adoption and security June 2012 Acknowledgement: I wish to express sincere thanks to my father Mr. Satyen Goware, Assistant Engineer Doordarshan Kendra Ahemedabad. I also extend my heartfelt thanks to Ms Chaitalee Patel, SAL Institute of Technology and Engineering Research Ahmedabad & Ms Preeti Kshatriya, Assistant Professor, SAL Institute of Technology and Engineering Research Ahmedabad. Apart from this I’m thankful to the latest technology that gives quick access to data whenever and wherever required.