Wireless Security WLAN 802.11: Esp. Ing. Fernando Boiero Maestría en Ciber-Seguridad
Wireless Security WLAN 802.11: Esp. Ing. Fernando Boiero Maestría en Ciber-Seguridad
Wireless Security WLAN 802.11: Esp. Ing. Fernando Boiero Maestría en Ciber-Seguridad
WLAN 802.11
• 802.11b:
– High Rate Direct Sequence Spread Spectrum (HR/
DSSS)
– Data rates 5.5-11 Mbps
– ISM unlicensed 2.4 GHz band
– To counter interference it uses dynamic rate switching
(can lower from 11 down to 1 Mbps). This is also used
when distance to access point is longer to improve
signal quality.
– Complementary Code Keying (CCK) used as
modulation scheme for higher rates
• 802.11a:
– RF bands used are known as Unlicensed National
Information Infrastructure (U-NII) bands
• Operates in 5 GHz band
• Allocation by Federal Communications Commission (FCC)
– Orthogonal Frequency Division Multiplexing (OFDM)
– Data rates: 6,9,12,18,24,36,48, and 54 Mbps
– Different modulation techniques: Binary Phase Shift
Keying (BPSK), Quadrature Phase Shift Keying (QPSK),
and Quadrature Amplitude Modulation (QAM).
– In Europe, 5 GHz band, is sometimes used by military
organizations for radar and satellite operations
• 802.11g:
– ISM unlicensed 2.4 GHz
– Same MAC as 802.11b
– Orthogonal Frequency Division Multiplexing (OFDM)
– Rates of 54 Mbps-108 Mbps
– Compatibility with 802.11b
• 802.11n-2009:
– Data rates up to 600 Mbps
– Multiple-input multiple-output (MIMO) antenna
– Frame aggregation
– 5 GHz and 2.4 GHz
• 802.11ac:
– High throughput on 5 GHz
– Multi-station WLAN throughput up to 1 Gbps
– Single link up to 500 Mbps
• 802.11ad:
– High throughput on 2.4, 5, and 60 GHz
– Up to 7 Gbps
• 802.11c: bridge procedures covering operation with 802.11 MAC for the IEEE 802.1d MAC
bridges standards
• 802.11d: requirements and definitions to allow 802.11 WLAN equipment to operate in
markets not served by the current standard
• 802.11e: support for quality of service (QoS)
• 802.11f: inter-Access Point protocols to provide support for roaming between access points
(AP) from different vendors
• 802.11h: spectrum and transmit power management extensions for 802.11a in Europe
• 802.11i: enhances security and authentication mechanisms by using Advanced Encryption
Standard (AES) with strong authentication and key exchange mechanisms
• 802.11j: enhancements to add channel selection for 4.9 and 5 GHz to 802.11a. For Japan.
• 802.11k: to define radio resource measurement enhancements.
• 802.11m: defines maintenance of technical and editorial corrections to the 802.11 WLAN
MAC and Physical layer specifications.
• Access Point:
– Wireless hub
– Allows a number of wireless clients to be connected to the wired network
– Acts as a bridge between different networks mediums (802.3 and 802.11)
– At least 2 wireless interfaces (wires and wireless)
– Provides a coverage area where a devices maintains the connection
– WLAN will typically contain a number of AP’s for larger coverage areas
• Wireless client adapter:
– To connect a device to the WLAN
– Different power levels
– Require a device driver in the device
• Antenna
– To transmit and receive radio signals
Authentication
response
Association
Approved/Rejected request
Association
response
Data frames
Probe request
Probe response
Decrypts message
Encrypted Challenge Text
with WEP key
Authentication
Do decrypted
If authentication response
challenge text and
successful then plain challenge text
association Association match?
occurs
Data frames
– Wireless devices listen to these control frames and learn about the impending use of
the medium and estimate for how long it will be in use. They defer transmission
attempts consequently.
• Physical Carrier Sensing mechanism
– To detect whether any RF energy is present at the transmission frequency to be used.
Then transmission attempt is defered.
• If the device learns the medium is busy it uses a random time backoff
period. This reduces probability of collisions.
• To determine if a collision occurred, wireless devices use a positive
acknowledgment (ACK) mechanism
• If ACK is not received, the frame is re-transmitted
B A E C D
RTS_C
RTS_B
Defer
CTS_D
CTS_A
DATA_C
Deaf
DATA_B
ACK_D
RTS_E
Collision
Application Application
Transport Transport
Network Network Network
IEEE
802.2 LLC
LLC: 802.2 802.1 LLC
802.2
IEEE 802.11 Bridging
MAC MAC MAC
MAC
IEEE 802.11
Physical Physical Physical
Phy
Access Point
Type:
00: Management
01: Control
10: Data
11: Reserved
Management Subtype:
Type:
00: Management
Subtype:
• 0000: Association Request
• 0001: Association Response
• 0100: Probe Request
• 0101: Probe Response
• 1011: Authentication
01: Control
10: Data
11: Reserved
Management Subtype: