You are on page 1of 6

Secure Building of WI-FI

SECURE BUILDING OF WI-FI

Done by

R. Arun II MCA
P. Sangeetha II M.Sc (IT)
St Joseph’s College of Arts & Science
Cuddalore 607001.
mailtorarun@gmail.com
Mobile No: 8870327927

INTRODUCTION raise the issue of the security due to other


inherent features such as radio waves
The main objective of this research being easier to intercept than physical
paper is to build secure WI-FI connections. wires.
Since every institutions, workplaces &
organizations preferring and switching COMMON EXPLOITS OF
over to WI-FI connections we have to WIRELESS NETWORKS
make sure that it is secure.
In general, attacks on wireless
This research paper is based on the networks fall into four basic categories:
observations & findings that were made
for the past one year while implementing  Passive Attacks
the WI-FI connections. Here we listed out  Active Attacks
what are all common exploits & probable  War Driving
solutions to tackle that the problems.  Jamming
Wireless Internet access is a huge PASSIVE ATTACKS
convenience that we have got used to, but
it is important to secure them. Most A passive attack occurs when
internet users do not even realize that someone eavesdrops on the networks
connecting their system to web through traffics. Armed with a wireless network
Wi-Fi routers can make them more adapter that supports promiscuous mode,
vulnerable to hackers. eavesdroppers can capture network traffic
for analysis using easily available tools.
SECURITY THREATS TO WI-FI
NETWORKS: ACTIVE ATTACKS
There is no physical protection of Once an attacker has gained
the wireless network. The risk of the data sufficient information from passive attack,
sharing is high as packets are sent through they can lunch an active attack against the
the airwaves, and an attacker can easily network. There are a potentially large
use various wireless sniffing tools. Most number of active attack can be lunched
wireless devices use a broad spectrum, so against a wireless network. These include,
it is very easy to identify the signals, but are not limited to, unauthorized access,
which makes all the more vulnerable to spoofing, denial of service, and flooding,
hackers. There is no need to re-login and as well as the introducing of malware.
restart network applications. WLANs do

R Arun II MCA Page 1


Secure Building of WI-FI

WAR DRIVING packets can use up all of the network’s


resources and force it to shut down, or a
War driving, also called access very strong radio signal that totally
point mapping, is the act of locating and dominates the airwaves can render access
possibly exploiting connections to wireless points and radio cards useless.
local area networks while driving around a
city or elsewhere. With an omnidirectional As wireless networks send information via
antenna and a geophysical positioning radio waves on public frequencies, thus
system (GPS), the war driver can they are susceptible to vulnerable.
systematically map the locations of
802.11b wireless access points. A hacker can initiate a packet-based brute
force DoS attack by using other systems
JAMMING on the network to send the useless packets
to the server. This adds significant
Jamming is one of many exploits overhead on the network and takes away
used compromise the wireless useable bandwidth from legitimate users.
environment. If an attacker truly wanted to
compromise your LAN and wireless SECURE BUILDING OF WI-FI
security, the most effective approach NETWORKS
would be to send random unauthenticated
packets to every wireless station in the Since wireless is a shared medium,
network. everything that is transmitted or received
over a wireless network can be
HACKERS DO THE FOLLOWING intercepted. Encryption and authentication
STEPS FOR HACKING WIRELESS are always considered when developing a
NETWORKS. wireless networking system. The goal of
adding these security features is to make
• Analyze network to attack wireless traffic as secure as wired traffic.
• Crack WEP key
• Sniff network Here are some simple ways to secure your
• Denial of Service attacks (DoS) Wi-Fi network and prevent its misuse

 Authentication through the open


system and shared key
authentication types.

 Data confidentiality through Wired


Equivalent Privacy (WEP)

USING A JAMMER DEVICE

A Wi-Fi Jammer is designed for


blocking wireless LAN networks and
Hacker trying to hack a computer Bluetooth devices. It could cut off of the
connections with Wireless Routers or
Wireless networks are extremely Wireless Access Points. It works on
vulnerable to DoS attacks. It can slow the 2.4~2.5GHz, could be used in any secure
network to crawling speeds or actually and privacy locations The Wi-Fi jammer is
force it to quit working. In the Brute Force applicable for blocking laptops, desktop
DoS attack method, a huge flood of computers, PDAs and so on. It could help

R Arun II MCA Page 2


Secure Building of WI-FI

you prevent unauthorized people leak out the best ways to secure your Wi-Fi
confidential information. The Bluetooth network is through encryption.
connections will be cut off also after turn
on Wi-Fi jammer. There are primarily two encryption Wi-Fi
standards

 Wireless Equivalent Protocol


(WEP)
 Wi-Fi Protected Access (WPA).

WIRED EQUIVALENT PRIVACY


(WEP)

WEP utilizes a symmetric


algorithm known as a stream cipher,
for encryption. A symmetric algorithm is
one that relies on the concept of a single
STOP PUBLICLY BROADCASTING shared key (as opposed to a public
YOUR (SSID) key) that is used at one end to encrypt
plaintext (the data) into cipher text (the
The broadcast works like an encrypted data), and at the other end to
invitation to the hackers who’re searching decrypt it - convert the cipher text back to
for just that opportunity. In Wi-Fi plaintext. Thus, the sender and the receiver
networking, the wireless access point or share the same key, and it must be kept
router typically broadcasts the network secret.
name (SSID) over the air at regular
intervals. Broadcasting was designed for WI-FI PROTECTED ACCESS (WPA)
mobile hotspots where Wi-Fi clients may
roam in and out of range. In the home, this Wi-Fi Protected Access is a
feature is unnecessary, and it increases the specification of standards-based,
likelihood someone will try to log in to interoperable security enhancements that
your home network. If you turn off SSID strongly increase the level of data
broadcasting, you can keep casual users protection and access control for existing
away from seeing your network. and future wireless LAN systems.
Designed to run on existing hardware as a
MAC ADDRESS FILTERING software upgrade, Wi-Fi Protected Access
is derived from and will be forward-
Each piece of hardware connected compatible with the upcoming IEEE
to a network has physical address or MAC. 802.11i standard. When properly installed,
Access points and routers keep track of the it will provide wireless LAN users with a
MAC addresses for all devices that high level of assurance that their data will
connect to them. You can restrict or allow remain protected and that only authorized
access to your network by filtering MAC network users can access the network
addresses.
Turn on WPA / WEP Encryption – To meet these goals, security
If the information sent back and forth over enhancements needed to be made.
your Wi-Fi network isn’t adequately
encrypted, a hacker can easily tap into the
network and monitor your activity. One of

R Arun II MCA Page 3


Secure Building of WI-FI

WPA encrypts the entire link from the PC to the


It’s more secure and alternative to VPN gateway in the heart of the
WEP. However, since it is newer, it is not corporate network, the wireless network
as widely supported. segment between the PC and the AP is
also encrypted. This is why VPNs have
WPA2 been recommended to help secure Wi-Fi
It’s newest type of wireless
encryption; it provides the highest level of While VPNs are generally considered
encryption available. WPA2 encryption an enterprise solution, integrated products
should be your first choice if your wireless that offer VPN pass-through
router, all of your wireless computers and connections, firewalls and routers are
devices support it. available to accommodate
telecommuters who work from home.
Although they provide excellent security,
VPNs are not self-managing. User
credentials and, often, VPN software
must be distributed to each client.
However, when properly installed, VPNs
extend the high level of security they
provide on wired networks to WLANs. In
fact, some Wi-Fi vendors themselves have
utilized VPNs in networks to secure their
own internal Wi-Fi networks

Jammer device TEMPORAL KEY INTEGRITY


PROTOCOL (TKIP)
VIRTUAL PRIVATE NETWORKS
(VPN) It is an enhanced data encryption.
Wi-Fi P r o t e c t e d Access utilizes i t s
Virtual Private Network Temporal K e y I n t e g r i t y P r o t o c o l
technology (VPN) has been used to secure ( TKIP). TKIP provides important data
communications among remote locations encryption enhancements including a
via the Internet since the 1990s. A per-packet key mixing function
familiar and already widely used
technology in the enterprise, it can readily WEP VULNEBERALITIES:
be extended to Wi-Fi WLAN segments on
existing wired networks. Although VPNs WEP is the original wireless
were originally developed to provide encryption standard, which is now
point-to-point encryption for long Internet outdated. The main problem with it is that
connections between remote users and it can be easily cracked. Cracking a
their corporate networks, they have wireless network means defeating the
recently been deployed in conjunction with encryption so that you can establish a
Wi-Fi WLANs. When a WLAN client connection without being invited. If you
uses a VPN tunnel, communications use WEP encryption, change your
data remains encrypted until it reaches encryption key regularly.
the VPN gateway, which sits behind
the wireless AP. Thus, intruders are DO NOT AUTO-CONNECT TO OPEN
effectively blocked from intercepting all WI-FI NETWORKS
network communications. Since the VPN

R Arun II MCA Page 4


Secure Building of WI-FI

If you connect to every available ADVANTAGES


Wi-Fi network automatically, you will
inevitably end up connecting to dummy There are real and measurable
Wi-Fi networks designed specifically to benefits to using a wireless network
catch unsuspecting users. Most computers versus a standard wired network. For a
provide a Wi-Fi setting that will configure home installation customer, the greatest
your computer to automatically connect to benefit is that there are no wires needed:
any open Wi-Fi network without notifying you don’t need to drill holes in walls and
you. Never select the ‘connect to available floors; you don’t need to drag cables or
Wi-Fi networks automatically’ setup hide them under rugs. One Wi-Fi access
option under your Network Connections point can provide network access for
window. any typically sized home. And if you
live in a rental or a historical building,
you may not be allowed to drill holes-
that makes wireless your only solution

It’s flexible: With a wireless network


you and your staff can have
uninterrupted access to people,
information and tools as you and they
move through the workplace with your
mobile PC

It’s Mobility: As you change your


business operations your wireless network
can change with you
ASSIGNING STATIC IP ADDRESSES
TO DEVICES It’s fast: From 11 to 54 Mbps throughput
and advanced roaming capabilities
Dynamic IP allocation also works provide reliable access to e-mail, the
to the advantage of attackers, who can Internet, file sharing and other network
easily obtain valid IP addresses from resources away from the desk
network’s DHCP pool. Turn off DHCP on
the router or access point, set a fixed IP It’s cost-effective: Expand and extend
address range instead and then configure your existing network by simply
each connected device to match. Using a adding more adapters and access points.
private IP address range (like 10.0.0.x) Planning is a no brainier as you need to
prevents computers from being directly buy only what you need
reached from the Internet.
LIMITATIONS
ENSURE ACCESS POINTS ARE
PLACED SECURELY HIGH CONSUMPTION OF
ELECTRICITY
The performance of a Wi-Fi home
network greatly depends on signal strength Wi-Fi technologies are power
of the wireless router or wireless access hungry and suck out your electricity like
point (base station). In the Centre of a water. This presents a clear disadvantage
room/office etc. to minimize its signal for users of laptops and other battery
strength outside the office. dependent devices. The battery industry is
still grappling with technology which will

R Arun II MCA Page 5


Secure Building of WI-FI

enable them to manufacture long lasting, compatibility to existing 802.11b


compact sized and light weight batteries. equipment, and less path loss than
802.11a. This translates into higher data
RADIO WAVE CONFLICTS rates for a given range, or increased range
for a given data rate
If you are using your Wi-Fi near
other radiation emitting devices such as CONCLUSION
microwave ovens, cordless phones, the
resulting conflicts between devices and Our future depends on what we do
networks tend to slow down your Wi-Fi in the present - Mahatma Gandhi
device. In older versions of Wi-Fi the
conflicts were so high that if the user were Wi-Fi provides freedom: freedom
to go near the microwave the data transfer to physically move around your home
would immediately stop or business and still stay connected to
the Internet or local network; freedom to
DATA SAFETY grow and move an office or business
without having to install new cables and
The greatest challenge faced by Wi-Fi wires; Plus, it is cool, and it is fun – as
providers today is how to prevent outsiders those in the know say, “Once you go
from accessing your data. Before investing wireless, you will never want to use a
in Wi-Fi check with the hardware guys cable again.”
about precautions to save your data.
Currently the Wi-Fi Protected Access Wi-Fi use is growing fast in homes,
technology is used to secure data transfer public access areas and businesses- both
and encryption over networks. large and small. The Wi-Fi Alliance is
active with many industry organizations
FUTURE TRENDS and is working closely with
manufacturers to make sure that
IEEE 802.11a existing Wi-Fi gear is compatible
with wireless technologies developed in
The 802.11a supplement to 802.11 future.
was published in 1999. It uses Orthogonal
Frequency Division Multiplexing (OFDM) REFERENCES
to provide data rates to 54 Mbps in the 5
GHz U-NII bands. “Overview of IEEE 802.11 Security”,

IEEE 802.11g www.techonline.com

The 802.11g task group is www.lib-asc.ekm.org


working on a supplement to the 802.11
standard that defines a technology for www.wi-fi.org
operation at 2.4 GHz that offers higher
data rates (up to 22 Mbps) using www.howstuffworks.com
OFDM, while remaining backwards
compatible to 802.11b.When www.about.com
compared to 802.11a, 802.11g offers the
advantages of lower cost, backwards

R Arun II MCA Page 6

You might also like