Title: ICOM 6505: Wireless Networks Wireless LAN
1ICOM 6505 Wireless Networks- Wireless LAN -
- By Dr. Kejie Lu
- Department of Electronic and Computer Engineering
- Spring 2009
2Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
3Standards
- IEEE 802.11 is a working group for WLAN standards
- Website http//www.ieee802.org/11/
- Major standards
- 11-1997
- 11a up to 54Mbps in 5GHz band
- 11b up to 11Mbps in 2.4GHaz band
- 11e quality of service
- 11g up to 54Mbps in 2.4GHz band
- 11i security
- 11n high throughput
4IEEE 802.11a
- A physical layer standard for WLANs in the 5GHz
radio band. - 8 available radio channels
- 12 channels in some countries because of
available radio spectrum permitted. - Maximum link rate of 54-Mbps per channel
- Maximum user data throughput will be
approximately half of this because the throughput
is shared by all users of the same radio channel - The data rate decreases as the distance between
the user and the radio access point increases.
5IEEE 802.11b
- A physical layer standard for WLANs in the 2.4GHz
radio band. - Up to 3 non-overlapped radio channels
- Maximum link rate of 11-Mbps per channel
- Maximum user throughput will be approximately
half of this because the throughput is shared by
all users of the same radio channel. - The data rate decreases as the distance between
the user and the radio access point increases
6IEEE 802.11d
- Supplementary to the MAC layer in 802.11 to
promote worldwide use of 802.11 WLANs - It will allow access points to communicate
information on the permissible radio channels
with acceptable power levels for user devices - The 802.11 standards cannot legally operate in
some countries the purpose of 11d is to add
features and restrictions to allow WLANs to
operate within the rules of these countries
7IEEE 802.11e
- Supplementary to the MAC layer to provide QOS
support for LAN applications - It will apply to 802.11 physical standards 11a,
11b and 11g - The purpose is to provide classes of service with
managed levels of QOS for data, voice and video
applications
8IEEE 802.11f
- A "recommended practice" document that aims to
achieve radio AP interoperability within a
multivendor WLAN network - The standard defines the registration of APs
within a network and the interchange of
information between APs when a user is handed
over from one AP to another
9IEEE 802.11g
- A physical layer standard for WLANs in the 2.4GHz
radio band. - The maximum link rate is 54Mbps per channel
- By comparison, 11b only provides 11Mbps rate
- Modulations used in the 802.11g standard
- Orthogonal frequency-division multiplexing (OFDM)
modulation is mandatory - Supports complementary code keying (CCK)
modulation for backward compatibility with 11b, - packet binary convolutional coding (PBCC)
modulation as option for faster link rates
10IEEE 802.11h
- Supplementary to the MAC layer to comply with
European regulations for 5GHz WLANs - European regulations require products to have
transmission power control (TPC) and dynamic
frequency selection (DFS) - TPC limits the transmitted power to the minimum
needed to reach the furthest user. - DFS selects the radio channel at the access point
to minimize interference with other systems,
particularly radar
11IEEE 802.11i
- Supplementary to the MAC layer to improve
security. - It will apply to 802.11 physical standards a, b
and g. - It provides an alternative to Wired Equivalent
Privacy (WEP) with new encryption methods and
authentication procedures. - IEEE 802.1x forms a key part of 802.11i
12802.11a or 802.11b
- Consider using 802.11b if
- Range requirements are significant
- Already have a large investment in 802.11b
- End users are sparsely populated
- Consider using 802.11a if
- There's need for much higher performance
- Significant RF interference is present within the
2.4 GHz band - End users are densely populated
13Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
14OSI Reference Model
15802.x Standard
- The IEEE 802 Local and Metropolitan Area Network
Standards Committee is a major working group
charted by IEEE to create, maintain, and
encourage the use of IEEE and equivalent ISO
standards. - The MAC and Physical layers of the 802 standard
were organized into a separate set of standards
from the LLC because of the interdependence
between medium access control, medium, and
topology.
16802.2 LLC Overview
- The LLC is the highest layer of the IEEE 802
Reference Model and provides functions similar to
the traditional data link control protocol - The purpose of the LLC is to exchange data
between end users across a LAN using an 802-based
MAC controlled link. - The LLC provides addressing and data link
control, and it is independent of the topology,
transmission medium, and medium access control
technique chosen. - Higher layers, such as TCP/IP, pass user data
down to the LLC expecting error-free transmission
across the network. - The LLC provides end-to-end link control over an
802.11-based wireless LAN.
17802.2 LLC Services
- Unacknowledged connectionless service
- Is a datagram-style service that does not involve
any error-control or flow-control mechanisms. - Connection-oriented service
- It establishes a logical connection that provides
flow control and error control between two
stations needing to exchange data. - Acknowledged connectionless service
- It does not involve the establishment of a
logical connection with the distant station. - But the receiving stations do confirm successful
delivery of datagrams.
18Service Set
- Independent Basic Service Set (IBSS)
- Basic Service Set (BSS)
- Extended Service Set (ESS)
19Independent Basic Service Set (IBSS)
20Basic Service Set (BSS)
21Extended Service Set (ESS)
22Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
23802.11 Physical Layer
- The 802.11 standard specifies several Physical
layers - Initial standard, 1997
- Current standards
- 802.11a
- 802.11b
- 802.11g
- Coming standard
- 802.11n
24Initial standard
- The initial standard approved in 1997 supports
data rates of 1 and 2Mbps in the 2.4GHz band - FHSS frequency hopping spread spectrum
- DSSS direct sequence spread spectrum
- This initial release also defines an infrared
Physical layer operating at 1 and 2Mbps via
passive ceiling reflection
25Current Standards
- IEEE 802.11b adds an 11Mbps, high-rate version
direct sequence standard - IEEE 802.11a defines a Physical layer using OFDM
(orthogonal frequency division multiplexing) to
deliver data rates of up to 54Mbps in the 5GHz
frequency band - IEEE 802.11g uses OFDM in the 2.4GHz frequency
band to provide up to 54Mbps data rate
26802.11b Physical Layer
27802.11 World Wide Spectrum
28802.11 DSSS Channel
29What is Spread Spectrum?
- The transmitted signal bandwidth is much greater
than the information bandwidth - Some function other than the information being
transmitted is employed to determine the
resultant transmitted bandwidth - Spreading Code
30Advantages of Spread Spectrum
- Low power density
- The transmitted energy is spread over a wide
band, and therefore, the amount of energy per
specific frequency is very low. - The effect of the low power density
- Such a signal will not disturb (interfere with)
the activity of other systems' receivers in the
same area, and - Such a signal can not be detected by intruders,
providing a high level of intrinsic security.
31Advantages of Spread Spectrum
- Redundancy
- The message is present on different frequencies
from where it may be recovered in case of errors.
- The effect of redundancy
- Spread Spectrum systems present high resistance
to noises and interference, being able to recover
their messages even if noises are present on the
medium.
32Spread Spectrum Modulations
- Two methods
- FHSS, or Frequency Hopping Spread Spectrum
- DSSS, or Direct Sequence Spread Spectrum
33FHSS - Modulation
- Spreading code modulation
- The frequency of the carrier is periodically
modified (hopped) following a specific sequence
of frequencies. - The spreading code is this list of frequencies to
be used for the carrier signal - "hopping
sequence". - The amount of time spent on each hop is known as
dwell time.
34FHSS - Modulation
- Message modulation
- The message modulates the (hopping) carrier
(FSK), thus generating a narrow band signals for
the duration of each dwell, - But also generating a wide band signal, if the
process is regarded over periods of time in the
range of seconds. - Redundancy is achieved by the possibility to
execute re-transmissions on different carrier
frequencies (hops).
35Example of FHSS
36DSSS - Modulation
- Spreading code modulation
- For the duration of every message bit, the
carrier is modulated (PSK) following a specific
sequence of bits (known as chips). - The process is known as "chipping and results in
the substitution of every message bit by (same)
sequence of chips. - In DSSS systems, the spreading code is the chip
sequence used to represent message bits.
37DSSS - Modulation
- Message modulation
- For message bits 0 and 1, the sequence of
chips used to represent the bit remains as
dictated by process above. - In this way message bits "0" and "1" are
represented by different chip sequences (one
being the inverted version of the other one). - Redundancy is achieved by the presence of the
message bit on each chip of the spreading code.
38DSSS
39System Collocation - DSSS
- How many independent systems may operate
simultaneously without interference - Collocation could be based on the use of
different spreading codes (sequences) for each
active system. - On condition that the sequences used are highly
distinguishable one from the other one (known as
orthogonality) each receiver will be able to
"read" only the information dedicated to it
(receiver and transmitter use same spreading
code). - The number of orthogonal pseudo-random sequences
is limited and it is a function of the sequence
length - number of chips (bits) in the sequence.
40System Collocation - DSSS
- The following table is taken from "Modern
Communications and Spread Spectrum" by G.R.
Cooper and C. D. McGillan
41System Collocation - DSSS
- Actual DSSS systems use 11 bit long spreading
sequences - Making the use of CDMA impossible.
- System collocation is therefore based on the
fixed allocation of bandwidth to each system. - For the transmission of 11 Mchips per second
(Msymbols per sec), IEEE 802.11 needs - A contiguous band of 22 MHz, and
- A minimum distance of 3 MHz between the carrier
frequencies of collocated DSSS systems.
42System Collocation - DSSS
- only 3 DSSS systems may be collocated
- The total available bandwidth in the ISM band is
83.5MHz (2.4GHz - 2.4835GHz) and - The distance (guide band) between carriers has to
be 3 MHz - Simple math 3222372 MHz
43802.11 DSSS Channel
44System Collocation - FHSS
- IEEE 802.11 defines 79 different hops for the
carrier frequency. - Using these 79 frequencies, IEEE 802.11 defines
78 hopping sequences (each with 79 hops) grouped
in three sets of 26 sequences each. - 326 78 (thus, max 3 APs allowed in the same
area) - FHS1 (0, 3, 6, 9, , 75)
- FHS2 (1, 4, 7, 10, , 76)
- FHS3 (2, 5, 8, 11, , 77)
- Sequences from same set encounter minimum
collisions and therefore may be allocated to
collocated systems.
45System Collocation - FHSS
- Theoretically, 26 FHSS systems may be collocated,
but collisions will still occur in significant
amounts. - To lower the amount of collisions to acceptable
levels, the actual number of FHSS collocated
systems should be around 15.
46Noise and Interference
- There are two types
- All band interference, and
- Narrow band interference
47All Band Interference
- The whole spectrum used by the radio is 83.5 MHz
in FHSS (the whole ISM band) while for DSSS it is
only 22 MHz (one of the sub-bands). - The chances of having an interference covering a
range of 22 MHz are obviously greater than the
chances of having the interference covering 83.5
MHz. - A 22 MHz wide interference may totally block a
DSSS system, while it will block only 33 of the
hops in a FHSS system. - A FHSS system will work in these conditions at
66 of its capacity, but it will work! A DSSS
system would not work at all.
48Narrow Band Interference
- A DSSS narrow band interference signal
(interference present around one single
frequency) is accepted by the receiver, - If enough energy is present on it, the
interfering signal will totally block the
receiver.
49Narrow Band Interference
- FHSS systems work with narrow band signals
(located each time around a different carrier
frequency). - A narrow band interference signal present on a
specific frequency will block only one specific
hop. - The FHSS receiver will not be able to operate at
that specific hop, - But, after hopping to a different frequency, the
signal will be accepted by the receiver.
50Near/Far Problem
- The interfering signals may be generated, for
example, by another radio transmitter located
close to the receiver of a DSSS system. - The signals generated by such a transmitter,
being received by the DSSS receiver at higher
power levels, could blind it, making it unable to
hear its partner. - On the other hand, if the receiver is FHSS, the
worst case will be that the other transmitter
will block some hops, forcing the FHSS system to
work in less than optimum conditions, but work.
51Multipath
- Environments with reflective surfaces (such as
buildings, office walls, furniture, etc.) - Generate multiple possible paths between
transmitter and receiver and - Therefore the receiver receives multiple copies
of the original (transmitted) signal. - Due to signals received taken different paths,
and therefore, different delays
52Multipath in Time Domain
- In DSSS systems, the chipping process generates a
high rate transmitted signal. - The symbols of this transmitted signal are much
shorter / narrower (in time) than the symbols
generated by a FHSS system transmitting the same
data rate. - Obviously, a narrow pulse (DSSS systems) is more
sensitive to delays (shifts in time) than a wider
pulse (FHSS systems) and - As a result the FHSS systems have better chances
to be undisturbed by the presence of multipath
effects
53Multipath in Time Domain
- Results of a shift of x
- A shift of x for a FHSS system,
- A shift of 11x, assuming in a DSSS system
operating with 11 chip spreading sequence
54Multipath in Time Domain
55Multipath in Frequency Domain - Fading
- The multiple copies of the original signal arrive
at the receiver with different instantaneous
amplitudes and phases. - The mixing of these copies at the receiver
results in having some frequencies canceling one
another, while other frequencies will sum up. - The result is a process of selective fading of
frequencies in the spectrum of the received
signal.
56Multipath in Frequency Domain - Fading
- FHSS systems operate with narrow band signals
located around different carrier frequencies. - If at a specific moment, the FHSS system is using
a carrier frequency significantly faded as a
result of multipath, the FHSS receiver could not
get enough energy to detect the radio signal. - The resultant loss of information is corrected by
re-transmitting the lost packets.
57Multipath in Frequency Domain - Fading
- DSSS systems operate over wider bands,
transmitting their signal over a group of
frequencies simultaneously. - As long as the average level within the wide
rectangle in is high enough, the DSSS receiver
will be able to detect the radio signal.
58Time and Frequency Diversity
- Both DSSS and FHSS retransmit lost packets, until
the receiving party acknowledges correct
reception. - A packet could be lost because of noises or
multipath effects. - This capability of a system to repeat
unsuccessful transmissions at later moments in
time is known as "time diversity".
59Time and Frequency Diversity
- DSSS systems use time diversity, but the problem
is that they retransmit on the same 22 MHz
sub-band. - If the noise is still there or if the topography
of the site did not change, the transmission
could be again unsuccessful. - As a result the multipath effects will be again
present - The multipath effects are a function of
frequency. - For same topography, some frequencies encounter
multipath effects, while others do not.
60Time and Frequency Diversity
- FHSS systems use "time diversity" (they
retransmit lost packets at later moments in time)
but they also use "frequency diversity" (packets
are retransmitted on different frequencies /
hops). - Even if some hops (frequencies) encounter
multipath effects or noises, others will not, and
the FHSS system will succeed in executing its
transmission.
61Throughput Analysis
- There are two types
- Single system throughput, and
- Aggregate throughput of collocated systems
62Single System Throughput
- DSSS systems transmit at rates of up to 11 Mbps
- Use a contiguous sub-band of 22 MHz.
- The efficiency of such a system is 11 Mbps / 22
MHz 0.5 bits / Hertz. - FHSS systems (as of today) transmit at rates of
up to 3 Mbps - Use a channel of 1 MHz.
- The efficiency of such a system is 3 Mbps / 1 MHz
3 bits / Hertz.
63Single System Throughput
- FHSS systems (future)
- A result of the latest FCC decision (summer 2000)
to allow FHSS operation in the 2.4 GHz band with
5MHz channels (instead of 1 MHz), - Operating at about 15 Mbps should be expected in
the market in the future. - The throughput is about 7 Mbps for 11 Mbps DSSS,
and about 2 Mbps for 3 Mbps FHSS.
64Aggregate Throughput
- Based on the IEEE 802.11 specifications, the max
number of DSSS systems that can be collocated is
3. - These 3 collocated systems provide an aggregate
rate of 3 x 11 Mbps 33 Mbps, or - A net aggregate throughput of 3 x 7 Mbps 21
Mbps.
65Aggregate Throughput
- FHSS systems may be operated with synchronized or
non-synchronized hopping sequences - In the case of non-synchronized hopping sequences
- The band is allocated in a dynamic way among the
collocated systems - They use different hopping sequences which are
not synchronized - Collisions do occur, lowering the actual
throughput.
66Aggregate Throughput
- In the synchronized case,
- Collisions are totally eliminated,
- Up to 12 systems can be collocated, and
- The aggregate rate and throughput is a linear
function of the number of collocated end systems.
67Throughput
68Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
69802.11 MAC Layer Services
- Authentication
- De-authentication
- Association
- De-association
- Re-association
- Privacy
- Data transfer
- Distribution
- Integration
- Power management
70Authentication
- The process of proving client identity which
takes place prior to a wireless client
associating with an AP. - Essentially any wireless client can associate
with an AP without checking credentials. - 802.11 provides option known as Wired Equivalent
Privacy (WEP) - A shared key is configured into the AP and its
wireless clients. - Only those devices with a valid shared key will
be allowed to be associated to the AP.
71De-authentication
- The de-authentication function is performed by
the base station. - It is a process of denying client credentials,
based on - incorrect authentication settings, or
- applied IP or MAC filters.
72Association
- Association.
- Enables the establishment of wireless links
between wireless clients and APs in
infrastructure networks. - Disassociation.
- Cancels the wireless links between wireless
clients and APs in infrastructure networks.
73Re-association
- Re-association.
- Occurs in addition to association when a wireless
client moves from one BSS to another. - Two adjoining BSSs form an ESS if they are
defined by a common ESSID, providing a wireless
client with the capability to roam from one area
to another. - Although re-association is specified in 802.11,
the mechanism that allows AP-to-AP coordination
to handle roaming is not specified.
74Privacy
- By default, data is transferred in the clear
- Allowing any 802.11-compliant device to
potentially eavesdrop on similar PHY 802.11
traffic within range. - The WEP option encrypts data before it is sent
wirelessly, using a 40-bit encryption algorithm
known as RC4. - The same shared key used in authentication is
used to encrypt or decrypt the data, allowing
only wireless clients with the exact shared key
to correctly decipher the data.
75Data Transfer Distribution
- Data transfer.
- The primary service of MAC layer is to provide
frame exchange between MAC layers. - Wireless clients use a Collision Sense Multiple
Access with Collision Avoidance (CSMA/CA)
algorithm as the media access scheme. - Distribution.
- The distribution function is performed by DS and
it is used in special cases in frame transmission
between APs.
76Integration Power management
- Integration.
- A function performed by the portal
- Design to provide logical integration between
existing wired LANs and 802.11 LANs. - Power management.
- IEEE 802.11 defines two power modes
- Active mode, where a wireless client is powered
to transmit and receive and, - Power save mode, where a client is not able to
transmit or receive, consuming less power. - Actual power consumption is not defined and is
dependent upon the implementation.
77CSMA/CD
- The classic CSMA/CD method is a very effective
mechanism in a wired environment, - Enabling speeds of 10 (T-base), 100
(Fast-Ethernet), or 1000 (Gigabit-Ethernet). - However, unlike wired networks, CSMA/CD cannot be
implemented for WLANs for two reasons.
78Why Not Classic CSMA/CD?
- First, in CSMA/CD, one of the basic suggestions
is all stations hear each other, - In WLAN, where this cannot be guaranteed.
- There is a hidden station effect where the
station hears the AP, but does not hear all other
members of the cell. - Secondly, it is not possible to both transmit and
receive on the same channel using radio
transceivers - Unless we use a full duplex radio which could
increase the price significantly.
79Hidden Terminal Problem
- Node B can communicate with A and C both
- A and C cannot hear each other
- When A transmits to B, C cannot detect the
transmission using the carrier sense mechanism - If C transmits to D, collision will occur at B
B
C
A
D
80CSMA/CA
- Collision avoidance mechanisms are related more
to deterministic type of networks, where the
response time is predictable. - 802.11 standard for CSMA/CA defines two different
access methods - the Distributed Coordination Function (DCF) and
- the Optional Point Coordination Function (PCF).
81Distributed Coordination Function (DCF)
- A station wishing to transmit data, senses the
medium first. - If the medium is busy, then the station defers
its transmission to a later time, - If the medium is free for a specified time
(Distributed Inter Frame Space (DIFS)), the
station transmits.
82Distributed Coordination Function (DCF)
- The receiving station then checks the CRC of the
received packet and sends an ACK packet. - This indicates to the transmitting station that
there were no collisions detected. - If the sender does not receive ACK, then it
re-transmits the last fragment.
83Point Coordination Function
- Used to implement time-critical services, like
voice or video transmission. - A single AP controls access to the media and a
point coordinator resides in the AP. - If a BSS is set up with PCF enabled, time is
spliced between the system being in PCF mode and
in DCF mode, - No station is allowed to transmit unless it is
polled, and stations receive data from the access
point only when they are polled.
84What about Hidden Node?
- The effect of the hidden station could cause a
collision at any stage of the transmit-receive
process. - To reduce the probability of two stations
colliding, the standard defines a Virtual Carrier
Sense mechanism.
85Virtual Carrier Sense
- A station waiting to transmit a packet will first
transmit a short control packet RTS - called Request To Send
- includes the source, destination and the duration
of the following transaction. - If the medium is free, the destination station
responds with a response control packet CTS - called Clear To Send
- includes the same duration information.
86Virtual Carrier Sense
- All stations receiving either RTS and/or CTS, set
their Virtual Carrier Sense indicator for the
given duration - called NAV, for Network Allocation Vector,
- This information is used together with the
Physical Carrier Sense when sensing the medium.
87Virtual Carrier Sense
88Virtual Carrier Sense
89802.11 Association
- The association process is a two step process
involving three states - Unauthenticated and unassociated,
- Authenticated and unassociated, and
- Authenticated and associated.
90Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
91802.11 Security
- The organizations have canalized their external
network traffic through distinct openings
protected by firewalls. - Simple and effective idea.
- By limiting external connections to a few well
protected openings, the organization can better
protect itself. - Unfortunately, the deployment of a wireless
network opens a back door
92Wireless Security Back Door
- A wireless back door
- Permits an attacker access beyond the physical
security perimeter of the organization. - The attacker can implement the parking lot
attack - The attacker sits in the organizations parking
lot and accesses hosts on the internal network.
93Parking Lot Attack
94802.11 Standard Security
- Two services are provided to bring the IEEE
802.11 functionality in line with wired LAN
assumptions. - Authenticationprovided by the authentication
service. - Privacy provided by the WEP (Wired Equivalent
Privacy) mechanism.
95Authentication Supported in 802.11
- Wired Equivalent Privacy (WEP) protocol
- Open System Authentication
- Closed Network Access Control (proprietary)
- Access Control Lists (proprietary)
96Shared Key Authentication
- A WEP feature called shared key authentication,
ensures only authorized stations can access the
WLAN. - A station requesting 802.11 service sends an
authentication frame to another station. - When a station receives the initial
authentication frame, the station replies with an
authentication frame containing challenge text.
97Shared Key Authentication
- The requesting station copies the challenge text
into an authentication frame, - encrypts it with a shared key using the WEP
service, and - sends the frame to the responding station.
- The receiving station decrypts the challenge text
using the same shared key and compares it to the
challenge text sent earlier. - If they match, the receiving station replies with
an authentication acknowledgement. - If not, the station sends a negative
authentication notice.
98Shared Key Authentication
99Open System Authentication
- Open system authentication is the default
authentication protocol for 802.11. - As the name implies, open system authentication
authenticates anyone who requests authentication.
- Essentially, it provides a NULL authentication
process.
100Closed Network Access Control
- Lucent has defined a proprietary access control
mechanism called Closed Network. - With this mechanism, a network manager can use
either an open or a closed network. - In an open network, anyone is permitted to join
the network. - In a closed network, only those clients with
knowledge of the network name can join. - In essence, the network name acts as a shared
secret.
101Access Control List
- Another mechanism used by vendors (but not
defined in the standard) to provide security is
the use of access control lists based on the
Ethernet MAC address of the client. - Each access point can limit the clients of the
network to those using a listed MAC address. - If a clients MAC address is listed, then they
are permitted access to the network. - If the address is not listed, then access to the
network is prevented.
102WEP Algorithm Discussion
- Reasonably strong
- The security provided by the algorithm relies on
the difficulty of discovering the secret key. - Self- synchronizing
- Very important when mobile stations go in and out
of coverage.
- Computationally efficient
- It can be easily implemented in both hardware and
software. - Exportable
- It can be exported outside the US.
- Optional
- It is an option not required in an 802.11-
compliant system.
103WEP Encryption Algorithm
- Two processes are applied to the plaintext data.
- One encrypts the plaintext
- The other protect against unauthorized data
modification
104WEP Integrity Algorithm
- The integrity check field CRC- 32 checksum
- CRC- 32 checksum calculates a checksum based on a
cyclic redundancy check
105Key Management
- Key management is a misnomer with respect to
802.11 as it is left as an exercise for vendors. - The 802.11 standard does, however, provide for
two methods for using WEP keys.
106Key Management
- The first provides a window of four keys.
- A station or AP can decrypt packets enciphered
with any one of the four keys. - The second method is called a key mappings table.
- In this method, each unique MAC address can have
a separate key. - The size of a key mappings table should be at
least ten entries according to the 802.11
specification.
107Key Management
108Passive Attack
- A passive eavesdropper can intercept all wireless
traffic, until an IV collision occurs. - By XORing two packets that use the same IV, the
attacker obtains the XOR of the two plaintext
messages. - The resulting XOR can be used to infer data about
the contents of the two messages. - IP traffic is often very predictable and includes
a lot of redundancy. - This redundancy can be used to eliminate many
possibilities for the contents of messages.
109Passive Attack - Extension
- An extension to this attack uses a host somewhere
on the Internet to send traffic from the outside
to a host on the wireless network installation. - The contents of such traffic will be known to the
attacker, yielding known plaintext. - When the attacker intercepts the encrypted
version of his message sent over 802.11, he will
be able to decrypt all packets that use the same
initialization vector.
110Passive Attack - Extension
111Active Attack
- Once plaintext is known. An attacker can use that
to construct his own correct encrypted packets. - This involves
- Constructing a new message,
- Calculating the CRC- 32
- Performing bit flips on the original encrypted
message to change the plaintext to the new
message.
112Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
113Roaming
- The standard includes mechanisms to allow a
client to roam among multiple APs that can be
operating on the same or separate channels. - Each AP transmits a beacon signal which includes
- a time stamp for client synchronization,
- a traffic indication map,
- an indication of supported data rates, and
- other parameters.
114Roaming
- Roaming clients use the beacon to gauge the
strength of their existing connection to an AP. - If the connection is considered weak, the roaming
station can attempt to associate itself with a
new AP.
115Roaming Operations
- The specific actions which occur as a user roams
from one AP to another is as follows. - The station sends a re-association request to a
new AP. - If the re-association response is successful,
then station has roamed to the new AP otherwise,
the station scans for another AP. - If AP accepts a re-association request, the AP
indicates re-association to the Distribution
System, the DS information is updated, and the
old AP is notified through the DS.
116Roaming Re-asscoiation
- Re-association usually occurs because
- The wireless station has physically moved away
from the original access point - Change in radio characteristics in the building
- High network traffic on the original access point
- High network traffic causes re-association which
also performs a load balancing function. - This process of dynamically associating and
re-associating with APs allows a customer to set
up WLANs with very broad coverage by creating a
series of overlapping 802.11b cells throughout a
building or across a campus.
117Outline
- Standards
- Architecture
- The Physical Layer
- The MAC Layer
- Security
- Roaming Approach
- Power Management
118Power Management
- 802.11 supports two power-utilization modes,
- Continuous Aware Mode and
- Power Save Polling Mode.
- The MAC layer implements power management
functions by putting the radio to sleep when no
transmission activity occurs for some specific or
user-defined time period.
119Power Management
- Potential problem
- A sleeping station can miss critical data
transmissions. - 802.11 solution
- Incorporating buffers to queue messages.
120Power Management
- The standard calls for sleeping stations to
awaken periodically and retrieve any applicable
messages. - The client radio will wake up periodically to
receive regular beacon signals from the AP. - The beacon includes information regarding which
stations have traffic waiting for them, - The client can thus awake upon beacon
notification and receive its data, returning to
sleep afterward.