Professional Documents
Culture Documents
5 Wireless security
- Wireless networks offer many advantages for business. However, due to the inherent (built in,
integral) lack of security, it brings some threat to business.
4 major threats to wireless networks (ie, able to intercept the transmission) are: WERR!
i. Rogue access points
ii. War driving
iii. Eavesdropping
iv. Radio-frequency jamming
Evil twin attack: (provide another access point to a connecter, then ask the connector for confidential information via Web
page, connector was supposed to connect to his intended access point but ended up connected to evil twin’s access point
due to very strong signal from the evil twin’s access point. The attacker must first be within the area of a Wi-Fi-enabled
computer (the connector).
‘’the attacker offers a separate connection . but first, he will use a hotspotter that detects wireless networks and offer
information about the wireless network it detected. Using the information he collected from the hotspotter, the attacker
may simulate a different wireless access point but using the same wireless network name or SSID that the user (the prey)
expected to connect to (prey would have assumed that he is connected to an authorized network but ended up fall into
prey to the attacker by being connected to the separate connection made by the attacker). However, this is only possible if
the signal is strong enough that the user will conntect to the attacker’s system instead of the real access point.
Once the user is connected to the attacker’s system, the attacker can have them to access a Web page which requests their
confidential information like user names, passwords and account numbers.
WAR DRIVING
- It is the act of tracing WLANs while moving around a city or a place (could by by driving or walking).
- Needs a Wi-Fi detector and a computer that could connect wirelessly. (wireless enabled)
- WLAN that has a coverage exceeding the building it is put in, an authorized user may intrude that network, using the Internet connection
for free. Also, the unauthorized user may gain access to other important data and resources within the building network.
EAVESDROPPING
- Is the efforts by unauthorized users to access data that are traveling over wireless networks
RADIO-FREQUENCY JAMMING
- Is the act of interfering with a wireless network transmission either intentionally or unintentionally by a person or by a device.
-
8.4 PERVASIVE COMPUTING
Definition
– each object having processing power (embedded with something that could connect that object to a network)
Aka
– ubiquitous computing
The infrastructure behind this pervasive computing (connect a device embedded with a connector to a network of a number of other devices or
appliances) is made up of two technologies:
i. Radio-frequency identification
ii. Wireless sensor network
Pervasive means
- the thing is everywhere, universal, we can’t escape from it, it’s just there all around us.
Eg application:
- SMART HOME having a HOME NETWORK.
Home network:
- Connect many appliances that communicate to one another using the home network
- Those appliances have their own systems ) eg, home security system + light and heat controls + tv + etc, each have their own connecting
devices to connect to the network.
- Could connect to Internet as well. Some appliances are Internet-ready appliance (can be controlled by a small handheld device or a
desktop computer via a home network, either wireless or via wireline).
The two technologies making up the infrastructure of pervasive computing (how each devices could connect to one another or to a network):
1. RFID
- Allow manufacturers to attach tags with antennas and computer chips on goods
- With the attached tags, manufacturers can track their movement through radio signals
History of RFID:
- Was first developed to replace bar codes
- On bar codes:
i. Aka Universal Product Code (UPC)
ii. Made up of 12 digits that are batched in various groups
iii. 1st digit = identifies the item type
iv. Next 5 digits = identify the manufacturer
v. Next 5 = identify the product
vi. Last digit = a check digit for error detection
vii. Worked well but have limitations
viii. Limitations:
- require a LINE OF SIGHT to the SCANNING DEVICE
- works well in a store, but lots problems for a MANUFACTURING PLANT or warehouse or shipping/receiving dock.
- PRINTED ON PAPER – can be ripped, soiled or lost
- it DOESN’T IDENTIFY THE ACTUAL ITEM, but IDENTIFY THE MANUFACTURER AND PRODUCT
On QR codes:
- Is a two-dimensional code (2D)
- Readable by dedicated QR readers and camera hones
- It’s advantages over bar codes are:
i. Can store much more information than bar codes
ii. Can store more data types like numbers, text, URLs, and other language characters like Japanese
iii. Has a small size, it stores information HORIZONTALLY and VERTICALLY
iv. More resistant to damage than bar codes
v. Less likely to be misread as it can be read from any direction or angle.
ACTIVE RFID tags: - use internal battery for power (having batteries, makes it more expensive than passive RFID tags)
- can be read over greater distances
- broadcast radio waves to a reader
- used primarily for EXPENSIVE ITEMS
PASSIVE RFID tags: - rely entirely on readers for their powers (hence less expensive than active rfid tags)
- can be read only up to 20 feet
- generally applied to less-expensive merchandise