5 - WLANs Flashcards

1
Q

Hidden Terminal

A

When a node cannot ‘hear’ that another node is busy due to being out of range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exposed Terminal

A

When the node is busy transmitting, and unable to transmit due to fear of collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless cards employ what sort of transmission?

A

Half-Duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of MACA

A

Multiple Access with Collision Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MACA employs what type of sensing? (2)

A
  • Physical Channel Sensing

- Virtual Channel Sensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sender and receiver nodes must send what before sending data?

A

Control frames, which reserves the medium for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collision Avoidance Communication (5)

A
  • Request to Send (RTS)
  • Replies with Clear to Send (CTS)
  • Any node that receives RTS, and should not transmit until indicated time has lapsed
  • Any node that receive RTS but not CTS knows it isn’t close enough to receiver to interfere, so can still transmit
  • After data received, it sends an ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What if not CTS arrives at sender?

A

Assume a collision and start binary exp back-off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Term employed to select an AP

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scanning Method (4)

A
  • mobile client node send Probe frames
  • all APs in range reply with Probe Response Frame
  • Mobile node selects an AP and sends an Association Request frame
  • AC responds with an Association Response frame
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

P.L Attack

A

Saturate wireless network with RF noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

D.L Attacks (2)

A
  • Two-sided AP learns about MAC address, hackers copy MAC address and transmit loudly from other side of the wall
  • Configure wireless card to masquerade as AP, easily attack victim
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Black-Hole Attacks

A

Complete termination of communication stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Grey-Hole Attacks

A

Selectivity drop or transmit a victim’s packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

N.L Attack

A

Performing DoS attacks such as ICMP floods, file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Factors for Wireless Network Encryption (3)

A
  • Need for privacy
  • Ease of Use
  • Government Regulations
17
Q

Forms of Network Encryption

A
  • WEP (Wired Equivalent Privacy)

- WPA, WPA2, 802.11i(WiFi Protected Access)

18
Q

WEP method

A

Shares a secret key between mobile station and AP

19
Q

WEP Criteria (5)

A
  • Optional
  • “Reasonably Strong” Encryption
  • Self-Synchronising
  • Computationally Efficient
  • Conform to government regulations
20
Q

WEP Encryption (4)

A
  • Employs secret key of 40 or 104 bits
  • Secret keys concatenated with 24-bit IV to form 64/128 bit encryption (silver/gold wireless card)
  • Inputted to pseudo-random number generator, RC4 alg (stream cipher)
  • Data XOR with key stream to produce cipher text
21
Q

WEP Decryption

A
  • Cipher text XOR key stream to produce data and ICV
22
Q

Issues with WEP Encryption (4)

A
  • Passive attack is subject to statistical analysis
  • Active attacks inject new traffic
  • Active attacks to decrypt traffic, by confusing AP
  • Dictionary Build attacks, by analysing traffic
23
Q

RC4 Vulnerabilities (2)

A
  • Single change in cipher text changes plain text message
  • Eavesdropping two cipher texts encrypted with the same key stream, we can obtain the XOR of the plaintext leading to statistical attacks to recover plaintexts
24
Q

WEPs IV Problems

A
  • IEEE 802.11 b/g doesn’t specify how often the IV should change, two wireless network cards inserted at the same time will both be initialised to zero
  • Short 24 bit length guarantees the reuse of the same key stream under standard conditions (exhausted after 5 hours)
25
Q

Types of WEP Authentication (2)

A
  • Open System Auth: all data sent in plaintext

- Shared Key Auth: a shared key between a group of nodes

26
Q

WEP Auth Method (4)

A
  • Mobile sends AuthFrame
  • AP replies with AuthChallengeText
  • Mobile node encrypts bytes
  • AP decrypts challenge and compares it to challenge
27
Q

Attacks by Patient Hackers (3)

A
  • Passive Traffic Decryption
  • Active Traffic Injection
  • Table-based attacks
28
Q

Improvements to WEP Problems (3)

A
  • Temporary Key Integrity Protocol (TKIP) to replace WEP without replacing hardware, by acting as a wrapper around WEP
  • TKIP key is 128 bit
  • Each TKIP packet has a unique 48-bit seq num, incremented for each new packet, ensuring key is different for each packet