Telecom CH7 Flashcards
What is the primary technology behind modern WLANs, and what standard does it rely on?
primary technology: radio freqeuncy and relies on IEEE 802.11 standard
different modes of operation in WLAN
- Infrastructure
- Ad-Hoc
- Wi-Fi direct
Describe the difference between infrastructure mode and ad-hoc mode in WLANs.
- Infrastructure: wireless devices connect to an AP (router) which manages communication for multiple STA’s
- Ad-Hoc: devices communicate directly with each other without AP
Explain the process of joining a Wi-Fi network from the perspective of a wireless station (STA).
The STA scans for available networks
Sends an association request to the AP
AP runs an authentication process
if successful, it sends an association response and establishes a secure connection
Outline the evolution of WLAN security.
- WEP : first security protocol, basic encryption and vulnerable to attacks
- WPA: introduced TKIP for improved encryption
- WPA2: enhanced security implementing AES.
- WPA3: Introduced SAE, enhanced protection.
Why is WEP considered insecure, and what specific vulnerabilities does it have?
Weak encryption
same secret key for authentication and encryption
IV reuse
Weak key
What were the goals of WEP?
confidentiality
access control
data integrity
What are the two types of keys supported by WEP?
- Default key (40 or 104 bits)
uses same encryption process - Key mapping key (individual key)
What is the problem with IV reuse in WEP?
The 24-bit IV has a limited number of unique values, so it is reused and vulnerable to attacks
How IV reuse in WEP can lead to security vulnerabilities.
IV reuse allows attackers to capture packets with the same IV, analyze patterns and recover the encryption key.
What’s the problem with a weak key in WEP?
If a weak key is used, the first few bytes of the output reveals a lot of information about the
key, so breaking the key is made easier
Possible improvements for WEP
use longer IV space
Filter out weak IV’s
Discard first 256 outputs of RC4 algorithm
Additional protection: Firewall, VPN
What are the two IEEE 802.11i security protocols?
WPA
WPA2
Describe how the Temporal Key Integrity Protocol (TKIP) works and its purpose in WPA.
TKIP generates a unique encryption key for each packet, addressing key reuse issues in WEP
What encryption method is used in WPA2 for data confidentiality?
WPA2 uses AES-CCMP a secure encryption method