Telecom CH7 Flashcards

1
Q

What is the primary technology behind modern WLANs, and what standard does it rely on?

A

primary technology: radio freqeuncy and relies on IEEE 802.11 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

different modes of operation in WLAN

A
  1. Infrastructure
  2. Ad-Hoc
  3. Wi-Fi direct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the difference between infrastructure mode and ad-hoc mode in WLANs.

A
  1. Infrastructure: wireless devices connect to an AP (router) which manages communication for multiple STA’s
  2. Ad-Hoc: devices communicate directly with each other without AP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the process of joining a Wi-Fi network from the perspective of a wireless station (STA).

A

The STA scans for available networks
Sends an association request to the AP
AP runs an authentication process
if successful, it sends an association response and establishes a secure connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Outline the evolution of WLAN security.

A
  1. WEP : first security protocol, basic encryption and vulnerable to attacks
  2. WPA: introduced TKIP for improved encryption
  3. WPA2: enhanced security implementing AES.
  4. WPA3: Introduced SAE, enhanced protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is WEP considered insecure, and what specific vulnerabilities does it have?

A

Weak encryption
same secret key for authentication and encryption
IV reuse
Weak key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What were the goals of WEP?

A

confidentiality
access control
data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of keys supported by WEP?

A
  1. Default key (40 or 104 bits)
    uses same encryption process
  2. Key mapping key (individual key)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the problem with IV reuse in WEP?

A

The 24-bit IV has a limited number of unique values, so it is reused and vulnerable to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How IV reuse in WEP can lead to security vulnerabilities.

A

IV reuse allows attackers to capture packets with the same IV, analyze patterns and recover the encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the problem with a weak key in WEP?

A

If a weak key is used, the first few bytes of the output reveals a lot of information about the
key, so breaking the key is made easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Possible improvements for WEP

A

use longer IV space
Filter out weak IV’s
Discard first 256 outputs of RC4 algorithm
Additional protection: Firewall, VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two IEEE 802.11i security protocols?

A

WPA

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe how the Temporal Key Integrity Protocol (TKIP) works and its purpose in WPA.

A

TKIP generates a unique encryption key for each packet, addressing key reuse issues in WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption method is used in WPA2 for data confidentiality?

A

WPA2 uses AES-CCMP a secure encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A