Wireless Security Flashcards

1
Q

Wireless Security methodologies and design factors

A
  • Channel characteristics
  • Authentication
  • Authorization
  • Encryption
  • Latency
  • Complexity
  • Intercept probability
  • Secrecy capacity (communication rate of secret information)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is modulation?

A

Describes changes applied to a carrier signal by a modulating signal
-> changes amplitude, frequency, or offset/phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amplitude Shift Keying

A
  • Modifies the amplitude of the carrier signal
  • Amplitude can be modified from zero to max or by using an offset from zero to not confuse silence with a symbol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Frequency Shift Keying

A

In frequency shift keying each symbol is defined by a different frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phase Shift Keying

A

In phase shift keying each symbol is defined by a different phase offset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital quadrature amplitude modulation

A
  • The combination of amplitude shift keying and phase shift keying is called quadrature amplitude modulation
  • Makes it possible to encode more information (bits) into a single symbol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Different types of jammers

A
  • Constant jammer
  • Intermittent jammer
  • Reactive jammer (only if transmission is detected)
  • Adaptive jammer (tailored to the level of received power at the legitimate receiver)
  • Intelligent jammer (exploit weaknesses of the upper-layer protocols)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prevention of jamming

A
  • Channel hopping
    -> Change the frequency using an unpredictable sequence (for the attacker)
    -> Jamming the whole bandwidth consumes too much power
  • Spread spectrum: Use a wider spectrum to spread the transmission instead of using a single frequency
  • Beam forming
    -> Use multiple antennas for communication and “aligned” to the communication partner
    -> An attacker cannot jam all antennas equally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Main types of signals

A
  • Electric current
    -> wired connections, e.g., Ethernet
  • Electromagnetic waves
    -> Wireless connection through air, e.g., WLAN
    -> Transmitting data using light, e.g., fibre connections
  • Acoustic waves
    -> Wireless connection through mediums where electromagnetic waves do not propagate well, e.g., underwater sonar systems of submarines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Amplitude

A
  • Maximum displacement from 0
  • Strength of a signal
  • Declines with increasing distance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Magnitude

A
  • Size of an entity compared to other entities
  • In the frequency domain for signals: Strength of a signal at a certain frequency in comparison to signals at other frequencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Frequency

A

1 Hertz = 1 sine wave per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phase

A

Offset from the normal sine wave starting point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Modulation

A

Digital signals are applied to a carrier signal (called switching or keying)
-> Each bit gets converted to a symbol representing that bit. A symbol is a specific value lasting a specified time to represent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Main attack vectors on wireless physical layers

A
  • Eavesdropping
    -> WPA3, VPN
  • Injection
  • Jamming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly