Buscar

Segurança de Rede

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes

Faça como milhares de estudantes: teste grátis o Passei Direto

Esse e outros conteúdos desbloqueados

16 milhões de materiais de várias disciplinas

Impressão de materiais

Agora você pode testar o

Passei Direto grátis

Você também pode ser Premium ajudando estudantes
Você viu 3, do total de 3 páginas

Prévia do material em texto

UNIVERSIDADE FEDERAL DE SÃO JOÃO DEL-REI – Campus Alto Paraopeba 
 
ENGENHARIA DE TELECOMUNICAÇÕES 
 
 
 
 
 
 
Resumo sobre segurança de redes Wi-Fi 802.11 
 
 
 
 
 
 
 
 
 
NOME: Davi Silva Sousa 
MATRÍCULA: 154 350 001 
 
 
 
 
 
 
 
 
 
 
 
26 de setembro de 2017 
Ouro Branco- MG 
 
 
 
 
A wireless network is the way that a computer is connected to a router without a 
physical link. In another words, it uses radio frequency to transmit data through the air 
which brings to us more mobility but we must be careful. Hackers may invade our 
personal computer and steal private data among far worse things. 
That’s why we have got security algorithms like WEP - Wired Equivalent Privacy, its 
intention was to provide data confidentiality but it has serious security flaws and was 
replaced by WAP - Wi-Fi Protected Access. Currently we've got the WPA Version 2. 
Several weaknesses have been discovered using WEP encryption that allows an 
attacker using readily available software to crack the key within minutes. WEP 
encryption uses a shared key authentication and sends the same key with data packets 
being transmitted across the wireless network. If malicious users have enough time and 
gather enough data they can eventually piece together their own key. 
 
The Wi-Fi was created by Wi-Fi Alliance, a non-profit organization that 
promotes Wi-Fi technology and certifies Wi-Fi products if they conform to certain 
standards of interoperability. 
Down below we have got the main standards in the IEEE (Institute of Electrical 
and Electronics Engineers) 802.11 family listed. 
 
• IEEE 802.11a 
 
A Wi-Fi standard for 5 GHz frequency which is less crowded and hence has relatively 
smaller interference problem, beyond that supports up to 54Mbps of bandwidth, which is 
much faster than the 11Mbps bandwidth provided by 802.11b standard devices. The 
802.11a offers as many as 12 non-overlapping channels. With more channels, larger 
number of users can be accommodated with no performance degradation. Although it has 
some disadvantages like not many client devices such as note book computers, PDAs 
support 802.11a standard, it is more expensive compared to other contemporary 
technologies like 802.11b and Bluetooth and the distance covered will be slightly less 
compared to 802.11b due to higher operating frequency (5 GHz). Note that, higher the 
radio frequency, lower the propagation distance for a given output power. 
• IEEE 802.11b 
When compared to the IEEE 802.11a protocol presents a better cost effective, it is 
well-supported and stable but runs in the 2.4 GHz range that makes it prone to 
interference from other devices (microwave ovens, cordless phones, etc) and also has 
security disadvantages. This protocol limits the number of access points in range of 
each other to three. Has 11 channels, with 3 non-overlapping, and supports rates from 1 
to 11 Mbps, but realistically about 4-5 Mbps max. Uses direct-sequence spread-
spectrum technology. 
• IEEE 802.11g: Wi-Fi standard for 2.4 GHz frequency with theoretical capacity 
of 54 Mbps. When compared to IEEE 802.11 
Has the same extension of 802.11b, with the same disadvantages (security and 
interference) furthermore, it has a shorter range than 802.11b. We can also say that this 
protocol is flexible because multiple channels can be combined for faster throughput, 
but limited to one access point and it is and has a higher cost than 802.11b. 
• IEEE 802.11n : Wi-Fi standard for 2.4 GHz and / or 5 GHz frequency with a 
capacity of 150 to 600 Mbps. This pattern uses the MIMO-OFDM transmission 
method. 
The 802.11n protocol is faster and less prone to interference and it uses the newest 
security. 
There are other protocols like EAP - Extensible Authentication Protocol and 
VPN – Virtual Private Network. VPN creates a secure virtual “tunnel” from remote 
device to VPN server using an encryption scheme and require authentication. The EAP 
has several versions available and is used in internal network beyond that, it has an 
extra security for enterprise and government Wi-Fi LANs. 
To ensure more safety we might use Network Security Systems las such 
Firewall. The first one acts as a barrier between a trusted network and and an untrusted 
network; only traffic allowed onto the network is defined in the firewall policy; all other 
traffic is denied. It could make the network or computer invisible to the internet. Block 
unauthorized users. Monitor and control flow of data to/from a network or computer. 
Many devices provide basic firewall capability. The Second one is a computer 
network authentication protocol created at MIT that works on the basis of tickets to 
allow nodes communicating over a non-secure network to prove their identity to one 
another in a secure manner. 
As shown above the Wi-Fi has its risks and can be slower than cable besides 
that, it has advantages like freedom, setup cost, flexibility and Scaleable. Any 
combination of these security techniques can be used. A good way defend yourself 
when using WEP would be to use longer WEP encryption keys, change your WEP keys 
frequently, to use a VPN for any protocol, including WEP, that may include sensitive 
information and lastly implement a different technique for encrypting traffic, such as 
IPSec over wireless. 
 
REFERENCES 
NETWORKING, Disponível em: 
http://networking.anandsoft.com/802.11a.html 
Accessed at 05:47 on 09/26/2017 
 
http://searchsecurity.techtarget.com/ 
Accessed at 6amàs 06:54 on 09/26/2017 
 
SLIDES :Wi-Fi the 802.11 Standard and Security 
WiFi Security: WEP, WPA, and WPA2 
Attack and Defense in Wireless Networks 
 
 
	26 de setembro de 2017

Continue navegando