What is a major difference between WLAN and Wire Bound communication?
WiFi does not rely on a medium
-> electromagnetic waves through the vacuum…
What is a potential probelm of WiFi regarding its propagation?
Full Duplex -> signal interference…
How is the “Medium” in WiFi structured?
frequency interval -> broadcast channel
carrier signal : 2.426 GHz
channel: 22MHz broad…
-> overlapping channels
=> delimiting channels with band or low pass filters
=> channel: continuous subset of frequencies within band… (band 2.4GHz, 5GHz,)
What WLAN standards are there?
IEEE 802.11b
IEEE 802.11a
IEEE 802.11g
IEEE 802.11n
IEEE 802.11ac
IEEE 802.11ax
Speeds, Band, Distance 802.11b
2.4 GHz
11 MBit/s
100m optimum
Speed, Band, Distance 802.11a
5 GHz
54 MBit/s
50m optimum
=> advantage: 5GHz less used by other devices (e.g. cellular, bluetooth)
Speed, Band, Distance 802.11g
uses orthogonal frequency division multiplex
Speed, Band, Distance 802.11n
2.4 and 5 GHz
600 MBit/s
250m optimum, 70m indoors
MiMo (multiple in multiple out)
-> use multiple antennas
Speed, Band, Distance 802.11ac
7 GBp/s
Speed, Band, Distance 802.11ax
11 GBit/s
What is the rule of thumb for actual transmission speeds for WLAN?
about half of what is specified for a,b,g
Can one increase the distance of WLAN?
yes -> incresase signal strength over allowed limit
-> several km possible
How are the channels in WLAN structured?
overlapping continuous frequencies
2.412 GHz middle
-> 22MHz width of channel
-> next channel 5MHz to the right…
=> need 4 channels in between to not overlap
What happens if two devices use neighboring channels?
overlap
-> degrade signal quality…
On what does the number of channels and distances depend?
on the standard
Are all channels available everywhere?
No -> b/g is restricted in channels depending on the country…
=> Europe no 14, japan all, US no 12-14
What is the turbo mode?
make use of multiple channels to enhance throughput
Consider you have a standard 802.11a connection between two wireless adapters. Is it possible to send and receive data at the same time on layer 1? So what kind of connection do you have?
Half Duplex
-> as can send in both ways but not at the same time (interference)
What is the typical indoor range of an 802.11g wireless link operating within specifications?
50m
How many non-overlapping channels are defined by IEEE 802.11b/g without considering country-specific limitations?
4
=> 14 channels in general but require 4 channels in between
1, 6, 11, 14
=> channel 14 greater distance than the rest (12 MHz)
What modes of operation exist / did we talk about?
ad-hoc
infrastructure mode
What is the difference between ad-hoc and infrastructure mode of operation?
devices communicate directly with each other
infrastructure
device communicate over base station -> usually Acces Point
What is a STA?
wireless station -> e.g. devices like PC or server (communication end-points)
What is a BSS?
basic service set
-> STA together with AP in infrastructure mode
How can one identify a BSS?
SSID
service set identifier
How is a network advertised?
Beacon Frame by AP
-> transmits SSID to STAs in range
What do STAs transmit if they want to join a BSS?
associatoin request to the AP
How does the AP respond to an associatoin request?
if any kind of authentication and authrization (optional) is succesful
-> client granted access by association response
How do STA communicate in a BSS?
over AP
=> never direct in infrastructure mode…
What is a hidden terminal ? What is the opposite to it?
Consider STA A and B
-> A and B are not in reach of each other
-> but in SAME BSS -> AP reaches both…
=> B/A is a hidden terminal for A/B
opposite:
in direct reach: exposed terminal
Who manages the media access control?
AP
-> controls which STA is allowed to send data at a given time
-> enforces media acess control
What is an extended service set?
often: AP connects WLAN to wired network
-> possibly multiple BSS connected with wired connected AP
=> ESS identified by ESSID
Example ESS?
Single network in University with multiple AP
=> single AP is BSS
-> multiple of these, each with same SSID form ESS
with common ESSID
What does ESS allow for?
transparent roaming
-> change AP from same ESSID…
=> e.g. eduroam…
What is the main difference in ad-hoc mode?
no AP for communication
-> at least two STA form independent basic service set (IBSS)
=> also identified by SSID
How are ad-hoc IBSS roughly formed?
first STA starting the service
-> takes over some crucial responsibilities of the AP
=> sending beacon frames containing SSID to announce IBSS
-> also handles associations and disassociations
Main difference between AP and first STA in ad-hoc?
altough taking some responsibilities of the AP
=> in ad-hoc, it does not relay the messages as all STA communicate directly… (in the same IBSS)
What is a drawback of ad-hoc?
communication with hidden terminals not possible…
What is the basic service set identifie (BSSID)?
MAC address of AP for given BSS
What statements are true?
The AP administers STAs' access to the medium.
All STAs which are part of the BSS are exposed to the AP.
The STAs communicate directly with each other if they are in range.
Communication with hidden terminals is not possible.
The STAs transmit data always to the AP which forwards it to the receiver
An ESS comprises of multiple APs and all their associated STAs, connected through a distribution system.
An SSID is the conventional name for a BSS.
A BSS comprises of one AP with all its connected STAs.
A BSS is uniquely distinguished by its BSSID which is the MAC address of the AP.
A BSSID is the conventional name for a BSS.
What frame types exist in WLAN?
control frames
management frames
data frames
What are control frames used for? What types exist?
used to implement media access control
request to send (RTS)
clear to send (CTS)
acknowledgement
PS, CF
What is a request to send? What is contained?
sent by station to receiver
request permission to send data
contains duration field indicating estimated time to complete the transfer
including subsequent acknowledgement
=> can be used by client in range to determine how long medium will be busy
What is a clear to send? What is contained?
response to request to send
-> grant permission for sending data to specific STA
=> also contains duration field
What is a acknowledgement?
sent by receiving wireless statoin to nitofy sender that data frame was submitted successfully
What are management frames used for? What types exist?
Delivers basic wireless services
like announcement of a BSS and to manage association and disassociation of STAs
Beacons
Association request/response
disassociation request/response
reassociation request/response
probe request/response
authentication / Deauthentication
What are data frames?
frames containing user data
comparable to ethernet frames
What do beacons do?
Periodically announce the SSID of a BSS.
What is the purpose of association ; disassociation; reassociaiton requests/Responses?
asociation:
Sent by STA/AP when a new STA wants to join a BSS.
disassociation:
Sent by STA/AP when a STA is about to leave a BSS
reasociation:
Sent by STA/AP when a STA lost connection to the BSS and wants to reconnect.
What are probe request/response used for?
Sent by a STA while looking for a BSS with a specific SSID
Both the probe request and response contain the SSID in clear text (even if encryption is enabled)
Since it is sent every time before a STA connects to a BSS the SSID can be discovered by observing the connection establishment.
This is why hiding the SSID is pointless in regard to security.
How can one make control and management frames observable?
set NIC to monitor mode
-> instaead of promiscuous mode (only data frames)
What is the equivalent of CMSA in IEEE 802.11?
distributed foundation wireless medium access control (DFWMAC)
How many variants of DFWMAC are there?
three
two distributed control functions
one point coordinated function
=> all based on CSMA/CA
What parameters does DFWMAC have?
short inter-frame spacing (SIFS)
PCF inter-frame spacing (PIFS)
DCF inter-frame spacing
What is SIFS used for?
shortest waiting time
-> depends on physical implementation (i.e. 802.11ac -> 16 micro seconds)
-> used if STA wants to send short control messages
What is PIFS used for?
SIFS plus one slot time
-> used for time-bounded services (PCF) only
What is DIFS used for?
SIFS plus two slot times
=> therefore longest waiting time
-> used for normal data transfers
How does DFWMAC-DCF using CSMA/CD work?
if medium not busy when STA want to transmit
-> wait at least DIFS period
-> afterwards allowd to send immediately if medium still free
-> otherwise -> choose random backoff lying in contention window
=> wait for DIFS plus random backoff time
if medium busy -> start over again
otherwise send data
if transmission successfull, RECEIVER waits only for SIFS and sends acknowledgement
sender: try to resend if after one DIFS no ACK was received
How is ensured in DFWMAC-DCF using CSMA/CS that acknowledgements have higher priority?
can be sent after SIFS
-> if sending regular stuff, stations have to wait DIFS (longer thatn SIFS) to transmit after medium became idle…
How can collisions happen in DFWMAC-DCF using CMSA/CD?
two stations coincidentially use same backoff time -> start sending at the same time
two stations mutually out of range (hidden terminals) => may overlap and only be visible to other stations but not stations involved…
How is the probability of collisions implemented in DFWMAC-DCF using CSMA/CA?
exponential backoff algorithm
-> STAs involved into collision increase sizue of contention window from wich number of backoff slots randomly chosen
-> increases each colliuson (siumioar to CSMA/CD in ethernet…)
What is a method to deal with potential collisions by hidden terminals?
DFWMAC-DCF with RTS/CTS extension
=> use additional control frames RTS and CTS (request to send, clear to send)
How does DFWMAC-DCF with RTS/CTS extension work?
Uses same waiting strategy as DFWMAC-DCF with CSMA/CA
=> but instead of sending data frame -> send RTS frame (due to same waiting time -> same priority…)
-> receiver of RTS frame (often AP in infrastructure mode) answers with CTS frame
What does a RTS contain?
receiver address
time needed to transmit the data frame
plus expected time to receive ACK from receiver
What do other clients sensing an RTS do?
adjust net allocation vector (NAV)
in accordance with duration field in RTS frame
NAV -> specifies earliest point in future at which station can try to access medium again
What is contained in a CTS?
duratoin field
-> specifying estimated time untiul transmission of the data frame and the ack id complete
What do clietns to that receive a CTS?
ajdust NAV same way as ones receiving RTS
Now, how is hidden terminal problem mitigated using RTS, CTS?
-> as both the sender and receiver transmit sth. (RTS; CTS)
=> all from them reachable stations get notified
-> thus, no hidden stations in proximity anymore…
When can a sender start sending after receiving a CTS?
after SIFS
What is the virtual reservation scheme?
RTS / CTS scheme
-> “reserves” medium through time values in CTS RTS frames…
Are in DFWMAC-DCF with RTS/CTS collisions still possible?
yes
-> if STA coincidentially chose same backoff time…
-> or if RTS/CTS not sensed… => collision if RTS of other station is sent before ongoing data transfer is sensed…
What can DFWMAC-DCF with RTS/CTS or CSMA/CA not ensure?
maximum access delay
minimum available bandwidth
What does PCF require?
an access point controlling media access
=> thus cannot be used in ad-hoc
Is PCF usually used?
no is optional
-> seldomly used
How is the medium controlled in DFWMAC-PCF with polling?
access time split into super-frames
super-frames made up of contention-free and contention period
during contention period:
STA may request sending according to RTS/CTS
during conteiton-free period:
AP explicitly polls stations by sending specialized control frames (PS frame)
-> is allowed to send this after PIFS -> thus always priority before STAs (having to wait DIFS to send data)
=> polled client allowed to send data after SIFS period
afterwards AP polls next client
=> AP guarantees both maximum access delay and minimum bandwidth to each client
=> furthermore, AP can prioritize some clients over others implementing some type of QoS
How is contenion-free period announced by AP?
through a beacon frame by the AP
Do AP have to implement DCF?
yes!
What is a distribution system (DS=
connects several BSS into ESS
How are the addresses used?
(from DS / to DS) ; (A1, A1, A3, A4)
(0/0); (DA, SA, BSSID, -)
(0/1) ; (DA, BSSID, SA, -)
(1/0); (BSSID, SA, DA, -)
(1/1); (RA, TA, DA, SA)
What can one infer if the from DS bit is set?
got exchanged in infrastructure network
comes from an AP
Why should one never send data unprotected in WLAN networks?
frames can be intercepted by anyone in range…
What does WEP stands for? What underlying encrpyiton algo is used?
wired equivalent privacy
-> encryption suite
stream cipher RC4
What key is used in WEP?
shared key
-> compressed to 48 or 96 bits
How is encrypted in WEP?
IV + Shared Key into RC4 -> Keystream
Keystream xor data -> encrypted data
data in CRC -> ICV
=> transmitted frame contains IV, encrypted data and ICV
Leayer 2 header is left unencrypted (only L3 payload encrypted…)
In what areas are problems of WEP?
IV fail
RC4 fail
ICV fail
Reply fail
Wiat is the IV fail in WEP?
IV used to encrypt frame
-> after 16 million frames -> IV starts again…
in case of 20 MBit/s -> in about 2 hours
=> same key used for multiple messages…
=> decryption of all messages with same IV is possible if only one is cracked…
=> often, contents of messages known (e.g. ARP or name resolutoin) -> find out about key-stream …
=> also: WEP does not demand that IV are reandomly chosen
-> can happen that all clients start with IV at 0…
What is the RC4 fail in WEP?
known weakness in RC4 about first few bytes of random material that is generated
=> thus RC4 demanging that first few thousand bytes not used for encryption… (of keystream)
-> !!!!! this is not considered by WEP!!!!!
-> plain text of first few bytes can be guesses (e.g. common header fields of higher layer protocols)
-> with siome probability, these provide information about certain byeetes of the WEP key
-> can be used to crack the key…
What is the ICV fail in WEP?
ICV used as kind of crypto. checksum
-> CRC used and encrypted using same mehcanimsm as the payload
-> possible to modify packet and the ICV such that cryptog. checksum remains valid to receiver “!!!
What is the reply fail in WEP?
WEP does not protect from replay attacks
-> attack: KoreK’s chopchop
=> can be used to recover complete keystream of a packet by chopping last byte of payload
adapting ICV, re-injecting
-> if assumpotion correct -> AP will accept frame… otherwise chopped byte can be gueddes again….
=> around 300k injections per packet with full payload needed…
What does WPA stand for and why was it invented?
WiFi protected access
-> used to overcome deficiencies of WEP
What types of basic WPA exist?
WPA-TKIP
temporal key integrity protocol
makes still use of TC4 but with new key scheduling algo
=> advantage: can be used on existing hardware…
WPA AES (advanced encryption standard)
replaces RC4 by AES
cannot be easily supported by older AP through SW updates
What is WPA2 and its improvement over WPA TKIP?
TKIP only uses per packet re-keying with same cipher and hardware -> make sth more secure
WPA2 uses Counter mode ciphre block chaining message authentication code protocol)
=> mroe secure…
CR4 replkaced with AES-CTR and AES-CBC-MAC to provide data integrity
=> since 2006, all WiFi certified devices must support WPA2
What modes of authenticatoin exist with WPA / WPA2?
pre shared key (PSK) mode
i.e. use password to login…
enterprise mode
What are advantages of WPA2 enterprise?
stronger authenticaion and security
-> takes care of authentication, authorization and accounting
authentication server (RADIUS server)
encryption keys generated dynamically per session after presentation of peer credentials (unlike PSK)
What are the three basic participants in radius?
supplicant
client aiminmg to get access to network
authenticator
forwards supplicants request to authenticaoin server and controls based on its decisions access to the network
authentication server
The server is checking the supplicant's request and then informs the Authenticator about its decision. In our setup this will be the radius server
How does the communication in WPA2 enterprise work? (authenticatoin)
supplicant (client) communicates with authenticator (AP) using WAP (extended authentcation protocol)
-> in our case, it is PEAP
TLS used to encrypt the communication
Packets are then forwarded from authenticator to authentication server (radius server) by encapsulating them in radius frames (EAP)
authentication server will answer access request withe either access accept or reject
-> if accepted, -> authentication server will hand pairwise master key to authenticator
-> needed to later generate key for session with supplicant within 4-way handshake
How does the 4-way handshake in WPA2 enterprise work=
both client and authenticator know paiurwise master secret
which is used for authentication between the two partners
=> Here, key from shared secret is derived
What are some general problems with wireless data transmission?
half duplex operatoin
can cause self interference (i.e. through reflection…)
interference in general ->only one shared medium
signal strength decreasing quadratically with distance
multipath propatagion due to reflection and refraction
How does WiFI compare to etherrnet?
half duplex vs full duplex, high speed data transfer
interference vs negligible interference
CSMA/CS and MAC necesarry vs usually no MAC necesarry as switches limit collision domain
security vs no built in security
What different channel access methods are there?
FDMA - Frequency Division Multiple Access
each data stream uses different frequency band
TDMA - time dividion multiple access
each data stream uses different time slot
CDMA Code Division Multiple Access
multiplexing based on spreading-codes
SDMA - Space Division Multiple Access
frequency reuse in different physical areas
Where are different licensed and unlicensed frequencies used?
unlicensed:
13.56 MHz -> NFC; RFID
2.4 GHz -> WLAN, Bluetooth, ZigBee, microwave ovens, RFID…
Mobile Netowrks (licensed)
GSM (2G) 900MHz, 1800MHz
UMTS (3G) 2100MHz
LTE (4G) 800, 1800, 2600 MHz
5G 2100, 3600MHz
How can one categorize types of wireless networks?
inftastructure less vs infrastructure based
single hop vs multi hop
Give examples for infrastructure less single hop networks
WLAN ad-hoc
Bluetooth
ZigBee
Give examples for infrastructure less multi hop networks
Mobile ad-hoc networks
e.g. Car to Car
Give examples for infrastructure based single hop networks
WLAN infrastructure mode
cellular netowkrs
Give examples for infrastructure based multi hop networks
wireless mesh networks
What is the terminology in infrastructure networks?
station
wireless host
access point
base station
group of communicatoin partners that use same channel
extended service set
group of multiple interconnected BSS with common service set identifier (SSID)
distribution system
interconnection network to connect multiple BSS
How are the addresses in WiFi frames used?
source and destination addresses
receiver and transmitter addresses
4 scenarios:
from / to ds (yes/no)
What adresses are used when data is transmitted in ad hoc mode (from station to station thus not from DS or to DS)?
Address 1:
Reciver Address = Destination Address (station)
Address 2:
Transmitter Address = Source Address
Address 3:
BSSID Mac of AP
Address 4:
None
What adresses are used when data is transmitted in infrastructure mode from AP to station ? (not to DS but from DS)
Transmitter Address = BSSID (AP)
Source Address
Empty
What adresses are used when data is transmitted in infrastructure mode from station to AP ? (to DS but not from DS)
Reciver Address = BSSID (AP)
Destination Address
What adresses are used when data is transmitted in between APs ? (wireless distribution system)
Reciver Address
Transmitter Address
=> Basically simlar to MAC and IP in IP routing…
Is CSMA/CA possible in wireless?
collision detection not really possible….
-> sensing while sending is difficult
-> a collision may only be visible to part of the nodes
a frame is always fully transmitted
link layer acknowledgements
=> thus not really…
Does collision mean interference?
no
What is the duration of SIFS?
10 or 16 micro seconds
What is the duration of DIFS?
28 micro seconds, 34 micro seconds or 50 micro seconds
What is the usual duraiton of slot times?
9 or 20 micro seconds
What are the limits of the congestion window?
15 <= CW <= 1023
How does Collision Avoidance work when transmitting a frame?
data link layer receives frame from upper layer
chose random backofftime = Random([0, CW]) * SlotTime
wait until channel is idle for DIFS
if it is again busy -> wait again and increase
while backoff time is > 0, wait for one slot time, decrease it (basically wait for backoff time…)
transmit frame (after / during backoff time medium not busy else wait for DIFS before decreasing backoff time again…)
transmit frame
is ACK received after 1 DIFS?
no -> Congestion window ? Congestion window * 2 -> go back to choosing backoff
yes -> finish
How does congestion avoidance work at receiver side?
data link layer receives frame from physical layer
is received frame okay?
wait for SIFS
transmit ACK
finish
What is important to remember in CA?
the backoff does not start again if medium is busy
-> if busy, simply wait for DIFS before continue to decrase it….
congestion window only increased in case no ACK received (-> for retransmission…)
Backoff chosen from first time on… (min 15… max 1024..)
What is RTS?
ready to send -> not request to send…
What does WPA3 enforce?
the protection of management frames
-> strictly enforced
How does WPA3 personal mode encrypt and authenticae?
authenticatoin -> still regular password used
encryption uses simultaneous authentication of equals
possible weak passwords only for authenticatoin
128bit AES for traffic encryoption with SAE exchanged keys
On what does WPA3 enterprise mode rely?
external server for authentication
-> advantage:
mutual authenticaoitn
centralized authentication
What is WiFI enhanced open mode in WPA3?
older standards dont encrypt traffic of open WiFi networks
=> WPA3 does…
What happens if two hosts have same MAC?
AP -> transmits to both…
but both canot reach each other as the NDP fails…
What happens if you try to establish SSH to IP and MAC shared by two hosts?
connect to both
try to estabilsh to both
-> wrong sequence numbers leads to closing the connection…
Where do you configure the AP?
hostapd.conf
How does wpa_passphrase compute the wpa preshared key form the passphrase?
PBKDF2(passphrase, ssid, 4096, 256)
4096 -> number of iterations
256 -> bit length of key
How are stations deauthenticated?
brodacast deauthentication packets
-> source MAC is the one of the AP
-> uses receiver address of host to be deauthenticated…
-> has reason code (e.g. unspecified reason, inactivity,…)
What is the purpose of the 4-way handshake?
generate keys for encryption between supplicant (station) and authenticator (base station / AP)
What is contained in the first part of the 4-way handshake?
AP transmits Key Nonce (ANonce) and replay counter
based on Nonce, STA can create pairwise TRANSIENT key from (
pairwise master key (shared secret)
Anonce
Snonce
MAC supplicant
MAC authenticator
What is contained in the second message of the 4-way handshake?
Supplicant to Authenticator
also transmits Nonce, Replay Counter and additionally MAC
AP can now also generate pairwise transient key same way as supplicant
replay value is same as in first message
MAC for integrity and authenticity of message (can be verified after calc. PTK)
also, contains information about WAP, such as used ciper and capabilities
What is contained in the third message of the 4-way handshake?
transmit Group Transient Key (encrypted) after verifying MAC, Replay and RSN information from previous message exchange
What is contained in message 4 of the 4-way handshake?
STA checks previosu message (MIC and replay counter)
if valid transmit confirmation to AP
-> finish 4-way handshake…
What protocol is used for the 4-way handshake0-
EAPOL (extended autehticaiton protocol over lan)
Which packet types are probably more interesting for an attacker
beacons
-> get more information about AP in surroundin
-> can use info to spoof one
How is signal strength idnicated?
dBm decibel-miliwatts
Why advantageous to serve as spoofed AP?
can decrypt stuff
contrary to sniffer
(only on L2…)
How can one ensure that a connection is secure between yourself and a public wifi=
admin side:
use individual passwords
client side:
use VPN
What is the first packet exchange when a station wants to reassociate to a BSS?
EAP packet with request identity from AP to STA
Client to AP response identnty in EAP
-> provide its identity, e.g. client1
What follows the request and response identity when reassociating?
EAP-TLS handshake
AP <-> Station
-> Request TLS EAP
<- Client Hello
-> Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done
<- Certificate, Client Key Exchange, Certificate Verify, Change Cipher Spec, ERncrypted Handshake Message
-> Change Cipher Spec, Encrypted Handshake Message
<- EAP-TLS response
-> Success
=> then 4-way handshake
How does authentication happens when RADIUS server is involved?
first authentication between client and radius server
=> TLS handshake forwarded by authenticator by encapsulating it in RADIUS packets….
-> then, client authenticates with AP using 4-way handshake and EAP protocol
-> results in key exchange for encryption…
What is transmitted between authenticator and authentication server?
AP <-> RADIUS
Forwards for the request and response identity
as well as the EAP-TLS handshake
an access request and response between AP and RADIUS server
=> 4 request responses exchanged
1 for identity
3 for TLS handshake
What must the RADIUS authentication of a client be successful before the WPA handhskae can take place?
durint RADIUS
-> TLS master secred established
=> EAP-TLS (WPA Handhsakle) requires such master secret to derive master session key and extended session key
How does WPA3 encrypt?
pairwise encryption between client and AP
client 1 <-> client 2 communication:
AP decrypt from client 1 with pairwise key
re-encrypts to client 2 with their pairwise key
Broadcast:
has group transient key that is shared with all stations in the BSS…
What happens if an AP is shutdown?
CLient tries to connect to other AP in reach
-> usually also done if other AP with same SSID but stonger signal strength in reach…
Last changed2 years ago