Security Evaluation of Wireless Network Access Points

Security Evaluation of Wireless Network Access Points

ISSN 2255-8691 (online) Applied Computer Systems ISSN 2255-8683 (print) May 2017, vol. 21, pp. 38–45 doi: 10.1515/acss-2017-0005 https://www.degruyter.com/view/j/acss Security Evaluation of Wireless Network Access Points Rūdolfs Kalniņš1, Jānis Puriņš2, Gundars Alksnis3 1,2Riga State German Grammar School, Latvia 3Department of Applied Computer Science, Riga Technical University, Latvia Abstract – The paper focuses on the real-world usage of IEEE 5. to examine the expert’s opinion on wireless network 802.11 wireless network encryption and Wi-Fi Protected Setup configuration. (WPS) function. A brief history on the development of encryption Hypothesis: Most users are not well informed about the methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have security of wireless networks. been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been II. SUMMARY OF 802.11 ENCRYPTION METHODS AND conducted. To test the security of encryption methods and WPS WI-FI PROTECTED SETUP function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set A. Overview up 802.11 network with a pre-shared key is to use Wi-Fi The first wireless network encryption standard Wired Protected Access 2 (WPA2) encryption without support for WPS Equivalent Privacy (WEP) was introduced as part of the function. Statistics in Riga shows that networks are often original 802.11 specification ratified in 1997. Vulnerabilities configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding in this encryption method were discovered in 2001, which the security of wireless networks. required the development of a new encryption standard [2]. In 2002, Wi-Fi Alliance released a new encryption method Wi-Fi Keywords – Network security, unauthorised access, wireless Protected Access (WPA), which was compatible with old networks. hardware and thus only required software upgrade [3]. However, this was only a temporary workaround and Wi-Fi I. INTRODUCTION Alliance kept on improving WPA. The wireless specification Security of wireless networks is a topical issue all over the 802.11i was ratified in 2004 and it included the improved Wi- world, especially in the recent years [1]. People start Fi Protected Access 2 (WPA2). Since then no new encryption increasingly using wireless networks at school, work, cafés, standards have been ratified, but in 2007 Wi-Fi Alliance parks and in other places. A new trend is connecting created an additional safety method – Wi-Fi Protected Setup appliances and other devices to the Internet. It is called (WPS). WPS makes it possible to connect to a wireless Internet of Things (IoT), and often this connectivity is made network just by pressing a hardware button, thus avoiding possible using wireless networks. It makes these devices entering a password altogether [4]. It should be noted that portable, but also security risks are created [1]. Data sent since the focus of the research is the security of wireless through wireless networks can be captured and analysed for networks using pre-shared key encryption methods, the illegal purposes, for example, acquiring credit card security of enterprise networks has not been researched. The information. It is the reason why the present research focuses 802.1x authentication method is used in enterprise-grade on the security of wireless network access points and networks. Instead of using one pre-shared key, unique user controllers. If unauthorised access can be prevented, data names and passwords are distributed to clients of the network, breaches can also be prevented. The research problem is increasing the overall security of the wireless network [4]. defined as the security of wireless network access points. Goal B. WEP Encryption of research is to determine the configuration of wireless networks in a city. Five tasks have been set: WEP encryption was the first method to secure a wireless 1. to identify the safest possible wireless network network [4]. Before data are encrypted, a checksum is created configuration; to perform an integrity check, and then the data frame is 2. to ascertain knowledge about the security of wireless encrypted using the stream cipher RC4 algorithm. Since this networks of the average user via an online survey; encryption method is outdated and can be easily decrypted, 3. to determine the security methods used in the wireless numerous vulnerabilities exist, such as the FMS attack, PTW networks of the capital city of Latvia – Riga downtown and attack and others [5]. The present research includes a review Agenskalns areas. of vulnerability, which reveals the password of a WEP 4. to make unauthorized access attempts to wireless networks, network. Research from TU Darmstadt proves that it is which use the safety methods of the wireless networks in possible to acquire a password of a WEP network in just 60 Riga downtown and Agenskalns areas. seconds [6]. ©2017 Rūdolfs Kalniņš, Jānis Puriņš, Gundars Alksnis. 38 This is an open access article licensed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), in the manner agreed with De Gruyter Open. Applied Computer Systems ________________________________________________________________________________________________ 2017/21 C. WPA/WPA2 Encryption III. INTERVIEW WITH PETER JOHANSSON (WATCHGUARD) Due to high vulnerability of WEP networks, Wi-Fi Alliance An interview with WatchGuard Regional Manager in created a new encryption method WPA, which was improved Northern Europe and Baltics Peter Johansson was conducted by WPA2 [7]. WPA encryption was a temporary workaround within the framework of the research. WatchGuard is an until a safer encryption method was developed. Since it had to enterprise network security solution provider, and because of be supported by the same hardware that supports WEP, very that the opinion of WatchGuard representative is competent strong encryption could not be introduced due to a lack of and valuable. The interview was conducted during the processing power, but there were significant improvements international IT conference DSS ITSEC 2016 [12]. over WEP, for example, the introduction of Temporal Key During the interview, questions were asked regarding the Integrity Protocol (TKIP) and others. As described in a awareness of network security of the general population, the publication by TU Dresden, manipulation of sent data packets security of wireless networks in real life and network security in a WPA network is possible, along other vulnerabilities [8]. as such. Peter Johansson pointed out that the security of With the ratification of 802.11i specification in 2004, the wireless networks depends on the manufacturers of wireless improved encryption standard WPA2 is released and routers and IT professionals. Most users do not want to spend WEP/WPA standards are made deprecated [4]. WPA2 is still time learning about security of wireless networks or do not the safest 802.11 wireless network encryption available at the care about it and their routers are using factory-given service time of writing. It is not perfect, as vulnerabilities still exist. set identifiers (SSIDs) and passwords. If the manufacturer For example, the 4-way handshake (which is also used in creates a different password and SSID for each router, and WPA) enables an offline dictionary attack, which makes a uses WPA2 encryption without WPS function, then the private brute force password guessing attempt up to several thousand network will be safe. If the manufacturer does not apply safe times faster [4]. The University of Central Florida has default settings, most users will not be bothered to change reviewed a possibility of an online dictionary attack, which them and private networks will not be safe. However, if an IT incorporates emulation of wireless network clients, each with professional sets up the network, in most cases it will be safe. a different MAC address, and each emulated client attempts to In such cases, it may be worth thinking of additional safety try a password. Such an attack is up to 100 times faster than a measures, such as firewalls and Wireless Intrusion Prevention traditional online brute force attack [9]. It should be noted that Systems (WIPS). While firewalls are often included in the only way to acquire the password of a WPA2 network software and only require the knowledge of an IT professional (without WPS support) is guessing it, and these vulnerabilities to be set up, WIPS are expensive systems, starting at 1000 only speed up the guessing process. USD for one access point, so it is very unlikely for an average D. Wi-Fi Protected Setup (WPS) Vulnerability home user to even consider it. Since firewalls are software solutions, they are a great way to increase the security of WPS was created to make it easier for an average user to devices connected to a wireless network. Setting up a firewall create a safe wireless network. It is often used – according to increases the network security even if a malicious user tries to the Wi-Fi Alliance product finder, 18,894 devices are certified perform attacks in the network. for WPS usage [10]. There are serious implementation flaws, which make it possible to gain unauthorised access to an otherwise safe network. WPS uses a Private Identification IV. SURVEY – AWARENESS OF NETWORK SECURITY Number (PIN) code to authorise access to a network. If a OF THE GENERAL POPULATION network is using WPS with the Push-Button-Connect method, the process is automated and the user does not have to enter A survey was conducted online with the goal to determine any code himself. However, there are WPS methods, which the knowledge about network security of the public, and their require a manual PIN code input.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us