04.01.2015 Views

Wireles Networks The Definitive Guide.pdf - Csbdu.in

Wireles Networks The Definitive Guide.pdf - Csbdu.in

Wireles Networks The Definitive Guide.pdf - Csbdu.in

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Deauthentication<br />

Deauthentication term<strong>in</strong>ates an authenticated relationship. Because authentication is needed<br />

before network use is authorized, a side effect of deauthentication is term<strong>in</strong>ation of any<br />

current association.<br />

Privacy<br />

Strong physical controls can prevent a great number of attacks on the privacy of data <strong>in</strong> a<br />

wired LAN. Attackers must obta<strong>in</strong> physical access to the network medium before attempt<strong>in</strong>g<br />

to eavesdrop on traffic. On a wired network, physical access to the network cabl<strong>in</strong>g is a subset<br />

of physical access to other comput<strong>in</strong>g resources. By design, physical access to wireless<br />

networks is a comparatively simpler matter of us<strong>in</strong>g the correct antenna and modulation<br />

methods. To offer a similar level of privacy, 802.11 provides an optional privacy service<br />

called Wired Equivalent Privacy (WEP). WEP is not ironclad security—<strong>in</strong> fact, it has been<br />

proven recently that break<strong>in</strong>g WEP is easily with<strong>in</strong> the capabilities of any laptop (for more<br />

<strong>in</strong>formation, see Chapter 5). Its purpose is to provide roughly equivalent privacy to a wired<br />

network by encrypt<strong>in</strong>g frames as they travel across the 802.11 air <strong>in</strong>terface. Depend<strong>in</strong>g on<br />

your level of cynicism, you may or may not th<strong>in</strong>k that WEP achieves its goal; after all, it's not<br />

that hard to access the Ethernet cabl<strong>in</strong>g <strong>in</strong> a traditional network. In any case, do not assume<br />

that WEP provides more than m<strong>in</strong>imal security. It prevents other users from casually<br />

appear<strong>in</strong>g on your network, but that's about all. [5]<br />

[5] One of O'Reilly's offices had a strange situation <strong>in</strong> which apparent "<strong>in</strong>terlopers"<br />

appeared on the network. <strong>The</strong>y eventually discovered that their ESS overlapped<br />

a company <strong>in</strong> a neighbor<strong>in</strong>g office build<strong>in</strong>g, and "foreign" laptops were simply<br />

associat<strong>in</strong>g with the access po<strong>in</strong>t that had the strongest signal. WEP solves<br />

problems like this but will not withstand a deliberate attack on your network.<br />

MSDU delivery<br />

<strong>Networks</strong> are not much use without the ability to get the data to the recipient. Stations provide<br />

the MAC Service Data Unit (MSDU) delivery service, which is responsible for gett<strong>in</strong>g the<br />

data to the actual endpo<strong>in</strong>t.<br />

Table 2-1. Network services<br />

Service<br />

Station or distribution<br />

Description<br />

service<br />

Distribution Distribution<br />

Service used <strong>in</strong> frame delivery to determ<strong>in</strong>e dest<strong>in</strong>ation<br />

address <strong>in</strong> <strong>in</strong>frastructure networks<br />

Integration Distribution<br />

Frame delivery to an IEEE 802 LAN outside the wireless<br />

network<br />

Association Distribution<br />

Used to establish the AP which serves as the gateway to a<br />

particular mobile station<br />

Reassociation Distribution<br />

Used to change the AP which serves as the gateway to a<br />

particular mobile station<br />

Disassociation Distribution Removes the wireless station from the network<br />

Authentication Station Establishes identity prior to establish<strong>in</strong>g association<br />

Deauthentication Station<br />

Used to term<strong>in</strong>ate authentication, and by extension,<br />

association<br />

Privacy Station Provides protection aga<strong>in</strong>st eavesdropp<strong>in</strong>g<br />

MSDU delivery Station<br />

Delivers data to the recipient<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!