II. Definitions
- Radio Frequency (RF) Communication
- Transmission and reception of wireless electromagnetic signals (at specific frequencies) for data communication
- Requires antenna, either internal (e.g. mobile device) or external (e.g. Wi-Fi router)
III. Background: Short-Range Wireless Standards (Personal Area Network or PAN)
- Radio-frequency identification (RFID, one-way communication)
- Active tags are self-powered (e.g. battery) and may be detected <100 meters away
- Passive tags must be relatively close to RFID reader to be detected
- https://en.wikipedia.org/wiki/Radio-frequency_identification
- Near Field Communication (NFC, two-way communication)
- Inter-device (e.g. phone) communication for data transmission (within 4 cm)
- Payments via Apple Pay, Android Pay to Visa PayWave, MasterCard PayPass
- Typically requires fingerprint, 2-factor authentication
- https://en.wikipedia.org/wiki/Near_field_communication
- Infrared
- Older, typically line-of-sight, 1-to-1 interface between devices (e.g. mobile, TV remote)
- https://en.wikipedia.org/wiki/Consumer_IR
- IEEE 802.15 Wireless Personal Area Network
- https://en.wikipedia.org/wiki/IEEE_802.15
- Bluetooth
- Personal area network typically within 10 meters (but up to 100 meters) at speeds up to 24 Mbits/s
- Only basic security protection, and can be hacked
- https://en.wikipedia.org/wiki/Bluetooth
IV. Background: Medium-Range Wireless Standards (Wireless Local Area Network or WLAN, 802.11)
- Approach
- Businesses typically use multiple access points, given relatively short Wi-Fi transmission distances
- Most Wi-Fi routers will accept connections from multiple different standards (e.g. B, G, N)
- Each frequency band has channels
- 2.4 Ghz band (B, G): 14 overlapping channels each with 5 Mhz spread (per FCC guidelines in U.S.)
- Non-overlapping channels (1, 6, 11, 14) have less chance of interferance from other signals
- 5 Ghz band (N, AC): 23 non-overlapping channels (per FCC guidelines in U.S.)
- 2.4 Ghz band (B, G): 14 overlapping channels each with 5 Mhz spread (per FCC guidelines in U.S.)
- Standards
- Old, rare, incompatible with other Wi-Fi standards
- 802.11a (5 Ghz): 54 Mbps (35 m or 115 ft distance)
- Older standards (2.4 Ghz has interference with microwaves and other devices in the same spectrum)
- 802.11b (2.4 Ghz): 11 Mbps (35 m or 115 ft distance)
- 802.11g (2.4 Ghz): 54 Mbps (38 m or 125 ft distance)
- Newer standards (higher frequency)
- 802.11n (2.4 or 5 Ghz): 65-150 Mbps (70 m or 230 ft distance)
- 802.11ac (5 Ghz): 86-780 Mbps (35 m or 115 ft distance)
- Old, rare, incompatible with other Wi-Fi standards
- Encryption Protocols
- Precautions
- Use WPA2 connections (with a strong password)
- Do not use WEP or WPA (encryption broken in seconds to minutes)
- Use WPA2 connections (with a strong password)
- Wired Equivalent Privacy (WEP)
- Replaced with WPA (specifically WPA2)
- RC4 encryption that uses 64-128 bit key for entire data stream
- Has vulnerability that renders it insecure (do not use)
- https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy
- Wi-Fi Protected Access (WPA)
- TKIP (temporal key integrity protocol) encryption that uses new 128-bit key for each packet
- Also allows for WiFi Protected Setup (WPS) - see below
- https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
- Wi-Fi Protected Access 2 (WPA 2, preferred)
- AES (advanced encryption standard) encryption that uses 192 to 256-bit keys (more data over wire)
- Personal version makes use of pre-shared key (PSK) - single password is encryption key (for all users)
- Enterprise versions use much more secure protocols (EAP, RADIUS)
- Can be coordinated with system login (e.g. active directory)
- Can automatically connect to WiFi for authenticated users without the user knowing password/key
- WiFi Protected Setup (WPS)
- Press WPS button on wireless router AND the button on the client device to create link
- Generates random pin that allows the device to access the router, but vulnerable
- Pins are typically short (8 digit) and can easily be brute-force hacked by software (e.g. Reaver)
- May be sufficient for home use, but avoid in business/enterprise
- Precautions
- Utilities: Wifi Analyzers
- See Computer Network for general network tools
- Acrylic WiFi
- Displays wireless signals, channels, standards, encryption and signal strength (RSSI - signal strength)
- Allows for selecting Wi-Fi channels that are not used by other potentially interfering Wi-Fi Routers
- https://www.acrylicwifi.com/en/wlan-software/wlan-scanner-acrylic-wifi-free/
- Ekahau Heat Mapper
- Displays Wi-Fi coverage maps to ensure consistent Wi-Fi coverage
- http://www.ekahau.com/wifidesign/ekahau-heatmapper
- inSSIder
- Displays information on Wi-Fi signals (helps to select channels with least interference)
- http://www.metageek.com/products/inssider/personal/
- Wi-Fi Pineapple
- Devices (e.g. Mark V) used for ethical hacking (white hat) to penetration test wireless access
V. Background: Long-Range Wireless Standards
- Various cell phone and other long-range data sources (e.g. WiMax, LTE, 3G/4G, CDMA)
- http://en.wikipedia.org/wiki/Comparison_of_wireless_data_standards
VI. References
- Warner (2016) CompTia A+ Networking, Pluralsight, accessed 1/14/2017