Basic Security in Wireless Networks Introduction We can finally say that wireless networks are the standard for connecting computers now. Wireless network cards are for long a standard laptop built-in accessory. Almost all broadband routers – a peripheral that allows you to share your broadband Internet connection with several computers – come with an antenna for wireless networking, allowing the sharing of your Internet connection not only with computers connected to the router by cable, but also to those that have antennas for wireless network. With the popularization with wireless networks came also the increased number of users being hacked and their connection or even important data being watched and stolen. In this short tutorial we will teach you the basics of wireless networking security: how to change the default router password, how to upgrade the router firmware, how to enable encryption and making sure that you are using the correct kind of encryption. Broadband routers can be installed very easily. All you have to do is to plug your broadband connection to the connector called WAN and the computers of your home or office to one of the ports called LAN, do a basic configuration for the type of broadband connection that you have (ADSL or cable) and you’re done, everything will be working. If your router has an antenna, the computers in our home or office that have an antenna for wireless networking will be connect to the Internet and your local network will work perfectly too. And here is the danger. Since nowadays most broadband routers support wireless networking and it comes enabled by default, you will have a wireless network enabled in your office or home even if you are not going to use it! Also, most users get so excited that their wireless connection worked seamlessly that they forget about a very important detail. Each and every computer with antenna for wireless network installed in the area will have access to their network. That includes your neighbor's computers and those of hackers stalking the data of your network, or at least enjoying the possibility of surfing the web for free (for you are the one who pays the bill). Reports of hackers who walk the streets of the great urban centers carrying their notebooks hunting for wireless networks without any kind of protection are more and more common. To solve this problem, you need to disabled the wireless networking capability from your router if you are not going to use it or enable encryption, if you are. This configuration must be done both in your wireless router and in the computers that have wireless networking cards that you want to have access to your network and/or your broadband internet connection. There are several encryption algorithms and methods available, the most commons called WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA-2. The problem is that both WEP and WPA methods proved to be flawed, meaning that if your wireless network is currently configured under any of these modes, it is vulnerable. Worse than knowing that your network is unprotected is thinking that it is protected while it isn't!

Another problem is that several users forget to change the default password for the control panel for their routers, which is practically the same as leaving the router without any password at all: when a hacker sees a login screen from a router the first thing he will try is the manufacturer’s default password (e.g., “admin” or “administrator”). So you need to change this as well. In summary, after installing your broadband router, you need to: • • • • •

Change the administrative password. Disable remote management. Upgrade the router firmware to its latest version to make sure it doesn't have any known flaws. Disable the wireless capability if you are not going to use it. Enable or change to WPA-2 encryption on both your router and on your computers.

Changing the Administrative Password The first thing you need to do is to access the control panel of your router. That is done via browser, using a special address (such as http://192.168.0.1, http://192.168.1.1 or http://192.168.0.254 - the exact address depends on the model and has to be checked in the manual). At first you will need to enter the default user and password, which is the one that comes written on the quick start guide or user manual (e.g., “admin”/“admin” or “administrator”/“administrator”). After you enter the control panel from the router, look for an option called “password,” “change password” or similar. The exact name and location will vary according to the router manufacturer and model, and it is almost impossible for us to list all possible locations. We were using a router from Links and on this particular product this option was under “Administration.” As you can see in Figure 1, all we needed to do was to enter the new password under “Router Password,” repeat it again under “Re-enter to confirm” and then click “Save Settings.” Some routers, like the one we were using, do not allow you to change the user name, only the password.

Figure 1: Changing the administrative password.

After saving the changes, a new login using the new password will be necessary.

Disabling Remote Management Some routers come with the remote management option enabled by default. This option allows anyone to access the router control panel from the Internet. For example, let's assume that the public IP address your Internet provider gave you is 69.69.69.69. If remote management is turned on, anyone on the Internet pointing his/her browser to your IP address (e.g., http://69.69.69.69) will have access to your router control panel (you will have a password enabled so the hacker will actually see the login screen). Of course this the most potential entry point to your network and that is why you should disable remote management, unless you are 100% sure you need this option (some technicians will leave this option turned on so they can manage their clients' network remotely - they will need to know their public IP address, of course). A very powerful trick in using remote management is changing the connection port. For example, if you change the connection port to 8081, people trying to open your IP address without entering this port number on their request (e.g., http://69.69.69.69) won't be able to access to the control panel. To access the control panel remotely, you will need to enter a colon and the port number (e.g., http://69.69.69.69:8081), creating a difficulty layer to the remote access. The exact location where you configure remote management depends on your router model and brand. On the router we were using, this option was available under the "Administration" option, on the same screen where we change the administrative password. See the option "Remote Management" in Figure 1 presented in the previous page, where we disabled this option.

Firmware Upgrade Firmware is the software the runs inside any hardware device. In the case of your broadband router, you need to keep this software up-to-date to make sure your network is protected against any known flaws and, more importantly, vulnerabilities. Login to the control panel from your router as described in the previous page and look for a place where it shows the current firmware version. In the case of our router, this was shown on the upper right corner from every page. A few routers allow you to download and upgrade the latest firmware by just clicking a button inside their control panel. If you are the lucky owner of one of these routers, look for an option that downloads and upgrades the firmware automatically. In most cases, however, you will need to download a file to your computer, upload this file to your router and then proceed with the firmware upgrade. To download the latest firmware, go to your router manufacturer website and look up on the download section or support pages if there is a more recent firmware for your router. You will need to know the exact model number from your router and sometimes also the revision (tip: look at the sticker available on the product). After locating the file, see if it carries a version number higher than the one your router is currently using. Of course if your router is already using the latest firmware available

no upgrade is necessary. Then download the file to your computer. Usually the file will have a zip extension, meaning that you need to uncompress it before uploading to the router. Next locate on the control panel from your router where you can upgrade its firmware. As usual the exact location will depend on you router manufacturer and model. In our case this option was called “Firmware upgrade” and was available under “Administration.” On this screen, shown in Figure 2, you will need to browse your computer for the uncompressed firmware file (that usually has the extension bin) and then click on the “Upgrade” box.

Figure 2: Firmware upgrade screen. The upgrade process takes a little while and after the upgrade a new login will be necessary.

Disabling the Wireless Networking Capability If you are not going to use the wireless capability from your broadband router, you must disable it, otherwise hackers will be able to easily access your network using a computer with a wireless network card. The exact name and location of this option will vary according to your router manufacturer and model. In our case this option was available under “Wireless,” “Basic Wireless Settings,” “Wireless Network Mode.” In theory this option configures the wireless network mode (i.e., speed), but it also presents an option called “Disabled,” as you can see in Figure 3. After selecting this option, simply click on “Save Settings.” Of course if you want to have a wireless network you need to keep this option configured with the wireless mode (speed) you want to use.

Figure 3: Disabling the wireless network.

Enabling Encryption Now you need to enable WPA-2 encryption. As we explained, routers come with no encryption at all, meaning that anyone can have access to your network! As usual, the exact location where this configuration is done will depend on your router brand and model. In our router this configuration was available under “Wireless,” “Wireless Security.” Several encryption options are available, as you can see in Figure 4. Choose WPA-2 or “WPA2 Personal” (the “WPA2 Enterprise” option allows the use of a RADIUS authentication server for users to login to the network; this feature is normally only used on large corporate networks). If your router doesn’t list WPA2 as an option, this means your router doesn’t support WPA2 (probably because it is an older model). We’d suggest you to upgrade its firmware, but this should be already done by now. In this case we strongly suggest you to replace your router, as your network won’t be secure with it.

Figure 4: Encryption options. Choose “WPA2-Personal.” After choosing WPA-2 as the encryption mechanism to be used, you will need to create a security key (think of it as a password to access your wireless network). Users willing to connect to your network wirelessly will need to configure this key on their computers. You need to create a random key containing 63 alphanumeric characters. It can be shorter, but we don’t recommend. Just go crazy pressing random characters on your keyboard, don’t feel tempted in actually typing something that make sense (see example in Figure 5; obviously don’t use the example we are giving). After typing this random 63-character word, select it, copy it to Notepad and then print it. Don’t forget to save it by clicking on “Save Settings.”

Figure 5: Configuring the encryption key. The next step is to configure the computers that can access your network to use the random key you have just created.

Configuring The Client PCs The last step is obviously configuring the computers you want to have access to your network wirelessly to use the encryption key you configured, otherwise they will be blocked out of your network. For that, simply click on the wireless network icon on the task bar (one of the small icons near the computer clock) and select your network from the list that will be shown (see Figure 6). To make sure the correct kind of encryption is enabled, double check to see if “WPA2” is listed for your network. In our case, our network was called “Gabriel,” see how WPA2 is being listed for this network. By the way. Change the default network name (SSID) if you haven’t done so. If you use the router’s default name (e.g., “linksys”) you may end up having several networks with the same name on the same area, making it confusing to identify which network is yours from the list of detected networks.

Figure 6: Selecting the network. After selecting your network and clicking on “Connect,” the operating system will ask you to enter the network key (that random 63-character word) two times. You only

have to do this on the first time the computer connects to your network, after that the computer memorizes the key.

Figure 7: Entering the encryption key. That’s it, now you are safe to use your network and can sleep better at night!

Basic Security in Wireless Networks

that have an antenna for wireless networking will be connect to the Internet and ... default user and password, which is the one that comes written on the quick start ... example, let's assume that the public IP address your Internet provider gave ...

99KB Sizes 1 Downloads 259 Views

Recommend Documents

WIRELESS NETWORKS IN ARCHAEOLOGY AND ...
the whole development of wireless technology from its early origins up to today. .... PDAs to mobile phones, especially 3G phones that, in the meantime, had ...

Evolutionary Games in Wireless Networks
Sep 15, 2009 - ulation(s) as biologist observe, where as in engineering, we can go ... time of convergence of this dynamics that is polynomial in the degree of.

Intelligent Jamming in Wireless Networks with ... - CiteSeerX
create a denial of service attack. ... Index Terms—Denial of Service, MAC protocol attacks, .... presented in [1] that showed that wireless networks using TCP.

Wireless Networks & Security.pdf
What is Wireless LAN? Explain. 5. c. Explain TCP over Wireless network. 4. Page 2 of 2. Main menu. Displaying Wireless Networks & Security.pdf. Page 1 of 2.

Wireless Mesh Networks
networking, internet, VOIP and multimedia streaming and broadcasting. ... The software development platform for multimedia campus networking is based on ...

pdf wireless security
Download. Connect more apps... Try one of the apps below to open or edit this item. pdf wireless security. pdf wireless security. Open. Extract. Open with. Sign In.

An Exposure towards Neighbour Discovery in Wireless Ad Hoc Networks
geographic position presented by GPS or by a Mac address. The objective is to recommend an algorithm in which nodes in the discovery of network their one-hop neighbours. It was assumed that time is separated into time slots and nodes are completely s

On Optimal Route Construction in Wireless Mesh Networks
I. INTRODUCTION. Wireless mesh networks have received considerable inter- ests thanks to their realm of possibilities such as instant deployability, self-configuring, last-mile broadband access pro- visioning, and low-cost backhaul services for large

Transmitter Cooperation in Ad-Hoc Wireless Networks
Transmitter Cooperation in Ad-Hoc Wireless Networks: Does Dirty-Paper Coding Beat Relaying? Chris T. K. Ng. Andrea J. Goldsmith. Dept. of Electrical ...

Defeating Heterogeneity in Wireless Multicast Networks
tracking the hardware capabilities of all mobile clients can be excessive in the ... have only one WiFi antenna because of space and energy ..... WiFi model. We compare the multicast performance of Pro- crustes with that of WiFi MIMO PHY. The WiFi tr

The Deaf Node Problem in Wireless Networks
We plan to work on these problems in ..... as construction sites and disaster-torn areas, wireless networks are often the only op- ...... the recovery is very slow. Also .... Two consecutive packets (for example, DATA and ACK) are separated by a.

Parallel Opportunistic Routing in Wireless Networks
Abstract—We study benefits of opportunistic routing in a large wireless ad hoc network by examining how the power, delay, and total throughput scale as the ...

A Survey of Key Management Schemes in Wireless Sensor Networks
Wireless sensor network, key management, security, key predistribution, pairwise key, ... F. Hu is with Computer Engineering Dept., Rochester Institute of Technology, Rochester, ..... phases that perform a particular job each, including Sender Setup,

Reaching consensus in wireless networks with ...
In this paper, the effect of the wireless medium on simple consensus protocol is explored. In a wireless environment, a node's transmission is a broadcast to all ...

Energy-Aware Distributed Tracking in Wireless Sensor Networks
At the fusion node a BLUE (Best Linear Unbiased Estimation) approach is used to combine ... instance, the lifetime of the wireless sensor network is improved ...... in a power constrained sensor network,” in Vehicular Technology Con- ference ...

Reaching consensus in wireless networks with ...
Email: [email protected]. Anand D. ... Email: [email protected]. Alexandros G. ...... [19] A. D. Sarwate and A. G. Dimakis, “The impact of mobility on gossip.

Energy-Aware Distributed Tracking in Wireless Sensor Networks
In wireless sensor network (WSN) applications, a common .... Said formulation uses ..... in a power constrained sensor network,” in Vehicular Technology Con-.

Scheduling in Multi-Channel Wireless Networks: Rate ...
Jun 17, 2009 - 5/25. Introduction. Problem description. Preliminaries. Optimal service rules. Simulation results. Conclusions. Motivation. • Traditional approach.

Transmission Power Control in Wireless Ad Hoc Networks
Transmission Power Control in Wireless Ad Hoc. Networks: ..... performance (compared to TDMA and FDMA), CDMA has been chosen as the access technology of choice in cellular systems, including the recently adopted 3G systems.

Connectivity-based Skeleton Extraction in Wireless Sensor Networks
boundary of the sensor network to identify the skeleton points, then generating the skeleton arcs, connecting these arcs, and ..... boundary partition with skeleton graph generation. As .... into skeleton arcs which will be described in next section.

An Exposure towards Neighbour Discovery in Wireless Ad Hoc Networks
An Exposure towards Neighbour Discovery in Wireless. Ad Hoc Networks. S. SRIKANTH1, D. BASWARAJ2. 1 M.Tech. Student, Computer Science & Engineering, CMR Institute of Technology, Hyderabad (India). 2 Associate Professor. Computer Science & Engineering

Robust Computation of Aggregates in Wireless Sensor Networks ...
gossip[4] because DRG takes advantage of the broadcast nature of wireless ... For more discussions on the advantages of distributed localized algorithms, we ...