Wi-Fi security: wireless with confidence

Since the IEEE ratification of the 802.11 standard in 1999, continuous exploits have been discovered compromising the confidentiality, integrity and availability of 802.11 networks. This paper describes the justification for a project to assess the security status of wireless network usage in society. It reviews the status of both commercial and residential approaches to wireless network security in three major Victorian cities, Melbourne, Geelong and Mornington, in Australia. By War Driving these suburbs, actual data was gathered to indicate the security status of wireless networks and give a representation of modern attitudes towards wireless security for the sample population. Preliminary results are presented to demonstrate the extent to which commercial or residential suburbs address wireless security. At this stage in the research further work is required to completely analyse the results. It is anticipated that the results will be useful for providing input into a defence and attack methodology for improving the security of both residential and commercial use of wireless networks.

[1]  B. Issac,et al.  The art of war driving and security threats - a Malaysian case study , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[2]  Suen Yek,et al.  Wily attackers seek wireless networks in Perth, Western Australia for easy targets , 2006 .

[3]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[4]  Johnny Cache,et al.  HACKING EXPOSED™ WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION , 2010 .

[5]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[6]  Stefano Basagni,et al.  Hack Boston: Monitoring Wireless Security Awareness in an Urban Setting , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[7]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[8]  Masakatu Morii,et al.  A Practical Message Falsification Attack on WPA , 2009 .

[9]  Johnny Cache,et al.  Hacking Exposed Wireless: Wireless Security Secrets & Solutions , 2007 .

[10]  Ammar Lodhi Cryptanalysis of IEEE 802.11i TKIP. , 2010 .

[11]  Hal Berghel Wireless infidelity I: war driving , 2004, CACM.

[12]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[13]  Chris Hurley,et al.  WarDriving: Drive, Detect, Defend: A Guide to Wireless Security , 2004 .

[14]  Erik Tews,et al.  Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.

[15]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[16]  Fadi A. Aloul Information security awareness in UAE: A survey paper , 2010, 2010 International Conference for Internet Technology and Secured Transactions.