802.11

An Analysis of Current 802.11 Wireless Network Layer One and Two Attacks and Possible Preventative Measures

ABSTRACT

The last 2 years has seen a major increase in the number of users of wireless networks, for both public and private use. Initially, there were a number of problems with data security, such as WEP, that made wireless networks vulnerable to attack. While data security has been increased through the use of tougher encryption and other methods, newer attacks based on lower levels are emerging. Layer 1 is the physical medium used to send the signal, in this case radio frequency, with connection and management handled by the MAC sub-layer of layer 2. Tools such as Airjack and Void11 can be used to launch DDoS and man-in-the-middle attacks against layer 2 of wireless networks, with jamming attacks used against the Physical layer.

On Wireless Network Security

ABSTRACT

We discuss practical security of 802.11b wireless networks through three anecdotal case studies. The dangers facing a university faculty, a small business and a home user are explored. Information Burglary—industrial espionage against telecommuters—is introduced. We investigate the underlying causes of security holes, spanning theoretic algorithmic flaws, deployment errors and end-user naivety. Failures to appreciate the range of radio coverage are highlighted and features interactions with other technologies are explored. Technical and ethical suggestions for improvements by the industry and network administrators are made.

Australian Defence Force Policy and the use of WPA2 as a Security Option for Deployment of 802.11 Wireless Networks in the Field

ABSTRACT

The wireless function is an under utilised resource for many military organisations. Until recently, Defence wireless local area network assessments have highlighted wireless inadequacies in relation to data security and the protection of sensitive information. But since the introduction of WPA2 and the acquisition of wireless applications into U.S Dept. of Defence networking infrastructure, global defence departments are testing wireless applications for advantages in the military domain. This paper examined WPA2’s security mechanisms and their relationship with the Australian Defence Force policy and military operational environments. Though still officially unacknowledged in the Australian military landscape, WPA2 offers a robust security solution that can potentially provide the Australian Defence Force with the networking flexibility that only wireless delivers. The analysis conducted here suggests that the use of wireless networks to support military operations when secured using WPA2 methods is feasible.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com