SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki

George E. Violettas, Tryfon L. Theodoroy, Konstantinos Chalkias, George Stephanides

2008

Abstract

This paper is a study of the use and possible flaws of the two basic cryptographic protocols (WEP, WPA) in Wi-Fi Networks. It presents some very easy to implement methods to gain malicious access to such networks by disclosing the network secret key, using Windows Operating Systems, like Win XP. It also describes the shutter of the myth saying that the MAC Address filtering is a safe practice for securing a wireless network. There is a field research, in which we show the distribution of wireless networks according to the security protocol implemented (if any) at a major city centre in Greece. Unfortunately, according to our results, only 8% of the wireless networks are using a fairly safe cryptographic scheme, 48% is not using any security at all, while the rest is using the totally unsecure WEP encryption.

References

  1. Aircrack-ng. (2007). Retrieved from http://www.aircrackng.org/doku.php
  2. Aircrack-ng. (2007). Is my card compatible with airodump /aireplay ? Retrieved from aircrack documentation: http://www.wirelessdefence.org/ Contents/Aircrack ORIGINAL.html#q080
  3. Airomap. (2007). Retrieved 01 29, 2008, from http://www.divideconcept.net/index.php?page=airosuit e/index.php
  4. Andrew Vladimirov, K. V. (2006). Wi-Foo: The Secrets of Wireless Hacking .
  5. AskOxford. (2008). Retrieved 02 23, 2008, from Oxford Online Dictionary: http://www.askoxford. om/ results/?view=dict&freesearch=dimitris&branch=1384 2570&textsearchtype=exact
  6. Aslam, B. I. (2006). 802.11 Disassociation DoS Attack and Its Solutions: A Survey. Mobile Computing and Wireless Communication International Conference, 2006. Amman: Nat. Univ. of Sci. & Technol.
  7. Bauer, F. L. (2002). Decrypted Secrets. Springler.
  8. Brad, A. (2008). 802.11 Attacks. Retrieved 04 16, 2008, from Foundstone Professional Services: http:// www.foundstone.com/us/resources/whitepapers/802.1 1%20Attacks.pdf
  9. Cygwin. (2007). Retrieved from http://www.cygwin.com/
  10. Ethereal. (2007). Retrieved 11 17, 2007, from http:// www.ethereal.com/
  11. Geier, J. (2003, May 1). Tutorials. Retrieved 01 2008, from Wi-Fi Planet: http://www.wi-fiplanet.com/ tutorials/article.php/2200071
  12. Gorlani, M. (2008). Mac Makeup. Retrieved from http:// www.gorlani.com/publicprj/macmakeup/macmakeup.asp
  13. (2004). Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. In Y. S. Kang, & e. al, Information Networking (pp. 915-924). Berlin: Springer Berlin / Heidelberg.
  14. Kershaw, M. (2007). Kismetwirless. Retrieved from Kismet: http://www.kismetwireless.net/
  15. Lisa Phifer, Core Competence Inc. (2004, 11 17). Using WPA without enterprise AAA.
  16. Microsoft. (2008). What are the different wireless network security methods? Retrieved 01 2008, from Windows Help and How-to: http://windowshelp.microsoft. com/Windows/en-US/Help/b385cc8a-af25-489e-a82edecf6df26b681033.mspx#EZB
  17. Netstumbler. (2008). Retrieved from http:// www.netstumbler.com/
  18. Ohrtman, F., & Roeder, K. (2007). Wi-Fi Handbook. McGraw-Hill.
  19. PISA & WTIA. (2005, April). Wireless LAN War Driving Survey 2004-05. Retrieved 03 2008, from http:// www.hkwtia.org/wtia/WLAN%20War%20Driving%2 0Report%20(2004-5).pdf
  20. Pocket Warrior. (2003). Retrieved 2008, from http:// pocketwarrior.sourceforge.net/
  21. The Shmoo Workgroup. (2008). Retrieved from http://airsnort.shmoo.com/
  22. Wi-Fi Alliance. (2003, Febrouary 6). Retrieved 01 16, 2008, from Enterprise Solutions for Wireless LAN Security: http://www.securitytechnet.com/resource/ hot-topic/wlan/Whitepaper_Wi-Fi_Enterprise2-6-03.pdf
Download


Paper Citation


in Harvard Style

E. Violettas G., L. Theodoroy T., Chalkias K. and Stephanides G. (2008). SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki . In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008) ISBN 978-989-8111-62-3, pages 96-101. DOI: 10.5220/0002027900960101


in Bibtex Style

@conference{winsys08,
author={George E. Violettas and Tryfon L. Theodoroy and Konstantinos Chalkias and George Stephanides},
title={SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)},
year={2008},
pages={96-101},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002027900960101},
isbn={978-989-8111-62-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)
TI - SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki
SN - 978-989-8111-62-3
AU - E. Violettas G.
AU - L. Theodoroy T.
AU - Chalkias K.
AU - Stephanides G.
PY - 2008
SP - 96
EP - 101
DO - 10.5220/0002027900960101