Bachelorarbeit, 2006
94 Seiten, Note: 1,7
1. INTRODUCTION
2. LITERATURE REVIEW
3. METHODOLOGY
3.1. TIMETABLE AND LOG-KEEPING
3.2. THE ARTEFACT
3.3. METHODOLOGY REFLECTION
4. WLAN BASICS
4.1. THE IEEE STANDARDS
4.2. RELATIONSHIP BETWEEN THE WI-FI ALLIANCE AND THE IEEE
4.3. WLAN ARCHITECTURE
4.3.1. Independent / Ad-Hoc
4.3.2. Infrastructure
5. SECURITY
5.1. SECURITY OBJECTIVES
5.2. WLAN SECURITY
5.3. WEP ARCHITECTURE
5.3.1. How WEP works
5.3.2. WEP – why it doesn’t work
5.3.3. WEP Summary
5.4. NEW SECURITY: 802.11I AND WPA
5.4.1. Temporal Key Integrity Protocol (TKIP)
5.4.2. What is WPA?
5.4.3. Counter Mode with CBC-MAC and Robust Secure Networks
5.4.4. Mixed Mode – Transitional Security Network (TSN)
5.4.5. 802.11i Summary
5.5. INTERIM AND EXTRA SECURITY SOLUTIONS
5.5.1. VPN and IPSec
5.5.2. SSL and SSH
5.5.3. Other alternatives
5.6. A BAD SECURITY EXAMPLE: NINTENDO DS
6. WIRELESS LAN PENETRATION TEST – AN EXPERIMENT
6.1. ASSEMBLING THE GEAR
6.2. GATHERING BASIC INFORMATION
6.3. ATTACKING WEP
6.4. GETTING PAST THE MAC FILTER
6.5. GETTING NETWORK SETTINGS
6.6. CONCLUSION
7. PHYSICAL LAYER SECURITY
7.1. FREQUENCIES AND THEIR USE
7.1.1. 2.4 GHz WLAN technology
7.1.2. 5GHz WLAN technology
7.1.3. Advantages and Disadvantages of the frequencies
7.2. HOW WLAN SIGNAL STRENGTH IS MEASURED
7.3. HOW THE SIGNAL IS AFFECTED
7.3.1. Straight-Line Losses
7.3.2. Interference
7.3.3. Practical Test: Microwave ovens versus WLANs
7.4. ANTENNAS AND THEIR IRRADIATION PATTERNS
7.4.1. Dipole Antennas
7.4.2. Directional Antennas
7.4.3. Antenna size matters
8. EXPERIMENTS
8.1. GENERAL ISSUES
8.1.1. Hardware and Software Configuration
8.1.2. Measuring the WLAN signal strength
8.1.3. Windows and Netstumbler
8.1.4. Linux and Wavemon
8.2. AVOIDING INTERFERENCE
8.3. MAKING THE TEST RESULTS COMPARABLE
8.4. EXPERIMENTS AND RESULTS
8.4.1. Signal loss for obstacles
8.4.2. Using a home-made reflector
8.4.3. Other means to shield the Access Point
8.5. RECOMMENDATIONS FOR PLACING THE ACCESS POINT TO INCREASE SECURITY
9. CRITICAL EVALUATION
9.1. EVALUATING THE OBJECTIVES
9.2. EVALUATING OF THE PROCESS AND PERSONAL REFLECTION
10. CONCLUSION
This project aims to investigate the security landscape of wireless networks in SOHO (Small Office/Home Office) environments, specifically addressing the inherent vulnerabilities of widely used protocols like WEP. By combining theoretical analysis with practical penetration testing and physical layer experiments, the work seeks to provide actionable guidelines for enhancing network security through strategic access point placement and shielding techniques.
6. Wireless LAN penetration test – an experiment
A Wireless LAN Penetration Test is not much different from a normal hack, but the main difference is that the people whose WLAN you are attacking, actually know what is going on and agree with it.
For my practical tests I asked a friend of mine if I could try to hack into his wireless network. We agreed on a few basic rules:
- The penetration test will be passive, meaning that I will not flood the network or attack individual stations in order to produce more traffic. People should still be able to use the internet.
- In order to produce enough traffic, downloads will be running while the test is being done, so I can get enough packets.
- Information acquired during my test will be made anonymous.
- The penetration test is successful as soon as I can surf the Internet.
- No further information other than the fact that there is a WLAN will be provided, the rest has to be gathered
1. INTRODUCTION: Outlines the rise of mobile computing and the corresponding increase in wireless security risks, establishing the motivation for the study.
2. LITERATURE REVIEW: Examines the evolution of wireless security standards, from the flawed WEP protocol to more robust solutions like WPA and 802.11i.
3. METHODOLOGY: Details the research approach, including brainstorming, literature review, penetration testing, and experimental signal measurement.
4. WLAN BASICS: Provides a foundational overview of IEEE 802.11 standards and the architecture of wireless networks.
5. SECURITY: Discusses core security objectives (CIA triad) and analyzes specific mechanisms, including WEP, WPA, VPNs, and physical security considerations.
6. WIRELESS LAN PENETRATION TEST – AN EXPERIMENT: Documents a practical penetration test on a real-world network, demonstrating how easily outdated security measures can be bypassed.
7. PHYSICAL LAYER SECURITY: Investigates how environmental factors and physical antenna placement impact signal leakage and security.
8. EXPERIMENTS: Reports on experimental testing of signal loss caused by obstacles and the effectiveness of homemade reflectors in securing an access point.
9. CRITICAL EVALUATION: Reflects on the research objectives, the limitations of the study, and the personal learning experience of the author.
10. CONCLUSION: Summarizes the findings, emphasizing that security is an ongoing, holistic process and that the human factor remains a primary vulnerability.
Wireless LAN, WLAN Security, SOHO, WEP, WPA, 802.11i, Penetration Testing, Physical Layer Security, Wardriving, Signal Interference, Access Point Placement, Cryptography, Network Privacy, CIA Triad, SSID
The paper focuses on identifying security vulnerabilities in wireless networks within SOHO environments and providing practical methods to enhance their protection against unauthorized access.
The study evaluates WEP, WPA, 802.11i, and discusses additional layers such as VPN, IPSec, SSL, and SSH.
The core research explores whether standard home/small office wireless networks are secure enough and how they can be fortified using existing technology and physical security techniques.
The author used a combination of literature review, a structured penetration test, and empirical experiments regarding signal propagation and interference.
It covers WLAN fundamentals, current security protocols, the mechanics of hacking, physical layer security, and practical experimental results on signal shielding.
Keywords include WLAN, WEP, WPA, Penetration Testing, Physical Layer Security, and SOHO environments.
To demonstrate the impact of external interference on signal stability and availability, highlighting that environmental factors directly affect network reliability and performance.
The experiment demonstrates that users can significantly influence the signal radiation pattern—and thus the security perimeter of their network—using low-cost, household materials.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

