Home > Wifi > How a Wireless Network Works
How a Wireless Network Works
Posted on Sunday, September 18, 2011 by Arman Zulhajar
Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with.
The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with every NIC.
For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range.
Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access to the network or its wires to pick up these packets, just the right tools. It is with the transmission of these packets that pose the largest security threat to any wireless network.
Wireless Encryption
The majority of home and small business networks are encrypted using the two most popular methods:WEP & WPA
WEP – Wired Equivalent Privacy – comes in 3 different key lengths: 64, 128, and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively. WEP provides a casual level of security but is more compatible with older devices; therefore, it is still used quite extensively. Each WEP key contains a 24 bit Initialization Vector (IV), and a user defined or automatically generated key; for instance, WEP 128 is a combination of the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128) WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.
WPA – WiFi Protected Access – comes in WPA and WPA2, and was created to resolve several issues found in WEP. Both provide you with good security; however, they are not compatible with older devices and therefore not used as widely. WPA was designed to distribute different keys to each client; however, it is still widely used in a (not as secure) pre-shared key (PSK) mode, in which every client has the same passphrase.
To fully utilize WPA, a user would need an 802.1x authentication server, which small businesses and typical home users simply cannot afford. WPA utilizes a 48 bit Initialization Vector (IV), twice the size of WEP, which combined with other WEP fixes, allows substantially greater security over WEP..
Every encrypted packet contains a 24 or 48 bit IV, depending on the type of encryption used. Since the pre-shared key is static and could be easily obtained, the purpose of the IV is to encrypt each packet with a different key. For example, to avoid a duplicate encryption key in every packet sent, the IV is constantly changing. The IV must be known to the client that received the encrypted packet in order to decrypt it; therefore, it is sent in plaintext.
The problem with this method is that the Initialization Vectors are not always the same. In theory, if every IV was different, it would be nearly impossible to obtain the network key; this is not the case. WEP comes with a 24 bit IV; therefore, giving the encryption 16 million unique values that can be used. This may sound like a large number, but when it comes to busy network traffic, it’s not.
Every IV is not different; and this is where the issues arise. Network hackers know that all the keys used to encrypt packets are related by a known IV (since the user entered WEP part of the key is rarely changed); therefore, the only change in the key is 24 bits. Since the IV is randomly chosen, there is a 50% probability that the same IV will repeat after just 5,000 packets; this is known as a collision.
If a hacker knows the content of one packet, he can use the collision to view the contents of the other packet. If enough packets are collected with IV matches, your network’s security can be compromised.
Category Article How a Wireless Network Works, Installing Modem With Wifi, Internet Tricks, Wifi
Random Posts
-
Rainbow Web 3 [FINAL] GAME » Match3 The dark Sorcerer Spider has risen to power again, and you are the only one who can stop this villain! ...
-
Halo: Combat Evolved Anniversary is an amazing remastered version of the original "Halo" campaign, created in celebration of the ...
-
CreaVures ( PLATFORM ) [FINAL] Restore the light and help five different CreaVures work together as they save the dying forest in this fun A...
-
Fashion Forward(DASH) [FINAL]| 98 MB finds all is not smiles and sunshine in Fashion Forward, a fun time management adventure from Sandlot G...
-
askutiniu metu vis pataikau žiūrėti liūdnus filmus. Vakarykštį vakarą praleidome keturiese prie "The road" . Vis dar kelia smalsum...
Powered by Blogger.
Blog Archive
-
▼
2011
(3255)
-
▼
September
(257)
- In Search Of The Lost Temple [FINAL]
- Love Story 2: The Beach Cottage [FINAL]
- Google Alert - Farmville Cheats
- Google Alert - Cafe World Cheats
- appmates blackberry application that converts into...
- Nexus Prime Appears On with Android Forum Other Pu...
- Intel Smart Response Technology
- Lexmark Makes Printer and Toner Products Responsibly
- Echoes Of The Past 3: The Citadels Of Time Collect...
- Echoes of the Past (1): Royal House of Stone [FINAL]
- The Agency of Anomalies 2: Cinderstone Orphanage [...
- Heroes of Hellas 3: Athens [FINAL]
- Big City Adventure London CE [Beta]
- Mystery Trackers Black Isle [BETA]
- Reset Forgot Windows 7 Password without Erasing An...
- Reset Your Windows 7 Password Lost Without Admin
- Echoes of the Past: Die Zitadellen der Zeit Sammle...
- Cradle of Egypt [BETA2]
- Apple iPad Wi-Fi 64GB : As good as they say?
- Google Alert - FrontierVille Cheats Videos
- Committed: Mystery at Shady Pines Premium Edition ...
- Fish and mean plants
- Samsung to launch flexible smartphone Galaxy Skin
- Fine Hair is more prone to split ends
- Apple MacBook Pro Core i5 2.3 GHz - 13.3" TFT
- Facebook News: Security Tips For Facebook
- Google Alert - FrontierVille Cheats
- Google Alert - CityVille Cheats
- The Hanging Gardens Of Babylon [FINAL]
- Acer AS7739Z-4469 17.3-Inch Laptop
- Things people do not tell you
- Facebook policies tricky for employers, workers
- Google Alert - FrontierVille Cheats
- Shining Plume 2 [FINAL]
- OIO: The Game v1.0 [FINAL]
- Hanging Gardens Of Babylon [DEMO]
- Azada 3: In Libro [BETA]
- Them: The Summoning [FINAL]
- The Worst Natural Hair Tutorial Ever!
- Fasten Seat Belt and Seat Belt Safety Statistics, ...
- Acer Iconia-6120 14-Inch Dual-Screen Touchbook
- Forza 4 Release Date
- A bird watcher's book
- Google Alert - FrontierVille Cheats
- How to send a birthday gift to a friend on facebook
- Google Alert - FrontierVille Cheats
- Google Alert - Cafe World Cheats
- Latest iPhone 4S with Dual Core Processor & Full H...
- How to Create Recent Post with Thumbnails for Blogger
- News about plants...
- How To Hide Text Behind Images-(Stegonography)
- Google Alert - FrontierVille Cheats
- Mystery Of The Ancients: Lockwood Manor Collector'...
- My Farm Life 2 [FINAL]
- The Blackwell Deception [BETA]
- Adobe’s new Flash vs. HTML 5: 3D game on
- Small things
- Google Alert - FrontierVille Cheats
- HP CEO : How to meaningfully grow revenue
- Halo: Combat Evolved Anniversary - Order Now!
- Make “Readmore” at Your Blog
- Surface: Mystery Of Another World [BETA]
- Order Of The Rose [BETA]
- Sonya Standard Edition [FINAL]
- Playing around...
- Exploding Cell Phone Battery When Charging be Safe
- The Display Change on Facebook
- Zumba Fitness Review
- Samsung Galaxy Tab (Verizon Wireless)
- 4squick Update Now Allows You To Upload Venue Pict...
- Meego Devices Now Available At Nokia Store With Tw...
- Nokia launch their most affordable devices to date...
- Google Alert - FrontierVille Cheats
- Auto Save Passwords Without Notification in Firefox
- Living Legends: Ice Rose [BETA]
- As DADT ends, To expect much change from DADT end
- Coming up : Proteins, Shiny Hair and Tender Heads
- Gears of War 3 Xbox 360 Console Bundle - Limited E...
- Google Alert - FrontierVille Cheats
- The Great Unknown: Houdini's Castle [BETA]
- The Scruffs 2: Return Of The Duke [BETA]
- Fist of the North Star: Ken's Rage Review
- How to Make Your PDF Files Speak to You
- Watch Mature videos on Youtube without sign In
- Canon PowerShot 12 .1MP Camera HS SX40 by 35x Opti...
- Mortimer Beckett (4) & The Crimson Thief Premium E...
- PanDigital 72-70FW 7-Inch Tablet Computer
- Wi-Fi Hacking Tools
- How a Wireless Network Works
- How To Hacking Wi-Fi Network
- Robo Earth Database to Network Robots
- Urban Legends: The Maze [FINAL]
- Mystery Legends: Beauty and the Beast Collector's ...
- Mystery Stories Mountains of Madness [FINAL]
- Antique Mysteries: Secrets Of Howard's Mansion [BETA]
- Oddly Enough: Pied Piper [FINAL]
- Fear for Sale 2 Sunnyvale Story [BETA]
- riminal Minds BETA
- Voodoo Chronicles: The First Sign Collector's Edit...
- The Hardy Boys - The Hidden Theft [FINAL]
-
▼
September
(257)