Wireless Weaknesses in Physical Layer
WiFi uses radio waves at frequencies that are public property freely used by
all people with certain restrictions restrictions. Every wifi has a certain coverage area depends
power and antenna used. Not easy to narrow down the area to be reached on the wifi.
This causes a variety of activities made possible place among other activities:
- Interception or tapping
It is very easy to do, and already familiar to hackers. Various tools to
easily obtained on the internet. Various cryptographic techniques can be dismantled by tools such tools.
- Injection
At the time of transmission by radio, made possible due to various weaknesses in the injection
wifi workings where there is no validation process who are connected or who
then disconnect.
- Jamming
Jamming is very possible to occur, either intentionally or unintentionally, because of ignorance
wireless users. Setting the frequency channel usage is mandatory in order
jamming can be minimized. Jamming occurs because the frequency used is quite narrow
so that channel reuse difficult in a dense area wireless networks. S
- Locating Mobile Nodes
With a variety of software, each one capable of performing wireless site survey and get
position information of the location of every Wifi and diverse configurations respectively. This can be done
with simple equipment such as PDAs or laptops with the support of GPS as a position marker.
- Access Control
In building a wireless network design needs in order to separate the node or host
trustworthy and untrustworthy hosts. So it requires a good access control
- Hijacking
The attack MITM (Man In The Middle) that can occur due to various weaknesses in wireless
protocol allowing the hijacking or takeover of communication
is going on and doing theft or modification of information.
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar