A. Sebbar, SE. Boulahya, G. Mezzour, M. Boulmalf

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Wi-Fi Technology.
Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Wireless LAN Security Understanding and Preventing Network Attacks.
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Company Confidential WiFiSPARK Limited The Benefits of Wireless Networking Matt O’Donovan WiFiSPARK Limited Tel :
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Technologies Networking Essentials Chapter 12 – Part 2 Fall, 2012.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Securing Home Networks (including WiFi and Servers) By Dr. Rafael Azuaje, Sul Ross State University, Alpine, TX Home networks (wire/wireless) are becoming.
 2009 AirTight Networks. Financial Districts Wireless Vulnerability Study A study conducted by AirTight Networks, Inc.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Northeastern Illinois University. Authors Salwa Abdelrahim Samia Nur Eldayim Supervisor Prof. Cafatori.
Wi-Fi Public Access Requirements for Wireless Products & Technologies Public Access Provider Perspective Phil Belanger.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
A Study of the Geographic Spread and Security of Wireless Access Points Stuart Cunningham & Vic Grout Centre for Applied Internet Research (CAIR) University.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
ogWifi brings Wireless to YOUR community Who and what is ogWifi? ● Non-profit volunteer-based Community WIFI Group ● Help businesses and organizations.
Wireless Networking What You need to remember. What you need: A wireless router (Microsoft MN-700 Wireless router shown) A Wireless Adapter (Microsoft.
Wireless Networks Dave Abbott.
Optimizing the In-Home Experience
Outline What is Wireless LAN Wireless Transmission Types
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Instructor Materials Chapter 9: Testing and Troubleshooting
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Network Neighborhood? Who’s on Your Wi-Fi?
Presented by: Jeffrey D. Bombell, American Computer Technologies
Institution Affiliated
How To Set Up A Wireless Network
Wireless Technology.
Unit 9 Network Fundamentals
Wireless Fidelity (15881A0515).
WUR Discovery Frame Content
WUR Discovery Frame Content
802.11b Wireless Network Security
Wi-Fi Technology.
WUR Discovery Frame Content
WUR Discovery Frame Content
WUR Discovery Frame Content
WUR Discovery Frame Content
Differences between WSN & MANET By: Dana Alotaibi.
WUR Discovery Frame Content
WUR Discovery Frame Content
And test your signal strengths
LM 5. Wireless Network Security
An Introduction to Wireless Router Setups
Presentation transcript:

A. Sebbar, SE. Boulahya, G. Mezzour, M. Boulmalf An Empirical Study of Wi-Fi Security and Performance in Morocco WarDriving in Rabat A. Sebbar, SE. Boulahya, G. Mezzour, M. Boulmalf Presented by Anass SEBBAR 2nd International Conference on Electrical and Information Technologies  ICEIT 2016

WIFI Widely Used, but Poses many Challenges Many people access the Internet over WIFI Easy and simple Here at the hotel WIFI poses many security & performance challenges Unsecure WIFI Steal bandwidth See visited web pages & steak cookies Attacker can position itself between user & access point => See passwords, credit cards, email if user doesn’t detect certificate problem Performance issues Interferences (use the same channel) before WIFI(you have to stay near the cable) WIFI(connection established by wave) – LiFi

Important to Study State of WIFI in Morocco It is possible to set up WIFI properly Security: use WPA2 Performance: use different channels Unfortunately, WIFI not always properly used Security: unsecure WIFI, WEP Performance: everyboday uses the same channel Research question: What is the state of security and performance of WIFI networks in Morocco? Morocco is ICT regional leader: conferences, companies Care about network security & peformance

Study Overview 1st academic field study about WIFI security & peformance in Rabat Wardriving Drive through streets (antenna & tools) Collect info about access points Security Channel use Vendors

Wardriving - Trajectory Hay Nahda & Hay Riad (20 km) Hay Sinaii, Zair street, Mahaj Riad, and Annakhil street Trajectory contains Administrative area Administrations Industry headquarters Residential rich area Zone villa Residential urban area Appartment buildings

Wardriving - Tools The set up we use to perform WarDriving: Use a laptop that runs inSSIDer Connect a 7bB omnidirectional antenna to laptop using Wi-Fi PC card Place the antenna outside our vehicle We drive at a speed less than 11 km/h To minimize the consequences of the Doppler effect on our results We use a laptop that runs inSSIDer connect a 7bB omnidirectional antenna to laptop and place the antenna outside our vehicle

Wardriving – Information Collection Data about ~ 10,000 access points Security No security, WEP => unsecure WPA, WPA2 => secure Channel Informs about congestion level RSSI Measure of signal strength Vendor Access point market in Morocco

Trajectory The trajectory contains : Administrative areas: Many administrations, Headquarters of large companies, Rich district Mainly large, Luxurious houses, Urbain district Mainly apartment buildings, Perform a 20km path between HAY NAHDA and HAY RIAD

Most WIFI use Proper Security Vast majority use WPA or WPA2 Good news => security Small % use WEP They believe it is secure Small % use no security Lack of awareness or car Hotspots The figure shows that the vast majority (77%) of networks use either WPA or WPA21.

More Security in the Administrative District Better security in administrative district Possible reason: use of professionals Better security in big houses compared with apartment buildings Possible reason: more awareness ~ 90% use WPA/WPA2 in administrative district Vs > 75% in residential area the percentage of WIFI networks that use WPA/WPA2 in the administrative district (88%) is higher than in the rich residential district (75%), which in turn than in the urban residential district (64%). WIFI security is higher in the administrative district probably because professional IT personnel configure WIFI access points in administrations, whereas end-users configure WIFI networks in residential areas. The difference between the rich and the urban residential district may be due in a difference in security awareness across the two districts

Majority of Networks have a Usable Quality Collect RSSI & use table Reported quality < actual quality Distance Doppler effect A considerable number of networks have a low quality. a small number of networks have a medium quality or a high quality

Channel 1 most Common This figure Shows the list of used Wi-Fi channels : 27% networks use channel 1 23% of networks use channel 6 23% use channel 11 he high usage of channel 1 is surprising given that channel 6 provides the best quality. This result may be due to awareness about high interferences that can occur on channel 6 when everybody chooses that channel. Such awareness may have caused network technicians to choose different channels, namely channels 1 and 11. This in turn has caused high interferences on channels 1 and 11. We note that the best method to find the channel to use is through tools such as Nirsofts WifiInfoView [6].

Types of WIFI vendors in Rabat Always found that the default configuration is provided by the manufactures, the default name AP and SSID broadcast. Thomson Telecom is the leader with 26% because it’s access points formed by the service provider in Morocco The interest is the distribution of access points by vendor (figure 9) is the configuration of the latter. A large percentage of Aps is always found that the default configuration is provided by the manufactures, the default name AP and SSID broadcast. Usually only 77% of access points were (WEP, WPA, WPA2) and activated until the majority have left their AP Default SSID. Thomson Telecom is the leader with 26% because it’s access points formed by the service provider in Morocco that particularly the only market that vendor APs with identical configurations greatly facilitate a type of ad hoc roaming. The figure below shows access points of vendor in Morocco by order.

Related Work Many wardriving studies in countries other Morocco First wardriving was carried in 2002 American cities (boston, San Diego) Norway Barcelona 32 areas in nine contries. Example: Wifi networks that use appropriete security 76% in LONDON 64% in DUBAI WIFI security in these countries comparable to Morocco

Conclusion First academic study of WIFI security & peformance in Rabat WIFI security in the areas studied in Rabat is comparable to WIFI security in developed countries Majority of WIFI networks use channel 1 Relieve channel 6, but not optimal (should use tools) Majority of WIFI networks have a usable quality Policy recommendations Awareness programs about WIFI security and tools to choose optimal channel