Thursday, December 24, 2009

About Me



Budy Thamrin Tidore Born on Earth.

Organizing future was in STMIK AMIKOM Yogyakarta. Sure will all work done is for the future a better course. Very confident and believe that ALLAH SWT to plan things and it was not in vain. Continue to try to do the best would be best to get something too.

To view the content of my articles, please select the title of the article you want to read the menu Blog Archive 

Contact


I really need the support of all friends, criticism and constructive suggestions. Please contact me, if my friends need help from me.
  •  Via e-mail
  1.  boedy.toch@gmail.com
  2.  boedyien@yahoo.co.id

Wireleess Sceurity

Overview article about how safe path to the scope of 802.11 wireless or WAP standards can be made. The method of data delivery in wireless communication with the wired communication is different. Given these differences, it implies a difference in how security can be maintained in the wireless sphere. Because of greater bandwidth, flexibility, and "freedom" it is a wireless communication infrastructure choices in communication. The desire grew as users in terms of security and is always there when needed. For a message that is sent, the user
expect any guarantee of:

• Authentication
Sending and receiving messages is really a he.

• Confidentiality
Messages can only be understood by the intended person.

• Integrity
The message is still intact and can be understood. 802.11 standard provides the facility to meet the requirements for security.

Wireless Physical Transport
Wireless signal that will be conducting data transmission using electromagnetic waves could be radio frequency (RF) or infrared frequency (IR). RF is more widely used in the implementation of wireless data transport method. 802.11 divided into 3 types:

• I-Band 902 MHz - 928 MHz,
• S-Band 2.4GHz - 2.48GHz, and
• M-Band 5.725GHz - 5.85GHz.

Which is now known to the wider community is 802.11b and 802.11a. 802.11b is commonly known as WiFi (Wire Fidelity), including the type of S-band 2.4 GHz and a maximum value of the link rate of 11Mbps. While 802.11a called WiFI5, including the type of M-Band 5.725 GHz and a maximum value of the link rate of 54Mbps.

WLAN Architecture

WLAN architecture is built from the stations and access points (APs). Basic structure is essentially a Service Set (BSS). Can be independent BSS BSS or BSS infrastructure. In independent BSS, stations communicate directly if they are within yangterjangkau, while the BSS infrastructure requires access point (AP) as a liaison between the stations.

WLAN Security Exploits

• Insertion Attacks
Those who do not have wireless access, wireless access with the aim to limited Internet access at no cost.
• Unauthorized Interception and Monitoring
The existence of parties to be "listeners" in the exchange of data between two parties or more. If the data is not properly encrypted, data can be obtained "listener" and managed by him either changed, or just information or taken disseminated.
• Denial of Service (DOS)
Utilizing the jamming signal. Because the use ISM band, then with signal can be affected easily by phone, microwave oven, and any transmission using the ISM band.
• Client-to-Client Attacks
MAC or IP address can be duplicated. Attack is often in TCP / IP can occur the wireless client that provides services such as SNMP, SMTP, FTP.
• Brute Force Attacks Against AP Passwords
Trying passwords by using dictionary password assistance.
• Encryption Attacks
Data sent from the client to the Access Point which is encrypted by using WEP protocol can be easily retrieved.
• Misconfiguration
Configuring the access point is not safe because it only uses the default settings.

Basic 802.11 Security

• SSID
Service Set Identifier (SSID) is a mechanism that can share the wireless networkinto parts with multiple network access point. This same concept with a subnet address that is used in wired LANs. SSID provides a method which can provide access control on the part of the AP or AP. Engineering added to complement this method is MAC Address Filtering.

• MAC Address Filtering
Each computer has a unique MAC address on its 802.11 network card. To enhance security in access control for each AP, each AP deprogram a list of MAC addresses can access the AP.

• WEP
WEP provides additional security with communications between the client encrypt and the AP uses RC4 encryption algorithm. All clients and APs using the same key for encryption and decryption. WEP uses 40-bit encryption key. WEP weakness is, this algorithm is still very easy to be attack. AES became an alternative to this algorithm.

Best Practice For Wifi Security


Although WEP can still be broken, but the WEP key to be implemented on 128-bit version. If WEP is implemented, then the default key must be changed periodically and randomly, and if possible use the session key. Clients must provide a password on the local drives, folders and files. Default SSID should be changed and the AP does not do SSID broadcasting for her and AP must use the MAC filtering. And to ensure end-to-end security, using a virtual private network (VPN).

WAP
With improving technology, to improve the security of a WAP protocol layer underwent a change.

WiMAX Technology

Wimax (Worldwide Interoperability for Microwave Access) is a sign SPECIFICATIONS for products that have passed the test the feasibility of IEEE 802.16 standards. WiMAX is a wireless technology that provides broadband connections over long distances. WiMAX is a broadband technology that has high speed access and wide coverage. WiMAX is an evolution from previous BWA technology with features that are more interesting. than capable of providing high-speed data, WiMAX also brings the issue of open standards. In other words, WiMAX devices in communication between different vendors can still be done (not proprietary). With a large data rates (up to 70 MBps), WiMAX eligible applied for "last mile Addons broadband connections, backhaul, and high-speed enterprise.

Distinguishing the WiMAX with WiFi is the technical standard which joined in it. if the WiFi standard IEEE 802.11 combines with ESTI (European Telecommunications Standards Institute) technical HiperLAN as suitable for WLAN, and WiMAX is a merger between the IEEE 802.16 standard by ETSI HiperMAN standards.

IEEE standards are used widely in asalanya areas, namely in Eroupa and surrounding areas. In order to make this technology is used globally, the WiMAX was created to focus on solving problems outside the network (outdoor) Addons point-to-multipoint wireless broadband, and allows use in a variety of purposes, including long distance to kenoktivitas homes, businesses, and wireless backhaul hotspots Addons

Fourth Generation Technology (4G)

Fourth Generation technology (4G) is a new technology enters the test phase. One was by Japan through NTT DoCoMo, the Japanese mobile phone company, by utilizing the power up to 900 skilled engineers to realize the fourth generation technology.

Motivation 4G technologies:
1. Interactive multimedia service support.
2. Teleconferencing, wireless internet.
3. Wide bandwidth, higher bit rates than 3G.
4. Global mobility, service portability, low-cost service.
5. Scalability for mobile networks.

New technologies in 4G:
1. Fully for packet-switched networks.
2. All the components of digital networks.
3. A large bandwidth to support multimedia services with low cost (up to 100 Mbps).
4. Network data security is strong.

Included in the 4G network are:
1. UMB (Ultra Mobile Broadband) or CDMA2000 1xEV-DO Revision C.
2. UMTS Revision 8 or 3GPP LTE (Long Term Evolution).
UMTS Revision 8 is still in development by the 3GPP to the target average speed download 100 Mbit / s and average speed uploads 50 Mbit / s, so that supports all IP-based networks.
3. WiMAX

Three Half-Generation Technology (3.5G)

3.5G technology, also called Super 3G, is an improvement from 3G technologies, particularly in increasing the data transfer speed over 3G (> 2 Mbps), so it can serve multimedia communications, such as Internet access and video sharing. Included in this technology is HSDPA and Wireless Broadband (Wi-Bro). WiBro is a part of the information technology policy in South Korea, known as 839 policies. WiBro can send data at speeds up to 50 Mbps. Data transfer speed surpasses the data transfer speed to HSDPA platform that has the ability to send data up to 14 Mbps.

Third Generation Technology (3G)

At first, 3G technology is introduced to some of the following purposes, among others:

1. Adding efficiency and network capacity.
2. Adding ability Browse (roaming).
3. To achieve data transfer speeds higher.
4. Improving service quality.
Demands of 3G requirements are:

1. Transmission must be symmetric and asymmetric.
2. Circuit and packet data high berkecepaan (144 Kbps vehicular, pedestrian 384 kbs, 2 Mbps indoor).
3. Enhanced Voice (voice improvement in quality).
4. Multimedia Applications.
5. Spectrum Eisiensi higher.
6. Multi-Environment Operation (operating in all environments): vehicular, outdoor to indoor, indoor office, satellite.


Tecakup for all communication needs, information, entertainment, transactions, travel, and E-Commerce. Which include 3G technology are:

====> EDGE (Enhanced Data Rates for Global / GSM Evolution) or E-GPRS (Enhanced-General Packet Radio Services).
EDGE is one of the standard for wireless data implemented on the GSM cellular network. Was first introduced in 2003 and is a continuation in tahapn evolution towards mobile Multimedia Communication. EDGE data speed can even reach speeds of up to 236.8 Kbit/s using 4 timeslots and mobile operators can memeberikan data services kemunikasi higher speeds than GPRS, while GPRS is only capable of data transmission speed of about 25 Kbps.

====> W-CDMA (Wideband-coded Division Multiple Access) or UMTS (Universal Mobile Telecommunictions System).

UMTS is a third generation system developed in Europe and was introduced in 2004. UMTS is designed so that it can provide a bandwidth of 2 Mbits / s. Services that can be pursued to meet the UMTS user requests wherever located, that is, UMTS is expected to serve the widest possible area, if there is no UMTS cell in a region can be in-route via satellite. Radio frequencies allocated for UMTS. Multiple access is used to allocate bandwidth dynamically according to the needs of consumers.

====> GAN (Generic Access Network) or UMA (Unlicensed Mobile Access)

This technology was adopted by the 3GPP in April 2005. GAN is intended to allow the telecommunications system can run in roaming and can handle LAN networks (WLAN) and WAN in the mobile phone simultaneously.

====> HSPA (High-Speed Packet Accees)

HSPA is the technology of the fusion of mobile technology protocols before, so that they can expand and add capacity (terutma of the data transfer speed) of the UMTS protocol that has been there before. Because of differences in ability (downlink and uplink) is, HSPA is divided into 2 standard are:

1. HSDPA (High Speed Downlink Packet Access)
Transfer speed downlink side of his (from the network to the handset) can reach 7.2 Mbps, and in theory can be served until the speed increased to 14.4 Mbps Maximum Uplink 384 kbps.

2. HSUPA (High Speed Downlink Packet Access)
Uplink transfer speed side of it (from the handset to the network) can reach speeds of Uplink speeds theoretically up to 5.76.

====> HSOPA (High Speed OFDM Packet Access)

Is the development of UMTS technology, particularly in antenna technology, which uses Orthogonal Frequency Division Multiplexing Multiple-Input-output (MIMO). Juag known as HSOPA super 3G because it can transfer data up to 100 Mbit / s for downlink and 50 Mbit / s for the Uplink.
Your Ad Here