Sie sind auf Seite 1von 4

Current status of the wireless local area networks in

Romania

Valeriu IONESCU, Florin SMARANDA Ion SIMA


Faculty of Electronics, Communications and Computer Science, IT&C Department,
University of Piteşti, LUMINA – The University of South-East Europe,
Piteşti, Romania Bucharest, Romania
valeriu.ionescu@upit.ro

Adrian-Viorel DIACONU
ETTI Department,
Politehnica University of Bucharest,
Bucharest, Romania

Abstract—This paper presents a study concerning the current the authentication and encryption algorithms needed to have a
implementation of 802.11 wireless local area networks in reduced hardware footprint, reduced power consumption and
Romania and their security. The data that was gathered reduced impact on the data rates [1].
throughout the year 2012 presents the structure of the wireless
networks in rural areas compared to urban areas, identifies Most non professional users also do not have access to
potential security problems and situates the Romanian national enterprise level authentication key distribution methods (such
development in the global context. This paper is part of a study as a RADIUS authentication server) which further decrease the
concerning the security of computer networks related to the new security options, and at the same time it was necessary to
threats to this segment of mobile networking. develop authentication methods for users that were easy to use
and did not require very long passwords.
Keywords—wireless; wardrive; security protocols; Romania
Recent studies have shown that beyond simple social
engineering attacks and brute force attacks (mostly dictionary
I. INTRODUCTION based attacks) multiple vulnerabilities have been found for
The mobility is the key factor in the evolution of many wireless networks (such as WEP vulnerability, WPA short
domains ranging from distance learning to economic packet spoofing and the exploit of Wi-Fi Protected Setup -WPS
transactions. data PIN acknowledgement messages) that are hard to remedy
for a non specialized user.
The development of various fast and affordable mobile
devices (smart phones, tablets, laptops, etc.) led to an increase Usually small businesses rarely can finance the cost of a
in wireless network traffic. Many business can quickly set up a dedicated network administrator and the wireless network is
wireless local area network in order to connect end devices configured and secured only at the installation time. The
with all the advantages that come from the lack of wires. contracts for further network maintenance are for the situation
where the quality of service is affected, however the networks
The Wireless Local Area Network (WLAN) development security can be affected well before that.
in Romania is strongly related to the local economic
conditions. Many businesses see the advantages of having This paper makes a survey of the WLAN environment in
internet connectivity but usually use a wired connection and Romania concerning the 802.11a,b,g,n wireless coverage with
local distribution, as setting up a wireless network involves a the following main aspects: wireless types; wireless security;
higher cost. This paper will use the term WLAN to identify wireless network structure and rural to city comparison.
802.11 a, b, g and n network types.
Extensive research regarding the current wireless
Security is a keyword usually associated with wireless implementations was performed in 2012 with the help of the
networks. Wireless security is usually a problem because the students of the Faculty of Electronics, Communications and
attacker has direct access to the transmission medium and can Computers from the University of Pitesti is the basis for this
easily identify the security methods used by the legitimate user. paper. The use of multiple devices resulted in hardware and
This was further complicated because the end devices for software incompatibilities that led to a thorough process of
mobile traffic do not have high computational power therefore software selection in order to obtain uniform results.
II. THE TOOLS FOR STATISTICS COLLECTION previous chapter), or offer the saving by email feature (which
can be problematic if the device is running out of power in an
Conducting a study of this magnitude needed tools and area with no internet access);
planning that would ensure a relevant sampling of all regions -localization: GPS data reading is necessary in order to
of the country. The scanning process for wireless access points process the results according to the geographic position;
was performed using wardriving, a technique where the -detection of the Wi-Fi Protected Setup feature: even if this
scanning is made onboard a moving vehicle. This method is feature is strongly promoted by many hardware vendors, early
widely used and its purpose varies from simple detection of implementations present serious security problems [4] [5].
free wireless access points in order to create a map of free Currently only few software solutions able to detect WPS;
internet access, to attempts to security breach. -detection of wireless network type: some software
solutions do not log this feature (WiGLE for Android) that is
On the internet exists a large collection of wardrives called important for the stated target of this research. Also, most
WiGLE.net constructed with data from various types of wireless chipsets are designed for 2.4GHz operation leaving
wardriving software, collection that can be freely interrogated only a few chipsets with dual band operation (that includes
in order to analyze the data. While this collection can easily 5Ghz frequency used by the 802.11a specification).
give an estimate on the number, security and type of wireless While Linux as operating system and Kismet as a wardrive
networks in a certain region, the number of collected features software is the preferred combination, the hardware
is reduced or compacted to generic values (for example the incompatibilities due to the heterogeneous hardware base, led
security is simply stored in NetStumbler [2] files, that count as to the decision that for this analysis the method used for
10% of the WiGLE.net database, only as unencrypted or wireless network discovery was the use of the "netsh wlan
encrypted (without further differentiation between WPA and show networks mode=bssid" command in Microsoft Windows
WPA2). that allows gathering information about the Network type,
Authentication, Encryption, BSSID and Radio type. The
The dynamic of the wireless connectivity has increased
software that uses this command is Vistumbler and it also
rapidly in the last couple of years (this can also be seen in the
WiGLE.net database as a increase in the number of daily supports reading GPS data. As this software does not detect
reported wardrives in 2012 compared to previous years - Fig. the WPS feature, the Wigle Wifi software was used in parallel,
running on the Android OS (with Wigle Wifi being unable to
1) and an investigation regarding the status of the wireless
detect the network type). Both software allow the export to
connectivity in Romania needed data collected in collected
KML format that is used to visualize areas in Google Maps or
conditions, in addition to the information from the WiGLE.net
Google Earth.
database, in order to give a correct representation.
Many software tools that can be used for wardriving, each III. WARDRIVE DATA
with different characteristics targeting different operating
systems (Linux, Windows, Android). Because the wardrivers As the basis for the results of this paper were analyzed
were performed with a multitude of mobile devices (the more than 18000 Access Points (AP) in Bucharest, and nearly
students of the Faculty of Electronics, Communications and 20000 wireless networks in the rest of the country. Fig. 2
Computers), some having hardware compatibility problems, shows the main areas that were scanned in 2012.
the following features were searched:
-compatibility and reliability: there are professional tools
that run on dedicated hardware and there is software that has
compatibility and limitations of the features depending on the
hardware and operating system. We searched free tools that
run on non dedicated hardware;

Fig. 1. WiGLE.net daily added WiFi Networks (year average) [3]


Fig. 2. Main areas that were scanned for this study
-complete data logging: some tools detect wireless
characteristics but lack data logging, offer incomplete data
logging (NetStumbler ns1 file format explained in the
Most major cities in Romania were scanned such as:
Bucharest, Cluj, Timisoara, Craiova, Constanta, Ploiesti, Iasi,
Pitesti, Buzau, but also many smaller rural locations where the
scanned because the results in these areas usually differ from
results scanned in cities as seen in previous studies [6].
The results from the capital city Bucharest often differ
significantly from the results of other Romanian cities,
therefore they were analyzed in most situations separately.

IV. WARDRIVE RESULTS (a) (b)


Fig. 3. Distribution of 802.11 protocols in Romania for cities (a) and rural
The first objective was to determine what is the share of areas (b)
various Wi-Fi protocols used in Romania, as there are many
versions available for the market: 802.11a, 802.11b, 802.11b
and 802.11n.
The results in Fig. 3 show that 802.11n technology is well
adopted in Romania in both rural and urban environment (54%
in rural, 59% in urban areas). 802.11b technology is nearing
the end of its life with under 1%. The urban graphic is also
representative for the Bucharest wardrives.
A technology that was available for a long time was
802.11a (ratified in 1999) that uses the band at 5GHz (5.47 to (a) (b)
5.725 GHz), having the advantage of no interfering with
2.4GHz networks. Fig. 4. The share of provider installations compared to private installations in
rural areas (a) and urban areas (b)
The scanning results in Romanian showed that the number
of 5GHz wireless networks was extremely low, having found Changing the MAC address for these devices is also
only two 5GHz wireless Access Points (APs). possible but this only involves a small percentage of the total
users and should not affect the results of the study.
At global level the number of 5GHz networks is reduced
due to higher hardware costs and reduced percent of hardware The results show that the share of provider based
supporting this standard. The data is confirmed by the installations is larger in rural environment (33%) compared to
WiGLE.NET database statistics [3], where the channels used the urban areas (17%), where people tend to deploy the
by 802.11a technology count as under 1% of the overall wireless networks with their own hardware.
wireless networks.
Another aspect that was studied was the use of security
While 802.11a was not a successful technology, this protocols. Rural areas have more unsecured APs (22%) than
situation is possible to change soon as the need for more cities (14%) or compared to the capital Bucharest (8%).
throughput will bring new products to the market operating in
the 5Ghz band such as IEEE 802.11ac and 802.11ad.
Internet providers (such as Romtelecom, Vodafone,
Orange, RDS, etc.) have offered for years local wireless
connectivity solutions as an extension to the wired
connectivity in order to attract more users both at personal and
enterprise level.
These solutions often include public hot spots and wired
connections to the users home accompanied by the leasing of (a) (b)
an wireless router to the user (ADSL modems with Wi-Fi).
This is a potential incentive for users to implement WLANs
using the provider hardware.
Finding this type of APs is possible because, even if the
Service set identification (SSID) can be easily customized by
the user, many users leave the default SSID on and (for those
users that customize the SSID) the device's MAC addresses
have similar OUI (usually because a large number of similar (c)
devices is acquired by the provider from a single hardware
Fig. 5. Security protocols distribution in rural areas (a), urban areas (b) and
manufacturer for implementing the WLANs in a determined Bucharest (c)
geographical region).
protocol. One possible cause, as identified in this paper, is the
large percentage of new 802.11n hardware that has WPA or
WPA2 capability. WEP encryption is usually used today for
hardware compatibility purpose (hardware that does not
support WPA or WPA2) and these results show that there is a
smaller percentage of legacy hardware in Romania.

V. CONCLUSIONS

(a) (b)
This paper presents the methodology and the results of a
study on the status of the local wireless networks in Romania
in the year 2012. This study was performed with a
heterogeneous hardware base (various PCs and Android
Smartphones) with the help of the students of the Faculty of
Electronics, Communications and Computers from the
University of Pitesti. Because of this, decisions had to be made
on the software used in order to ensure capturing similar results
from all participants.
(c) This paper results showed that in Romania the adoption of
Fig. 6. Detail of security protocols in rural areas (a), urban areas (b) and new technologies follows the international tendencies, having
Bucharest (c) the advantage that there is a reduced base of legacy equipment,
especially in rural areas. The market is still not saturated with
wireless networks because:
- the advent of High Definition content on the internet will
drive the need for more 802.11n networks or even faster
networks in the detriment of 802.11g and 802.11b networks
that still represent an important share of the implementations;
- the second reason is that rural locations have still to be
fully covered by wired and wireless connectivity, as in most
cases the internet connectivity uses costly 3G.
Fig. 7. Worldwide WiGLE.net security protocols in September 2012[3]
The study also concluded that the network security in urban
Netstumbler files (ns1) [2] only save the security protocol environment is higher than in rural environment through the
information as generic WEP (for WEP,WPA and WPA2) and higher use of WPA/WPA2 security protocols.
these results can be interrogated from the WiGLE.net. These
results are not sufficient for this analysis as WEP security The study will continue with the purpose to create an online
protocol is easily penetrated [7], and should be regarded as a database with updated information targeting specifically local
security problem. Our wardrive results show that rural areas wireless networks in Romania that should server for further
present a large number of Open System Authentication APs comparative investigations.
(46%) as unencrypted (22%) or WEP (24%).
REFERENCES
The number of APs that use WPA and WPA2 is very large.
In order to obtain a perspective on the context of WiFi [1] Valeriu IONESCU, Florin Smaranda, Emil Sofron, „Performance
Impact Of Wireless Security in 802.11 Networks”, THE 4th
installations in Romania relative to the global status of WiFi INTERNATIONAL CONFERENCE RoEduNet ROMANIA, MAY 20 -
networks, we used the WiGLE.net database for comparison, 22, 2005, ISBN 973-7794-26-5
because it has a large number of wardrive results from multiple [2] Marius Milner, "How to read and write .NS1 files", April 22,
countries. 2004,http://www.stumbler.net/ns1files.html, Accessed September 2012.
[3] Wireless Geographic Logging Engine, Statistics, http://wigle.net/graph-
The worldwide evolution of used security protocols (as large.html, Accessed September 2012
analyzed from the WiGLE.net database) shows that indeed [4] Stefan Viehböck "Brute forcing Wi-Fi Protected Setup. When poor
WPA2 security protocol is rapidly increasing in the detriment design meets poor implementation", 26.12.2011, Version 3,
of the less secure WPA and the insecure WEP. The large http://sviehb.wordpress.com/, accessed on 10 october 2012.
number of unencrypted APs is partially due to many free [5] US-CERT, "Vulnerability Note VU#723755 WiFi Protected Setup
access points offered by shops to their clients or by internet (WPS) PIN brute force vulnerability", Original Release date: 27 dec.
providers in order to promote their connections. Most of these 2011, http://www.kb.cert.org/vuls/id/723755, Accessed September 2012.
free wireless connections have limitations on the speed or on [6] Valeriu IONESCU, Florin SMARANDA, Emil SOFRON “Contextual
services for roaming wireless users”, Proceedings of the 5-th RoEduNet
the total navigation time. IEEE International Conference, 1-3 June 2006, Sibiu, Romania, ISBN
The situation in Romania (especially in urban areas) (10) 973-739-277-9, ISBN (13) 978-973-739-277-0, pg. 113-118.
compared to worldwide results shows a larger number of [7] Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker,
"Security Flaws in 802.11 Data Link Protocols", COMMUNICATIONS
WPA2 connections in the detriment of the WEP security OF THE ACM, May 2003/Vol. 46, No. 5.

Das könnte Ihnen auch gefallen