Peter Dordal, Loyola University Chicago Dept of Computer Science
Thursday 4:15-6:45, LT-412 (Linux lab)
Text: William Stallings, Wireless Communications & Networks, 2nd Edition, 2005, Pearson Prentice Hall, ISBN 0-13-191835-4
My general course groundrules are here. Exams will count for between 70% to 80% of your grade, with homework and programs making up the rest.
I will be in my office Monday, Dec 8, 10:00-4:00, Wed Dec 10, 1:00-4:00, and Friday Dec 12, 10:00-6:00.
Take-home final exam, Due Friday December 12.
Midterm study guide is now (mostly) done. The midterm is Oct 23.
Course notes
Program 2: block codes, due Oct 9; also bitstring.java and tester.java
Program 3: Cracking WEP (simulation), due Dec 4
Wi-fi techniques cartoon, Randall Munroe
Waveguide cantenna, Greg Rehm
More mathematical version, Martti Palomaki
Pringles Yagi, Rob Flickenger
Cantenna Yagi, Andrew Clapp
FCC 15.247 rules
Bay of Fundy,
Wikipedia (an example of wave resonance)
IEEE 802.11 MAC & PHYS layers, 1999
802.11 tutorial, Pablo Brenner
packet-types article, Jim Geier
Files for mod2-division: bitstring.java and tester.java
Wireless and airplanes (Maybe so. Maybe no.)
some tcpdump sniffs
Notes on sniffing, with annotations of some of the following:
bluebird_conn.text,
a sniff of a windows machine connecting to a (blue) wireless router.
bluebird2.text,
null packets and ACK packets
bluebird_dis2.text,
a disconnection
office2.text,
a linux machine in my office trying to connect. Lots of ProbeReqs!
Internal annotation.
thursday.text,
just in case you thought there was some privacy!
See lines 1157, 1923, 2025++, 4036 (sing_Services), 329166 (Peter)
cisco info on Wireless Domain Services, the cisco DS mechanism
Boston MBTA RFID-card hack, from Defcon, with some neat RFID plots
WEP Weaknesses
Fluhrer, Mantin & Shamir, Weaknesses in Key-scheduling for RC-4
The deepest flaw. Longer keys won't fix it.
Stubblefield, Ioannidis, Rubin, Using FMS to break WEP
Tim Newsham, Cracking WEP Keys. Lots on key weakness and brute-force options.
Borisov, Goldberg, Wagner, Intercepting Mobile Communications.
An excellent summary of techniques.
Arbaugh, Your 802.11 Wireless Network has No Clothes.
WEP authentication is also broken.
Beck and Tews, Practical attacks
against WEP and WPA
Tews, Weinmann & Pyshkin,
Breaking WEP in 60 seconds
rc4.java, my rc4 demo code
WEP IV-to-keystream calculator
Some last-minute files: md5demo.java, md5demo.out, lc1.html