Introduction
#Wi-Fi is an ever-present technology that connects devices to local networks or the internet wirelessly. Despite its convenience, it is frequently targeted by attacks exploiting its vulnerabilities. This article explores its history, functionality, risks, and best practices for secure use.
Wi-Fi Characteristics
#| Term | Description |
|---|
| Name | Wi-Fi (Wireless Fidelity) |
| Technical Standard | IEEE 802.11 (and its evolutions: b, g, n, ac, ax, etc.) |
| Creation Date | 1997 (standardization) |
| Frequencies | 2.4 GHz, 5 GHz, 6 GHz (depending on the standard) |
| Range | Up to 100 meters indoors (varies with obstacles and power) |
| Theoretical Speed | Up to 9.6 Gbps (Wi-Fi 6E) |
| Usage | Access to a local network or the internet |
| Secure Protocol | WPA3 (recommended) |
History of Wi-Fi
#- 1971: Invention of wireless networking (AlohaNet) in Hawaii.
- 1997: Wi-Fi standardization by the IEEE (802.11 standard).
- 1999: The term “Wi-Fi” is coined, and the Wi-Fi Alliance is formed.
- 2003: Introduction of WPA (Wi-Fi Protected Access) to replace vulnerable WEP.
- 2018: Launch of WPA3, enhancing network security.
How Wi-Fi Works
#Required Hardware
#- Router: Manages the connection between the local network and the internet.
- Wi-Fi Access Point: Emits the wireless signal (integrated into the router or separate).
- Client Device: Smartphone, computer, tablet, etc.
Connection Steps (Simplified)
#- Network Detection: The device scans for available SSIDs (network names).
- Authentication:
- The user selects an SSID (e.g., “Kiwi”).
- The access point sends a challenge (cryptographic challenge).
- The device responds with the password, encrypted according to the protocol (WPA3).
- Validation: If the password is correct, the access point grants connection.
- IP Assignment: A DHCP server (usually built into the router) assigns an IP address to the device.
Key Vocabulary
#| Term | Definition |
|---|
| SSID | Name of the Wi-Fi network (e.g., “Kiwi”). |
| DHCP | Protocol that automatically assigns IP addresses to devices. |
| Channel | Frequency band used to avoid interference (e.g., channel 6). |
| WEP/WPA/WPA3 | Encryption protocols (WPA3 is the most secure). |
| VLAN | Virtual Local Area Network to segment traffic (e.g., guest network). |
Risks and Common Attacks
#| Type of Attack | Description | Consequences |
|---|
| Man-in-the-Middle (MitM) | Interception of data between the device and the access point. | Data theft (passwords, emails). |
| Rogue Access Point | Fake access point mimicking a legitimate network. | Connection to a malicious network. |
| Malware Spread | Distribution of malicious software via a compromised network. | Infection of connected devices. |
| Brute Force Attack | Attempt to guess the Wi-Fi password. | Unauthorized network access. |
Security Best Practices
#For the Wi-Fi Network
#- Use WPA3: Avoid WEP and WPA (outdated).
- Strong Password: 12+ characters, mix of letters, numbers, and symbols.
- Network Segmentation: Create VLANs to isolate IoT and guest devices.
- Disable WPS: Vulnerable protocol, often enabled by default.
- Update Firmware: Patch router vulnerabilities.
For Devices
#- Avoid Public Networks: Use a VPN if necessary.
- Disable Auto-Wi-Fi: Prevent unwanted connections.
- Check Certificates: On public networks, verify the authenticity of the access point.
Conclusion
#Wi-Fi is essential technology, but its security depends on best practices. By understanding how it works and its risks, everyone can protect their data and devices. Adopt WPA3, segment your networks, and stay vigilant against public networks!
Further Reading
#