June 24, 2007
June 24, 2007
June 27, 2007
Division Experimentation & Lab-Oriented Studies
12.231.1 - 12.231.8
An Isolated Distance Education Lab Environment for the Study of Wireless Devices and Protocols
Many educational institutions that offer curriculum classes in wireless technologies include protocol investigation and security configuration. Wireless technology labs help to reinforce theory and concepts, and to provide educational experiences not available through classroom lecture. Secure, remote access to lab equipment enables students to perform experiments 24/7 from any location thus maximizing the utilization of the equipment and providing scheduling flexibility to the students. Student laboratories for wireless devices can be problematic in institutions that offer wireless network access. This production wireless environment can be disrupted or even disabled if a student misconfigures the laboratory equipment.
This paper describes our success with the adoption of an isolated, remotely-accessible faraday cage that houses wireless equipment, permitting even the most invasive wireless projects to be performed in an area that offers production wireless network access. Our lab isolation is optimized for the ISM 2400-2483 MHz frequency band thus providing isolation for IEEE 802.11b/g radio communication. Current laboratory exercises include wireless access point configuration, wireless network interface card configuration, wireless network sniffing, WEP cracking, rogue access point detection, and wireless-based DoS attacks.
Remote control of devices inside a faraday cage is inherently problematic. Any wiring penetrating the wall of the cage is a potential source for RF leakage. Our approach is to use fiber optic cable for all data transmission into and out of the isolation area. Power delivery into the isolation area requires care to provide grounding filters for the frequency range of concern. Heat dissipation from the isolation area is aided by forced airflow through the cage. Details of our implementation are given.
The goal of this project is to provide the student with a fundamental understanding of wireless network security principles and implementation scenarios. To that end, a variety of security topologies, technologies and concepts used to provide secure communications channels are presented. An abbreviated list of subjects1,2 include:
• Explain the goals and factors involved in a wireless network security strategy. • Explain several popular wireless network attacks and configure wireless security to mitigate vulnerabilities. • Explain popular wireless protocols, and apply the protocols in a wireless networked environment. • Explain and demonstrate the concepts of wireless data transfer security issues and techniques used to secure wireless data, such as WAP, WTLS, and WEP. • Explain, model, and configure wireless network security perimeters.
Toderick, L., & Deng, J., & Lunsford, P. (2007, June), An Isolated Distance Education Lab Environment For The Study Of Wireless Devices Paper presented at 2007 Annual Conference & Exposition, Honolulu, Hawaii. 10.18260/1-2--1695
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2007 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015