Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
11
Sigit wibawa
Universitas Mercu Buana, Indonesia
Email: sigitwibawa@ieee.org
I. Introduction
The basic terminology used in Wireless networks is as When we consider the illustration of the use of the 2.4
follows: GHz frequency by the 14 channels, such as overlapping,
this causes interference problems that will cause damage
1. Service Set Identification (SSID) is the name of a to the data sent and received, so that a good channel usage
wireless network that must exist and is very important to strategy is needed, we must choose channels that do not
be able to connect and join a network, the first time we do interfere with each other so that data and performance can
a network configuration we will be asked to specify the be optimal.
network name or SSID to be used.
5. Management frames in the IEEE 802.11 standard there
2. The Basic Service Set Identifier (BSSID) has the is a rule in which there are general provisions, namely:
understanding that in an infrastructure topology there is at
least one AP that acts as a transmitter, there is an address • Frame Authentication
called the MAC Address, which is a mutually agreed upon • Frame De-authentication
identity owned by a wireless device, from this address we • Frame Association
coordinate and synchronize forwarding and broadcasting • Frame Association Request
data packets, this function is almost the same as bridge • Frame Association Response
technology in wired network methods. • Frame Reassociation Response
• Frame Disassociation
3. Extended Service Set Identification (ESSID) in a large
• Frame Beacon
network, an AP is not enough to serve all clients, let alone
• Frame Probe Request
the network is in a separate area, the AP signal will not
• Frame Probe Response
reach because it is used by several APs. Each AP is
arranged in a different channel to avoid interference, so 6. Reliability Block Diagram (RBD) Redundant
that it forms a network such as a cellular network, each configuration, Reliability Block Diagram (RBD) which is
client or user can do handoff or roaming easily without configured as Redundant is a method that measures the
losing service signals, in other words it can function to reliability of a complex system and has a redundant
forward from a radio cell to a cell other via a cable configuration (has a backup component that functions the
network. The combination of AP and cable network will same as the system element) [21].
form the so-called Distributed System (DS) as shown in
Figure 4.1 RBD with Redundant configuration is the ability of a
system to function normally even though there are
elements that are not functioning. This is usually achieved V. The main challenge at this time
by having backup components that function the same as
system elements [22]. For simulation and testing for resistance and interference,
the ESP8266 IOT Module [17], [18], [19], [20] is used,
Redundant is the same as k out of n system where a system which is a complete chip which includes processor,
n component works well if and only if at least k of n memory and also access to GPIO. This causes ESP8266
components works well. Redundant is used in continuous to directly replace Arduino and added to its ability to
equipment / machine conditions and is required to have a support wi-fi connections directly. ESP8266 is a wi-fi
backup system with an IID machine (Identic independent module that functions as a wireless microcontroller
distribution), the number of machines working follows the support device and makes TCP / IP connections. This
binomial distribution with parameters n and p. The module uses approximately 3.3 Volts with three wi-fi
reliability of the system is the same as the probability that modes, namely Station, Access Points and Both. This
the number of working machines is greater than or equal module is also equipped with a processor, memory and
to k [22]: GPIO to carry out this microcontroller attack simulation
can be relied upon, ESP8266 module based on Ethernet
and wireless there are several types that can be found on
………………. (1) the market but actually have the same function the
difference lies only in the GPIO pin provided.
information:
Figure 4.3. Serial and Parallel standby redundancy To run certain functions a module such as ESP8266
requires a programming language to run, it requires
development tool programs such as Arduino IDE Figure 5.3 Scan AP Application Menu ESP8266
(Integrated Development Environment) which is software Second step: determine the target to be attacked
that can be used by designers to perform various processes after determining the target we will be asked to do the type
related to programming microcontroller modules such as of attack that will be shown to the target of the choice
Arduino including modules ESP8266, this IDE already there is De-auth, Beacon and Probe-Request we can
supports various operating systems such as Windows, choose one or all three of these types of attacks carried out
Linux and others.
References
[1] A Novel Classification Scheme for 802.11 WLAN Active Attacking
Figure 5.6 Standby Redundancy Traffic Patterns Wenzhe Zhou, Alan Marshall and Qiang Gu School of
This mathematical approach to standby redundancy Electrical & Electronic Engineering, Queen’s University, Belfast,