Wireless Security Threat Taxonomy
Wireless Security Threat Taxonomy
Wireless Security Threat Taxonomy
Several papers have published very specific threats to wireless WLANs all use the same layer 2 packets; the difference is
networks—specifically in the area of attacks against the IEEE in the physical layer. 802.11a uses a higher frequency
802.11 Wired Equivalency Protocol (WEP). Other papers have than 802.11b or one of the possible flavors of 802.11g.
addressed wireless attacks based on the attack models used in This higher frequency means that the radio transmission
wired networks. However, the different characteristics of
will not travel as far and will not propagate through solid
wireless networks require looking at the threat differently. We
present a Wireless Threat Taxonomy that we used to build the objects as well the low frequency standard. This tends to
security architecture for the Wireless Network at West Point. help limit eavesdropping, but in no way eliminates the
threat. Also 802.11a has about 5 times the bandwidth that
Index terms – Wireless, Threat, Information Assurance, 802.11b does. This higher bandwidth means that attacks
802.11 that require data collection can be executed faster on an
802.11a WLAN than on an 802.11b WLAN. Most of the
attack techniques highlighted here can be applied to other
I. INTRODUCTION wireless network protocols, such as IEEE 802.15, a
wireless personal area network specification similar to
Wireless Local Area Networks (WLAN) are increasing in Bluetooth.
popularity. They are being installed by businesses of all
types, educational institutions, governments, and the We look at the threat from two points of view: the insider
military. WLANs provide users a significant mobility and the outsider. The outsider has access to the wireless
advantage as users can access their information in many network and the software and hardware that can be
locations, some of which are more conducive to purchased or otherwise obtained publicly. The insider is a
collaboration. The freedom and mobility that WLANs valid user of the wireless network whose goal is to obtain
promise, however, also present some serious security access to information which she would not otherwise be
challenges. In the military domain, the department of entitled. The insider has valid software, hardware, and
defense’s (DoD) transition from industrial-age to certificates for both the wired network and WLAN.
network-centric warfare brings with it technical
challenges that are highly dependent and revolve around We start by examining attacks against the confidentiality
the successful implementation of a robust and secure of communication on the network. We then move into
wireless network of systems. These networks must those attacks that actually alter the network traffic, hence
address the threats described here. destroying the integrity of the information on the network.
We do not discuss availability attacks against a wireless
WLANs are not limited by network jacks nor are they network as they include techniques such as electronic
limited by geography. WLANs provide unprecedented jamming which goes beyond the scope of this paper.
flexibility in that an area not originally intended as a
collaborative workspace can accommodate a large When looking at confidentiality attacks we start with the
number of wireless clients. Auditoriums now least intrusive and work towards more intrusive attacks.
accommodate hundreds of networked computers just by Of the seven attack techniques in our taxonomy, three
plugging a few Wireless Access Points (WAPs) into the violate just the confidentiality or privacy of the session:
network. The radio waves used for WLAN propagate traffic analysis, passive eavesdropping, and active
quite well. The advertised ranges for wireless network eavesdropping. One technique can be used to violate
interface cards range up to 300 feet. In reality, 802.11b confidentiality and/or integrity -- the man-in-the-middle
networks can be accessed over one-half mile away in an attack. Three attack techniques violate the integrity of the
urban environment. [1] network traffic: unauthorized access, session high jacking,
and the replay attack.
This paper addressees known security threats to IEEE
802.11 networks focusing specifically on 802.11a because The integrity attack techniques generally require
that is the standard we implemented. However, the successful use of one or more of the confidentiality attack
difference between 802.11a and other protocols in the techniques.
802.11 family is trivial with respect to security. 802.11
If the session is encrypted at layer 2 or higher using a For more details on how the CRC-32 integrity checker is
protocol such as Wired Equivalent Protocol (WEP) or the vulnerable see Borisov, Goldberg and Wagner’s papers.
Advanced Encryption Standard (AES), then in order to [11] [9] [4] [5]
read the data the attacker has to decrypt the packets.
[3][4][5][6][1][7][8][9]
IV. CONCLUSION
202/1202f1dfull.html&pub=nwc accessed 20 September
In this paper we did not address denial of service attacks 2002.
on wireless networks. Interfering with a wireless [4] Moioli, Fabio, Security in Public Access Wireless
transmission is very easy to do and difficult to stop. An LAN Networks, Masters Thesis, Department of
attacker with a stronger transmitter or advantageous Teleinformatics, Royal Institute of Technology,
location can cause significant availability problems. Stockholm, Sweden. 12 June 2000.
Mitigating these risks is far beyond the scope of this [5] Borisov, Nikita, Ian Goldberg and David Wagner,
paper. Because management packets in 802.11 are not Intercepting Mobile Communications: The Insecurity of
authenticated, even a weak transmitter can broadcast 802.11, in the Proceedings of the Seventh International
forged disassociate packets and keep legitimate users off Conference on Mobile Computing and Networking, July
the network. 16-21, 2001.
[6] Internet Security Systems, Wireless LAN Security:
Another key aspect that we did not address is key 802.11b and Corporate Networks. ISS Technical White
distribution. The encryption keys for the authentication Paper. Webpage online available at
and the payload as well as the actual authentication keys http://documents.iss.net/whitepapers/wireless_LAN_secur
themselves must be available to all participants. ity.pdf last accessed 20 September 2002.
Problems with key distribution can undo all the security [7] Chickinsky, Alan, Wireless LAN Security Threats.
effort put into designing a secure architecture. Document IEEE 802.11-01/258
[8] Colubris Networks, Inc. Comparing Colubris IPSEC
That said, we have described a simple taxonomy for Wireless Access Point Solutions with Wireless
attack techniques that can be used to construct all the Middleware Gateways. 2002 Webpage online available at
well-known wireless attacks. By understanding these http://download.colubris.com/library/whitepapers/WP-
seven attack techniques and using them to analyze a 020912-EN-02-00.pdf last accessed 20 September 2002.
wireless security architecture, the network designer can [9] Colubris Networks, Inc. Comparing Colubris IPSEC
understand the risk and take the proper mitigation steps. Wireless Access Point Solutions with Cisco Safe for
Wireless LANs. 2002 Webpage online available at
By using this taxonomy we determined that the minimum http://download.colubris.com/library/whitepapers/WP-
components of a secure WLAN architecture include at 020912-EN-01-00.pdf last accessed 20 September 2002.
firewall between the wireless and wired components of [10] Arbaugh, William, Narendar Shankar and Y.C. Justin
the network, private mutual authentication, block cipher Wan, Your 802.11 Wireless Network has No Clothes.
encrypted payloads (preferably at layer 2), and strong Department of Computer Science University of Maryland.
cryptographic integrity checking. We used this taxonomy Web page online available at
in designing the West Point wireless network component. http://www.cs.umd.edu/~waa/wireless.pdf last accessed
The wireless component first phase includes seven 20 September 2002.
buildings, 369 access points and will eventually grown to [11] Borisov, Nikita, Ian Goldberg and David Wagner,
5,000 users. It meets the DoD policy for secure Security of the WEP Algorithm. Webpage online
unclassified wireless networks. available at http://www.isaac.cs.berkeley.edu/isaac/wep-
faq.html last assessed 26 September 2002.
V. REFERENCES [12] Lynn, Mike and Robert Baird, Advanced 802.11
Attack, presentation to Black Hat 2002 Conference, Las
Vegas, NV 31 July 2002. Available at
[1] Ellison, Craig, Exploiting and Protecting 802.11b http://www.blackhat.com/presentations/bh-usa-02/baird-
Wireless Networks, 4 September 2001, webpage online lynn/bh-us-02-lynn-802.11attack.ppt last accessed 20
http://www.extremetech.com/print_article/0,3998,a=1388 September 2002.
0,00.asp ExtremeTech.com last accessed 20 September [13] Schwartz, Ephraim, Researcher crack new wireless
2002. security spec. InfoWorld. 14 February 02. Webpage
[2] Leoutre, Marc, Edward Post, Mark Reigner, and Scott online available at
Lathrop, Wireless Security: Wireless Antennas and http://staging.infoworld.com/articles/hn/xml/02/02/14/020
Footprint Analysis, Unpublished Research Paper. United 214hnwifispec.xml, last accessed 1 Oct 02.
States Military Academy, West Point, NY, May 2002. [14] Mishra, Arunesh and William Arbaugh, An Initial
[3] Fratto, Mike, Mobile & Wireless Technology Tutorial: Security Analysis of The IEE 802.1X Standard.
Wireless Security in Network Computing, 22 January University of Maryland, Department of Computer Science
2001, CMP United Business Media, webpage online and University of Maryland Institute for Advanced
http://www.nwc.com/shared/printArticle.jhtml?article=/1 Computer Studies Techniacal Report CS-TR-4328 and
UMIACS-TR-2002-10 6 February 2002.