0% found this document useful (0 votes)
8 views

Ch18 WirelessSecurity

The document discusses wireless network security, outlining key security requirements and risks associated with wireless environments. It details various security measures, protocols like WEP, WPA, and WPA2, and the IEEE 802.11 standards that govern wireless LANs. Additionally, it explains the phases of operations in IEEE 802.11i, including discovery, authentication, key management, and protected data transfer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Ch18 WirelessSecurity

The document discusses wireless network security, outlining key security requirements and risks associated with wireless environments. It details various security measures, protocols like WEP, WPA, and WPA2, and the IEEE 802.11 standards that govern wireless LANs. Additionally, it explains the phases of operations in IEEE 802.11i, including discovery, authentication, key management, and protected data transfer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Wireless Network Security

Dr. Mana Khatua


Assistant Professor
Dept. of CSE, IIT Guwahati
Email: manaskhatua@iitg.ac.in
Wireless Security Overview
 Security requirements for wireless are the same with wired environment.
 Confidentiality
 Integrity
 Availability
 Authenticity
 Accountability

 Key Factors Contributing to Risks


 Channel: broadcast communication; more susceptible to eavesdropping and jamming
 Mobility: contributes additional risks
 Resources: advanced OS, but limited resources (memory, processing)
 Accessibility: Certain devices (sensors, robots) may be left unattended for long time

27-03-2023 MANAS KHATUA, IIT GUWAHATI 2


Wireless Network Threats
Lack of
central
point of
control

e.g. Bluetooth,
Barcode reader,
Handhold PDAs

Bogus reconfiguration
commands to routers
/switches exposed to
nonfiltered traffic

27-03-2023 MANAS KHATUA, IIT GUWAHATI 3


Wireless Security Measures
wireless security measures dealing with three components -

 Securing wireless transmission


 Signal hiding technique (for hiding wireless AP)
 Turn off SSID broadcasting by AP
 Assign cryptic name to SSID
 Reduce signal strengths
 Directional antennas
 Encryption of wireless transmission

 Securing wireless access point (AP)  Securing wireless networks


 Access control policy  Enable anti-virus, anti-spyware, firewall
o it is typically based on the identity of the user  Turn off SSID broadcasting by routers
who requests access to a resource
 Change default identifier on router
 Authentication mechanism
o to make sure the identity is who they say they  Change router’s pre-set password
are.  Apply MAC-filtering
 Use encryption for traffic

27-03-2023 MANAS KHATUA, IIT GUWAHATI 4


IEEE 802.11 Wireless LAN
• IEEE 802 committee responsible for LANs
• In 1990, IEEE 802.11 WG was formed
Aims:
• To develop a protocol & transmission specifications for Wireless LAN

• Developed IEEE 802.11i WLAN Security Specification

•The Wi-Fi alliance formed in 1999. This is an industry consortium.


First standard became popular is 802.11b in 1999

Developed a certification procedure for 802.11 security standards


 Wi-Fi Protected Access (WPA)
Recent version in WPA2 – it incorporates all features of 802.11i spec

27-03-2023 MANAS KHATUA, IIT GUWAHATI 5


IEEE 802.11 Protocol Stack
LLC:
 keeps track of frame transmissions
 handle frame retransmissions

MAC layer
 Addressing
 MAC framing from data
 Medium Access

Physical layer
 encode/decode signals
 Bit transmission/reception
 Transmission medium

27-03-2023 MANAS KHATUA, IIT GUWAHATI 6


MAC Frame (MPUD)
MAC protocol data unit (MPUD)

MSDU

CRC: Cyclic Redundancy Check. Also known as Frame Check Sequence (FCS).
This is an error-detecting code, such as that which is used in other data-link
control protocols.

27-03-2023 MANAS KHATUA, IIT GUWAHATI 7


IEEE 802.11 BSS, ESS
BSS (basic service set):
the smallest building
block.

BSS consists of a set of


stations controlled by a
single coordination
function.

BSSs connected via


APs. APs functions as
bridges.

ESS: two or more BSSs are connected via Distribution System (DS)
IBSS (independent BSS): When all stations in the BSS are mobile stations that
communicate directly with one another (not using an AP)

27-03-2023 MANAS KHATUA, IIT GUWAHATI 8


IEEE 802.11 Services
Service Provider Used to support

Association Distribution system MSDU delivery

Disassociation Distribution system MSDU delivery

Re-association Distribution system MSDU delivery

Authentication Station LAN access and security

De-authentication Station LAN access and security

Distribution Distribution system MSDU delivery

Integration Distribution system MSDU delivery

MSDU delivery Station MSDU delivery

Privacy Station LAN access and security

Re-association: Enables an established association to be transferred from one AP to another


Distribution: when the MPDUs must traverse the DS to get destination STA
Integration: transfer of data between a STA on an 802.11 LAN and a STA on an 802.x LAN.
27-03-2023 MANAS KHATUA, IIT GUWAHATI 9
Wireless LAN Security Protocols
 Wired Equivalent Privacy (WEP) algorithm
The original native security
o 802.11 privacy by 802.11 work group
mechanism for WLAN.

Disadvantage: very week w.r.t. security & privacy • Used to protect wireless
communication from
802.11 Task Group i is formed to address the issue. eavesdropping (confidentiality)

• Prevent unauthorized access to a


 Wi-Fi Protected Access (WPA) wireless network (access control)
o eliminates most of the 802.11 security issues
• Prevent tampering with
o it was based on the current state of the 802.11i standard transmitted messages (integrity)

Final form of the standard • Provide users with the equivalent


level of privacy inbuilt in wireless
 Robust Security Network (RSN) networks (User’s role)

 Wi-Fi Protected Access 2 (WPA2)

27-03-2023 MANAS KHATUA, IIT GUWAHATI 10


How WEP Works
IV original unencrypted packet checksum

RC4
key

IV encrypted packet

IV (initialization vector)  WEP Flaws and Vulnerabilities


 There are 224 different IVs  Weak keys for encryption
 IV reuse and small size
 RC4 is an Encryption Algorithm

27-03-2023 MANAS KHATUA, IIT GUWAHATI 11


Wi-Fi Protected Access (WPA)
 New security technique WPA in the year 2002-03

 Replacement of security flaws in WEP

 Improved data encryption

 Strong user authentication

 Because of many attacks related to static key, WPA minimize shared secret
key in accordance with the frame transmission

 Use the RC4 algorithm in a proper way and provide fast transfer of the data
before someone can decrypt the data.

27-03-2023 MANAS KHATUA, IIT GUWAHATI 12


WPA2
Based on the IEEE 802.i standard
The primary enhancement over WPA is the use of the AES (Advanced
Encryption Standard) algorithm
The encryption in WPA2 is done by utilizing either AES or TKIP (Temporal
Key Integrity Protocol)

2 versions: Personal & Enterprise


The Personal mode uses a PSK (Pre-shared key) & does not require a
separate authentication of users
The enterprise mode requires the users to be separately authenticated by
using EAP (Extensible Authentication Protocol)

WPA3 has been proposed, not used extensively till now.

27-03-2023 MANAS KHATUA, IIT GUWAHATI 13


WEP vs WPA vs WPA2
WEP WPA WPA2

Year introduced 1999 2003 2004


TKIP (Temporal Key Integrity CCMP (Counter Mode CBC-
Encryption protocol Fixed-key
Protocol) MAC Protocol)
Session key size 64-bit/128-bit 256-bit 256-bit
Cipher type RC4 stream cipher TKIP (RC4-based) AES
Cyclic Redundancy
Data integrity Message Integrity Check CCMP
Check
Authentication Open system /Shared PSK + PMK (Pairwise Master
Pre-Shared Key (PSK)
method key Key)
Symmetric key
Key management WPA + WPA-PSK PMK + PSK
encryption
Pros Better than no security i) TKIP encryption i) Stronger encryption
ii) 256-bit key for encryption method: AES
ii) Solves prior issues
Cons i) Fixed-key encryption Many security Require more processing
ii)many vulnerabilities vulnerabilities still exist power

27-03-2023 MANAS KHATUA, IIT GUWAHATI 14


Services in RSN
Latest Security
Standard by IEEE
802.11 Task Group I

Access Control (as Security Function) – It works with any authentication protocol and key exchange

Authentication – It is mutual authentication. Also do secret key exchange for secured communication

Privacy with message integrity – MAC-level data encryption and message integrity code (MIC) are used
to ensure confidentiality, integrity, origin authentication, etc.

27-03-2023 MANAS KHATUA, IIT GUWAHATI 15


Cryptographic Algorithms in RSN

27-03-2023 MANAS KHATUA, IIT GUWAHATI 16


Types of Configuration
 802.11i security is
limited to BSS STA IBSS STA

 End-to-end security is
provided by upper layer
STA
STA

27-03-2023 MANAS KHATUA, IIT GUWAHATI 17


802.11i Phases of Operations

27-03-2023 MANAS KHATUA, IIT GUWAHATI 18


(1) Discovery Phase
Purpose of Discovery Phase:
For an STA and an AP
to recognize each other,
agree on a set of security capabilities,
establish an association for future communications

Security Capabilities:
 Confidentiality & Integrity protocols (Cipher suite)
 TKIP
CCMP
Vendor specific
 Authentication & Kay management approach
(AKM suite)
 IEEE 802.11X (Port based network access control)
 Vendor specific

27-03-2023 MANAS KHATUA, IIT GUWAHATI 19


Discovery Phase
Discovery Procedure:
AP uses
• Beacon & Probe Response to advertise its 802.11i
security policy

STA uses the above messages


• to identify an AP
• to associate with the AP

Open system authentication


 Only to maintain backward compatibility with the IEEE
802.11 state machine
 STA & AP simply exchanges IDs

Association
 STA & AP agree on a set of security capabilities to be
used.
 Using Association Request, STA informs its selection from
the set declared by AP (using Beacon / Probe Response)

AP can refuse association request


STA also can block rogue AP

27-03-2023 MANAS KHATUA, IIT GUWAHATI 20


(2) Authentication Phase
This is mutual authentication
◦ Between STA & AS located in a DS
IEEE 802.11i makes use of IEEE 802.11X Port-
based Network Access Control
◦ Extensible Authentication Protocol (EAP)
◦ Supplicant ~STA
◦ Authenticator ~AP
◦ Authentication server (AS)

Consists of three steps:


 Connect to AS
◦ By request-Response, AP  STA  AS
 EAP exchange
◦ authenticates the STA and AS to each other
◦ STA-to-AP message flow uses EAP over LAN (EAPOL)
protocol,
◦ AP-to-AS message flow uses Remote Authentication
Dial In User Service (RADIUS) protocol
 Secure key delivery
◦ the AS generates a master session key (MSK)
◦ sends it to the STA secretly

27-03-2023 MANAS KHATUA, IIT GUWAHATI 21


(3) Key Management Phase
In this phase, a variety of
cryptographic keys are
generate and distributed to
STAs.

There are two types of keys:


• pairwise keys used for
communication between an
STA and an AP
• group keys used for multicast
communication.

27-03-2023 MANAS KHATUA, IIT GUWAHATI 22


IEEE 802.11i Keys

27-03-2023 MANAS KHATUA, IIT GUWAHATI 23


IEEE 802.11i Keys

27-03-2023 MANAS KHATUA, IIT GUWAHATI 24


Key Distribution
4-way handshake:
The upper part of the
Figure shows the MPDU
exchange for distributing
pairwise keys.

Group Key Handshake


the AP generates a GTK and
distributes it to each STA in
a multicast group.

27-03-2023 MANAS KHATUA, IIT GUWAHATI 25


(4) Protected Data Transfer Phase
IEEE 802.11i defines two schemes for this:
 Temporal Key Integrity Protocol (TKIP) – for older WiFi devices using WEP
 Counter Mode-CBC MAC Protocol (CCMP) – for new WiFi devices using WPA / RSN

TKIP and CCMP both provides two services:


 Message integrity
 In TKIP: using message integrity code (MIC) generated by algorithm Michael
 In CCMP: using cipher block chaining message authentication code (CBC-MAC)

 Data confidentiality
 In TKIP: using RC4 based encryption
 In CCMP: using AES for encryption

27-03-2023 MANAS KHATUA, IIT GUWAHATI 26


EAP Layered Context
RFC RFC RFC RFC
5216 5281 5433 5106

27-03-2023 MANAS KHATUA, IIT GUWAHATI 27


EAP Protocol Exchanges

27-03-2023 MANAS KHATUA, IIT GUWAHATI 28


IEEE 802.1X Access Control
Until the AS authenticates a
supplicant (i.e. client),
the 802.1X control channel is
unblocked, but the 802.11 data
channel is blocked.

Once a supplicant is authenticated


and authorised, the data channel
becomes unblocked

802.1X uses the concepts of


controlled and uncontrolled ports.

Ports are logical entities defined


within the authenticator and refer to
physical network connections,
Each logical port is mapped to one
these two types of physical ports
(controlled /uncontrolled)

27-03-2023 MANAS KHATUA, IIT GUWAHATI 29


Cont

27-03-2023 MANAS KHATUA, IIT GUWAHATI 30


27-03-2023 MANAS KHATUA, IIT GUWAHATI 31

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy