Ch18 WirelessSecurity
Ch18 WirelessSecurity
e.g. Bluetooth,
Barcode reader,
Handhold PDAs
Bogus reconfiguration
commands to routers
/switches exposed to
nonfiltered traffic
MAC layer
Addressing
MAC framing from data
Medium Access
Physical layer
encode/decode signals
Bit transmission/reception
Transmission medium
MSDU
CRC: Cyclic Redundancy Check. Also known as Frame Check Sequence (FCS).
This is an error-detecting code, such as that which is used in other data-link
control protocols.
ESS: two or more BSSs are connected via Distribution System (DS)
IBSS (independent BSS): When all stations in the BSS are mobile stations that
communicate directly with one another (not using an AP)
Disadvantage: very week w.r.t. security & privacy • Used to protect wireless
communication from
802.11 Task Group i is formed to address the issue. eavesdropping (confidentiality)
RC4
key
IV encrypted packet
Because of many attacks related to static key, WPA minimize shared secret
key in accordance with the frame transmission
Use the RC4 algorithm in a proper way and provide fast transfer of the data
before someone can decrypt the data.
Access Control (as Security Function) – It works with any authentication protocol and key exchange
Authentication – It is mutual authentication. Also do secret key exchange for secured communication
Privacy with message integrity – MAC-level data encryption and message integrity code (MIC) are used
to ensure confidentiality, integrity, origin authentication, etc.
End-to-end security is
provided by upper layer
STA
STA
Security Capabilities:
Confidentiality & Integrity protocols (Cipher suite)
TKIP
CCMP
Vendor specific
Authentication & Kay management approach
(AKM suite)
IEEE 802.11X (Port based network access control)
Vendor specific
Association
STA & AP agree on a set of security capabilities to be
used.
Using Association Request, STA informs its selection from
the set declared by AP (using Beacon / Probe Response)
Data confidentiality
In TKIP: using RC4 based encryption
In CCMP: using AES for encryption