Security design for a new local area Network AULWLAN
|
|
- Miranda Lewis
- 8 years ago
- Views:
Transcription
1 International Conference on Computer Systems and Technologies CompSysTech 2003 Security design for a new local area Network AULWLAN Ahmed Abdo Ali ABSTRACT : This paper presents a security scheme for a medium access control protocol in a new wireless local area network AULWAN (Aden University laboratory WLAN). The design objective has been to develop a security scheme that will be scalable for various needs and offer high security for demanding applications. The designed security scheme provides both privacy of wireless data communications and the authenticity of communicating parties, Our authentication scheme allows also the communicating entities to establish a shared secret key for secure communication session. Data security schemes have also been introduced.there are three optional data security modes that offer flexible ciphering and data security level. words :- Computer Network, Security, Design,LAN, WLAN I. INTRODUCTION wireless local area network (WLAN) technology is seen very promising for various types of wireless indoor and office communications, such as ad-hoc networking and wireless access to company networks. The main purpose of WLANs is to offer network solutions when fixed networks become impossible or inconvenient. Typical examples are networks that are set up on temporary basis and in buildings where cabling is not reasonable. The emerging standards like IEEE wireless LAN [1] or High performance Radio Local Area Network (HIPERLAN)[2] are good examples of WLAN approaches where high performance. Mobility and multi user characteristics have been taken into specification.on the contrary, above systems are often too complex and expensive for local, stationary wireless communication. Our new WLAN proposal called AULWAN (Aden University laboratory WLAN) [6] is designed for short range, multi-user environment with flexible choice of low-mobility or stationary wireless terminals. Typical environment include home, office and public areas like airport lounges and libraries. Terminals range from multimedia laptops to sensors introducing different transmission and security needs. IEEE standard was a starting point for the development of the MAC layer of ADLWLAN (called AULMAC), in which 2.4 GHz RF-band with DSSS modulation is used for physical medium as specified in leee Major differences are that AULMAC offers connection-oriented data-transfer service with negotiated QoS(Quality of Service ) parameters. ADLMAC utilises TDMA (Time Division Multiple Access ) with reserved constant bit-rate data channels, and thus, provides real-time support for multimedia applications. In addition, compared to IEEE standard, the security scheme of ADLWLAN is improved by increased security and flexibility to select the security level for different terminals. In this paper, a new security design including authentication, data ciphering and algorithms for encryption is presented. This paper is organised as follows. At first, used authentication methods are described followed by an explanation about data security schemes. After that, data encryption algorithms are introduced and conclusions given in the last section. II.OVERVIEW OF SECURITY IN AULWLAN In AULWLAN, security related network elements are portable stations (PSs), Base. Station (BSs) and central authorities (CAs). Each PS contains a permanent unique secret key that is also stored in BS and in a CA unit. A BS
2 controls the communication of PSs and it is also connected to a wired LAN. A CA is a logical unit that contains all necessary security parameters of PSs of the specific location area. Therefore, a Bs will contact a CA if it does not identificate PS in its own cell. In the prototype implementation of AULWLAN the CA unit is located in the BS and both of them are considered to be trusted units, Figure 1 illustrates the structure of AULWLAN system. Authenticated Portable station Non - Authenticated Portable station Base station Extemal Network Cell range Wired LAN Portable station Out of renge Figure 1 over view of the structure of ADLWLAN system Since there might be different type of PSs (laptop, sensor), and thus, different type of information to be transmitted, security level should be chosen flexibly. Therefore, are different modes for authentication and data encryption, which are summarized in table 1. Authentication modes: Data security modes: Table 1.Authentication and data security modes. 1-Open authentication 2- Secret key authentication 1.Open security 2.Cell security 3.Entiry security III.AUTHENTICATION SCHEMES Authentication services are divided into Open authentication and secret key authentication as depicted in Figure 2.In Open authentication on encryption function is used, whereas in Secret authentication IDEA(International Data Encryption Algorithm) [7] is used instead of LEEE ,WEP( wined equivalent privacy algorithm. Compared to IEEE802.11, WPE(Wired equivalent pribacy) algorithm, in our protocol the default authentication method is Secret key authentication with two transmitted messages. Each station contains a permenent secret that used only in the secret key authentication. Authentication is thus more secure and the umber of transmitted messages minimized. In the prototype implementation of AULWLAN, integrity of the authentication messages relies on nonces which are fresh random numbers constituting of two nonce identifiers [3],(r2.r3 etc in figure 3).Moreover the first nonce idcntifier is generated by feeding a pseudo randon number generate in (PRNG) on the Ps proper seed value. In addition,. for the secret key authentication mode integrity
3 is strengthened by using an encrypted 32- bit cyclic redundancy check (CRC-32) [1].The CRC value is computed over the whole authentication data This entirety together with the proper session key and a nonce is called an integrity check value (ICV) in the Secret authentication messages. IEEE standard does not define how temporary secret keys for one communication session should be exchanged between a PS and a BS and that is one major lack of the standard. In our secret key authentication scheme, session keys are exchanged within secure authentication messages A sessace key is encrypted within the authentication data and added also into the ICV for ensuring the integrity of the key. Authentication Secret authentication Open authentication Encryption -IDEN Integrity -Encrypted -Encrypted CRC Integrity Figure (2). Authentication modes and heeded services In AULWLAN system, a BS sets the required authentication level, thus PSs must authenticate with the required mode Authentication scheme starts when a PS sends an authentication request to a BS, which responds whether the authentication request was accepted or rejected. Only tw. messages over the air are transmitted despite of the authentication mode. The two authentication modes are next described in more detail. A. Open authentication and deauthentication Open authentication mode does not use any cryptographical functions during the authentication scheme. A PS sends to an open authentication message that includes a plaintext nonce to a BS, which processes the none and checks that it is generated by the PS with that MAC address. If the message is valid, the BS sends back an Open authentication response message that contains a new nonce. A plaintext temporary address for the communication session for the PS is transmittcd as well within the message. Open deauthentication scheme occurs when the PS wants to leave the cell reliably, It sends an Open deauthentication request message that contains a new nonce calculated from the last nonce used in the authentication scheme to the proper BS are receiving this message, the BS responds similarly as in as authentication scheme by sending an Open deauthentication response message. Figure 3 illustrates the transmission of nonces and the conjunction between them.
4 Portable station Open authentication 1 2 Data transmission Open 3 authentication 4 Base station identifiers: Nonc e1:r111 r2 2:r2 11r3 R 3:r3 ll r4 4:r4 ll r5 Figure 3 Open authentication and Open deauthentication. B. Secret key authentication and deauthentication Secret key authentication messages are sent in encrypted form between the communication parties. Secret key authentication starts when a PS sends a Secret key authentication request message to a BS. The BS processes it and whether the massage is correct, it sends back a Secret key authentication response message, the Secret key deauthentication scheme occurs for the same reasons as in the Open deauthentication scheme. In Figure 4, the Secret key authentication request frame and also the lengths of frame fields in octets are presented in the authentication request message the addresses in the MAC header are in plaintext form and the whole user data is encrypted with the permanent key of the PS. The ICV part consists of the first nonce and the session key generated by the PS as well as the CRC value calculated from the whole user data The session key and the nonce in the ICV are encrypted with the permanent key of the PS, and thus, this ICV and the whole user data are very well protected for the transmission medium. No one than the home BS and the CA know the PS proper permanent key. When the BS receives the authentication request message of the PS, It checks the MAC address and then decrypts the message With the PS proper permanent key. If the BS does not recognise the MAC address, it enquires the PS s permanent key from the CA unit. Next, the BS generates a new nonce and gives a temporary address for the PS. As can be seen in Figure 5, the Secret key authentication response includes also current broadcast key that is transmitted to all PSs on the same cell of AULWLAN. This broadcast key is changed frequently. e.g. after BS reboots or when there are on PS s in the cell. The ICV is done in the same way as in the authentication request it is also encrypted with the permanent key of the PS. Now the whole user data is encrypted correspondingly with the session key. MAC Header Encrypted authentication information ICV 4 CRC- 32 CRC- 32 Figure 4. Secret key authentication request message.
5 After receiving the Secret key authentication response, if the message is able to decrypted with the session key and the ICV value is correct as well, the PS can be sure that the message is authentic and came from the proper BS. After these steps the secret key authentication is successfully completed. MAC Header Encrypted authentication information CRC - 32 CRC TA ICV Broadcast Figure 5. Secret key authentication response message All encryption functions in the secret key authentication and deauthentication mode are implemented IDEA. Secret key deauthentication is used for secure disconnection.a PS sends a Secret key deauthentication request message and it consists of the same bricks as the secret key authentication request message but now the message is encrypted with the session key used in the current session. Moreover, all encryptions in Secret key deauthentication is done by the current session key. A new nonce is calculated from the last nonce used in the authentication scheme as well after receiving the deauthentication request message, the BS checks whether the deauthentication message was correct and responses by sending a Secret key deauthentication response message. The content of this message is likewise in the request message but agair, a new nonce is calculated. When the PS receives the authentication response message, and if he message is valid it can be sure that deauthentication scheme was valid. Notice that nonces are processed likewise in the Open authentication case presented in Figure 3. IV.DATA SECURITY SCHEMES Security of the data message relies on the encryption functions. The flexibility of the security system is obtained by three separate data security schemes which are Open security that does not support any cryptographical operations, Cell security that uses our improved WEP algorithm for data ciphering, and Entity security IDEA. Figure 6 depicts the data security modes and needed services On the contrary to [1], our data security sceme is more flexible because of three separate data security schemes. In addition, of the integrity of the encrypted data messages by using an encrypted CRC-32 that constitutes alone the ICV for secure data messages. All but the Open security mode use this integrity service. Further, secure data messages contain also location privacy service that is achieved by using an 8 bit temporary addresses[4]. Temporary addresses become in use after the authentication scheme, It changes static globally unique MAC following, the security modes are described in more datail. 4
6 Data securely Open security Cell security Entity security Location privacy: Encryption: Encryption: - Temporary - Improved - IDEA address Integrity WEP : Integrity : - Encrypted CRC - Encrypted CRC location Privacy: location Privacy: : - Temporary :: - Temporary address address Figure 6.Data security modes and needed services. Open security mode is necessary because in some situations it is fruitless or forbidden to use any data encryption schemes. The Open security scheme follows the Open authentication scheme because session keys are not exchanged during that authentication mode. Cell security scheme is the default mode for the data ciphering in AULWLAN system. The cell security scheme allows light protection for transmitted data because of our improved WEP algorithm. This data security mode makes it infeasible for unauthenticated third parties to eavesdrop the transmitted data. On the contrary. all authenticated PSs in the same cell could eavesdrop each other. Entity security is the strongest scheme of data ciphering in AULWLAN system and prevents eavesdropping also between portable stations in one cell. Every message between a PS and a BS is encrypted and decrypted by a session proper key. In Entity security mode, IDEA algorithm is used, in the next section, cryption algorithms are presented. V.CRYPTION ALGORITHMS ON AULWLAN There are two ways to encrypt data in our system; by using secret key block cipher cipher algorithm IDEA[7] and by using improved WEP algorithm. IDEA is based on extensive cryptanalysis, and it is very secure. Moreover, a 128 bit key length is used to effective remove the risk of brute force attacks[7]. For ADLWLA IDEA is used in Electronic Code Book mode (ECB) because burst errors in wireless transmission path, and therefore, a 64 bit user data block is encrypted independently, Cipher Bloce Chaining (CBC) or Cipher Feedback (CFB) modes strengthen the integrity service but due to RF transmissions medium errors they are not used. Since AULWLAN accepts various terminals, not transmissions have to be protected extremely securely and on the other hand, there are information that does not agree with any delays (real-time video).we have therefore modified WEP algorithm[1] by making if more suitable for light data encryption. It encrypts user data in independent 64 bit block and uses a 64 bit key length. Figure 7 illustrates a high level ciphering scheme for an improved WEP algorithm, A PRNG generates as initialzation vector (IV) that is transmitted to the receiver station within the user data in plaintext form. The IV and the broadcast key are XORed and after that a data block is encrypted with the resulting vector. The encryption procedure itself consists of three rounds and two data permutation round Decryption is similar to the encryption procedure.
7 Seed Broadcast PRN IV XOR Plaintext data block Plaintext data block IV XOR Broadcast Permutation Permutatio Ciphered Data block Permutation Permutatio Figure 7. Ciphering scheme in our improved WEP algorithm VI. CONCLUSIONS Our security scheme for AULMAC protocol is very flexible Since we have three data security levels. PSs can be configured for optimal security level, and thus, the use of computing resources can be optimized. For demanding real-time applications, our improved WEP algorithm gurantees efficient security and ensures minimal delays during the trans smission. Using IDEA and the secret key authentication the network can be set up very securely. Our AULMAC protocol and the security scheme is currently under implementation. For the prototype system, we consider cell of AULWLAN, and therefore, the handover situations are not handled. Authentication during handover situations is of the major future tasks. REFERENCES [1] IEEE p D5.0 IEEE Standard for local and metropolitan area networks: wireless LAN Medium Access Control (MAC) and physical Layer (PHY) specifications, IEEE standards Department, [2] ETS , Radio Equipment and System (RES), High Performance Radio Local Area Network (HIPERLAN), Type 1; Functional specification, October [3] V. Bharghavan, Secure Wireless LANs, proceedings of ACM conference on computers and Communications Security 94, Fairfax, Virginia, November 1994.pp [4] V.Bharghavan, A Dynamic Addressing Scheme for Wireless Media Access, Proceedings of the IEEE ICC95, Seattle, June 1995.PP [5] M. Burrows, M. Abadi, R.Needham, Alogic of Authentication, ACM Transactions on computer systems, vol.8,on I, February pp [6] M. Hannikainen, J.Knuutial, A. Letonsari, T. Hamalainen, J. Jolela, J. Ala- Laurila, J. Saarinen, TUTMAC: A Medium Access control Protocol for A New Multimedia wireless local Area Network, accepted to IEEE PIMRC 98 conference. [7] B.Schneter Applied Cryptogrophy Second Edition Protocols, algorithms, and source code in C, John Wiley & Sons,1996. ABOUT THE AUTHOR Ass. Prof. Ahmed Abdo Ali, Ph D, Department of Physics, Aden university, Yemen, phone : E- Mail: Ahmed_acc@yahoo.com
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
More information802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
More informationJournal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.
More informationWireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group jingan.xu@tu-ilmenau.de, mitsch@tu-ilmenau.de Abstract.
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationSecurity in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationSecurity in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationGSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
More informationKey Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
More informationKey Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
More informationHow To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
More informationYour 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
More informationCS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
More informationChapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
More informationNetwork Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security (WS 2003: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control (MAC and physical characteristics
More informationWireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
More informationAn Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
More informationCCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai
More informationWireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
More informationA SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS Jose Perez Texas A&M University Corpus Christi Email: jluisperez16@gmail.com Fax Number: (361) 825-2795 Faculty Advisor: Dr. Ahmed Mahdy, Texas A&M University
More informationWhite paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
More informationVulnerabilities of Wireless Security protocols (WEP and WPA2)
Vulnerabilities of Wireless Security protocols (WEP and WPA2) Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne Abstract - Wirelesses Local Area Networks (WLANs) have become more prevalent
More informationThe Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola ajn05012@student.mdh.se +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
More informationWI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
More informationCS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
More informationNXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
More informationThe next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
More informationWEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
More informationConfiguration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System
Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.1.1 Radio Channels...
More informationWireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
More informationUNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
More informationIEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption
IEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems Tata Consultancy Services
More informationWireless security (WEP) 802.11b Overview
Wireless security (WEP) 9/01/10 EJ Jung 802.11b Overview! Standard for wireless networks Approved by IEEE in 1999! Two modes: infrastructure and ad hoc IBSS (ad hoc) mode Independent Basic Service Set
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationBasic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationAll vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
More informationHow To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationWiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastr, David Wagner Presented By: Tristan Brown Outline Motivation Cryptography Overview TinySec Design Implementation
More informationWireless LANs and Privacy. Ido Dubrawsky Network Security Engineer Cisco Secure Consulting Services Cisco Systems, Inc. And
Wireless LANs and Privacy Ido Dubrawsky Network Security Engineer Cisco Secure Consulting Services Cisco Systems, Inc. And Lance Hayden Business Development Manager Cisco Secure Consulting Services Cisco
More informationSecret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
More informationWith its promise of a target transmission. Responding to Security Issues in WiMAX Networks. Section Title
Responding to Security Issues in WiMAX Networks Chin-Tser Huang, University of South Carolina J. Morris Chang, Iowa State University WiMAX technology has attracted significant attention and interest because
More informationBurglarproof WEP Protocol on Wireless Infrastructure
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2006 Proceedings Pacific Asia Conference on Information Systems (PACIS) 1-1-2006 Burglarproof WEP Protocol on Wireless Infrastructure
More informationSymm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2
Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit
More informationPCMCIA Wireless LAN Card User s Manual
PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of
More informationTable of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
More informationIEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationEXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationAgenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story
Wireless s June September 00 Agenda Wireless Security ผศ. ดร. อน นต ผลเพ ม Asst. Prof. Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University,
More informationWireless LAN Security I: WEP Overview and Tools
Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
More informationWireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
More informationAbstract. 1. IEEE 802.11. a. 802.11a b. 802.11b c. 802.11g 2. HiperLAN/2. 3. Bluetooth. 4. HomeRF.
A Detailed Study on Wireless LAN Technologies Vijay Chandramouli Department of Computer Science and Engineering The University of Texas at Arlington vmouli@uta.edu Abstract Wireless Communication is an
More informationRecommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationMultiple WiFi Clients on a Single Wireless Card
Multiple WiFi Clients on a Single Wireless Card Juan M Torrescusa Supervisor: Andrea Bittau April 27, 2006 This report is submitted as part requirement for the BSc Degree in Computer Science at University
More informationAnalysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 shenam91@gmail.com, 2 dkamal@brcm.edu.in Abstract This paper
More informationIEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
More informationChapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
More informationWireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
More informationAuthentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
More informationSSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. E-mail: pro09020@fe.up.pt Dez 2009. Dez 2009 1
SSI Commons Wireless Protocols WEP and WPA2 Bertil Maria Pires Marques E-mail: pro09020@fe.up.pt Dez 2009 Dez 2009 1 WEP -Wired Equivalent Privacy WEPisasecurityprotocol,specifiedintheIEEEWireless Fidelity
More informationWireless Local Area Networking (WLAN) Security Assessment And Countermeasures
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE 802.11 Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for
More informationchap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: jungkyu21@seoultech.ac.kr Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
More informationNetwork Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 3 Symmetric Cryptography General Description Modes of ion Data ion Standard (DES)
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationHANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
More informationWLAN and IEEE 802.11 Security
WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise
More informationWLAN Authentication and Data Privacy
WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may
More informationHIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
More informationCS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
More informationTecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
More informationARIB STD-T64-C.S0042 v1.0 Circuit-Switched Video Conferencing Services
ARIB STD-T-C.S00 v.0 Circuit-Switched Video Conferencing Services Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T for Related Industrial Property Rights. Refer to "Notice" in the
More informationA Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationSecurity in wireless networks:
: Vulnerabilities and countermeasures Department of Software Engineering and Computer Science Blekinge Institute of Technology Spring 2003 Authors: Josephine Larsson Ida Waller Supervisor: Anders Carlsson
More informationCOMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
More informationA Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite
White Paper A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite 1. Introduction Since the ratification of the IEEE 802.11b standard in 1999, wireless LANs have
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationPwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
More informationABSTRACT. This thesis focuses on the detection of attacks in Wireless networks (802.11b). As the
ABSTRACT Kaniganti, MadhaviLatha. Master of Science. The University of Memphis. December 2003. An Agent-Based Intrusion Detection System for Wireless LANs. Major professor: Dr. Dipankar Dasgupta. This
More information1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6. secure data communication. The access point periodically advertise
More informationWHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
More informationNetwork Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
More informationA COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
More informationMAC Layer Key Hierarchies and Establishment Procedures
MAC Layer Key Hierarchies and Establishment Procedures Jukka Valkonen jukka.valkonen@tkk.fi 17.11.2006 1. Introduction and Background 2. Pair-wise associations 3. Group associations 4. Different layers
More informationAuthentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia ggr@qualcomm.com ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
More informationSecurity Of Wi-Fi Networks
Security Of Wi-Fi Networks Security Of Wi-Fi Networks Durmuş Ali Avcı, Kemal Hajdarević International Burch University, Faculty of Engineering and Information Technologies, 71000, Sarajevo, Bosnia and
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More informationDistributed Systems Security
Distributed Systems Security Protocols (Physical/Data-Link Layer) Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Overview Security on
More informationTutorial 3. June 8, 2015
Tutorial 3 June 8, 2015 I. Basic Notions 1. Multiple-choice (Review Questions Chapter 6, 8 and 11) 2. Answers by a small paragraph (Chapter 2: viruses: MBR, rootkits, ) Multiple choice X. Which is the
More informationMessage Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More information