A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
|
|
|
- Florence Ray
- 10 years ago
- Views:
Transcription
1 A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute of technology Abstract-- Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Extensible Authentication Protocol Transport Layer Security is completely password cracking resistant because it does not rely on user passwords. Extensible Authentication Protocol Transport Layer Security provides mutual authentication between the supplicant and authentication server based on X.509 certificates. It eliminates MITM attacks and rogue access point s can be detected. This paper addresses the security problem by proposing a system which involves Client identity protection method that when implemented prevents unauthorized user access and thus protecting or encrypting the data against malicious manipulation. Proposed system provides mutual Authentication server based on X.509 certificates. Keywords-EAP, MITM I. Introduction Wireless networks offer the benefits of increased productivity, easier network expansion, flexibility, and lower the cost of ownership. In addition Wireless LAN Systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Following the increasing demand for wireless data access, different kind of wireless communication technologies are being developed continually.[8] On the other hand, security considerations continue to be a major challenge in the wireless network set-ups. Lack of security and inflexible authentication is often cited as a major barrier to the growth of e-commerce (electronic commerce) into m-commerce (mobile commerce). Wireless LANs, unlike the relative simplicity of wired Ethernet deployments, broadcast radio-frequency (RF) data for the Client stations to hear. This presents new and complex security issues requiring additional policies to be incorporated in every WLAN deployment. Wireless LANs require strict User authentication, Data privacy and Data Integrity to prevent unauthorized access to network resources and protect data from modification or destruction. This paper addresses the security problem by proposing a system which involves Client identity protection method that when implemented prevents unauthorized user access and thus protecting or encrypting the data against malicious manipulation. Proposed system provides mutual Authentication server based on X.509 certificates. It eliminates MITM attacks and from rogue AP s. Provides better secure authentication this project can be used in telecommunication applications, for wi -fi authentication, it has wide scope for different applications. II. How EAP works The Point-to-Point (PPP) Extensible Authentication Protocol (EAP) (RFC 2284) is an authentication protocol defined by the Internet Engineering Task Force (IETF) that typically rides on top of other protocols such as 802.1x, RADIUS, PPP. Through the use of EAP, support for a number of authentication schemes may be added, including smart cards, Kerberos, Public Key (PKI), One Time Passwords (OTP), and others.[1] EAP creates a standard message structure to authenticate the Client to the network. Depending on the authentication protocol agreed upon by the Client and the server, the details in the message exchange may vary. Figure 2.1 shows us the general message flow that occurs between the EAP Client, Authenticator and Authentication server. The steps involved in the EAP conversation are:[4] 1. The EAP Client connects to the network and tries to access information on the network. 2. The Authenticator responds to the Client by asking for its identity. 3. The Client responds to the Authenticator with its identity information. 4. The Authenticator forwards the Client s identity information to the Authentication Server using the necessary protocol agreed upon by the Authentication Server and the Authenticator or Client. 5. The Authentication Server responds with a challenge to the Authenticator and specifies the EAP authentication type supported by the Authentication server. This message is transmitted over the RADIUS protocol back to the Authenticator. 6. The Authenticator forwards the challenge back to the Client with the authentication type requested by the Authentication Server. 7. The Client examines the challenge and determines if it can support the requested EAP authentication protocol. If it cannot support the authentication type requested by the Authentication Server, the Client will issue a NAK request and try to negotiate an alternative authentication method. If the Client can support the authentication type 3488
2 requested by the Authentication Server, it responds with its credential information. 8. The Authenticator relays the Client s credentials to the Authentication Server using the RADIUS protocol. 9. If the Client s credentials are valid, the Authentication Server authenticates and authorizes the Client. Otherwise, the Client is rejected and the appropriate RADIUS Access-Accept or Access-Reject message is sent back to the Authenticator using the RADIUS protocol. 10. The Authenticator receives the RADIUS Access- Accept or Access-Reject message and configures the network access accordingly. 11. Upon receiving the RADIUS ACCEPT packet, the Authenticator transitions the Client s port to an authorized state and the network traffic is forwarded. III.Remote Authentication Dial-in User Service A. Overview The Remote Authentication Dial-in User Service (RADIUS) (RFC 2865) is an IETF-defined Client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dialin users and authorize their access to the requested system or service [3] forwarded to a RADIUS Authentication Server that validates the user and returns the information necessary for the access server to initiate a session with the user. The user repeats this process to initiate every session. A dictionary file kept in the RADIUS database determines the types of attributes that can be included in the user profile. The user profile is a file containing authentication security and configuration information for each user. B. Extensible Authentication Protocol (EAP) over RADIUS EAP over RADIUS is a transport mechanism for passing EAP messages of any EAP type by the RADIUS Client (access point) to a RADIUS server for authentication. EAP is supported in the RADIUS and allows for new authentication types to be used over links running on the PPP protocol. To support EAP, RADIUS includes two new attributes - EAP-Message and Message- Authenticator. Figure 3.1: A typical RADIUS ServerTopology Fig2.1: IEEE 802.1x and EAP Message Exchange [RFC2865]. It is commonly used to provide centralized Authentication, Authorization, and Accounting (AAA) for dial-up, virtual private network, and, wireless network access. The software for a RADIUS server includes three parts: an Authentication server, Client protocols and an Accounting server. These pieces can all run on one machine or on separate ones outfitted with different operating systems. Broadly speaking it works by having a user dial in to a remote access server and pass logon name and password information to it. The information is Normally, the RADIUS server encapsulates the EAP packets within a standard RADIUS packet, using the EAP-Message attribute, and then transmits them back and forth between the RADIUS Client and the RADIUS server [RFC2869]. The access point then becomes only a pass-through device relaying EAP authentication messages from the wireless Client device to the RADIUS server and vice versa without having to process the packets. This way every new EAP type that is introduced need not be installed at each access point but only at the RADIUS server end. The access point would then behave the same way for each EAP type thus making it extremely flexible. The RADIUS Client (access point) must however support the negotiation of EAP as an authentication protocol and the passing of EAP messages to a RADIUS server. When 3489
3 a connection attempt is made, the end user negotiates the use of EAP with the access point. When the user sends an EAP message to the access point, the access point encapsulates the EAP message as a RADIUS message and sends it to its configured RADIUS server. The RADIUS server processes the EAP message and sends a RADIUSformatted EAP message back to the access point. The access point finally forwards the EAP message to the end user. IV. Dynamic Extensible Authentication A. Existing System There are several extensible authentication methods which has its limitations the table5.1 shows clearly some EAP-methods and its limitations. B. Proposed system As analyzed in the above table EAP-TLS provides better security by overcoming some of the limitations in other EAP methods. EAP-TLS can be easily used for device authentication by using digital signed certificates in the device. EAP-TLS is completely password cracking resistant because it does not rely on user passwords. EAP- TLS provides mutual authentication between the supplicant (User) and Authentication server based on X.509 certificates. It eliminates MITM attacks and from rogue AP s. In this proposed system it generates dynamically generates and distributes user based and session based encryption keys to secure connections therefore supplicants(users) identity and password are not revealed. Some of the advantages of the proposed system are[5]: Strong wireless security using established standards Defends against the weaknesses in WEP encryption, session hijacking, man-in-the-middle attack and dictionary attacks Addresses weaknesses in (WEP) and 802.1X Mutual authentication between client and server Easy to deploy and manage Proposed system is implemented using JAVA Supports different operating systems and RADIUS servers. V THE METHOD Two Server and Client modules were developed in this project. Each module has different packages. A. Radius packet format Figure 5.1: Radius packet format Table 5.1: EAP-Methods and its limitations. The field is one octet, and identifies the type of RADIUS packet. When a packet is received with an invalid field, it is silently discarded. RADIUS s (decimal) are assigned as follows: 1 Access-Request 2 Access-Accept 3 Access-Reject 4 Accounting-Request 5 Accounting-Response 11 Access-Challenge The field is one octet, and aids in matching requests and replies. The RADIUS server can detect a duplicate request if it has the same client source IP address and source UDP port and within a short span of time. The field is two octets. It indicates the length of the packet including the,,, Authenticator and Attribute fields. The minimum length is 20 and maximum length is Authenticator The Authenticator field is sixteen (16) octets. The most significant octet is transmitted first. This value is used to authenticate the reply from the RADIUS server, and is used in the password hiding algorithm. B. EAP-TLS Request Packet 1 The field is the one octet and aids in matching responses with requests. The field must be changed on each Request packet. 3490
4 Figure 5.2: EAP-TLS request packet The field is two octets and indicates the length of the EAP packet including the,,, Type, and Data fields. Type EAP-TLS Flags L M S R R R R R L = included M = More fragments S = EAP-TLS start R = Reserved The field is two octets and indicates the length of the EAP packet including the,,, Type, and Data fields TLS Message The TLS Message field is four octets, and is present only if the L bit is set. This field provides the total length of the TLS message or set of messages that is being fragmented. TLS data The TLS data consists of the encapsulated TLS packet in TLS record format. D. Implementation Architecture of Server The L bit (length included) is set to indicate the presence of the four-octet TLS Message field, and must be set for the first fragment of a fragmented TLS message or set of messages. The M bit (more fragments) is set on all but the last fragment. The S bit (EAP-TLS start) is set in an EAP-TLS Start message. This differentiates the EAP- TLS Start message from a fragment acknowledgment. TLS Message The TLS Message field is four octets, and is present only if the L bit is set. This field provides the total length of the TLS message or set of messages that is being fragmented. C. EAP-TLS Response Packet 2 The field is one octet and must match the field from the corresponding request. Figure 5.4: Shows the Implementation architecture of Server Module. Figure5.3: EAP-TLS response packet 3491
5 E. Implementation Architecture of Client Figure 5.5: shows the implementation architecture of Client Module. Results As a proof to the concept a project was developed under same title. Following table gives the test cases for the same. Conclusion EAP-TLS provides better security by overcoming some of the limitations in other EAP methods. EAP-TLS can be easily used for device authentication by using digital signed certificates in the device. EAP-TLS is completely password cracking resistant. EAP-TLS provides mutual Authentication server based on X.509 certificates. It eliminates MITM attacks and from rogue AP s. It dynamically generates and distributes user based and session based encryption keys to secure connections therefore supplicants (users) identity and password are not revealed. Acknowledgement We are deeply indebted to all those who have motivated us to prepare this paper. References [1] RFC 2716 & 5216 The EAP-TLS Authentication Protocol. [2] RFC 3579 RADIUS and EAP. [3] RFC 2865 RADIUS. [4] Jyh-Cheng Chen and Yu-Ping Wang, Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and Empirical Experience, 2005 [5] Funk, P. and S. Blake-Wilson, "EAP TLS Authentication Protocol (EAP-TLS)", August 2004 [6] Brett Turner, Andrew Woodward Edith Cowan University, Securing a wireless network with EAP-TLS: perception and realities of its implementation,6th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 1st to 3rd December [8] William Stallings, Network Security Essentials Third Edition [9][FMS01] Stubblefield, A., Ioannidis, Rubin, A. Using the Fluhrer, Mantin, and Shamir. Attack to Break WEP. 3492
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper
Bosch Security Systems Video Systems Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper 4 July 2016 Secure the edge of the network Security devices are mostly located
How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a
Evaluation of EAP Authentication Methods in Wired and Wireless Networks
Master Thesis Electrical Engineering October 2012 Evaluation of EAP Authentication Methods in Wired and Wireless Networks Tirumala Rao Kothaluru Mohamed Youshah Shameel Mecca School of Computing Blekinge
Extensible Authentication Protocol (EAP) Security Issues
Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Belnet Networking Conference 2013
Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
RADIUS: A REMOTE AUTHENTICATION DIAL-IN USER SERVICE
InSight: RIVIER ACADEMIC JOURNAL, VOLUME 5, NUMBER 2, FALL 2009 RADIUS: A REMOTE AUTHENTICATION DIAL-IN USER SERVICE Daniel Szilagyi*, Arti Sood** and Tejinder Singh M.S. in Computer Science Program, Rivier
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
EAP-WAI Authentication Protocol
EAP-WAI Authentication Protocol draft-richard-emu-wai-00 Richard 2009-07-26 Stockholm, IETF 75th Preface WAPI is a WLAN security protocol and brought forward By a Standard Group in China. It was invited
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
How To Authenticate With Port Based Authentication
Chapter 2, Port-Based Authentication Concepts Author: Jim Geier Principal Consultant, Wireless-Nets, Ltd. Email: [email protected] This chapter is a sample from the book Implementing 802.1x Security
Lecture 4b AAA protocols (Authentication Authorization Accounting)
Lecture 4b AAA protocols (Authentication Authorization Accounting) Network security (19265400 / 201000086) Lecturers: Aiko Pras Pieter-Tjerk de Boer Anna Sperotto Ramin Sadre Georgios Karagiannis Lecture
Authentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien
How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)
Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a
RadSec RADIUS improved. Stig Venaas [email protected]
RadSec RADIUS improved Stig Venaas [email protected] Overview RADIUS overview RadSec overview What is wrong with RADIUS RadSec benefits Radsec implementations, deployment and standardisation RADIUS overview
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
A Threat Analysis of The Extensible Authentication Protocol
A Threat Analysis of The Extensible Authentication Protocol Lei Han Student #: 100304821 April, 2006 Supervised by Professor Michel Barbeau School of Computer Science Carleton University Honors Project
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
Network Access Control and Cloud Security
Network Access Control and Cloud Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Chapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard
Allied Telesis White Paper 802.1x White Paper Executive Summary Security and flexibility are often seen as mutually exclusive requirements in a network, yet both are equally important. Security is crucial
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS
APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Certified Wireless Security Professional (CWSP) Course Overview
Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption
Network Access Control and Cloud Security
Network Access Control and Cloud Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
Cisco Secure Access Control Server Deployment Guide
Cisco Secure Access Control Server Deployment Guide 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 58 Contents Introduction... 4 Cisco Secure ACS...
Cisco SAFE: Wireless LAN Security in Depth
White Paper Cisco SAFE: Wireless LAN Security in Depth Authors Sean Convery (CCIE #4232), Darrin Miller (CCIE #6447), and Sri Sundaralingam are the primary authors of this white paper. Mark Doering, Pej
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
CISCO WIRELESS SECURITY SUITE
Q&A CISCO WIRELESS SECURITY SUITE OVERVIEW What is the Cisco Wireless Security Suite? The Cisco Wireless Security Suite is an enterprise-ready, standards-based, wireless LAN (WLAN) security solution for
m-trilogix White Paper on Security in Wireless Networks
m-trilogix White Paper on Security in Wireless Networks Executive Summary Wireless local area networks (WLANs) based on IEEE 802.11b (Wi-Fi) will ship, according to a Cahners- Instat study, 23.6 million
SLIP and PPP. Gursharan Singh Tatla. [email protected] www.eazynotes.com. 1 www.eazynotes.com
SLIP and PPP Gursharan Singh Tatla [email protected] 1 Data Link Layer in Internet We know that Internet consists of individual systems that are connected to each other. Basically, it is wide are
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
Intranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
IEEE 802.1X For Wireless LANs
IEEE 802.1X For Wireless LANs John Roese, Ravi Nalmati, Cabletron Albert Young, 3Com Carl Temme, Bill McFarland, T-Span David Halasz, Aironet Paul Congdon, HP Andrew Smith, Extreme Networks Slide 1 Outline
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
Implementing Security for Wireless Networks
Implementing Security for Wireless Networks Action Items for this session Learn something! Take notes! Fill out that evaluation. I love to see your comments and we want to make these better! Most important:
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2)
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) Moffat Mathews, Ray Hunt Department of Computer Science and Software Engineering, University of Canterbury, New Zealand {[email protected]}
Using IEEE 802.1x to Enhance Network Security
Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
User Authentication in the Enterprise Network
User Authentication in the Enterprise Network Technology for secure accessibility to Enterprise IT services 2001 Enterasys Networks, Inc. All rights reserved. Steve Hargis Technical Director Office of
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
3GPP TS 29.161 V6.3.0 (2007-12)
TS 29.161 V6.3.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the Public Land Mobile Network (PLMN)
EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
WiNG 4.X / WiNG 5.X RADIUS Attributes
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 4.X / WiNG 5.X RADIUS Attributes Part No. TME-08-2011-01 Rev. C MOTOROLA and the Stylized M Logo are registered in the US Patent
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance
CSC574: Computer and Network Security
CSC574: Computer and Network Security Lecture 21 Prof. William Enck Spring 2016 (Derived from slides by Micah Sherr) Wireless Security Wireless makes network security much more difficult Wired: If Alice
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
Wireless Technology Seminar
Wireless Technology Seminar Introduction Adam Worthington Network Consultant [email protected] Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
