Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.



Similar documents
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

Your Wireless Network has No Clothes

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security in IEEE WLANs

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wireless Networks. Welcome to Wireless

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless LAN Security Mechanisms

Chapter 6 CDMA/802.11i

WLAN and IEEE Security

Wireless Security: Token, WEP, Cellular

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

Computer Networks - CS132/EECS148 - Spring

Linux Access Point and IPSec Bridge

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Cryptanalysis of IEEE i TKIP

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Security in Wireless Local Area Network

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Tutorial 3. June 8, 2015

A Security Analysis of the Wireless Networks (IEEE )

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

2. WLAN SECURITY MECHANISMS AND PROTOCOLS 1. INTRODUCTION

Distributed Systems Security

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

How To Secure Wireless Networks

The Misuse of RC4 in Microsoft Word and Excel

Wireless security. Any station within range of the RF receives data Two security mechanism

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

HANDBOOK 8 NETWORK SECURITY Version 1.0

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Wireless LAN Security I: WEP Overview and Tools

Wireless Local Area. Network Security

WPA Migration Mode: WEP is back to haunt you...

Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures

CS 356 Lecture 29 Wireless Security. Spring 2013

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks

Security in Wireless and Mobile Networks

The next generation of knowledge and expertise Wireless Security Basics

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Keywords: WLAN, IEEE g, VPN, OpenVPV, Security.

Security in Ad Hoc Network

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

WiFi Security: WEP, WPA, and WPA2

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

CS 758: Cryptography / Network Security

Netzwerksicherheit: Anwendungen

Lecture 2 Secure Wireless LAN

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Network Security: Cryptography CS/SS G513 S.K. Sahay

Industrial Communication. Securing Industrial Wireless

The Basics of Wireless Local Area Networks

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Recommended Wireless Local Area Network Architecture

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

Chapter 37. Secure Networks

Overview of Networks and Standards

CRYPTOGRAPHY IN NETWORK SECURITY

ECE 4893: Internetwork Security Lab 10: Wireless Security

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

WHITE PAPER. WEP Cloaking TM Maximizing ROI from Legacy Wireless LAN

IEEE Technical Tutorial. Introduction. IEEE Architecture

EXAM questions for the course TTM Information Security May Part 1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

How To Analyze The Security On An Ipa Wireless Sensor Network

Data Link Layer Overview

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

Wiereless LAN

chap18.wireless Network Security

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

Link Layer and Network Layer Security for Wireless Networks

Transcription:

Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1

IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics of a wireless local area network LAN The standard comprises three physical layer units: Frequency Hop Spread Spectrum: 2.4 GHz band; 1, 2, 5.5, and 11 Mbit/s Direct Sequence Spread Spectrum: 2.4 GHz band, 1, 2, 5.5, 11 and 22 Mbit/s Baseband infrared: diffuse infrared; 1 and 2 Mbit/s Transmission in the license-free 2.4 GHz band implies: Medium sharing with un-volunteering 802.11 devices Overlapping of logical separated wireless LANs Overlapping with non-802.11 devices The medium access control MAC supports operation under control of an access point as well as between independent stations In this class we will mainly focus on the standard s security aspects: Many equipment vendors claim that IEEE 802.11 is as secure as a wired network more on this below... Network Security WS 2002: 15 Wireless LAN Security 2

802.11 - Architecture of an Infrastructure Network STA 1 ESS 802.11 LAN BSS 1 Access Point BSS 2 Portal Distribution System Access Point 802.11 LAN 802. LAN STA 2 STA 3 Station STA: Terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set BSS: Group of stations using the same radio frequency Access Point: Station integrated into the wireless LAN and the distribution system Portal: Bridge to other wired networks Distribution System: Interconnection network to form one logical network etended service set, ESS based on several BSS Network Security WS 2002: 15 Wireless LAN Security 3

802.11 - Architecture of an Ad-Hoc Network 802.11 LAN Station STA: Terminal with access mechanisms to the wireless medium STA 1 BSS 1 STA 3 Basic Service Set BSS: Group of stations using the same radio frequency STA 2 BSS 2 Ad-Hoc networks allow direct communication between end systems within a limited range STA 4 802.11 LAN STA 5 As there is no infrastructure, no communication is possible between different BSSs 7.6.1 Network Security WS 2002: 15 Wireless LAN Security 4

Security Services of IEEE 802.11 Security services of IEEE 802.11 are realized by: Entity authentication service Wired Equivalent Privacy WEP mechanism WEP is supposed to provide the following security services: Confidentiality Data origin authentication / data integrity Access control in conjunction with layer management WEP makes use of the following algorithms: The RC4 stream cipher please refer to chapter 3 The Cyclic Redundancy Code CRC checksum for detecting errors Network Security WS 2002: 15 Wireless LAN Security 5

The Cyclic Redundancy Code 1 The cyclic redundancy code CRC is an error detection code Mathematical basis: Treat bit strings as representations of polynomials with coefficients 0 and 1 a bit string representing message M is interpreted as M Polynomial arithmetic is performed modulo 2 addition and subtraction are identical to XOR CRC computation for a message M: A and B agree upon a polynomial G; usually G is standardized Let the n be the degree of G, that is the length of G is n + 1 n n M 2 R M 2 + R Then if = Q + it holds = Q G G G where R is the remainder of M divided by G Usually, R is appended to M before transmission and Q is not of M 2 interest, as it is only checked if n + R divides with remainder 0 G Network Security WS 2002: 15 Wireless LAN Security 6

Network Security WS 2002: 15 Wireless LAN Security 7 The Cyclic Redundancy Code 2 Consider now two Messages M 1 and M 2 with CRCs R 1 and R 2 : As and divide with remainder 0 also divides with remainder 0 CRC is linear, that is CRCM 1 + M 2 = CRCM 1 + CRCM 2 This property renders CRC weak for cryptographic purposes! more on this below... 2 1 1 G R M n + 2 2 2 G R M n + 2 2 2 2 1 2 1 2 2 1 1 G R R M M G R M R M n n n + + + = + + +

IEEE 802.11 Entity Authentication 1 IEEE 802.11 provides a very basic authentication service: Authentication should be performed between stations and access points and could also be performed between arbitrary stations When performing authentication, one station is acting as the requestor A and the other one as the responder B The authentication dialogue: 1. A B: Authentication, 1, ID A 2. B A: Authentication, 2, r B 3. A B: {Authentication, 3, r B } K A,B 4. B A: Authentication, 4, Successful As can be easily deduced from the above protocol, mutual authentication requires two independent protocol runs, one in each direction Network Security WS 2002: 15 Wireless LAN Security 8

IEEE 802.11 Entity Authentication 2 IEEE 802.11 authentication comes in two flavors : Open System Authentication: Essentially it is a null authentication algorithm. IEEE 802.11, section 8.1.1 Shared Key Authentication: Shared key authentication supports authentication of STAs as either a member of those who know a shared secret key or a member of those who do not. IEEE 802.11, section 8.1.2 The required secret, shared key is presumed to have been delivered to participating STAs via a secure channel that is independent of IEEE 802.11 Concluding, IEEE 802.11 does not provide sufficient means for authentication in truly mobile environments: As a result of the missing key management very often open system authentication is used Network Security WS 2002: 15 Wireless LAN Security 9

IEEE 802.11 s Wired Equivalence Privacy 1 IEEE 802.11 s WEP uses RC4 as a pseudo-random-bit-generator PRNG: For every message M to be protected a 24 bit initialization vector IV is concatenated with the shared key K BSS to form the seed of the PRNG The integrity check value ICV of M is computed with CRC and appended to the message The resulting message M ICV is XORed with the keystream generated by RC4IV K BSS IV IV K BSS seed WEP PRNG keystream Ciphertet M CRC algorithm ICV WEP Encryption Block Diagram Message Network Security WS 2002: 15 Wireless LAN Security 10

IEEE 802.11 s Wired Equivalence Privacy 2 As IV is send in clear with every message, every receiver who knows K BSS can produce the appropriate keystream to decrypt a message This assures the important self-synchronization property of WEP The decryption process is basically the inverse of encryption: K BSS IV seed WEP PRNG keystream CRC ICV M? ICV = ICV Ciphertet Message WEP Decryption Block Diagram Network Security WS 2002: 15 Wireless LAN Security 11

IEEE 802.11 s Security Claims The WEP has been designed to ensure the following security properties: Confidentiality: Only stations which possess K BSS can read messages protected with WEP Data origin authentication / data integrity: Malicious modifications of WEP protected messages can be detected Access control in conjunction with layer management: If set so in the layer management, only WEP protected messages will be accepted by receivers Thus stations that do not know K BSS can not send to such receivers Unfortunately, none of the above claims holds... :o Network Security WS 2002: 15 Wireless LAN Security 12

Weakness #1: The Keys IEEE 802.11 does not specify any key management: Manual management is error prone and insecure Shared use of one key for all stations of a BSS introduces additional security problems As a consequence of manual key management, keys are rarely changed As a another consequence, security is often even switched off! Key Length: The key length of 40 bit specified in the original standard provides only poor security The reason for this was eportability However, today s wireless LAN cards often also allow keys of length 128 bit Network Security WS 2002: 15 Wireless LAN Security 13

Weakness #2: WEP Confidentiality is Insecure Even with well distributed and long keys WEP is insecure The reason for this is reuse of keystream: Recall that encryption is re-synchronized with every message by prepending an IV of length 24 bit to K BSS and re-initializing the PRNG Consider two plaintets M 1 and M 2 encrypted using the same IV 1 : C 1 = P 1 RC4IV 1, K BSS C 2 = P 2 RC4IV 1, K BSS then: C 1 C 2 = P 1 RC4IV 1, K BSS P 2 RC4IV 1, K BSS = P 1 P 2 Thus, if an attacker knows, for eample, P 1 and C 1 he can recover P 2 from C 2 without knowledge of the key K BSS Cryptographers call this an attack with known-plaintet How often does reuse of keystream occur? In practice quite often, as many implementations choose IV poorly Even with optimum choice, as IV s length is 24 bit, a busy base station of a 11 Mbit/s WLAN will ehaust the available space in half a day Network Security WS 2002: 15 Wireless LAN Security 14

Weakness #3: WEP Data Integrity is Insecure Recall that CRC is a linear function and RC4 is linear as well Consider A sending an encrypted message to B which is intercepted by an attacker E: A B: IV, C with C = RC4IV, K BSS M, CRCM The attacker E can construct a new ciphertet C that will decrypt to a message M with a valid checksum CRCM : E chooses an arbitrary message of the same length C = C, CRC = RC4IV, K BSS M, CRCM, CRC = RC4IV, K BSS M, CRCM CRC = RC4IV, K BSS M, CRCM = RC4IV, K BSS M, CRCM Note, that E does not know M as it does not know M Nevertheless, a 1 at position n in results in a flipped bit at position n in M, so E can make controlled changes to M Data origin authentication / data integrity of WEP is insecure! Network Security WS 2002: 15 Wireless LAN Security 15

Weakness #4: WEP Access Control is Insecure Recall that the integrity function is computed without any key Consider an attacker who learns a plaintet-ciphertet pair: As the attacker knows M and C = RC4IV, K BSS M, CRCM, he can compute the keystream used to produce C If E later on wants to send a message M he can compute C = RC4IV, K BSS M, CRCM and send the message IV, C As the reuse of old IV values is possible without triggering any alarms at the receiver, this constitutes a valid message An application for this attack is unauthorized use of network resources: The attacker sends IP packets destined for the Internet to the access point which routes them accordingly, giving free Internet access to the attacker WEP Access Control can be circumvented with known plaintet Network Security WS 2002: 15 Wireless LAN Security 16

Weakness #5: Weakness in RC4 Key Scheduling In early August 2001 a new attack to WEP was discovered: The shared key can be retrieved in less than 15 minutes provided that about 4 to 6 million packets have been recovered The attack is basically a known-plaintet attack, that makes use of the following properties of RC4 and WEP s usage of RC4: RC4 is vulnerable to deducing bits of a key if: many messages are encrypted with keystream generated from a variable initialization vector and a fied key, and the initialization vectors and the plaintet of the first two octets are known for the encrypted messages The IV for the keystream is transmitted in clear with every packet The first two octets of an encrypted data packet can be guessed The attack is described in [SMF01a] and [SIR01a] R. Rivest comments on this [Riv01a]: Those who are using the RC4-based WEP or WEP2 protocols to provide confidentiality of their 802.11 communications should consider these protocols to be broken [...] Network Security WS 2002: 15 Wireless LAN Security 17

Conclusions IEEE 802.11 does not provide sufficient security: Missing key management makes use of the security mechanisms tedious and leads to rarely changed keys or even security switched off Entity authentication as well as encryption rely on a key shared by all stations of a basic service set 40 bit keys are too short to provide any security Reuse of keystream makes known-plaintet attacks possible Linear integrity function allows to forge ICVs Unkeyed integrity function allows to circumvent access control by creating valid messages from a known plaintet-ciphertet pair Weakness in RC4 key scheduling allows to cryptanalyze keys Even with IEEE 802.1 and individual keys the protocol remains weak Countermeasures: Place your IEEE 802.11 network outside your Internet firewall Do not trust any host connected via IEEE 802.11 Additionally, use other security protocols, e.g. IPSec Network Security WS 2002: 15 Wireless LAN Security 18

Additional References [BGW01a] N. Borisov, I. Goldberg, D. Wagner. Intercepting Mobile Communications: The Insecurity of 802.11. 7th ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking MOBICOM, Rome, Italy, July 2001. [IEEE97a] IEEE. Wireless LAN Medium Access Control MAC and Physical Layer PHY Specifications. IEEE Std 802.11-1997, The Institute of Electrical and Electronics Engineers IEEE, 1997. [Riv01a] R. Rivest. RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4. http://www.rsa.com/rsalabs/technotes/wep.html, 2001. [SIR01a] A. Stubblefield, J. Ioannidis, A. D. Rubin. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. AT&T Labs Technical Report TD-4ZCPZZ, August 2001. [SMF01a] Adi Shamir, Itsik Mantin and Scott Fluhrer. Weaknesses in the Key Scheduling Algorithm for RC4. http://eyetap.org/~rguerra/toronto2001/rc4_ksaproc.pdf, August 2001. Network Security WS 2002: 15 Wireless LAN Security 19