Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074



Similar documents
Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Chapter 6 CDMA/802.11i

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS 356 Lecture 29 Wireless Security. Spring 2013

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Wireless security. Any station within range of the RF receives data Two security mechanism

Security in IEEE WLANs

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Wireless LAN Security Mechanisms

Solution for Non-Repudiation in GSM WAP Applications

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

The next generation of knowledge and expertise Wireless Security Basics

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

chap18.wireless Network Security

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Chapter 2 Wireless Networking Basics

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Particularities of security design for wireless networks in small and medium business (SMB)

Configure WorkGroup Bridge on the WAP131 Access Point

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

How To Secure Wireless Networks

Wireless LAN Security I: WEP Overview and Tools

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Recommended Wireless Local Area Network Architecture

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

WIRELESS SECURITY IN (WI-FI ) NETWORKS

9 Simple steps to secure your Wi-Fi Network.

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

VLANs. Application Note

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Basic processes in IEEE networks

Security in Wireless Local Area Network

A Comprehensive Review of Wireless LAN Security and the Cisco Wireless Security Suite

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Huawei WLAN Authentication and Encryption

Research In Motion D. Stanley, Ed. Aruba Networks March 2009

WiFi Security: WEP, WPA, and WPA2

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Security design for a new local area Network AULWLAN

Multiple WiFi Clients on a Single Wireless Card

Chapter 2 Configuring Your Wireless Network and Security Settings

Your Wireless Network has No Clothes

Key Management (Distribution and Certification) (1)

Wireless Local Area. Network Security

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Module 6, Assignment 5

Wireless Technology Seminar

How To Analyze The Security On An Ipa Wireless Sensor Network

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Lab VI Capturing and monitoring the network traffic

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

HP M n Access Point Configuration and Administration Guide

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Distributed Systems Security

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter

Wireless security (WEP) b Overview

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Wireless Networks. Welcome to Wireless

ProCurve Wireless LAN Security

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

Chapter 2 Wireless Settings and Security

ACC , Cisco Systems, Inc. All rights reserved.

Lecture 3. WPA and i

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

Burglarproof WEP Protocol on Wireless Infrastructure

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

Computer Networks. Secure Systems

Authentication in WLAN

Security Awareness. Wireless Network Security

How To Get A Power Station To Work With A Power Generator Without A Substation

Network Security Protocols

IEEE Technical Tutorial. Introduction. IEEE Architecture

Lecture 2 Secure Wireless LAN

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

The Importance of Wireless Security

Setting up a WiFi Network (WLAN)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

IT-Sicherheit: Sicherheitsprotokolle. Wireless Security. (unter Benutzung von Material von Brian Lee und Takehiro Takahashi)

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

WLAN and IEEE Security

Secure Automatic Ticketing System

Transcription:

Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections. First section is intro in WiFi technology and terminology. The second section shows the security architectures and algorithms used in WiFi networks. Both important mechnisms: encryption/decryption as well as authentication is analyzed within simple IEEE 802.11 aproach in section three and four. The architectures such as WPA or WPA2 are not subject of this paper. Key-Words: m-application security, WiFi, IEEE 802.11, WEP. 1. WiFi Introduction The WiFi is common name for wireless local area networks technology compling with IEEE 802.11 standards and owned by WiFi Alliance. The WiFi Alliance promotes standards with the aim of improving the interoperability of wireless local area network products based on the IEEE 802.11 standards. The Wi-Fi Alliance is a consortium of separate and independent companies and it agrees on a set of common interoperable products based on the family of IEEE 802.11 standards. The figure 1 describes the overview architecture of a WiFi LAN. Fig. 1 Overview of a WiFi LAN A WiFI LAN consists from these components: The end-user device with IEEE 802.11 board radio network interface cards - NICs it could be PDA, smart-phone or laptop; BS/AP Base Station or Access Point a device with antenna wich send and receive radio packets over wireless environment from the end-user devices; Page 3

BSS Basic Service Set is the cell coverage formed by radio antenna of the Access Point device; DS Distribution System is the items that provide Internet to the APs. It is possible to have in the office or home an Intranet without having a distribution system. There is only one AP and all devices communicate and interconnect each other like through a network router. ESS Extended Service Set contains all the BSSs, APs and Dss from an WiFi LAN and it is seen as a single IEEE 802.11 layer to all the upper layer from OSI Network Model. An IEEE 802.11 local area network is based on a cellular architecture. Each cell - BSS - Basic Service Set is controlled by a BS - Base Station called also AP Access Point. Most of the installations of an IEEE 802.11 LAN are formed from one or more cells and their respective access points. The access points can be connected with Ethernet or in some cases wireless itself in order to provide a DS - Distribution System. 2. WiFi Authentication Mechanisms In order to supervise a Wireless LAN it is better to use an 802.11 packet analyzer such as OmniPeek or ngenius Sniffer Wireless. The understanding of different 802.11 frame types is a basis for deciphering what the network is or isn't doing. The 802.11 standard provides various frame types that, stations NICs and access points. Each frame has a control field that shows the 802.11 protocol version, frame type, and various indicators WEP is on/off, power management is active, and so on. In addition all frames contain MAC addresses of the source and destination station including access point; a frame sequence number; frame body and frame check sequence for error detection. The 802.11 data frames contain protocols rules and data from the higher layers within the frame body. A data frame, for instance, could be carrying the XML code from a Web page (complete with TCP/IP headers) that the user is viewing. Other frames that stations use for management and control carry specific information regarding the wireless link in the frame body. For instance, a beacon's frame body contains the service set identifier (SSID), timestamp, and other pertinent information regarding the access point. For more details regarding 802.11 frame structure and usage, 802.11 standards are a good start. The standards for WiFi are free for download from the 802.11 Working Group Web site [WIMT08]. For protecting data in WiFi LAN, there are many developed security architectures such as ones from figure 2: Page 4

Disable WEP Open System Auth Shared Key Auth Authentication Type WPA WPA2 PSK Pre-Shared Key EAP Extensible Authentication Protocol PSK Pre-Shared Key EAP Extensible Authentication Protocol Fig. 2 Wireless LAN authentication type Table 1 presents the security architectures from figure 2 with various features including the algorithms and techniques that are used: Table 1 WiFI Security Architectures Security IEEE 802.11 WPA IEEE 802.1x or Architecture IEEE 802.11i- WPA2 Authentication WEP Open PSK or EAP PSK or EAP Protocol System or with CCMP Shared Key Encryption method RC4 TKIP-RC4 or AES TKIP-RC4 or AES The Length of the 40 bits 128 bits for 128 bits key encryption 64 bits for authentication The length of the 24 bits 48 bits 48 bits Initialization Vector (IV) Key Management NONE IEEE 802.1x/EAP IEEE 802.1x/EAP The key per packet The concatenation of the IV The Mixing of the function NONE Data Integrity CRC-32 Michael CCM The encryption, authentication and confidentiality in WiFi networks are ensured using one of the following security archtectures: WEP, WPA or WPA2. The WEP Wired Equivalency Policy consists into three main parts: WEP encryption/decryption, WEP authentication and WEP Integrity. WEP Integrity is ensured using CRC-32 algorithm. WEP Authentication use Shared Key and WEP Encryption uses a crypto scheme based on RC4 algorithm. WPA and WPA2 are similar with WEP but a little more complicated. Page 5

3. WEP Encryption and Decryption All the WEP Encryption/Decryption and WEP Authentication (not Open System) services are based on a password known only by acess points and NIC that will communicate within WiFi LAN. Most operating system provides a user interface to insert the WEP/WPA key like in figure 3: Fig. 3 User interface for entering WEP or WPA key After the WEP key is introduced (in advanced system this key could stay on a smart card, HSM or a RADIUS Authentication Server), the security of the IEEE 802.11 standard is ensured by WEP Wired Equivalency Policy. The encryption algorithm for WEP is in figure 4. Seed IV-Initialization Vector Symetric Key is WEP/WPA Key RC4 Including PRNG Key Stream IV-Initialization Vector Concatenate Go Wireless Clear Text Clear Bytes Integrity Check CRC 32 Algorithm Clear Text + CRC32 Value (ICV) + XOR Encrypted Text and CRC32 (ICV) Fig. 4 WEP encryption scheme Page 6

If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from Wireless router set by the network admin) to the application which manage the WiFi stack. The algorithm ARCFOUR (RC4 see the crypto chapter) is used in order to generate a key stream. The CRC32 function is applied to the clear packet in order to do integrity check. The resulted packet is going into XOR function with key stream and it results the encryption of the clear byte array and CRC32 value ICV (Integrity Check Value). Before the network packet to go in the air the encrypted packet (which contains ICV) is concatenated with the initialization vector. The wireless router or the wireless receiver gets the initialization vector in clear and the encrypted message. The receiver has the symmetric key for the RC4 encryption algorithm and get from the air the IV value (Initialization Vector) and encrypted packet (which contains the encrypted Text and ICV) as in figure 5. Symetric Key is WEP/WPA Key IV-Initialization Vector RC4 Including PRNG Key Stream Clear Text Clear Bytes YES Get by the receiver Get from Wireless Encrypted Text and CRC32 value (ICV) + XOR Clear Text CRC32 Value (ICV) Integrity Check CRC 32 Algorithm ICV1 If (ICV == ICV1) NO Drop the packet Fig. 5 WEP decryption scheme The receiver is now able to rebuild the key stream for decryption. The encrypted text and the ICV Integrity Control Value is decrypted with the obtained key stream. The decrypting module is able to get the ICV and clear text. The CRC32 algorithm is applied to the clear text and it is obtain 4 bytes of the ICV1 Integrity Control Value. If ICV1 and ICV is the same then the clear text was corectelly decrypt so the module of decryption send the clear text to the receiver application. The explained flow is detailed in figure 6. Page 7

Fig. 6 Logical flows for the encryption and decryption in WEP The details of the structure of wireless packet in the air are in figure 7. Clear MSDU (MAC Service Data Unit) 0-2304 bytes ICV 4 bytes Initialization Vector 3 bytes Padding 6 bits ID Key 2 bits IV 4 bytes XOR MSDU (MAC Service Data Unit) 0-2304 bytes + Key Stream ICV 4 bytes Encrypted Fig. 7 The structure of the wireless packet in the air The flow of the encryption is depicted in the left side of the figure 6. The message is divided into many messages. For the each obtained message s packet is made the calculation of the ICV Integrity Check Value on 4 bytes using CRC32 algorithm. Each packet is concatenated with its own ICV. For each packet transimission in the air is generated an IV Initialization Vector which has 4 bytes. The IV contains 3 generated Page 8

bytes, a 6 bits section for padding and 2 bits for key identification as in figure 10. The IV on 4 bytes goes in clear together with the encrypted packet message. The IV 4 bytes value is used with symmetric static key in RC4 algorithm and the PRNG Pseudo Random Number Generated to generate the key stream. The key stream encrypts the message packet using XOR bits function. WEP Encryption/Decryption Issues The major issues for WEP security are releated to the RC4, CRC32 algorithm and IV Initialization Vector. The RC4 PRNG is producing an infinit byte array for encryption using a small symmetric static key. The sender executes a XOR function over the clear packet frame using the infinit byte array key sequence provided by RC4. The receiver implements the reversal mechanism obtaining the original packet frame. If E1 = C1 RC4(v,k) and E2 = C2 RC4(v,k) (where C1, C2 = the clear byte array of the WiFi packet frames which have the last 4 bytes the CRC32 value, E1, E2 = the encrypted bytes array, v = the IV Initialization vector, k = the static symmetric key, = is the XOR function, RC4(v,k) = the random byte array which represents the key sequence produced by RC4 using v and k as input), then E1 E2 = (C1 RC4(v,k)) (C2 RC4(v,k)) = C1 C2. The XOR function applied to the encrypted packet frames (E1 and E2) generates the result of the XOR of the clear packet frames (C1 and C2). If an eavesdropper modify a bit in the encrypted packet frames then that bit is found in the clear packet frames. The only measure in WEP Encryption/Decryption mechanism to avoid such type of attack is to use CRC32 for the message integrity. The ICV Integrity Check Value field (4 bytes) is calculated as output of the CRC32 function applied on the clear packet frame. The problem of the CRC32 is that the algorithm is linear. The generator polynom is clear and an eavesdropper can calculate the bit difference between the two ICVs. If the generator polynom of the CRC is known, it is clear which bits in ICV should be modified in order to obtain consistent ICV values. The IV value in WEP is stored in 24 bits and it is sent in clear in each wireless packet frame. An AP at a 54 Mbps bitrate which is activated for 1500 bytes per packet frame will finish all the possible bits combinations for IV in 5 hours = 1500 bytes * 8 bits / (54 Mbps *10 6 ) * 2 24 = [ 12000 / (54*1000000) ] * 16777216 = (12/54000) * 16777216 = 0,00022 * 16777216 = 3690 sec = 1 hour. This means that in one hour, an attacker has time to compare from hour to hour the various encrypted messages (the messages were encrypted using the same key sequence because the IV is the same from hour to hour). It is worst if the WiFi card for an AP starts with IV value zero and increment by one for each packet frame sent into the air. A fast solution is to provide dynamic keys as in CISCO WEP solution from CISCO Aironet solution. 4. WEP Authentication The WEP Authentication is done in many modes: Open Authentication (not use RC4), Shared Key Authentication (use RC4), and MAC filters. The SSID-Service Set Identifier is very important for a mobile station in order to know at which AP Access Point it will be assigned. The SSID should be assigned to an AP and also to be configured for each station. Once the client mobile station becomes activated in transmission environment, it starts to search APs into the activation area using probe request frames. Page 9

Those probe request frames are broadcasted to all the APs that have the same SSID with the mobile client station. All the APs that have the same SSID respond with probe response frames. The mobile client station determines the AP that will be used in WiFi data exchange taking into account the best bitrate and loading rate. Once the mobile client station established the AP used for WiFi communication, it starts the authentication process. The IEEE 802.11 specification shows Open Authentication (not use RC4) and Shared Key Authentication as recommended. The MAC filters are not part of the standard. The MAC filters are very good in practice because the AP can be configured to not accept the WiFi mobile client stations which do not have the MAC from the AP s white list. The major inconvinient for this kind of authentication is the possibility to change the MAC address for an IEEE 802.11 board which is included into a mobile client station. The mobile client station authentication consists in the following transactions: 1 The mobile client station broadcasts a frame request on every channel 2 The AP from client s action area sends a frame response 3 The client decides which the most advantageous AP will be used and sends an authentication request frame 4 The AP sends back the response to the client s authentication frame 5 If the authentication is done with success the client sends an association request frame to the AP 6 The AP responds with an association response frame 7 The mobile client station sends data to the AP using the WEP encryption and decryption mechanism if it is configurated otherwise will send the data in clear. Fig. 8 The client authentication The authentication can be made between the AP and the mobile client station or between two mobile client stations (ad-hoc networks). So, it is clear the authentication can be done only in case of unicast frames but not multicast frames. WEP Open System Authentication The AP accepts any kind of authentication request frame. The connection is made very fast and the authentication consists in two messages: the authentication request frame and the authentication response frame as in figure 9. WEP Open Authentification does not offer the possibility to verify if the mobile client station is valid or not. Page 10

Fig. 9. WEP Open Authentication with different WEP keys (in this case with different SSID) Practically for Open Authentication, the SSID authentication mechanism is used. The SSID is not encrypted and it is included as beacon into information frames of the APs. These frames are not encrypted so with traffic analyzer program is very easy to find out the active SSIDs in an area. So, it is not recommended to use for authentication and confidentiality the SSID mechanism. Thus, any device which has the SSID name of the AP, can connect to the WiFi network. The usage of the WEP Open Authentication without WEP encryption/decryption protocol becomes a major vulnerability. If an AP has the WEP encryption/decryption mechanism activated (this means to have a value for the symmetric static key), the WEP key becomes a modality to control the access to the resources. If the mobile client station does not know the correct WEP symmetric static key, then the client can not send WiFi frames even if the client knows the AP s SSID (the authentication was successful). WEP Shared Key Autentication WEP Shared Key Authentication uses a cryptographic scheme based on chalangeresponse mechanism for the authentication. The AP and the mobile client station have stored/configured the same symmetric shared key. This authentication method is elementary and does not provide the authentication of the AP, only the mobile client station is authenticated. Fig. 10 WEP Authentication with Shared Key WEP/WPA Key Page 11

The authentication process with shared key has the following steps: 1 The mobile client station sends an authentication request frame to another mobile station or to the AP asking the authentication 2 The AP sends to the mobile client station an authentication response which contains an challenge bytes array using WEP pseudo random number generator 3 The mobile client station gets the challenge bytes array encrypt the frame as in figure 12.10 and sends back to the AP the probe of the authentication request frame 4 The AP decrypts the frame and check out if the decrypted frame contains the same bytes array challenge as the AP sent at step 2. If the bytes arrays are the same then the client is authentified. The challenge bytes array is generated by AP using RC4 PRNG and it has 40 or 104 bits. In this kind of authentication the client does not authentify the AP. The WEP Shared Key Authentication is better than the WEP Open Authentication and it allow the access to the WiFi resources only if the mobile client station has the symmetric shared key. The shared key bytes array is stored in each station (mobile client or AP) into MIB Management Information Base in write-only mode and it is accessible only to the MAC coordinator. In order to have a good authentication and encryption mechanism the both client station and AP should have WEP encryption/decryption and WEP Shared Key Authentication enabled. The IEEE 802.11 standard does not specify the key management and distribution for the mobile client stations and AP stations. References [1] Zhiqun Chen, Java Card Technology for Smart Cards Architectures and Programmer s Guide, Addison Wesley, 2004 [2] Cristian TOMA, Marius POPA, Catalin BOJA, Solution for Non-Repudiation in GSM WAP Applications, WSEAS Transaction on Computers, UK, 2008. [3] Cristian TOMA - Security in Software Distributed Platforms, AES Publishing House, Bucharest, 2008, ISBN 978-606-505-125-6. [4] Wolfgang Rankl & Effing, Smart Card Handbook 3rd Edition, John Wiley & Sons Publishing House, USA 2004 Page 12