Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story



Similar documents
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Network Access Security. Lesson 10

The next generation of knowledge and expertise Wireless Security Basics

Wireless LAN Security I: WEP Overview and Tools

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Networks. Welcome to Wireless

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Chapter 7 Transport-Level Security

Configuring Security Solutions

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security in IEEE WLANs

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Recommended Wireless Local Area Network Architecture

Security in Wireless Local Area Network

Chapter 2 Wireless Networking Basics

Topics in Network Security

WIRELESS SECURITY IN (WI-FI ) NETWORKS

WIRELESS NETWORKING SECURITY

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

The Importance of Wireless Security

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Wireless LAN Security Mechanisms

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

Computer Networks. Secure Systems

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Security Awareness. Wireless Network Security

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Chapter 6 CDMA/802.11i

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

CS 356 Lecture 29 Wireless Security. Spring 2013

Chapter 17. Transport-Level Security

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Implementing Security for Wireless Networks

WIRELESS NETWORK SECURITY

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

m-trilogix White Paper on Security in Wireless Networks

Authentication in WLAN

Application Note: Onsight Device VPN Configuration V1.1

chap18.wireless Network Security

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Certified Wireless Security Professional (CWSP) Course Overview

Network Security Essentials Chapter 5

Cisco SAFE: Wireless LAN Security in Depth

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Wireless Security for Mobile Computers

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Configure WorkGroup Bridge on the WAP131 Access Point

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Internetwork Security

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Transport Level Security

Chapter 3 Safeguarding Your Network

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Link Layer and Network Layer Security for Wireless Networks

Developing Network Security Strategies

CSC574: Computer and Network Security

Catapult PCI Compliance

United States Trustee Program s Wireless LAN Security Checklist

How To Secure Wireless Networks

Security and privacy in public WLAN networks

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Industrial Communication. Securing Industrial Wireless

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Technical Brief. Wireless Intrusion Protection

Web Security Considerations

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

9 Simple steps to secure your Wi-Fi Network.

WiFi Security: WEP, WPA, and WPA2

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Linux Access Point and IPSec Bridge

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Transcription:

Wireless s June September 00 Agenda Wireless Security ผศ. ดร. อน นต ผลเพ ม Asst. Prof. Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand Security Characteristics W Security Security Threats W security management TCP/IP Protocol Suite ( Model) Security for TCP/IP 5 Applications User service and interface 5 Applications Application layer security protocols Secure Http (Https) Transport Process delivery + Error (TCP/UDP) Reliable end-to-end (whole message) Transport VPN + Secure Socket Layer (SSL), Transport Layer Security (TLS) Network Move packets from source to destination Packet end-to-end (across network) Network IPsec + Layer Tunnel (Changeable fields, e.g. TTL) Data Link Provide frames Node-to-node (same network segment) Data Link Encryption for set of MACs (Not all the frame, e.g. header) Physical Transmission bit streams (mechanical and electrical spec) Physical Encryption all bit streams (Point-to-point, banking) Car Security Story Break/gear/Steering Wheel Lock Avoid cars that have lock Break windows + tools (hammer/screw driver) Alarm system implemented Scan the keychain frequency Cut off the alarm signal Try to bypass/disable, not to break the encryption Agenda Security Characteristics W Security Security Threats W security management 5 6

W Security Non-Cryptographic Security Scheme Cryptographic Security Scheme Non-Cryptographic Security Scheme Closed W Omit SSID in the Beacon MMPDU frame Easy to eavesdrop and know MAC Filtering Access list of MAC Spoof MAC Screen out baby or Casual attacker 7 8 Cryptographic Security Scheme User Authentication Message Authentication/Verification Message Encryption User Authentication Prove the user s identity Key for authentication Correct key valid user?? Spoof attacker has the key Need cryptographic 9 0 Message Authentication/Verification Encrypt the message before send A hash function (Integrity Check Value, ICV) Arbitrary input fixed-length output (hash) Cyclic Redundancy Check (CRC) Message Digest 5 (MD-5) Secure Hash Algo. No. (SHA-) [60 bits] SHA-56, 8, 5 [bits] Header frame/data frame/key Verifying that message is not modified Message Encryption Encapsulation Cryptographic encryption algorithm Block-oriented cipher Data Encryption Standard (DES) / Triple DES Advanced Encryption Standard (AES) RC-, RC-5, RC-6, etc. Stream-oriented cipher RC- Key length

Message Encapsulation Data Data Encryption Algo. ICV generator ICV Data ICV Built-in W Security Wired Equivalent Privacy (WEP) Provides encryption based on RC- cipher 80.x Provides authentication using Extensible Authentication Protocol (EAP) Wi-Fi Protected Access (WPA) Uses dynamic keys and advanced encryption 80.i Advanced encryption and authentication WEP Wired Equivalent Privacy (WEP) Goal: protecting air traffic as wired traffic Strong enough for casual eavesdropping WEP deploys RC (RSA Security) Provides 6-8 bit encryption Privacy Controlling personal info. not too widely spread out Confidentiality Preventing others to understand our communications Plain Text WEP Block Diagram Initialization Vector (IV) -bit Secret Key (0-bit or 0-bit) Pseudo-Random Number Generator RC- Integrity Algorithm (CRC-) + Integrity Check Value (ICV) Key Sequence Bitwise XOR IV Cipher Text 5 6 WEP Encapsulation WEP Key IV IV Data Data ICV Encryption Algo. ICV generator Data ICV MSDU CRC- of MSDU Based on Exclusive-OR Operation Encryption C = P K Decryption P = C K Interesting Properties P = C K = (P K) K = P (K K) = P Can re-create keystream can decrypt a frame 7 8

WEP Issues Weak Point is IV not RC- Static encryption keys must be changed manually Attacker s tools: Airsnort, Yellowjacket, Airfart Encryption keys can be cracked in seconds Default setting is OFF 9 80.x A New Hope Provides secure access using port control Uses EAP (Extensible Authentication Protocol) Supports Kerberos, smart cards, one-time passwords, and so on Components required: Wireless device AP Authentication server, typically Remote Authentication Dial-in User Service (RADIUS) 0 How 80.x Works Wireless Device Access Point Authentication Server (RADIUS) User requests connection AP requests user ID User sends ID AP requests user credentials User sends AP credentials AP confirms credentials AP requests RADIUS connection for user RADIUS asks for credentials AP sends credentials to RADIUS RADIUS confirms credentials If credentials are correct, user is given access to the network through the AP, according to policies enforced by the authentication server 80.x The Downside Only does authentication Encryption is still required If used with WEP, the encryption keys are still static even though the authentication keys change Authenticator and device must use the same authentication method Only supports client-level authentication Wi-Fi Protected Access (WPA) 80.X TKIP and AES WPA Wi-Fi Protected Access (WPA) WPA = 80.X + TKIP WPA requires authentication and encryption 80.X authentication choices include LEAP, PEAP, TLS WPA has strong industry supporters Adds to 80.X and TKIP Widespread adoption of WPA will add robust security and remove the security issue from the W industry WPA will become accepted as the standard

Temporal Key Integrity Protocol (TKIP) TKIP Based on RC Effective patch for WEP Dynamic key management (based on 80.x) Initialization vector sequencing Rapid re-keying Per-packet key hashing http://www.cs.berkeley.edu/~daw/papers/wireless-cacm.pdf 5 6 Feature Comparison 80.i Mutual authentication Dynamic session key Message Integrity Check (MIC) Temporal Key Integrity Protocol (TKIP) Future Stronger encryption schemes, such as AES http://www.cs.berkeley.edu/~daw/papers/wireless-cacm.pdf 7 8 80.i and WPA Uses 80.x authentication Uses Temporal Key Integrity Protocol (TKIP) to dynamically change encryption keys after 0,000 packets are transferred Uses Advanced Encryption Standard (AES) encryption, which is much better than WEP A subset of 80.i, Wi-Fi Protected Access (WPA) is available as a firmware upgrade today 9 80.i and WPA Pitfalls Keys can be cracked using much less than 0,000 packets Michael feature shuts down AP if it receives two login attempts within one second. Hackers can use this to perpetrate a DoS attack. 80.i is yet to be released 0 5

Agenda Security Characteristics W Security Security Threats W security management Typical W Topology Sniffing Eavesdrop network traffic SSID broadcast is full text Spoofing Impersonate legitimate device credentials, like MAC address Jamming Introduction of radio signals that prevent W operations Session Hijacking Hacker disconnects the legitimate user but makes AP think that user is still connected 5 6 6

DoS Flood the network with useless traffic (e.g.repeated login requests) and eventually shut it down Man in the Middle All W traffic from devices is passed through the rogue device Lack of strong AP level authentication 7 8 War Driving in Southern Cal. WarDriving Driving around town looking for unprotected W connections to get access 9 http://pasadena.net/apmap/losangeleslarge.gif 0 Agenda Security Characteristics W Security Security Threats W security management Wireless Security Concerns Management of device security Corruption of data sent to wireless devices Malicious code (viruses, Trojans, worms) Unauthorized users Confidentiality of data sent wirelessly Security of data stored on a handheld device 7

W security management Open Access No WEP Broadcast Mode Basic Security 0-bit, 8-bit, 56-bit Static Encryption Key Enhanced Security Dynamic Encryption Key / Scalable Key Management Mutual 80.x/EAP Authentication TKIP/WPA Traveling Security Wireless Policy Issues Policy needs to dictate permitted services and usage Needs a means of identifying and enforcing wireless policies Existing organization security policies need to be updated to cater to wireless security issues Policy needs to indicate how access will be controlled, for instance, time of day Virtual Private Network (VPN) Wireless Policy Issues All access needs to be logged User compliance and standards enforcement Centralized control of security policies Wireless intrusion alert issues Process to update client software levels Intrusion detection policies Knows Your Organization Process Management and Standards Weakness Audits and Controls, and IDS Application Security Weakness User Involvement, Awareness and Roles Client Security Key Password Quality User and Key Administration Weakness Environment Integrity and Robustness Strength Network Security and Technology Issues 5 6 More Secure W Topology Client Differentiation 80.Q wired network with Vs Channel: SSID: Laptop V: Channel: 6 SSID: PDA V: Channel: SSID: Phone V: RADIUS 7 8 8

Client Differentiation Conclusions 80.Q wired network with Vs SSID: Laptop V: SSID: PDA V: SSID: Phone V: 9 Wireless technology is becoming embedded Notebooks, PDAs, cell phones, etc. W is currently unsecure 80. WEP security is insufficient for the enterprise 80.i and WPA offer great improvements People, processes, policies and architecture are required to deploy W securely 50 References Who s Watching Your Wireless Network? by Ian Hameroff, Computer Associates, etrust Security solutions, CA World 00 Wireless Configuration and Security Issues by Greg Gabet, IBMGS, CA world 00 Addressing the Challenges of Adopting Secured Mobility in the Enterprise by Hans-Georg Büttner, Ernst & Young IT-Security GmbH, Germany, CA World 00 Wireless Local Area Network Security by Robert Simkins, University of Derby, UK References A Field Guide to Wireless s for Administrators and Power Users by Thomas Maufer, Prentice Hall, 00 Security Flaws in IEEE 80. Data Link Protocols, By Nancy Cam-Winget, Russ Housley,David Wagner, and Jesse Walker, COMMUNICATIONS OF THE ACM May 00/Vol. 6, No. 5, pp 5-9 (http://www.cs.berkeley.edu/~daw/papers/wireless-cacm.pdf) 5 5 9