WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK



Similar documents
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Wireless security. Any station within range of the RF receives data Two security mechanism

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Vulnerabilities in WEP Christopher Hoffman Cryptography

Chapter 6 CDMA/802.11i

How To Secure A Wireless Network With A Wireless Device (Mb8000)

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

CS 356 Lecture 29 Wireless Security. Spring 2013

9 Simple steps to secure your Wi-Fi Network.

Wireless LAN Security I: WEP Overview and Tools

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Wireless Networks. Welcome to Wireless

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Wireless LAN Security Mechanisms

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

WLAN Authentication and Data Privacy

Security Of Wi-Fi Networks

Security in IEEE WLANs

Chapter 2 Wireless Networking Basics

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Huawei WLAN Authentication and Encryption

Wireless LAN Security: Securing Your Access Point

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

WiFi Security: WEP, WPA, and WPA2

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Configure WorkGroup Bridge on the WAP131 Access Point

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Security in Wireless Local Area Network

The Importance of Wireless Security

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model

chap18.wireless Network Security

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Tutorial 3. June 8, 2015

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

The next generation of knowledge and expertise Wireless Security Basics

IEEE Wireless LAN Security Overview

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Recommended Wireless Local Area Network Architecture

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

CSC574: Computer and Network Security

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wireless Local Area Network Security Obscurity Through Security

Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

Top 10 Security Checklist for SOHO Wireless LANs

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

USER GUIDE Cisco Small Business

Lecture 2 Secure Wireless LAN

Certified Wireless Security Professional (CWSP) Course Overview

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

How To Secure Wireless Networks

WLAN and IEEE Security

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING


Wireless Pre-Shared Key Cracking (WPA, WPA2)

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

Computer Networks. Secure Systems

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

WPA Migration Mode: WEP is back to haunt you...

Distributed Systems Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

WiFi Security Assessments

2. WLAN SECURITY MECHANISMS AND PROTOCOLS 1. INTRODUCTION

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

Your Wireless Network has No Clothes

Security Awareness. Wireless Network Security

WIRELESS NETWORKING SECURITY

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Chapter 3 Safeguarding Your Network

ALL Mbits Powerline WLAN N Access Point. User s Manual

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Particularities of security design for wireless networks in small and medium business (SMB)

WLAN Information Security Best Practice Document

Security of Wi-Fi Networks

Chapter 2 Configuring Your Wireless Network and Security Settings

How To Analyze The Security On An Ipa Wireless Sensor Network

Securing your Linksys WRT54G

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Transcription:

IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK RUCHIR BHATNAGAR & VINEET KUMAR BIRLA Research Scholar & Department of CSE & Mewar University, Chittorgarh, Rajasthan, India ABSTRACT As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. The security conventions intended for the wired systems can't be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication. In this paper we will mull over the different remote security dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is more hearty security convention as compared with WPA on the grounds that it utilizes the Advanced Encryption Standard (AES) encryption. There are few issues in WPA2 like it is helpless against brute force attack and MIC bits could be utilized by programmer to compare it with the decoded content. So in this paper we will concentrate on different sorts of wireless security dangers. KEYWORDS: Wi-Fi, Security, WPS, Brute Force Attack INTRODUCTION Wireless LAN technology has rapidly become very popular all over the world. The wireless local area network (WLAN) protocol, IEEE 802.11, and associated technologies enable secure access to a network infrastructure. Until the development of WLAN, the network client needed to be physically connected to the network by using some kind of wiring. With the rapid increase in use of WLAN technology it is important to provide a secure communication over wireless network. Since its creation the security of wireless networks went through different stages of development, from MAC address filtering or WEP to WPA/WPA2.The wireless technology was proven to be very practical (not only) for home users. Such a handy option to be comfortably connected to internet on a mobile device without the need of wires is still gaining in popularity. This led to an attempt to make a configuration of WLAN easier for regular user without any knowledge about computer science. The result of this was standard known as Wifi Protected Setup (WPS).WPS, as a standardized technology, is implemented on wide variety of currently produced wireless access points. The incorrect designing of its standard led to fatal weakness which is discussed in this thesis in greater details. Impact Factor(JCC): 1.9586- This article can be downloaded from www.impactjournals.us

24 Ruchir Bhatnagar & Vineet Kumar Birla Figure 1: Wireless Communication The 802.11 networks consist of four major components: DISTRIBUTION SYSTEM - a logical component used to forward frames to their destination. ACESS OINTS (APs) - devices performing wireless-to-wired bridging function. STATIONS (STAs) - device with wireless network interface communicating with other similar devices via APs. WIRELESS MEDIUM - medium used to transfer frames from station to station. Weakest Security Mechanisms Among the most commonly used security mechanisms to protect WLAN while them being no obstruction at all for an even unexperienced attacker are SSID hiding and MAC ADRESS FILTERING: Many APs offer user an option to hide the SSID. If it is enabled, the AP in its beacon frames does not show the SSID - an empty string is shown instead. Although it looks like a good idea (if no one sees the WLAN it cannot be attacked), it is not helpful at all. MAC ADRESS FILTERING: Like SSID hiding, MAC address filtering is also commonly used "security" mechanism. Although it is better to use even weak protection than none at all, MAC address filtering can be easily broken by using MAC address spoofing technique. WEP (Wired Equivalent Privacy) Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. WEP Encryption For each packet, a 24-bit initialization vector (IV) is chosen. The IV concatenated with the root key yields the per packet key. The CRC-32 is calculated over the data to be encrypted. The per packet key is then used to encrypt the data followed by the ICV using RC4 stream cipher. The (unencrypted) IV is transmitted in the header of the packet. Index Copernicus Value: 3.0 - Articles can be sent to editor@impactjournals.us

Wi-Fi Security: A Literature Review of Security in Wireless Network 25 Figure 2: Simplified WEP Frame WEP Decryption The initialization vector (IV) is unencrypted in the header. The IV is appended to the root key. The combination of IV and the root key is used as an input for the pseudo-random number generator to generate a bit sequence. This sequence is XORed with the encrypted data plus ICV to decrypt the data. The ICV calculation then is run. If the value matches the value of ICV in the incoming frame, the data is considered to be valid. Figure 3: WEP Encryption WPA (WIFI PROTECTEC ACCESS) The basic principle of WPA could be simplified as follows: transfer the data decrypted by Temporary Key Integrity Protocol before somebody can decrypt the key. While WEP was using single pre-shared key for all encryption, WPA changes the unicast encryption key for every frame and each change is synchronized between the wireless client and the wireless AP. For the global encryption key, WPA includes a facility for the wireless AP to advertise changes to the connected wireless clients. WPA features two different operation modes: WPA-PSK (Pre-Shared Key) mode WPA Enterprise mode WPA Encryption WPA needs following values in order to encrypt a wireless data frame: Impact Factor(JCC): 1.9586- This article can be downloaded from www.impactjournals.us

26 Ruchir Bhatnagar & Vineet Kumar Birla Initialization vector (IV) Data encryption key Source and destination addresses (SA, DA) Priority field value Data integrity key WPA Decryption The WPA decryption process can be described as follows: The IV is extracted from the IV and extended IV fields. The IV, DA and the Data encryption key are used as the input for the key mixing function to produce the per-packet key. IV and per packet key are used as the input for RC4 PRNG function to generate key stream of the same size as the encrypted data, MIC and ICV. The key stream is XORed with the encrypted data, MIC and ICV to produce unencrypted ICV, MIC and the data. The ICV is calculated and compared with the value of unencrypted ICV. WPA2 In September 2004, the Wi-Fi Alliance introduced Wi-Fi Protected Access 2 (WPA2),which is the second generation of WPA security. WPA2 still uses PSK authentication but instead of TKIP encryption it uses enhanced data encryption: a specific mode of The Advanced Encryption Standard (AES) known as the Counter Mode Cipher Block. WPA2, similarly to WPA, offers two modes of operation: WPA2-PSK (Pre-Shared Key) mode WPA2 Enterprise mode WPA2 Encryption Encrypt a starting 128-bit block with data integrity key and AES. In the next step, XOR Result1 with next 128-bit block to produce XResult1. Encrypt XResult1 with AES and data integrity key XOR Result2 and the next 128-bit block of data. WPA2 Decryption Decryption process can be summarized in these 4 steps: Find the value of the starting counter from values in 802.11 header and MAC header. The starting counter value and the encrypted portion of the 802.11 payload are used as an input for the AES counter mode decryption algorithm with the data encryption key. The result is the decrypted data and MIC. To produce the decrypted data block, AES counter mode XORs the encrypted counter value with the encrypted data block. Index Copernicus Value: 3.0 - Articles can be sent to editor@impactjournals.us

Wi-Fi Security: A Literature Review of Security in Wireless Network 27 The starting block, 802.11 MAC header, CCMP header, data length, and padding fields are used as an input for the AES CBC-MAC algorithm with the data integrity key to calculate a MIC. To find out if the data is valid, compare the unencrypted MIC with the calculated value of MIC. If the values do not match, WPA2 discards data. BRUTE FORCE METHODOLOGY The following chart illustrates how the optimized brute-force attack works: Figure 4: Brute Force Attack Chart Figure 5: Example of Brute Force Attack CONCLUSIONS In the research work it is observed that many organizations are currently deploying wireless networks typically to use IEEE 802.11b protocols, but technology used is not secure and still highly susceptible to active attacks and passive intrusions. Currently available security protocols like WEP, WPA and WPA2 have some advantages and disadvantages and also there are some vulnerability exists in these security protocols. Various types of security attacks are possible as explained in the previous sections Impact Factor(JCC): 1.9586- This article can be downloaded from www.impactjournals.us

28 Ruchir Bhatnagar & Vineet Kumar Birla Wifi Security provided a preview of mechanisms used for securing wireless networks.. This provided us useful information which we used in the next chapter, which was dedicated to WLANs encryption standards and mechanisms. In the chapter we discussed how does each of the standards work: improvements compared to previous standard, encryption process, decryption process, flaws and possible attacks. ACKNOWLEDGEMENTS We would like to acknowledge and extend my heartfelt gratitude to the Mr. Rudra Pratap Ojjha and Mr. Santosh Upadhyay for hosting this research, making available the data and valuable comments. REFERENCES 1. M. Gast, 802.11 Wireless networks: The definitive guide. O'Reilly & Associates, Inc., Sebastopol, 2002. 2. What is 802.11 wireless?." http://technet.microsoft.com/en-us/library/ cc785885(v=ws.10).aspx. 3. T.Nghi, \Wireless local area network."http://www.netlab.tkk.fi/opetus/s38118/s00/tyot/25/index.shtml. 4. A. M. A. Naamany, A. A. Shidhani, and H.Bourdoucen, \IEEE 802.11 wireless lan security overview," in IJCSNS International Journal of Computer 138 Science and Network Security, pp. 138{155, 2006. 5. Q. Docter, E. Dulaney, and T. Skandier, CompTIA A+ Complete Study Guide: Exams 220-701 (Essentials) and 220-702 (Practical Application). Sybex, 2009. 6. DHCP starvation attack." http://www.networkdictionary.com/ networking/dhcpstarvationattack.php. 7. Cisco unified wireless network architecture base security features." http://www.cisco.com/en/us/docs/solutions/enterprise/mobility/emob41dg/ch4_secu.html. 8. S. DeFino, B. Kaufman, N. Valenteen, and L. Greenblatt, Offcial Certified Eth-ical Hacker Review Guide. Cengage Learning, 2009. 9. M. Stxhlberg, \Radio jamming attacks against two popular mobile networks," 2000. 10. A. Mousa and A. Hamad, \Evaluation of the RC4 algorithm for data encryption,"proc. Of International Journal Computer Science & Applications, vol. 3, no. 2,2006. 11. B. Bing, The world wide Wi-Fi : technological trends and business strategies.john Wiley & Sons, Inc, 2003. 12. H. Berghel and J. Uecker, \WiFi attack vectors," Communications of the ACM, vol. 48, no. 8, pp. 21{28, 2005. 13. K. Hulin, C. Locke, P. Mealey, and A. Pham, \Analysis of wireless security Vulnerabilities, attacks, and methods of protection," Information Security Semester Project, 2010. 14. E. Tews and M. Beck, \Practical attacks against WEP and WPA," in Proceedings of the second ACM conference on Wireless network security, pp. 79{86, ACM, 2009. 15. E. Tews, \Attacks on the WEP protocol," IACR Eprint Server, eprint. iacr. org,no. 2007/471, 2007. 16. B.Haines, Seven Deadliest Wireless Technologies Attacks. Syngress/Elsevier, 2010. Index Copernicus Value: 3.0 - Articles can be sent to editor@impactjournals.us

Wi-Fi Security: A Literature Review of Security in Wireless Network 29 17. J. Wang, Computer network security : theory and practice. Springer, 2009. 18. J. Davies, \Wi-fiprotected access data encryption and integrity." http://technet.microsoft.com/enus/library/bb878126.aspx. 19. J. Edney and W. A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison Wesley, 2004. 20. A. A. Vladimirov, K. V. Gavrilenko, and A. A. Mikhailovsky, Real 802.11 Security Wi-Fi Protected Access and 802.11i. Addison Wesley, 2004. 21. M. D. Ciampa, Security+ Guide to Network Security Fundamentals. Course Technology, Cengage Learning, 2012. Impact Factor(JCC): 1.9586- This article can be downloaded from www.impactjournals.us