UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security



Similar documents
CS 356 Lecture 29 Wireless Security. Spring 2013

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Chapter 6 CDMA/802.11i

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

chap18.wireless Network Security

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

How To Secure Wireless Networks

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

How To Understand The Latest Wireless Networking Technology

WLAN Authentication and Data Privacy

Lecture 3. WPA and i

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Advanced Security Issues in Wireless Networks

Wireless security. Any station within range of the RF receives data Two security mechanism

Certified Wireless Security Professional (CWSP) Course Overview

Chapter 2 Wireless Networking Basics

CS549: Cryptography and Network Security

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

WiFi Security: WEP, WPA, and WPA2

Huawei WLAN Authentication and Encryption

Security Policy. Trapeze Networks

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

IEEE Wireless LAN Security Overview

MAC Layer Key Hierarchies and Establishment Procedures

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network security, TKK, Nov

Configure WorkGroup Bridge on the WAP131 Access Point

With its promise of a target transmission. Responding to Security Issues in WiMAX Networks. Section Title

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

ALL Mbits Powerline WLAN N Access Point. User s Manual

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Lecture 2 Secure Wireless LAN

Wireless Local Area Network Security Obscurity Through Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

Wireless Pre-Shared Key Cracking (WPA, WPA2)

WLAN w Technology

IT-Sicherheit: Sicherheitsprotokolle. Wireless Security. (unter Benutzung von Material von Brian Lee und Takehiro Takahashi)

ClickShare Network Integration

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Wireless Network Security Challenges

Chapter 2 Configuring Your Wireless Network and Security Settings

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Research In Motion D. Stanley, Ed. Aruba Networks March 2009

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

Chapter 3 Safeguarding Your Network

Setting up a WiFi Network (WLAN)

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Security in IEEE WLANs

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003

Chapter 2 Wireless Settings and Security

Authentication in WLAN

Wireless Security for Mobile Computers

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

CSC574: Computer and Network Security

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Wireless LAN Security Mechanisms

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Network Security Protocols

CCMP known-plain-text attack

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Wi-Fi Client Device Security & HIPAA Compliance

WI-FI Security by using Proxy server

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

Wi-Fi Client Device Security and Compliance with PCI DSS

Wireless Technology Seminar

Question How do I access the router s web-based setup page? Answer

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter

Nokia E90 Communicator Using WLAN

The Importance of Wireless Security

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

Cipher Suites and WEP

ProCurve Wireless LAN Security

The next generation of knowledge and expertise Wireless Security Basics

USER GUIDE Cisco Small Business

How To Get A Power Station To Work With A Power Generator Without A Substation

The following chart provides the breakdown of exam as to the weight of each section of the exam.

ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS NETWORKS

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Quantum Cryptography for Secure Communication in IEEE Wireless Networks

Wireless Networks The Definitive Guide

Wireless communications systems security. Alexey Fomin, SUAI

Transcription:

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security

IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop a protocol & transmission specifications for wireless LANs (WLANs) since then demand for WLANs, at different frequencies and data rates, has exploded hence seen ever-expanding list of standards issued 2

IEEE 802 Terminology A c c e ss p o in t ( AP ) B a s i c s e r vi c e se t ( B S S ) C o o r di n a t io n f un c t i on D i s t ri b u t io n s ys t e m ( D S ) E x t e nd e d se r v i ce s e t ( E S S ) M A C pr o t o co l d at a u n i t ( M P D U) M A C se r v i ce d a ta u n it ( M S D U) S t a t io n A n y en t i t y t h a t h a s s t a t io n f u n c ti o n a li t y an d p ro v i d es a c c e ss t o t h e di s t r ib u t i on sy s t e m v i a t h e wi r e l es s m e d i um f o r a s s oc i a t ed s t at i on s A s e t o f st a t i on s c on t r o ll e d b y a s i n gl e c oo r d i na t i o n f u n c ti o n T h e lo g i c al f u nc t i o n t h a t d et e r m in e s wh e n a s t a ti o n o p e r at i n g w i t h in a BS S i s p er m i t te d t o t r a ns m i t a n d m a y be a b le t o r e c e iv e P DU s A s y st e m us e d to i n te r c o nn e ct a se t o f B S S s a n d i n t e gr a t e d L A N s t o cr e a t e a n E S S A s e t o f on e o r m o r e i n t er c on n e c te d B SS s a nd i n t e gr a t e d L A N s t h a t a p p ea r a s a s i n g le B S S t o th e L LC l a y e r a t an y s ta t i o n a s s oc i at e d wi t h on e o f t h e se B S Ss T h e un i t of d a ta e x ch a n g ed be t w e en t w o p e e r M A C e n t i te s u si n g th e s er v i c es of t h e p h y si c a l l a y e r I n f o rm a t i on t h at i s d e l i ve r ed a s a u n it b e tw e e n M A C u s e r s A n y de v i c e t h a t c o n ta i n s a n I E E E 8 0 2. 11 c o nf o r m an t M AC a n d ph y s i ca l l ay e r 3

Wi-Fi Alliance 802.11b first broadly accepted standard Wireless Ethernet Compatibility Alliance (WECA) industry consortium formed 1999 to assist interoperability of products renamed Wi-Fi (Wireless Fidelity) Alliance created a test suite to certify interoperability initially for 802.11b, later extended to 802.11g concerned with a range of WLANs markets, including enterprise, home, and hot spots 4

IEEE 802 Protocol Architecture 5

Network Components & Architecture 6

IEEE 802.11 Services 7

802.11 Wireless LAN Security wireless traffic can be monitored by any radio in range, not physically connected original 802.11 spec had security features Wired Equivalent Privacy (WEP) algorithm but found this contained major weaknesses 802.11i task group developed capabilities to address WLAN security issues Wi-Fi Alliance Wi-Fi Protected Access (WPA) final 802.11i Robust Security Network (RSN) RSN is commonly called WPA2 8

RNS Glossary EAP: Extensible Authentication Protocol A collection of many different alternative authentication protocols TKIP: Temporal Key Integrity Protocol CCMP: Counter Mode with CBC MAC Protocol CBC: Cipher Block Chaining MAC: Message Authentication Code MIC: Message Integrity Code (same as MAC) AS: Authentication Server PSK: Pre-shared key MSK: Master Session Key PMK: Pair-wise Master Key PTK: Pair-wise Transient Key KCK: Key Confirmation Key KEK: Key Encryption Key TK: Temporal Key GMK: Group Master Key GTK: Group Temporal Key 9

802.11i RSN Services and Protocols 10

802.11i RSN Cryptographic Algorithms 11

802.11i Phases of Operation 12

802.11i Discovery and Authentication Phases 13

IEEE 802.1X Access Control Approach 14

802.11i Key Hierarchy 15

Robust Security Network via 802.1X PTK (Pairwise Transient Key 64 bytes) 16 bytes of EAPOL-Key Confirmation Key (KCK) Used to compute MIC on WPA EAPOL Key message 16 bytes of EAPOL-Key Encryption Key (KEK) - AP uses this key to encrypt additional data sent (in the 'Key Data' field) to the client (for example, the RSN IE or the GTK) 16 bytes of Temporal Key (TK) Used to encrypt/decrypt Unicast data packets 8 bytes of Michael MIC Authenticator Tx Key Used to compute MIC on unicast data packets transmitted by the AP 8 bytes of Michael MIC Authenticator Rx Key Used to compute MIC on unicast data packets transmitted by the station Last two only used when TKIP is used.

802.11i Key Management Phase 4-way handshake 17

802.11i Protected Data Transfer Phase have two schemes for protecting data Temporal Key Integrity Protocol (TKIP) s/w changes only to older WEP adds 64-bit Michael message integrity code (MIC) encrypts MPDU plus MIC value using RC4 Counter Mode-CBC MAC Protocol (CCMP) uses the cipher block chaining message authentication code (CBC-MAC) for integrity uses the CTR block cipher mode of operation 18

IEEE 802.11i Pseudorandom Function 19

WPA2-PSK Pre-Shared Key Mode Network traffic encrypted using a 256 bit PMK User enters key (Pairwise Master Key) 64 hex digits 8-63 Printable ASCII characters Takes the passphrase, salts it with SSID of AP, then runs it through 4096 iterations of HMAC-SHA-1 Authentication, Connection, Establishment of PTK and GTK. Similar process as when an AS is present except the PSK is used as the PMK. Creation of PTK and GTK is the same as in Enterprise mode.

Summary have considered: IEEE 802.11 Wireless LANs protocol overview and security Wireless Application Protocol (WAP) protocol overview Wireless Transport Layer Security (WTLS) 21