How To Secure Wireless Networks



Similar documents
CS 356 Lecture 29 Wireless Security. Spring 2013

chap18.wireless Network Security

Certified Wireless Security Professional (CWSP) Course Overview

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Industrial Communication. Securing Industrial Wireless

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

How To Protect A Wireless Lan From A Rogue Access Point

Wireless security. Any station within range of the RF receives data Two security mechanism

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Recommended Wireless Local Area Network Architecture

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

CS549: Cryptography and Network Security

Link Layer and Network Layer Security for Wireless Networks

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Security in IEEE WLANs

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Security Awareness. Wireless Network Security

Developing Network Security Strategies

Security in Wireless Local Area Network

Chapter 2 Wireless Networking Basics

The next generation of knowledge and expertise Wireless Security Basics

Wireless Security with Cyberoam

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

WIRELESS NETWORKING SECURITY

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Link Layer and Network Layer Security for Wireless Networks

Lecture 3. WPA and i

Wireless Network Standard and Guidelines

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Configuring Security Solutions

Wireless LAN Security Mechanisms

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

All You Wanted to Know About WiFi Rogue Access Points

Your Wireless Network has No Clothes

Implementing Security for Wireless Networks

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Chapter 2 Configuring Your Wireless Network and Security Settings

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Wireless Security for Mobile Computers

IEEE Wireless LAN Security Overview

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

WLAN Authentication and Data Privacy

Ensuring HIPAA Compliance in Healthcare

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Network Security Best Practices

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

Security Requirements for Wireless Local Area Networks

Network security, TKK, Nov

Wireless Network Security Position Paper - Technical

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Wireless Technology Seminar

Closing Wireless Loopholes for PCI Compliance and Security

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Wireless Networks. Welcome to Wireless

PCI Wireless Compliance with AirTight WIPS


Technical Brief. Wireless Intrusion Protection

Chapter 3 Safeguarding Your Network

United States Trustee Program s Wireless LAN Security Checklist

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Hole196 Vulnerability in WPA2

Security Analysis on Wireless LAN protocols

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Transcription:

Lecture 24 Wireless Network Security modified from slides of Lawrie Brown

Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements are the same: confidentiality, integrity, availability, authenticity, accountability most significant source of risk is the underlying communications medium

Wireless Networking Components

Wireless Network Threats accidental association malicious association ad hoc networks nontraditional networks identity theft (MAC spoofing) man-in-the middle attacks denial of service (DoS) network injection

Securing Wireless Transmissions principal threats are eavesdropping, altering or inserting messages, and disruption countermeasures for eavesdropping: signal-hiding techniques encryption the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions

Securing Wireless Networks the main threat involving wireless access points is unauthorized access to the network principal approach for preventing such access is the IEEE 802.1X standard for port-based network access control provides an authentication mechanism for devices wishing to attach to a LAN or wireless network use of 802.1X can prevent rogue access points and other unauthorized devices from becoming insecure backdoors

Wireless Security Techniques use encryption allow only specific computers to access your wireless network use anti-virus and anti-spyware software and a firewall change your router s pre-set password for administration turn off identifier broadcasting change the identifier on your router from the default

IEEE 802.11 Terminology

Wireless Fidelity (Wi-Fi) Alliance 802.11b first 802.11 standard to gain broad industry acceptance Wireless Ethernet Compatibility Alliance industry consortium formed in 1999 to address the concern of products from different vendors successfully interoperating later renamed the Wi-Fi Alliance

Wireless Fidelity (Wi-Fi) Alliance term used for certified 802.11b products is Wi-Fi has been extended to 802.11g products Wi-Fi Protected Access (WPA) Wi-Fi Alliance certification procedures for IEEE 802.11 security standards WPA2 incorporates all of the features of the IEEE 802.11i WLAN security specification

IEEE 802 Protocol Architecture

General IEEE 802 MPDU Format MAC Protocol Data Unit

IEEE 802.11 Extended Service Set

IEEE 802.11 Services

Distribution of Messages Within a DS the two services involved with the distribution of messages within a Distribution System are: distribution the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN

Association-Related Services transition types, based on mobility: no transition a station of this type is either stationary or moves only within the direct communication range of the communicating stations of a single BSS BSS transition station movement from one BSS to another BSS within the same ESS; delivery of data to the station requires that the addressing capability be able to recognize the new location of the station ESS transition station movement from a BSS in one ESS to a BSS within another ESS; maintenance of upper-layer connections supported by 802.11 cannot be guaranteed

association Services establishes an initial association between a station and an AP reassociation enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another disassociation a notification from either a station or an AP that an existing association is terminated

Wireless LAN Security Wired Equivalent Privacy (WEP) algorithm 802.11 privacy Wi-Fi Protected Access (WPA) set of security mechanisms that eliminates most 802.11 security issues based on the current state of the 802.11i standard Robust Security Network (RSN) final form of the 802.11i standard Wi-Fi Alliance certifies vendors in compliance with the full 802.11i specification under WPA2

802.11i RSN security services Authentication: between a user and an Authentication Server that provides mutual authentication and generates temporary keys to be used between the client and the AP over the wireless link Access control: enforces the use of the authentication function, routes the messages properly, and facilitates key exchange It can work with a variety of authentication protocols Privacy with message integrity: MAC-level data are encrypted along with a message integrity code that ensures that the data have not been altered

Elements of IEEE 802.11i

IEEE 802.11i Phases of Operation

IEEE 802.11i Phases of Operation

802.1X Access Control

MPDU Exchange authentication phase consists of three phases: connect to AS the STA sends a request to its AP that it has an association with for connection to the AS; the AP acknowledges this request and sends an access request to the AS EAP exchange authenticates the STA and AS to each other secure key delivery once authentication is established, the AS generates a master session key and sends it to the STA

IEEE 802.11i Key Hierarchies

IEEE 802.11i Keys for Data Confidentiality and Integrity Protocols

Phases of Operation

Temporal Key Integrity Protocol (TKIP) designed to require only software changes to devices that are implemented with the older wireless LAN security approach called WEP provides two services: message integrity adds a message integrity code to the 802.11 MAC frame after the data field data confidentiality provided by encrypting the MPDU

Pseudorandom Function

Summary wireless security overview wireless network threats wireless security measure IEEE 802.11 wireless LAN overview Wi-Fi alliance IEEE 802 protocol architecture IEEE 802.11 network components and architectural model IEEE 802.11 services IEEE 802.11i IEEE 802.11i Services IEEE 802.11i Phases of Operation Discovery Phase Authentication Phase Key Management Phase Protected Data Transfer Phase the IEEE 802.11i Pseudorandom Function