Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures



Similar documents
Security in Wireless Local Area Network

Wireless Network Standard and Guidelines

Wireless LAN Security Mechanisms

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

Wireless Network Policy

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

HANDBOOK 8 NETWORK SECURITY Version 1.0

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

The next generation of knowledge and expertise Wireless Security Basics

EKT 331/4 COMMUNICATION NETWORK

LTE, WLAN, BLUETOOTHB

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

communication over wireless link handling mobile user who changes point of attachment to network

Wireless data communication in Control Systems

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

Wireless LANs vs. Wireless WANs

CHAPTER 1 1 INTRODUCTION

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Wireless LAN Networking White Paper

Wired & Wireless LAN Connections

Best Practices for Outdoor Wireless Security

Wireless Networking for Small Businesses, Branches and Home Offices

Security Design.

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

802.11b and associated network security risks for the home user

CHAPTER. Wireless Networking

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

WIRELESS NETWORK VISUALIZATION USING RADIO PROPAGATION MODELLING. Johanna Janse van Rensburg and Barry Irwin

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Link Layer and Network Layer Security for Wireless Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Mobile Office Security Requirements for the Mobile Office

WLAN and IEEE Security

The Basics of Wireless Local Area Networks

White Paper. Wireless Network Considerations for Mobile Collaboration

How To Manage An Wireless Network At A University

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

ITL BULLETIN FOR AUGUST 2012

Demystifying Wireless for Real-World Measurement Applications

TL-WN310G 54M Wireless CardBus Adapter

OpenWay Radio Frequency FAQ

This chapter discusses how to design a wireless network, and includes the following sections: Making the Business Case. Wireless Technology Overview

1.3 Understand VLANs, Wired LANs, and Wireless LANs. 1.5 Understand Wide Area Network Connections

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

Wireless Local Area Network Proposal

Wireless Local Area Network

DRAFT Wireless Network Security

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Networks. The two main network types are: Peer networks

Network Security Best Practices

Wireless VPN White Paper. WIALAN Technologies, Inc.

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Abstract. 1. IEEE a a b b c g 2. HiperLAN/2. 3. Bluetooth. 4. HomeRF.

Conducting a WLAN Site Survey and Implementation for the Cisco Unified Wireless Network

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE standard.

Narrowband and Broadband Access Technologies

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

SmartDiagnostics Application Note Wireless Interference

ENHWI-N n Wireless Router

Chapter 2 Configuring Your Wireless Network and Security Settings

PCMCIA Wireless LAN Card User s Manual

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Cabling LANs and WANs

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

Closing Wireless Loopholes for PCI Compliance and Security

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Chapter 1 Instructor Version

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Recommended Wireless Local Area Network Architecture

5GHz 300Mbps a/n Wireless Outdoor Access Point

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Huawei One Net Campus Network Solution

Chapter 7 Low-Speed Wireless Local Area Networks

Transcription:

Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE 802.11 Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for the degree of Master of Science in Telecommunications Advisor Dr. Jeremy Allnutt Director, M.S. Telecom Program George Mason University School of Information Technology & Engineering December 2002

Introduction To WLAN Technology

Introduction Wireless networking technologies offers many advantages over traditional wired (or physical) network connectivity, to include:!mobility support!rapid deployment of network resources!flexible implementation!scalability

Basic WLAN Components Wireless Network Interface Card (PCMCIA) Wireless Access Point

WLAN Spectrum Allocation

WLAN Spectrum Allocation ISM FREQUNCY BANDS Frequency (Lower Limit) Frequency (Upper Limit) Total Bandwidth 902 MHz 928 MHz 26 MHz 2.4 GHz 2.4835 GHz 83.5 MHz 5.725 GHz 5.850 GHz 125 MHz Industrial, Scientific, and Medical (ISM) Frequency Allocations (Source: Bruce)

WLAN Standards

WLAN Standards 802.11b HomeRF IrDA 802.11a 802.11g Bluetooth Max Speed 11Mbps 10Mbps 4Mbps 54Mbps 54Mbps 1 Mbps Frequency 2.4GHz 2.4 GHz Light waves 5GHz 2.4GHz 2.4 GHz Indoor Range 150-300 feet 150 feet 1 meter 150-300 feet 150-300 feet 30 feet Applicatio n WLAN WLAN Device Beaming WLAN WLAN Personal Area Network Wireless Networking Standards and Specifications (Source: Anderson)

WLAN Transmission Technologies

WLAN Transmission Technologies Spread Spectrum Narrowbeam Microwave Infrared

Comparison of WLAN Transmission Technologies Transmission Technology Range Limitation Signal Interception Susceptibility Susceptibility To Interference / Jamming Low High Low High Low High Spread Spectrum **** **** **** Narrowband Microwave **** ******************** ******************** Infrared ****************** * **** ********************

WLAN Network Topologies

WLAN Topologies Laptop PDA Wireless Segment Ethernet Segment Peer-to-Peer (Ad hoc) Topology Hybrid Topology Laptop PDA Wireless Bridge Wireless Bridge Infrastructure Topology Point-to-Point Topology

IEEE 802.11 Hybrid WLAN Topology Physical Network Segment LAN Switch Internet Router Network Firewall Laptop PDA Wireless Access Point Wireless Network Segment

WLAN Applications

WLAN Applications WLAN Topology Application Peer-to-Peer Ad hoc networking between mobile devices Hybrid (Wireless/Wired) Network extension for wired LAN infrastructure WLAN Client location flexibility and mobility Point-to-Point Wireless connectivity between buildings or facilities

WLAN Applications Organization Application Advantage Educational Institutions Classroom and student connectivity!relocation of devices to different locations in classrooms Health Care / Hospitals Patient monitoring and access to patient medical information!mobility Inventory Control Manufacturing Conference Centers Connectivity for portable inventory devices with central storage facility Network connectivity for machinery in open locations and hazardous environments Provide connectivity to attendees with enabled devices!real-time reporting!relocation of devices to different locations!hazardous environments!rapid deployment Education Shared computer resources among student classrooms and laboratories!mobility

WLAN Applications Tactical/Military Multimedia Resources Rapid establishment of network with mobility support in hazardous environments Provide wireless access to multimedia resources!mobility Rapid network deployment!shared Resources Small Office/Home Office (SOHO) Residential Rapid establishment of low cost network infrastructure Rapid establishment of low cost network infrastructure Low cost networking solution!low cost networking solution

WLAN Security Risks

WLAN Security Risks Network Detection RF Signal Limiting Interference and RF Disruption Unauthorized Network Access Denial of Service Insider Threat Compromised Devices Illicit Access Point Deployment Data Interception

WLAN Security Risks Security Vulnerability Relative Security Risk Level Low High Security Countermeasures Detecting WLANs RF Signal Propagation ******************** ******************** Deactivate access point beacon and advertisement transmission Minimize access point transmission level Interference and RF Disruption ******* Unauthorized Access ************************** Conduct RF environment analysis Strategic location of access point deployments Use strong authentication

WLAN Security Risks Data Interception **************************!Use encryption Denial of Service *************!Implement measures to secure against unauthorized access Insider Threat *********************!Background investigations!require change of encryption key upon employee termination/dismissal Compromised Devices *********************!Security awareness!reporting requirement for lost or stolen devices!require change of encryption key if compromise is suspected Illicit Access Point Deployment *********************!Limit physical access to wired network infrastructure!conduct routine monitoring for illicit/improperly configured access point

WEP Authentication / Encryption

WEP Encryption Process PLAINTEXT MESSAGE CRC Logical Exclusive-Or (XOR) Operation GENERATED ENCRYPTION SEQUENCE IV ENCRYPTED MESSAGE CRC IV LEGEND Cyclic Redundency Check Initialization Vector

Weaknesses of WEP Algorithm The primary issues that have led to the defeating the security provided by WEP, is related to the:!implementation of the encryption algorithm!relatively short length of the shared encryption key!iv being transmitted with its associated encrypted message!static nature associated with WEP encryption key management

WEP Encryption Process Initialization Vector (IV) Initialization Vector (IV) used to generate the used to generate the psuedo-random encryption psuedo-random encryption sequence is transmitted sequence is transmitted along with the encrypted along with the encrypted message message IV IV ENCRYPTED MESSAGE ENCRYPTED MESSAGE

RF Signal Limiting

SNR Measurements At Selected Distances (100mW Output Power) 60 50 40 30 10' 20' 100' 20 10 0

SNR Measurements For Selected Output Power Levels 120 100 80 SNR (db) 60 100mW 50mW 5mW 1mW 40 20 0 0 20 40 80 100 Distance (Feet)

RF Interference Source 60 50 40 30 Norma l Interference Source 20 10 0 Figure X.X Microwave Interference Source Effect On WLAN Transmissions (Distance From Wireless Device 10 Feet)

Maximum Distances For Output Power Levels IEEE 802.11b 2.4 GHz Wireless Access Point 1200 1000 800 Distance (Feet) 600 400 200 0 100 50 5 1 Output Pow er (mw)

Firewall / Intrusion Detection System / VPN Integration

Firewall Integration Into A Wireless Network Segment Laptop PDA LAN Switch Firewall Wireless Access Point Wireless Network Segment

IDS Integration Into A Wireless Network Segment Intrusion Detection System Laptop PDA LAN Switch Firewall Wireless Access Point Wireless Network Segment

VPN Integration Into A Wireless Network Segment Laptop PDA LAN Switch VPN Gateway VPN / IPSec Tunnel Wireless Access Point Wireless Network Segment

Emerging Security Technology and Standards

Emerging Security Technology and Standards IEEE 802.11e - Quality of Service (QoS) IEEE 802.11g - 54 Mbps over 2.4 GHz band IEEE 802.11h Spectrum Manager 802.11a IEEE 802.11i - Enhanced security

Summary / Conclusion

Summary! The optimal security solution for WLANs involves a combination of security technologies! A detailed threat risk assessment and analysis is essential to determine which security measures, or combination of measures are the most effective! The implementation of preventive and protective end-toend security measures, such as firewalls, intrusion detection, and VPN technologies, provides the most secure and effective defense against the threats associated with the transmission of data over an insecure wireless medium

Summary! Requires implementation of policy requirements to ensure the effectiveness of security solutions! Training information will emphasize the importance of security to network users

Conclusion A combination of security measures will further increase the security offered by WLAN technologies Increased security will support new WLAN applications Emerging security technology will reduce the increasing security threats associated with providing wireless network connectivity