The next generation of knowledge and expertise Wireless Security Basics



Similar documents
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security. TestOut Modules

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless security. Any station within range of the RF receives data Two security mechanism

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Wireless LAN Security Mechanisms

WIRELESS SECURITY IN (WI-FI ) NETWORKS

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Link Layer and Network Layer Security for Wireless Networks

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Configure WorkGroup Bridge on the WAP131 Access Point

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

CONNECTING THE RASPBERRY PI TO A NETWORK

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Network Access Security. Lesson 10

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Configuring Security Solutions

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

VPN. Date: 4/15/2004 By: Heena Patel

Network Security Best Practices

Top 10 Security Checklist for SOHO Wireless LANs

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Wireless Encryption Protection

How To Secure Wireless Networks

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

AirStation One-Touch Secure System (AOSS ) A Description of WLAN Security Challenges and Potential Solutions

Best Practices for Outdoor Wireless Security

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Wireless Network Standard and Guidelines

NETWORK SECURITY (W/LAB) Course Syllabus

Security in Wireless Local Area Network

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Question How do I access the router s web-based setup page? Answer

Chapter 6 CDMA/802.11i

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Top 10 Security Checklist for SOHO Wireless LANs

Computer Networks. Secure Systems

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Legacy Security

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Implementing Security for Wireless Networks

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Topics in Network Security

Cisco Virtual Office Express

Industrial Communication. Securing Industrial Wireless

Application Note: Onsight Device VPN Configuration V1.1

WLAN Authentication and Data Privacy

A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

How To Protect A Wireless Lan From A Rogue Access Point

Chapter 3 Safeguarding Your Network

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Creating a VPN Using Windows 2003 Server and XP Professional

Recommended Wireless Local Area Network Architecture

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Wireless VPN White Paper. WIALAN Technologies, Inc.

How To Get A Power Station To Work With A Power Generator Without A Substation

Intranet Security Solution

ECB1220R. Wireless SOHO Router/Client Bridge

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Developing Network Security Strategies

Securing your Linksys WRT54G

2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router

Chapter 2 Configuring Your Wireless Network and Security Settings

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

VPN Lesson 2: VPN Implementation. Summary

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.

Security Policy Revision Date: 23 April 2009

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Link Layer and Network Layer Security for Wireless Networks

User Guide. E-Series Routers

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

Chapter 2 Wireless Settings and Security

Exam Questions SY0-401

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

HP AP8760 Dual Radio a/b/g Access Point Overview

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

ESR7550 KEY FEATURES PRODUCT DESCRIPTION

P r o t o l ck w fi ma a n ger User s Guide

Wireless Networks. Welcome to Wireless

ALL Mbits Powerline WLAN N Access Point. User s Manual

ENHWI-N n Wireless Router

Security Awareness. Wireless Network Security

United States Trustee Program s Wireless LAN Security Checklist

9 Simple steps to secure your Wi-Fi Network.

Authentication in WLAN

Transcription:

The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

Networking computers, printers, personal desktop assistants (PDA) and other networks together wirelessly provides for a mobile environment at home or in the workplace. Organizations worldwide are realizing that this mobile environment has an associated cost. In some instances, even with the proper security, the cost to the respective organization could be the loss of sensitive information. There are several inherent vulnerabilities associated with transmitting information over a publicly available wireless medium. This medium also known as RF spectrum has a specific band of frequencies that are to be utilized for 802.11 network hardware. The public spectrum is referred to as the Industrial, Scientific, and Medical (ISM) band. It is assumed that the reader of this paper is knowledgeable of the various protocols (i.e., CSMA/CD, OFDM), standards (i.e., 802.11 a/b/g), terminology and hardware needed to construct a basic 802.11 wireless network. This white paper begins with wireless network terminology, then basic wireless network security, which provides guidance associated with the basics associated with creating a secure wireless smalloffice-home-office (SOHO) network. Next, virtual private network (VPN) infrastructure is discussed and how this technology can assist with providing a defense-in-depth postured solution. Finally, IEEE standard 802.11i is then discussed and how it could be the de facto secure wireless networking standard. Basic 802.11 Network Security It doesn t benefit the network owner to allow a malicious user unfettered access to network resources (i.e., bandwidth, network drives, printers, etc), sensitive files, or deny service to the system owner. With this in mind, securing the network against various vulnerabilities is a necessity. Three often-implemented methods used to secure SOHO and/or larger corporate wireless networks include: - SSID configuration - Filtering MAC addresses - Encrypting transmissions These three items when implemented properly can provide enough protection to secure your wireless network from a malicious user with basic to intermediate hacking skills. SSID Configuration The service set identifier (SSID) is not only the name associated with a portion of a network, but it can also be viewed as being a password to a network. It is a descriptor similar to a workgroup name that allows you to access resources associated with a particular portion of a larger network. Wireless APs and routers possess the ability to configure a SSID. The majority of wireless APs and routers come pre-programmed with a default SSID. For example, in their out-of-the-box configuration, Linksys routers are configured with a SSID of linksys. If a system administrator doesn t change the SSID within the router or

AP, any malicious user with the capability to access www.google.com can research the default SSID for various types of 802.11 a/b/g network devices. Another risk associated with not properly configuring the SSID is that the minimal security provided by the SSID could be easily compromised if the AP is configured to broadcast its SSID. Hence, this issue can be resolved by disabling the SSID broadcasts. MAC Address Filtering Every network device (wired or wireless) has a unique media access control (MAC) address. To increase the security of a wireless network, the AP or router can be configured with a list of approved MAC addresses. This technique is best utilized on SOHO networks where the number of clients is reasonably small. In theory, any network device with a MAC address not listed in your MAC access control list will not be granted access to your network. However, MAC addresses can be spoofed by malicious users to obtain access to the desired network. Hence, MAC address filtering and disablement of the SSID broadcasts alone won t provide a secure configuration. WEP Encryption Wired equivalent privacy (WEP) is an encryption standard implemented at the MAC protocol layer of 802.11 networks. The purpose of WEP encryption (up to 128-bit) is to provide wireless networks with security comparable with wired networks. WEP specifies either a 64- or 128-bit option for encrypting transmitted data. Included in the 64- and 128-bit options is a 24-bit initialization vector (IV) that is used in the encryption process. WEP employs the symmetric key encryption algorithm with a pseudo random number generator. The process is diagramed in figure 1. Since this is a symmetric algorithm, the key used to encrypt the data is the same key use to decrypt the data on the receiver side. Hence, the decryption process is the exact opposite of the process shown in figure 1. Figure 1: WEP Encryption Process 1 1 www.ece.umd.edu/merit/archives/ merit2004/merit_fair04_posters/goldberg_simcoe.pdf

To provide a brief synopsis of this process, the IV and the secret key (40- or 104-bit length) are inputs to the pseudo random noise generator. A XOR then occurs between the output of the generator and the data to be transmitted. The output of the XOR computation is the encrypted text or ciphertext. There are various vulnerabilities associated with WEP encryption. For this reason, WEP is suited for SOHO networks or networks with basic security requirements. Without providing technical details, a few of the major issues associated with WEP include: - No key management protocol - IV transmitted in the clear - IV is a static entity - One-way authentication Various secure solutions that can be implemented to resolve these issues include: VPN, WPA1 and WPA2. These solutions will be discussed later in this document. Wireless VPN Security In today s age of technology, most corporate networks are deploying technologies allowing for secure remote access to corporate servers (i.e., Microsoft Exchange, file) back at the office. Providing this capability has the ability to increase both efficiency and mobility while mitigating the risks associated with communicating over the public Internet. A virtual private network (VPN) is a means to provide secure access to a network remotely. First, a connection (socket) is established between the client PC and the VPN server. Once this connection is established, a dedicated enclave or tunnel is created between the two entities. Prior to packets being transmitted, the channel is encrypted between the client and the VPN concentrator. The packets can also be encapsulated in a way that provides for an additional layer of security. Implementing both technologies simultaneously provides an additional layer of security. An example of a VPN implemented onto an existing 802.11 network is diagramed in figure 2. Within various types of operating systems (i.e., Linux, Windows XP Professional), the capability exists to implement a VPN connection. Tunneling protocols such as the pointto-point tunneling protocol (PPTP) and the layer 2 tunneling protocol (L2TP) exist within the operating system. Microsoft has developed an advanced encryption standard (AES) software update that can be used in conjunction with the tunneling protocols.

Figure 2: VPN Over Existing Network [2] 2 Other forms of VPN solutions exist for the corporate enterprise. An organization can purchase a Cisco VPN concentrator (i.e., Cisco VPN 3000) and implement the software portion of the VPN by using Cisco s VPN client. This software would be installed on the client PC. The IP addresses and protocol (i.e., TCP or UDP) would have to be configured in the VPN client. 802.11i Wireless Security 802.11i is the newer version of the original 802.11 wireless network security. 802.11i utilizes an architecture based solution rather than solely an encryption package. This architecture includes an authentication protocol, port-based authentication (802.1x), and temporal key integrity protocol (TKIP). Another name for 802.11i is Wi-Fi protected access (WPA). WPA mitigates the majority of the security risks associated with WEP by eliminating the IV, forcing mutual authentication, and updating the key every session. Implementing 802.11i (w/aes) with a RADIUS server is a viable solution for a corporate enterprise. It provides thorough data protection by means of AES encryption as well as mutual authentication to eliminate rogue APs. An example of this implementation with WEP is detailed in figure 3. Following the diagram is a summary of the steps involved in the protocol. 802.1x The 802.1x protocol is an authentication standard that can be used on any network. It provides the network with a way to authenticate users and/or devices as well as a way to manage the encryption keys. Individual sessions utilize different keys while keys are changed on a random basis. 2 www.dell.com/downloads/ global/vectors/wireless_security.pdf

TKIP TKIP is an encryption algorithm that uses the RC4 algorithm by default, however it has the ability to utilize AES as the encryption. TKIP uses 4 keys in its encryption process along with a key management scheme to force key changes on a continuous basis. Figure 3: 802.1x/RADIUS Implementation 3 Conclusion This paper outlined the fundamentals behind properly securing SOHO, enterprise, or highly sensitive 802.11 wireless networks. Regardless of the data contained within the network, the network should be secured in accordance with corporate policies, network size, cost restrictions, and risk. 3 www.dell.com/downloads/ global/vectors/wireless_security.pdf