Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 1 Wireless Security Developed by: Alberto Escudero Pascual,

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
N ational I NFOSEC E ducation and T raining P rogram Educational Solutions for a Safer World http//
Cryptography and Network Security
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Network Security Introduction
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Message Authentication Code
Re-evaluating the WPA2 Security Protocol
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
CNET334 - Network Security
Information and Network Security
CSE 4905 Network Security Overview
Wireless LAN Security 4.3 Wireless LAN Security.
إعداد : Alberto Escudero Pascual/ IT +46 النسخة العربية: أنس طويلة
Cryptography and Network Security
Security Of Wireless Sensor Networks
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
ONLINE SECURE DATA SERVICE
Introduction to Cryptography
Cryptography and Network Security
Presentation transcript:

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 1 Wireless Security Developed by: Alberto Escudero Pascual, IT +46

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 2 Goals To be able to situate wireless security within the broad context of information security. To understand where “security” can be built into each layer of the OSI/Internet protocol stack To be able to identify the key security elements that need to be considered when performing wireless design planning.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 3 Table of Contents Part I –Wireless Security/Information Systems Security –OSI model and link level encryption Part II – Five security attributes in the context of WLAN Part III – Ten threats for security in WLAN

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 4 Defining Wireless Security Security is a wide and general concept What ”Security” are we talking about? We need to start by defining the right “Security Context” to study WLAN Security We will present Wireless Security in the context of Information Security.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 5 What is Information Security? (COMSEC) ● Late 70's, refered to as ”Communication Security” COMSEC was defined by “U.S. National Security Telecommunications and Information Systems Security Instruction” (NSTISSI) as: “ Measurement and controls taken to deny unauthorized persons information derived from telecommunications and to ensure the authenticity of such telecommunications.”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 6 What is Information Security? (COMSEC) ● COMSEC security included two security attributes related to this unit: ● Confidentiality ● Authentication

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 7 Confidentiality ”Assurance that information is not disclosed to unauthorized persons, processes, or devices.” Protection from unauthorized disclosure

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 8 Authentication ”Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual’s authorization to receive specific categories of information” Verification of originator

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 9 Growth of PC's in the 80's lead to a new security era COMPUSEC was defined by the NSTISSI as: “Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated” What is Information Security? (COMPUSEC)

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 10 COMPUSEC introduced two more security attributes related to this unit: Integrity Availability What is Information Security? (COMPUSEC)

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 11 Integrity ”Quality of an Information System (IS) reflecting the local correctness and reliability of the operating system; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data.” The data can not be modified without notice

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 12 Availability ”Timely, reliable access to data and information services for authorized users.” The access is “reliable”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 13 In the 90's, COMSEC and COMPUSEC merged to form Information Systems Security (INFOSEC) INFOSEC included the four attributes: Confidentiality, Authentication, Integrity and Availability from COMSEC and COMPUSEC What is Information Security? (INFOSEC)

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 14 INFOSEC included also a new attribute: Non-Repudiation What is Information Security? (INFOSEC)

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 15 Non-Repudiation (Accountability) ”Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 16 INFOSEC in WLAN INFOSEC is defined by the U.S. NSTISSI as: ”The protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 17 The Methodology What: Wireless Security will be presented from the point of view of INFOSEC Why: To give a methodological approach for designing security of a wireless network How: All five security attributes of INFOSEC are presented and we discuss how WLAN (can) implements each of them

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 18 Two reminders Before moving into the five security attributes, two reminders from the Advanced Internetworking Unit –OSI model and WLAN standards –Link level encryption

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 19 The OSI Model and Wireless Security (reminder) Wireless standards refers to layer 1 and 2 of the OSI protocol stack Security in WLAN tends to be identifief as setting properly ”Wireless Link Level Encryption” Security mechanisms in layer 3 and above do not belong to ”wireless security” and should be considered as part of a “Network or Application Security Unit”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 20 Link Level Encryption Definition: The process to secure data at link level when data is transmitted between two nodes attached to the same physical link. Requirements: A (secret/key) shared between the communication parties and an agreed encryption algorithm.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 21 Link Level Encryption When sender and receiver are not present in the same media, the data needs to be decrypted and re-encrypted in each of the nodes along the way to the receiver. LL Encryption only works HOP-BY-HOP. The link level encryption is normally used when higher level protocol encryption is not present or in high assurance applications.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 22 Link Level Encryption in IEEE WEP has been the most known link level encryption algorithm for IEEE ( ) WEP has been proven to be insecure. Other alternatives have been develop in the last five years and standardised as the Wi-Fi Protected Access (WPA2). The new standard IEEE i will include an enhancement of WPA, named WPA-2.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 23 Link Level Encryption in IEEE Link encryption does not provide end- to-end security outside of the physical link Link Encryption should always be consider as just an extra security measure Link encryption requires more hardware resources in the access points and the security design of key distribution and management.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 24 Five security attributes in WLAN Confidentiality Authentication Integrity Availability Non-repudation (Accountability)

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit Wireless (LAN) Confidentiality Defined as the assurance that information transmitted between access points and clients is not disclosed to unauthorized persons. Needs to ensure that either 1) the communication between a set of access points in a wirelessdistribution system (WDS) is protected OR 2) the communication between an access point (AP) and a station/client (STA) remains protected

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 26 WEP Part of the original IEEE b standard of 1999 Aimed to provide a “comparable level of confidentiality” to a wired network WEP was broken and obsolete shortly after its release WEP was proven weak independently of the length of the key size The lack of any key management in the protocol itself did WEP even weaker (keys are distributted manually). Quickly, new alternatives poped up as WEP+ from Lucent and WEP2 from Cisco

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 27 WEP and their enhancements (WEP+, WEP2) are currently obsolete WEP is based on the “RC4 stream cypher” Multiple available software to break WEP (Airsnort,wepcrack, kismac, aircrack etc). Interested in the history of WEP security? check the “Additional Resources” WEP

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 28 WPA and WPA2 are born Wi-Fi Protected Access (WPA) was proposed in 2003 while IEEE i was discussed. WPA focused on enable old-hardware to be easily updated. In 2004, WPA was enhanced to include AES and certified as part of the IEEE i standard with the name WPA2 (2004). WPA2 is designed to work with and without a key management server.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 29 WPA and WPA2 are born If no key management server is used, all stations share a “pre-shared key” (PSK) PSK mode is known as WAP-Personal or WAP2 Personal When a key management server is used, WPA2 is known as WPA(2)-Enterprise One major improvement in WPA2: the possibility of exchanging keys dynamically

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit Wireless (LAN) Authentication The measure designed to establish the validity of a transmission between Access Points and/or Wireless Stations (STA) The right to send *bridge/route* data via the Access Point

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 31 Open Authentication - NO security, everyone can start talking to the access point Shared Key Authentication - A secret is shared between access point and the client - A challenge response allows the access point to verify the shared secret and grant access Association Mechanisms

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 32 WEP and Authentication in Layer-2 Shared Key Authentication in WEP is obsolete Plain-cypher text attacks can be easily performed “Encryption” key and “Authentication” key are the same shared secret Once one is compromised so is the other

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 33 WEP and Authentication in Layer-2 Recommendations: Use WAP2-Enterprise mode Authentication in major wireless networks (WISP) is normally implemented in higher network layers (IP layer) by means of captive portals By using a ”captive portal” we have NO simple means to stop the flow of traffic that bridges (crosses) our access points.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 34 Stop Broadcasting SSID A variation of ”Open authentication” is called “Closed Network”. ”Closed networks” do NOT broadcast periodically SSID beacon frames (IEEE link level management frames) Turning off the broadcast of SSID implies that the wireless clients need to know the SSID in advance

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 35 Stop Broadcasting SSID A “security” protection? Will not prevent other software to find the SSID by “eavesdrop” the association frames of another station Finding the SSID of a “Close Network” is as simple as waiting for “someone” to get associated to the wireless network and extract the SSID string from an association frame Should be consider as an “extra precaution” but NOT as a real security protection.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 36 MAC address filtering as security measure Many WISPs use MAC address filtering to limit/provide access to a wireless networks assuming that MAC addresses are “hard- coded” and can not be easily modified MAC addresses in most (wireless) networks interfaces can easily be modified! An authentication mechanism based ONLY on MAC addresses is insecure.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 37 Wireless Captive Portals Moving Authentication out of the Wireless: Captive Portal There exists many implementations of Wireless Captive Portals The majority are based on the same type of concept: HTTP redirection and Dynamic Firewalling

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 38 Wireless Captive Portals 1) Clients are allowed to associate with an AP and obtain an IP by means of DHCP 2) Once the client has an IP, all HTTP requests are captured and the client is forced to a “log-in” web page. 3) The captive portal verifies the validity of the user/password and changes the status of a firewall (normally in the same machine) 4) Firewalls rules are normally based on the values of the client's MAC and DHCP IP address.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 39 Wireless Captive Portal authentication in three steps

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit Wireless (LAN) Data Integrity The capability of a wireless protocol to determine if the payload has been be altered by unauthorized users WEP was intended to provide payload integrity The integrity mechanism (CRC) used in WEP is also insecure. No surprises! The payload can be altered and the CRC message updated without knowing the WEP key

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 41 Wireless (LAN) Data Integrity Result: Traffic can be modified without being noticed WPA and WPA2: included a more secure message authentication code (MAC – cryptographic checksum) and the inclusion of a frame counter, which prevents “replay attacks”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 42 Wireless (LAN) Data Integrity WEP vs WPA2 Data Integrity by means of WEP is obsolete WPA or WPA2 should be implemented to achieve Wireless Data Integrity by means of encryption in the link level

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit Wireless (LAN) Availability “The capability of the technology to ensure reliable access to data and information services for authorized users.”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 44 Interference in wireless radio channel WLAN operates in predefined radio channels open for anyone to use Preventing unauthorized users to interfere with your network is almost impossible Advice: Monitor carefully your links to identify possible sources of “interference”

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 45 Denial of Service (DoS) WLAN networks are vulnerable to DoS by radio interference, anyone can start using: - the same or adjacent radio channel - the same SSSID DoS can be intentional and/or unintentional Consider scheduling periodical radio frequency scans Do not overpower your links

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 46 Other threats to availability Presence of hidden nodes (heavy retransmission) Viruses (heavy scanning) Peer-to-peer software (heaving data transfer) Spam (heavy incoming/outgoing mail)

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit Wireless (LAN) Non-repudiation (Accountability) The WLAN protocols do not have a mechanism to assure the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity. Accountability needs to be implemented in higher protocol layers.

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 48 Ten WLAN Security Threats

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit WLAN Security Threats

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit WLAN Security Threats

Last Updated: 25 April, 2006 Alberto Escudero Pascual Multimedia Training Kit 51 Conclusions 1. Security attributes as described in INFOSEC can be implemented in different layers of the OSI model 2. If link level security is needed avoid WEP and use IEEE i (WPA2) 3. Have clear security requirements, as solutions depend on each scenario