IEEE 802.11i Dohwan Kim.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
IWD2243 Wireless & Mobile Security Chapter 3 : Wireless LAN Security Prepared by : Zuraidy Adnan, FITM UNISEL1.
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Measuring of the time consumption of the WLAN’s security functions Jaroslav Kadlec, Radek Kuchta, Radimír Vrba Dept. of Microelectronics.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
CSE 4905 WiFi Security II WPA2 (WiFi Protected Access 2)
History and Implementation of the IEEE 802 Security Architecture
Authentication and handoff protocols for wireless mesh networks
Wireless Protocols WEP, WPA & WPA2.
Methods of Securing LANs
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Information Security.
Wireless LAN Security CSE 6590.
Wireless LAN Security 4.3 Wireless LAN Security.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Wireless Network Security
The RC4 Algorithm Network Security.
Presentation transcript:

IEEE 802.11i Dohwan Kim

Table of contents WEP WPA1 WPA2 Conclusion

Wireless network security 802.11 WEP 802.11i WPA1 At first, WEP is used as wireless network security. But WEP had serious problem, so IEEE 802.11 working group make task group i. IEEE 802.11i make wireless network security protocols which are WPA1 and WPA2. WPA2

WEP (Wired Equivalent Privacy) 1999.09 IEEE 802.11 RC4, CRC-32 IV (initialization vector) : 24 bit WEP-40 – 64bit, WEP-104 – 128bit Static method Not recommend Alternative : dynamic WEP WEP is a security algorithm for IEEE 802.11 wireless networks. WEP uses the stream cipher RC4 for confidentiality, and the CRC-32 checksum for integrity. Standard WEP-40 has 40 bit key and 24bit initialization vector. In WEP, RC4 generate key stream by using initialization vector and key. And cipher text is generated by calculating XOR between keystream and cipher text. But WEP is not recommended because WEP use static key. Recently, everyone can crack WEP key. Alternative is dynamic WEP. Dynamic WEP use dynamic key which is changed frequently. So dynamic WEP can prevent cracking.

WPA (Wi-Fi Protected Access) Enterprise mode Authentication : IEEE 802.1x/EAP Encryption : TKIP/MIC Personal mode Authentication : PSK WPA means wi-fi protected access. WPA consists of enterprise mode and personal mode. In enterprise mode, WPA use IEEE 802.1x and EAP for authentication. In personal mode, WPA use PSK for authentication. And WPA use TKIP and MIC for encryption.

WPA - authentication IEEE 802.1x/EAP In enterprise mode, WPA use IEEE 802.1x and EAP. IEEE 802.1x is authentication method for WPA in enterprise mode. And EAP means extensible authentication protocol. When device access to AP, AP access RADIUS server for authentication. Radius server means remote authentication dial-in user services, and it can decide authentication of user. IEEE 802.1x needs radius server, so this method can only use in enterprise.

WPA - authentication PSK (Pre Shared Keying) AP has pre-shared key. If supplicant want access to AP, supplicant must know AP’s PSK. PSK means pre shared keying. In PSK, AP has pre-shared key. And if supplicant want access to AP, supplicant must know AP’s PSK.

WPA - encryption TKIP/MIC Difference from WEP Based on WEP RC4 encryption Difference from WEP Master keys MIC TKIP is encryption method based on WEP. So TKIP use RC4 encryption. But TKIP has some differences from WEP. First, WEP has only one master key, but TKIP has several master keys by mixing key and initialization vector. Second, TKIP use MIC which means message integrity check.

WPA2 Enterprise mode Personal mode Authentication : IEEE 802.1x/EAP Encryption : AES-CCMP Personal mode Authentication : PSK WPA2 is more robust than WPA1. WPA2 and WPA use same authentication, IEEE 802.1x and EAP in enterprise mode, and PSK in personal mode. But WPA2 use encryption which is AES-CCMP. WPA1’s TKIP is more robust than WEP, but TKIP is also limited to encrypt data. So AES-CCMP is used in WPA2.

WPA2 - encryption CCMP is encryption method based on AES. AES is a type of symmetric cryptographic technique. CCMP is encryption method based on AES. AES is a type of symmetric cryptographic technique. This is figure about symmetric cryptographic technique.

WPA2 – encryption (AES) Low memory Easy implementation Robust AES has many advantage. First, AES use low memory, and second, implementation of AES is easy. Moreover, AES is very robust. This figure show process of AES. In AES, there are 4 process such as sub bytes, shift rows, mix columns, and add round key.

Conclusion WEP and WPA1 (TKIP) is not recommended. Drawback of AES is researched, so beyond AES receives attention. WEP and WPA1 is not recommended. 802.11i only recommend CCMP. And drawback of AES is researched, so beyond AES receives attention.