March 2001 Optional MAC-Level Security Enhancements for Home WLANs Carlos Rios LinCom Wireless Carlos Rios, LinCom Wireless.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
Doc.: IEEE /431r0 Submission July 2002 Carlos Rios, RiosTek LLC Slide 1 Pre-Shared Key RSN Extensions Enrollment, Authentication and Key Management.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
1 Wireless LAN Security Presented by Vikrant Karan.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /063 Submission May 2000 Y. Kuchiki, M. Ikeda Seiko Epson Corp. Slide 1 Yutaku Kuchiki, Masayuki Ikeda Seiko Epson Corporation May.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Doc: IEEE /465r0 Submission July 2001 Carlos Rios, LinCom WirelessSlide 1 A Proposal to IEEE i: Optional MAC-Level Authentication and Encryption.
Doc.: IEEE /200 Submission September 2000 Ron Brockmann, Intersil Plug-n-Play Security in the Home & Small Business Ron Brockmann Intersil.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless Network Security CSIS 5857: Encoding and Encryption.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Doc.: IEEE /376 Submission November 2000 S. Watanabe et al, Seiko Epson Corp. Slide 1 Proposal to use KPS to Enhance Security of MAC Layer Shinichiro.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: Authors:
Submission doc.: IEEE /313r1 March 2016 Guido R. Hiertz, Ericsson et al.Slide 1 The benefits of Opportunistic Wireless Encryption Date:
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Ethernet Programming
Instructor Materials Chapter 6 Building a Home Network
Symmetric and Asymmetric Encryption
Authentication and Upper-Layer Messaging
Wireless Protocols WEP, WPA & WPA2.
Methods of Securing LANs
Katrin Hoeper Channel Bindings Katrin Hoeper
CMSC 414 Computer and Network Security Lecture 15
Discussions on FILS Authentication
Security for location determination at a Public Domain
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
802.1X and key interactions Tim Moore November 2001
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
TSN Architecture Mike Moreton, STMicroelectronics
Risks of Wireless Access Points
RADIUS Client Kickstart
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
Security Of Wireless Sensor Networks
2840 Junction Ave, San Jose, CA 95134, USA
Proposed Modifications to e-D4.0 Direct Link Protocol
Changes to SAE State Machine
doc.: IEEE /454r0 Bob Beach Symbol Technologies
May 2002 Project: IEEE P Working Group for Wireless Local Area Networks (WLANs) Submission Title: Liaison Report, May 2002 Date Submitted:
Security of Wireless Sensor Networks
MAC applicability for WirelessHUMAN
Session MAC Address Solves Deadlocks
Wireless Architectural Thoughts
Presentation transcript:

March 2001 Optional MAC-Level Security Enhancements for Home WLANs Carlos Rios LinCom Wireless Carlos Rios, LinCom Wireless

TGeS to Date Good solution proposed for Enterprise Security: March 2001 TGeS to Date Good solution proposed for Enterprise Security: Mutual Authentication Replay Protection Session Keys Key Management Strong Encryption The solution for the Home still relies on WEP Manually generate and distribute common WEP key Pain to regenerate and redistribute new keys Keys WILL be forgotten Stations can eavesdrop on each other Carlos Rios, LinCom Wireless

March 2001 An Idea There is room for an optional 802.11MAC-level scheme that can readily provide Mutual Authentication Per Session Encryption Keys Secure Encryption key generation and distribution Support of WEP2 encryption ON TOP of the presently proposed 802.11eS structure Carlos Rios, LinCom Wireless

March 2001 That is not really new Already have the 00/200 Intersil submission “Plug and Play Security in the Home and Small Business” Use as an optional Authentication method in addition to Open and Shared Key Simple Diffie-Helman multiple frame exchange Simultaneous mutual authentication and session key generation Use in concert with WEP2 encryption as now proposed Carlos Rios, LinCom Wireless

March 2001 General Details Stations have unique, factory assigned Private keys, use to generate corresponding Public Keys AP and Station are configured for “Public Key Authentication” On first contact, APs, Stations learn each other’s MAC Address and Public Key pairs Authentication consists of performing a Diffie-Helman exchange to securely mutually prove IDs AND generate a shared session WEP2 key Key expiration and regeneration, redistribution can be handled similarly, or, more easily, by doing so directly while WEP2 encrypted with the initial key. Carlos Rios, LinCom Wireless

March 2001 Closing Remarks An optional, previously presented MAC level scheme can add Home Wireless Network mutual authentication and session encryption key management to the 802.11eS proposal Acknowledge that this is not an alternative to the Enterprise ESN proposal Security provided is NOT strong enough for the Enterprise It is certainly good enough for the home This is TIMELY enough to not bog down the 802.11e standardization process Carlos Rios, LinCom Wireless