Mobile and Wireless Network Security

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
IPsec Internet Headquarters Branch Office SA R1 R2
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
IEEE Wireless Local Area Networks (WLAN’s).
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part II.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
25-1 Last time □ Firewalls □ Attacks and countermeasures □ Security in many layers ♦ PGP ♦ SSL ♦ IPSec.
Wireless and Security CSCI 5857: Encoding and Encryption.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
1 WEP Design Goals r Symmetric key crypto m Confidentiality m Station authorization m Data integrity r Self synchronizing: each packet separately encrypted.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
IWD2243 Wireless & Mobile Security Chapter 4 : Security in Wireless Ad Hoc Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Stream Cipher July 2011.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Lecture Notes Thursday Sue B. Moon.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
25-1 Last time □ Firewalls □ Attacks and countermeasures □ Security in many layers ♦ PGP ♦ SSL ♦ IPSec.
Module 48 (Wireless Hacking)
Security In Wireless Protocols - A Brief Overview
Message Authentication Code
TERMINOLOGY Define: WPAN
Wireless Protocols WEP, WPA & WPA2.
Security in the layers 8: Network Security.
WEP & WPA Mandy Kershishnik.
Mobile and Wireless Network Security
Wireless LAN Security CSE 6590.
Wireless Security Ian Bodley.
“I don’t have to be careful, I’ve got a gun.”
Cryptography Lecture 16.
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
PART VII Security.
Chapter 6 Network Security
WLAN Security Antti Miettinen.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Intercepting Mobile Communications: The Insecurity of
Security in Wide Area Networks
Presentation transcript:

Mobile and Wireless Network Security Design Fundamentals ET-IDA-082 Lecture-22 Mobile and Wireless Network Security GSM, UMTS,802.11,Bluetooth 22.07.2015, v11 Prof. W. Adi

Outlines Wireless Network Security 802.11 Bluetooth Security 2G, 3G Mobile Security (see early lecture contents) Wireless Network Security 802.11 Bluetooth Security

Through Modern Communication Mobile Environment Open Global Market Through Modern Communication Global Information Short-Circuit (AAA Scenario) Light Heating Kitchen Garage Door Gates ... Remote Control Car power - line CAN-Bus Anywhere Any time Any device TV Power Station power line network Internet WLAN: 802.11 AP Wireless Network DECT Bluetooth

IEEE 802.11 security There are many different electronic devices for e-payment system. Different banks may be concerted in e-payment and the financial network is neccessary. E-payment flatform is built connecting the financial network and other open network, where the electronic devices can communicate with the flatform. PC is the most common device. Other devices include mobile devices, e.g. laptop, PDA, mobile telephone, ATM(Automatic Teller Machine), POS(Position of Sale), telephone and terminal. The electronic devices can connect the e-payment flatform using different open network.

IEEE 802.11 security Many users use no encryption/authentication Still packet-sniffing and various attacks easy! Securing 802.11 encryption, authentication first attempt at 802.11 security: Wired Equivalent Privacy (WEP): a failure current attempt: 802.11i

Wired Equivalent Privacy (WEP): authentication as in protocol ap4.0 host requests authentication from access point access point sends 128 bit nonce host encrypts nonce using shared symmetric key access point decrypts nonce, authenticates host no key distribution mechanism authentication: knowing the shared key is enough

WEP data encryption Host/AP share 40 bit symmetric key (semi-permanent) Host appends 24-bit initialization vector (IV) to create 64-bit key 64 bit key used to generate stream of keys, kiIV kiIV used to encrypt ith byte, di, in frame: ci = di XOR kiIV IV and encrypted bytes, ci sent in frame

Sender-side WEP encryption

Breaking 802.11 WEP encryption Security hole: 24-bit IV, one IV per frame, -> IV’s eventually reused IV transmitted in plaintext -> IV reuse detected Attack: Trudy causes Alice to encrypt known plaintext d1 d2 d3 d4 … Trudy sees: ci = di XOR kiIV Trudy knows ci di, so can compute kiIV Trudy knows encrypting key sequence k1IV k2IV k3IV … Next time IV is used, Trudy can decrypt!

802.11i: improved security numerous (stronger) forms of encryption possible provides key distribution uses authentication server separate from access point

802.11i: four phases of operation AP: access point STA: client station AS: Authentication server wired network 1 Discovery of security capabilities STA and AS mutually authenticate Together generate Master Key (MK). AP servers as “pass through” 2 3 STA derives Pairwise Master Key (PMK) 3 AS derives same PMK, sends to AP 4 STA, AP use PMK to derive Temporal Key (TK) used for message encryption and integrity

Bluetooth security There are many different electronic devices for e-payment system. Different banks may be concerted in e-payment and the financial network is neccessary. E-payment flatform is built connecting the financial network and other open network, where the electronic devices can communicate with the flatform. PC is the most common device. Other devices include mobile devices, e.g. laptop, PDA, mobile telephone, ATM(Automatic Teller Machine), POS(Position of Sale), telephone and terminal. The electronic devices can connect the e-payment flatform using different open network.

Bluetooth Security - Components Security is based on the SAFER+ security protocol (J. Massey) All link-level security is based on 128-bit link keys A secret PIN number (variable from 4 to 16 octets) which is common to the two devices wishing to communicate forms one of the key inputs into forming the initial link key. Authentication in Bluetooth uses a device-to-device challenge and response scheme to determine if the two devices share a common link key Encryption generates a cipher stream based on an encryption key which is generated from a common link key – encryption is symmetrical Link keys can be semi-permanent or temporary

Bluetooth Security – Link keys In order to accommodate for different types of applications, four types of link keys have been defined: the unit key KA: Semi permanent key generated in every unit only once during factory setup the combination key KAB: This is dependent on two units and is unique for a particular pair of devices – more secure than a unit key the master key Kmaster: Temporary key used for point to multipoint broadcast communications and will replace the current link key until peer-to-peer communications resume the initialization key Kinit: The is a temporary key which is used when no combination or unit keys have been exchanged yet. It is generated using a PIN code as one of its inputs In addition to these keys there is an encryption key, denoted Kc. This key is derived from the current link key.

Bluetooth Security – Generating keys Generation of Keys uses two “Basic Modes” Algorithm E22 is used to generate Initialization keys Kinit and Master keys Kmaster where PIN’ is a combination of the bluetooth address and the PIN and L’ is derived from the number of octets in the PIN Algorithm E21 is used to generate Unit keys and Combination keys where RAND is a 128-bit random number and BD_ADDR is the units bluetooth address

Bluetooth Security – key exchange Exchange of unit keys A sends the unit key KA to unit B securely by XORing with Kinit Unit B will store KA as the link key KBA. Usually the application will let the unit with restricted memory abilities send its unit key to be used as the link key since this unit only has to remember its own unit key Kinit is discarded once keys have been exchanged

Bluetooth Security – key exchange Creation and exchange of combination keys KAB , KBA Random numbers (LK_RANDA and LK_RANDB) are generated in Unit A and Unit B These are exchanged securely by XORing them with the current link key K Two new random numbers (LK_KA and LK_KB) are generated for LK_RANDA and LK_RANDB using the E21 algorithm These two random numbers are XORed together to form a new combination key KAB on unit A and KBA on unit B

Bluetooth Security – key exchange Creation and exchange of a master key Kmaster The master device generates two random numbers (RAND1 and RAND2) and uses the E22 algorithm to generate a random key Kmaster A third random number (RAND) is generated by the master and sent to the slave The slave and the master compute an overlay (OVL) using the E22 algorithm with the current key and the new random as inputs The master key (Kmaster) is sent from the master to the slave by XORing it with the overlay The slave which has the identical overlay, recalculates Kmaster

Bluetooth Security – Authentication Authentication process using secret key Challenge-Response Authentication uses a challenge response scheme to check the claimant’s knowledge of a secret key (current link key) The verifier challenges the claimant to authenticate a random number (AU_RANDA) with an authentication code, E1, and return a result, SRES, which is compared against it’s own generated code SRES’ Authentication is often mutual – Unit A verifying Unit B is followed by Unit B verifying Unit A

Bluetooth Security – Encryption Key Generating the Encryption Key The encryption key Kc is generated by E3 from a COF (Ciphering Offset Number), the current link key and a 128-bit random number The COF is either derived from the BD_ADDR of the master if the current link key is a master key otherwise it is generated from the ACO created during authentication Even though the generated key length is 128 bits this may be shortened due to export encryption laws

Bluetooth Payload Encryption Encryption process by a Running Key Generator RKG (Additive Stream Cipher)

Encryption Running-Key Generator E0 Linear Sequence Generators De-linearizing combiners

E0: Key Generation Engine Parameters Primitive LFSR Polynomials

Authentication Function E1

Authentication Function Ar Block, SAFER + (J. Massey) Based on PHT: Pseudo-Hadamard Transform PHT(x,y) = (2x+y, x+y) mod 2n Low-Complexity Arithmetic!

Wireless Security Still not adequate for today’s Network application Challenges! There are many different electronic devices for e-payment system. Different banks may be concerted in e-payment and the financial network is neccessary. E-payment flatform is built connecting the financial network and other open network, where the electronic devices can communicate with the flatform. PC is the most common device. Other devices include mobile devices, e.g. laptop, PDA, mobile telephone, ATM(Automatic Teller Machine), POS(Position of Sale), telephone and terminal. The electronic devices can connect the e-payment flatform using different open network.