Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga Ana Sanz Merino Manish Shah Takashi Suzuki Randy Katz.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

RadSec – A better RADIUS protocol
Encrypting Wireless Data with VPN Techniques
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Protected Extensible Authentication Protocol
Mobile and Wireless Security INF245 Guest lecture by Bjorn Jager Molde University College.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Secure Authentication System for Public WLAN Roaming Ana Sanz Merino Yasuhiko Matsunaga Manish Shah Takashi Suzuki Randy Katz.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Course 201 – Administration, Content Inspection and SSL VPN
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.
Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Doc.: IEEE /751r0 Submission July 2004 Max Riegel, SiemensSlide 1 Selling network access Views from a business perspective Max Riegel Siemens.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless Network Security and Interworking
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Wireless security Wi–Fi (802.11) Security
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Secure Sockets Layer (SSL)
Radius, LDAP, Radius used in Authenticating Users
Secure Authentication System for Public WLAN Roaming
Presentation transcript:

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga Ana Sanz Merino Manish Shah Takashi Suzuki Randy Katz

2 Agenda Single sign-on to confederated wireless networks with authentication adaptation Privacy information protection using policy engine Improve security of web-based WLAN authentication by binding 802.1x link level authentication Performance Measurement

3 Loose Trust Relationship in Current Public Wireless LAN Roaming User WLAN Service Provider ID Provider (ISPs, Card Companies) WLAN Service Provider Strong Trust No Trust Weak Trust Each WLAN system is isolated, deploys different authentication schemes Users have to maintain different ID and credentials

4 Challenges and Our Solutions Confederate service providers under different trust levels and with different authentication schemes to offer wider coverage Alleviate user burden of maintaining different identities and credentials per WLAN provider SSO Roaming with Authentication Adaptation Select proper authentication method and protect privacy of user information per WLAN provider Policy Engine Client Avoid theft of wireless service without assuming pre- shared secret between user and network L2/Web Compound Authentication

5 The Single Sign-on concept Single username and password Users authenticate only the first time Inter-system handover with minimal user intervention Each network may deploy its own authentication scheme Coffee shop (provider A) Street (provider B) Office (provider C) ID Provider Confederation Initial Sign-on Single sign-on

6 Single Sign-on Technology Currently two technologies clearly accepted by industry:  RADIUS: Proxy-based authentication scheme  Liberty Alliance: Redirect-based authentication scheme We adopted both of them for our implementation Need authentication adaptation framework

7 Authentication Adaptation Flow User Terminal (3)Select authentication method according to user’s preferences WLAN Service Provider (1) Request authentication (2) Announce: - provider id - authentication methods - charging options - required user information (4) Submit: - selected authn. method - selected charging option - user information (5) Authenticate the user

8 Client-side Policy Engine Control automatic submission of user authentication information according to communication context  Context includes trust level of provider, cost, etc. Authentication/Authorization flow adaptation  Switch between Proxy-based (Radius) and Redirect-based (Liberty-style) single sign on

9 Policy Engine Architecture WLAN providerClient Policy Enforcement Point Web Browser Policy Check Engine EAP/ 802.1X Policy Repository Context End User Applet Auth Info. Repository AAA Server Capability Policy

10 Security Threats of Web-based Authentication and Access Control Web Server IP/MAC spoofing-> Theft of Service Rogue AP - >DoS Lack of cryptographic bindings causes several security vulnerabilities External Network Gate-control (IP/MAC) No Message Integrity Check ->Message Alteration No Data Encryption ->Eavesdropping

11 L2/Web Compound Authentication Access Point Client RADIUS/Web Server (1) 802.1x TLS guest authentication External Network (2) Establish L2 Session Key (3) Web Auth (with L2 session key digest) (4)Firewall Control Prevent theft of service, eavesdropping, message alteration Don’t work for L2 DoS attack – out of scope

12 WLAN Single Sign on Testbed MC Fire wall Web Portal Web Server Client Radius Identity Provider Radius External Network HTTPS Service Provider #1 RADIUS Fire wall Web Radius Client Radius 802.1x RADIUS Web Service Provider #2 SOAP HTTPS

13 Authentication Adaptation User Interface

14 Layer 2 Roaming User Interface

15 Delay Profile Evaluation Proxy-based (RADIUS) Redirect-based (Liberty) LocalRoamingLocalRoaming Web Authentication Policy Engine Link Layer (802.1x) Authentication Total (Units: sec)

16 Conclusions 1. Secure public WLAN roaming made possible by accommodating multiple authentication scheme and ID providers with an adaptation framework 2. Policy Engine reflects user authentication scheme preference and protects privacy of user information 3. Compound L2/Web authentication ensures cryptographically-protected access 4. Confirmed with prototype, measured performance shows reasonable delay for practical use 5. Exploits industry-standard authentication architectures: Radius, Liberty alliance

backup

18 (1)Monthly/Pre- paid Subscribers (2)One-time Users (3)Non- Subscribers Free & Advertisement Contents (Hotspot Owner Pays) Premium Contents & External Network Access (Subscriber Pays) WLAN Infra- structure User Category Services AAA Servers Public Wireless LAN Service Model The network is ‘open’ to users without pre-shared secret

x/11i/WPA L2 Network Authentication and Access Control (1) Mutual TLS authentication with pre-shared key (2) Establish L2 session key dynamically External Network (3) Only successfully- decrypted packets are forwarded Conventional ‘Closed-style’ authentication: Only hosts with pre-shared key can access the network, Mainly for Corporate WLAN

20 L2/Web Authentication Comparison Web-based802.1x/WPA/11i SupportMost public WLAN providers Corporate Networks (only on 802 LAN/MANs) Pre-shared Secret Not necessary (use credit-card authorization) Necessary EncryptionNonePer-station RC4, AES(802.11i) AuthenticationSSL-protected Password EAP-TLS (certificate- based) Access ControlIP/MAC addressCryptographic AccountingFine-grainedOnly at boot time

21 Our Approach Compound L2/Web authentication to ensure users to have cryptographically-protected wireless LAN access Use 802.1x ‘guest’ authentication mode, embed L2 session key digest in web authentication  At layer 2, do not assume pre-shared secret  Digest embedding is necessary for avoiding race attack After Web authentication, user gets full access  Otherwise, users have limited access to free contents L2 DoS protection is out of scope

22 Race Attack Scenario Legitimate Client APRADIUS/Web L2 Auth K1 Malicious Client (MAC Spoofer) L2 Auth K2 Firewall (L2 Session key verify NG) Bind (MAC, MD5(K1) Bind (MAC, MD5(K2)) Theft of service can be prevented by authentication binding L2 DoS attack is still possible L2 Auth Web Auth+ MD5(K1) (Why L2 session key digest embedding is necessary)

23 Compound Authentication Testbed Access Point Client RADIUS/Web Server (1) 802.1x TLS guest authentication External Network (2) Establish L2 Session Key (3) Web Auth (with L2 session key digest) (4)Firewall Control Xsupplicant 0.6 libwww-perl Cisco AIR-350 FreeRADIUS Apache Attacker (rejected)