1 IEEE 802.11 Network Security Rohit Tripathi Graduate Student. University of Southern California.

Slides:



Advertisements
Similar presentations
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
WEP & WPA Mandy Kershishnik.
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
IEEE i Dohwan Kim.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Security Issues with Wireless Protocols
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

1 IEEE Network Security Rohit Tripathi Graduate Student. University of Southern California.

2 Presentation Overview IEEE Network Security – Basics – Architecture – Security (WEP) – WEP Vulnerabilities. – Practical Implementation of Attacks. – Recent security advancements for Wi-Fi Networks. – Summary

3 What is IEEE ? IEEE Standard for Wireless LAN’s. – Ethernet(networking) capability over radio waves. – Increased Mobility and Flexibility. – Sometimes even more economical. – More practical.(e.g. Large halls, atriums,etc.) – b – 11 Mbps, g – up to 54Mbps, a – up to 54Mbps..11b/g at 2.4GHz radio frequencies..11a at 5-6GHz. Uses CSMA/CA (MAC protocol for shared Media). Different Modulation schemes provides different data speeds. Range – feet (approx.)

4 Terminology WLAN - Wireless Local Area Network. AP – Access Point. Station – Any device on wireless network. SSID – Service Set Identifier(identifies a network name.). MAC Address – Wireless LAN card address, 6 octets (xx.xx.xx.xx.xx.xx)

5 Picture from Infrastructure Network Mode

Architecture (cont….) Frame Types. – Data Frames: Used for Data Transmission. – Control Frames: Used for Media Access Control (RTS, CTS, ACK) – Management Frames: Used to exchange Management Information. (Beacon, Probe, Association, Authentication.)

Standard Security Goals Create Privacy as achieved by a wired network (WEP – Wired Equivalent Privacy). – Parking Lot Attack!!. Should Provide – Confidentiality: No eavesdropping. – Access Control: Deny access to unauthenticated stations. – Data Integrity: Prevent tampering with transmitted messages. Research shows that none of the goals are achieved!!

8 WEP Protocol Wired Equivalent Privacy. – Link Layer Protocol. – Two subsystems. WEP Authentication Technique. – Provides Access Control. WEP Data Encapsulation Technique. – Data Integrity and confidentiality.

9 WEP Authentication STA AP Shared secret distributed out of band Authentication Challenge (128 octets Nonce) Authentication Response (Nonce is RC4 encrypted under shared key) Decrypted nonce? Authentication Request Authentication Result From IEEE: Overview of Security.

10 WEP Data Encryption MessageCRC Key stream = RC4(IV,K) CiphertextIV XOR Transmitted Data Compute Integrity Checksum c(M) and append to original message M. P = Key-stream generated using RC4 encryption algorithm on a 24 bit IV concatenated to a pre-shared key (40-bit or 104-bit). XOR “P” with Key-stream to produce ciphertext. C = P  RC4(IV,K) Transmit IV and Ciphertext.

11 WEP Data Decryption Decryption (Reverse Process) Extract IV P’ = C  RC4(IV, K) = ( P  RC4(IV,K) )  RC4(IV,K) = P Split P’ into and re-compute the checksum c(M’) to see if it matches c’. Establishes message integrity.

12 Attacks on WEP WEP allows IV to be reused with any frame – Same IV produces same key stream (RC4(IV,K)). Risks of Key-stream Reuse. – Now If C1 = P1  RC4(IV, K) and C2 = P2  RC4(IV, K) then C1  C2 = ( P1  RC4(IV, K))  ( P2  RC4(IV, K)) = P1  P2 (i.e. XOR of two plain texts) – Key-stream reuse to read encrypted traffic. Known techniques to find out P1 and P2 given P1  P2. Becomes easier with more intercepted packets using same IV value.

13 Key-stream reuse (continued…) Decryption Dictionaries – Over time attacker can build a table of key-stream corresponding to each IV (Need known plaintext). – Helped by well defined protocol structures(IP headers, login sequence,etc.) – Attacker can transmit known plaintext (e.g. spam) and intercept the cipher text to gain the key-stream. – Table size depends only on the IV length and not the key size. – Standard fixes IV size as 24 bits. – Gives a modest space requirement. E.g bytes for each of the 2^24 possible IV’s needs 24GB. – Even first few thousands IV’s table can be effective in most cases because of most PMCIA cards reset IV value to 0 when reinitialized.

14 Attacks on WEP (continued…) Message Modification – CRC is insufficient to detect message tampering (not a cryptographically secure authentication code). – Controlled modification of cipher-text possible without disrupting the checksum. – CRC is linear function i.e. c(x  y) = c(x)  c(y). – Original Cipher-text C = RC4(IV, K)  – Possible to find C’ that decrypts to a modified message M’ = M  Δ – C’ = C  = RC4(IV, K)   = RC4(IV, K)  = RC4(IV, K)  = RC4(IV, K)  – C’ decrypts to P  Δ, but with right checksum!!

15 Authentication Spoofing A challenge-response pair gives the key-stream. Challenge (Nonce- Plain Text) Response (Nonce RC4 encrypted under shared key) STA AP Decrypted nonce OK? This key-stream can be used to encrypt any subsequent challenge. Authentication Request

16 IP Redirection For decrypting a ciphertext without knowing the key. Trick the AP into decrypting ciphertext for the attacker. – Sniff an encrypted packet. – Modify the encrypted message so that the destination address is that of the attacker.(already shown that message modification is possible without any alarm.)

17 Practical Implementation of Attacks Till now we talked about retrieving the Key-stream. But is it possible to recover the secret key(Ultimate Break)?? – Fluhrer, Mantin and Shamir Attack. RC4 – Key Scheduling Algorithm, Output Generator (PRGA). Knowledge of IV and and first output byte gives information about the key bytes (called Resolved Cases). – Practical Implementation: AT&T Labs Tech Report. Passive Attack. Eased by the clear text transfer of IV. Coding for the simulated Attack < 2 hours. Full key recovered with 256 probable resolved cases. Off the shelf hardware and software to capture packets.

18 Practical Attacks (continued…) Mounting the Attack – P  C = P  (P  RC4(IV,K)) = RC4(IV,K) i.e. Key-stream. Got “P” from Encapsulation header added to IP/ARP traffic. – 5/6 *10^6 packets to recover 128 bit key.(Very practical on a busy network.) Improving the Attack – User Memorable pass-phrase used as key. Check if the decoded key byte is an ASCII, number or punctuation. Key recovered in reasonable time - Ultimate Break of WEP!!

19 Conclusions….. Assume that the link layer WEP offers no security. Use E2E higher-level security mechanisms (IPSec, SSH). Anyone within the physical range can access the network as a valid user. Other kinds of Attacks: MAC spoofing, Jamming(DoS), Insertion Attacks(Rogue AP’s). This paved the way for further research to create more secure WLAN’s.

20 Wi-Fi Protected Access(WPA) Specification from Wi-Fi Alliance(2003) – Strong, standards-based, interoperable security for today’s Wi- Fi networks. What needs to be addressed (~ flaws in WEP). – Weak User Authentication. – Weak Key Management. – Weak IV selection. – CRC is good for detecting random errors and not message tampering. – Additionally the new system should be backward compatible.

21 Security Mechanisms in WPA Authentication (and Key Management). Encryption.

22 Authentication and Key Management Based on Extensible Authentication Protocol (EAP). – Supports many flavors of EAP. – Uses existing key (temporary keys) distribution methods such as KDC, Kerberos, Needham-Shroeder. Can handle any form of user credentials. – Digital certificates, username and passwords, secure ID’s,etc. Creates a framework where client workstations mutually authenticates with the Authentication Server (4 way handshake).

23 Authentication Process Associate EAP Identity Request EAP-Success STA AP Authentication Server EAP Auth Response EAP Auth Request EAP Identity Response From IEEE: Overview of Security.

24 Session Key Distribution C ( Kc )AP s( Ks ) Authentication Server ( ~KDC ) c,s,n {Kcs,s,n}Kc AND {Kcs,c,n}Ks Kc and Ks: Long term Keys.(Only used once!!) Kcs : Session Key. (Temporary) {Kcs,c,n}Ks AND {data}Kcs

25 Encryption WPA uses Temporal Key Integrity Protocol (TKIP) – Dynamic Key (against static WEP key) distributed by Authentication Server. – Key size increased to 128 bits. – Change in WEP key requires manual work. – Already shown that intruder who collects enough encrypted data (with static WEP key) can exploit the system. – Sets up an hierarchy to generate more data encryption keys using the pair-wise key.(per packet key construction) Uses Message Integrity Check(MIC) against CRC. – Provides strong mathematical function to check msg integrity.

26 WPA Deployment. Can be installed as software upgrade on most Wi-Fi devices. – Clients require software upgrade to the NIC. Enterprise would require an authentication server. – Typically Remote Authentication Dial-In-User Service (RADIUS) Small Office and Home Office (SOHO) can use pre-shared key. – But still use strong TKIP encryption, per packet key construction. All the upgrades (transition) can happen in steps. – Allows mixed mode.(though not recommended)

27 The Future: WPA-2 Existing WPA features. – TKIP encryption. – EAP authentication Additionally use Advanced Encryption Standard(AES) for encryption. – Currently considered to be a very strong encryption algorithm. – Variable Key size of 128, 192 or 256 bits. – Drawback: Requires hardware upgrade.

28 Summary security does not meet any of its objectives. Current Work to replace. – Authentication Scheme using 802.1X (EAP) and Kerberos. – Encryption scheme using AES. – Key management using established mechanisms. Wi-Fi Alliance working on WPA2.

29 References Nikita Borisov, Ian Goldberg, David Wagner, Intercepting Mobile Communications: The Insecurity of , ACM Mobicom 2001.Intercepting Mobile Communications: The Insecurity of Adam Stubblefield, John Ioannidis, Aviel D Rubin, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, AT&T Labs Technical Report TD-4ZCPZZ, 2001.Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Wi-Fi Alliance, Wi-Fi Protected Access, 2003.Wi-Fi Protected Access

30 Questions ???