Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
1 Chapter Overview Wireless Technologies Wireless Security.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Xiuzhen Cheng Xiuzhen Cheng Csci388 Wireless and Mobile Security – Temporal Key Integrity Protocol.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Wireless Security Ian Bodley.
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Presentation transcript:

Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp

Outline  Why Wireless?  Overview Security in Wirelss Networking  WEP  Authentication  Integrity  Encryptions  Off Standard: Access Control List  Attacks  Future Solution

Wireless?  Wire: Limited by power and LAN cable  Mobility  unwire  Laptop & Wireless  Simple Installation  Convenience to use  Cost of equipment  Popularity

Wireless Standards  IEEE b  11Mbps 2.4Ghz band Unlicensed, 1999  IEEE a  54Mbps, 5Ghz band Licensed  IEEE g  54Mbps 2.4Ghz band Unlicensed, 2003  IEEE i: (Amendment)

Overview Wireless  Wi-Fi : Wireless Fidelity  Hotspot: Where you can have Wi-Fi access  Two types of Wireless Networking  ad hoc: meeting or conference (no internet)  Infrastructure: base station & clients  Connect to external Network (Internet)  Needs: Access point and/or Wireless NIC

Overview Security in Wireless Protocol: WEP Authentication (challenge & Response) Integrity: CRC-32 Encryption: Stream cipher, RC4, with IV

WEP  Wired Equivalent Privacy Protocol  Security behind the Wi-Fi  Designed to encrypt and decrypt data for Wi-Fi  Disable or 40 bit keys or 104 bit keys  Uses RC4 encryption algorithm  64 bits for RC4 keys or none  40 bits for WEP key & 24 bits for IV

Authentication in WEP  Open & Shared Key  Picture from Mark Stamp  Problem: Know Plaintext Attack Nonce N E(N, K A-B ) Request for shared key auth. Authentication response Alice Bob (base station)

Access Control List (not in WEP)  Created by Vendors, not in Family  Identity Problem: Who you are?  Based on the shared Key?  Only one shared Key  Access List: a list of MAC addresses  Failure: MAC addresses can be modifiable  Open source device drivers

Encryption in WEP  IV + Secret Key XOR Plaintext  IV is only 24 bits, too short  40 bits for WEP is still too short  Remember: The other 64 bits for RC4  Given P1 = P2 then C1 = C2  No session Key, One key for all operations  Encryption and Decryption  Access point & Users

Integrity in WEP  No protect against replays  (No sequence Number in Packet)  CRC-32 checksum is not good enough for integrity in experiment  High Possibility of Collision

Key Management in WEP  No key distribution systems   Static Key and the same key for everything  Manually Enter the secret key in Both sides  Not practice, is often ignored

Attacks in WEP  Numerous Attacks since 2001  Fluhrer-Mantin-Shamir (FMS) attacks  Publicly Released the tools to attack WEP  Off-the-Shelf Hardware and Software  Impossible to detect  Only a couple of hours

Solution: IEEE i  A Future Standard for Wi-Fi  IEEE i still Amendment  Two new Protocols to address above issues  New key management: IEEE802.1X  Short Term Solution: TKIP  Long Term Solution: CCMP

TKIP  Temporal Key Integrity Protocol  No new hardware required but  firmware upgrade & driver upgrade  Three element:  A message integrity code  A packet sequencing  A per-packet key mixing function  128-bit Encryption, 64-bit Authentication

CCMP  Counter-Mode-CBC-MAC Protocol  New Protocol in i  required new hardware  Many properties similar to TKIP  Free from constraints of existed Hardware  RC4 replaced by AES  AES 128-bit, 48-bit IV, no per-packet key  Fix all well known WEP flaws

The End  Good-bye