Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.

Slides:



Advertisements
Similar presentations
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Advertisements

© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
IPsec Internet Headquarters Branch Office SA R1 R2
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Wireless Network Security Issues By Advait Kothare SJSU CS265 Fall 2004.
& WEP Tzachy Reinman System and Network Security Course
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Security.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
CSC-682 Advanced Computer Security
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
Stream Cipher July 2011.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
WEP & WPA Mandy Kershishnik.
Wireless Security Ian Bodley.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 8: IEEE Security - 1 Dr. Kemal Akkaya

Kemal AkkayaWireless & Network Security 2 Management Messages in IEEE  Authentication frame:  authentication is a process whereby the access point either accepts or rejects the identity of a radio NIC.  Deauthentication frame:  A station sends a deauthentication frame to another station if it wishes to terminate secure communications.  Association request frame:  association enables the AP to allocate resources for and synchronize with a radio NIC.  Association response frame:  An AP sends an association response frame containing an acceptance or rejection notice to the radio NIC requesting association.  Reassociation request frame:  If a radio NIC roams away from the currently associated access point and finds another AP having a stronger beacon signal, the radio NIC will send a reassociation frame to the new AP.  Reassociation response frame:  An AP sends a reassociation response frame containing an acceptance or rejection notice to the radio NIC requesting reassociation.  Disassociation frame:  A station sends a disassociation frame to another station if it wishes to terminate the association.  Beacon frame:  The AP periodically sends a beacon frame to announce its presence and relay information, such as timestamp, SSID, and other parameters regarding the AP to radio NICs that are within range.  Probe request frame:  A station sends a probe request frame when it needs to obtain information from another station.  Probe response frame:  A station will respond with a probe response frame, containing capability information, supported data rates, etc., when after it receives a probe request frame.

Kemal AkkayaWireless & Network Security 3 IEEE Security  Probe: Look for a (better) AP  Authentication: Getting permission to access the AP  Association: Register with the AP  Data Flow: Encrypted messages Encrypted data messages

Kemal AkkayaWireless & Network Security 4 Wired Equivalent Privacy (WEP)  Primary built security for protocol  Intended to make wireless as secure as a wired network  Uses RC4 Algorithm  Provides  Confidentiality: Encrypts data Through symmetric encryption using RC4 with a shared key  Integrity: Data received are the data sent Through message check sum using encrypted cyclic redundancy check (CRC)  Authentication: AP only allows authorized stations to associate Through challenge/response

Kemal AkkayaWireless & Network Security 5 RC4  Sender calculates Integrity Check Value (ICV) over data  four-byte hash/CRC for data integrity  Each side has 104-bit shared key  Sender creates 24-bit initialization vector (IV), appends to key: gives 128-bit key  Sender also appends keyID (in 8-bit field)  128-bit key inputted into pseudo random number generator to get keystream  Data in frame + ICV is encrypted with RC4:  Bytes of keystream are XORed with bytes of data & ICV  IV & keyID are appended to encrypted data to create payload  Payload inserted into frame encrypted dataICVIV MAC payload Key ID

Kemal AkkayaWireless & Network Security 6 RC4 Encryption Process

Kemal AkkayaWireless & Network Security 7 Authentication with the Access Point  AP has two ways of initiating communication with a client  Shared Key  Open Key  Open key allows anyone to start a conversation with AP  No authentication  Shared Key is supposed to add an extra layer of security by requiring authentication info as soon as one associates  Shared Key Authentication  Client begins by sending an association request to the AP  AP responds with a challenge text (unencrypted)  Client, using the proper key, encrypts text and sends it back to the AP  If properly encrypted, AP allows communication with the client  Not secure!: Using passive sniffing, one can gather 2 of the three variables needed in Shared Key authentication: challenge text and the encrypted challenge text

Kemal AkkayaWireless & Network Security 8 Pros & Cons  Pros  Easy computation Fast – 10 times faster than DES Can use large bit blocks and keys  Stream based encryption  Key can be made to change at regular intervals using fancy programming  Implementation in Popular languages (C, perl) well documented.  Cons  Vulnerable to brute force attacks  Require a large data structure  Proven Breakable by researchers at ATT and Rice Univ. (August, 2001) “One hour of brute force computation to break standard WEP”  Once Key is broken all messages are easily readable.

Kemal AkkayaWireless & Network Security 9 Problems with WEP  1 static key  No encryption is strong if one key is used forever  Key length is short  Brute forcing is possible  Using CRC32 in ICV  Bit flipping attack: CRC(msg XOR delta) = CRC(M) XOR CRC(delta)  Bits cannot set or cleared, but could be flipped  No specification on key distribution  Lacks scalability  No protection against replay attack  Improper RC4 implementation  Protocol doesn’t actually specify IV’s use  2 existing attacks Numerical limitation FMS attack

Kemal AkkayaWireless & Network Security 10 Attacks  Numerical Limitation Attack  IV’s are only 24bit, and thus there are only 16,777,216 possible IV’s  A busy network will repeat IV’s often  By listening to the encrypted traffic and picking out the duplicate IV’s, it is possible to obtain the clear text  FMS Attack -- weak IV attack --  Some IV’s do not work well with RC4  Using a formula, one can take these weak IV and infer parts of the WEP key 5 % chance of guessing correctly  Once again, passively monitoring the network for a few hours can be enough time to gather enough weak IV’s to figure out the WEP key  4M ~ 6M packets to decrypt 40bit WEP key  The time needed to deploy the attack is linearly proportional to the key length 104bit key is just as useless as 40bits key  A lot of other attacks…

Kemal AkkayaWireless & Network Security 11 Conclusion: WEP  Confidentiality  FMS attack  Integrity  Bit-flipping attack  Authentication  Non existent  WEP is flawed by a technology weakness, and there is no simple solution to fix it  Attacks against WEP are passive and extremely difficult to detect NO MORE WEP