J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part I.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part II.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
IWD2243 Wireless & Mobile Security Chapter 3 : Wireless LAN Security Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Shambhu Upadhyaya Security – Key Hierarchy Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 11)
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
Chapter 6 Wireless Network Security
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
IT4833/6833 WiFi Security Building Blocks (I).
Presentation transcript:

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part I

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Outline 6.1 Wireless Communications and WLAN Standards 6.2 WEP: Wired Equivalent Privacy 6.3 WPA: Wi-Fi Protected Access 6.4 IEEE i/WPA2 6.5 Bluetooth Security 6.6 Wireless Mesh Network Security

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Overview Radio based communication, open air The attacker, having a radio transmitter and receiver with the same radio frequency of the underlying wireless network, can easily:  Intercept wireless data  Connect his computing devices to a nearby wireless network  Inject new packets to an existing wireless network  Jam a particular wireless channel using a jamming device Security measures  Implement encryption algorithms, authentication algorithms, and integrity-check algorithms at the data-link layer  Provide network access with wired equivalent privacy  Higher-layer protocols and applications can be used without any modification

J. Wang. Computer Network Security Theory and Practice. Springer 2008 WLAN Architecture Two types of architecture  Infrastructure: Attach to a wired infrastructure  Ad hoc (peer-to-peer): not attach to any fixed infrastructure Mobile station is referred to as STA  Each STA in the IEEE standard is identified by a 48-bit MAC address Wireless access point (WAP)  One end: a wired link connected to a wired LAN  The other end: a radio transmitter and receiver to establish radio connections between the AP and STAs  Each AP is associated with a Service Set Identifier (SSID)

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Infrastructure WLANs Beaconing: AP announces regularly its SSID and other info for an STA to connect to it Scanning: STA waits for a beacon and joins a WLAN by sending a request to the corresponding AP with the AP’s SSID

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Ad Hoc WLANs Formed without wired infrastructure Doesn’t use APs An STA may communicate with another STA directly within communication range Can use multiple STA’s to extend communication range

J. Wang. Computer Network Security Theory and Practice. Springer Essentials is the wireless counterpart of (Ethernet) & (Token Ring) It specifies communications and security mechanisms for WLAN at the MAC sublayer and at the physical layer Commonly-used sub protocols:  a: 5 Ghz  b: 2.4 Ghz, 11Mbps, 35m indoor, 110m outdoor, WEP  g: 2.4 Ghz, 54Mbps  i: WPA2  n: supports MIMO

J. Wang. Computer Network Security Theory and Practice. Springer 2008 A schematic of the IEEE 802 family Schematic of the 802 Suite

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Wireless Communication Weaknesses Wireless communications could be easily sniffed Radio signals could be easily disturbed or injected to the network Wireless hand-held computing devices and embedded systems may not have sufficient computing resources or power supply to carry out complex computations

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Wireless Security Vulnerabilities Eavesdropping attack Denial-of-service attack Message-reply attack STA-spoofing attack AP-spoofing attack

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Outline 6.1 Wireless Communications and WLAN Standards 6.2 WEP: Wired Equivalent Privacy 6.3 WPA: Wi-Fi Protected Access 6.4 IEEE i/WPA2 6.5 Bluetooth Security 6.6 Wireless Mesh Network Security

J. Wang. Computer Network Security Theory and Practice. Springer 2008 WEP Overview Published in 1999, WEP is the security component at the data-link layer of b Requirements: All STA’s and AP’s in the same WLAN have to share the same secret key K (called the WEP key) WEP Key:  40-bit, 104-bit (most common), 232-bit  WLAN devices may share multiple WEP keys, identified by a one-byte key ID (keyID)  WEP keys are often selected by administrator  Once installed, WEP keys will not change

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Device Authentication and Access Control WEP uses a simple challenge-response authentication To get access to an AP, an STA does the following: 1.Request: STA sends a request for connection to the AP 2.Challenge: AP generates 128-bit pseudorandom string cha and sends it to STA cha = a 1 a 2 …a 16 (where each a i is an 8-bit string) 3.Response: STA generates a 24-bit IV V and encrypts cha using RC4 with key V||K and sends res to AP r i = a i  k i, for i = 1,2,…,16 res = V || r 1 r 2 …r 16 4.Verification: AP applies RC4 on V||K to generate the same sub keys, computes a i ’=r i  k i and verifies a i ’ = a i for i = 1,2,…,16, and grants connection if true

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Data Integrity Check Goal: to ensure that packets are not modified or injected by non- legitimate STAs WEP uses the CRC-32 value of M as its ICV  CRC-32 is common network technique to detect transmission errors Simple Algorithm for CRC is  and bit shifting  Can be easily implemented on a chip To get a k-bit CRC value:  M : an n-bit binary string  P : a binary polynomial of degree k, yielding a ( k+1 )-bit binary string  Divide M0 k by P to obtain a k -bit remainder CRC k ( M ) If M||CRC k (M) is not divisible by P, it implies that M has been modified

J. Wang. Computer Network Security Theory and Practice. Springer 2008 LLC Frame Encryption Encryption done at MAC layer encrypting LLC frames, 3 step process  Let M be a LLC frame: M || CRC 32 (M) = m 1 m 2 ….m l  Sender first generates a 24-bit initialization vector V, then uses RC4 on input V||K to generate a sequence of 8-bit sub-keys: c i = m i  k i  Sender’s MAC sublayer adds a header to the payload V || KeyID || c 1 c 2 …c l  General form of this encryption: C = ((M || CRC 32 (M))  RC4(V||K)) b hdrIVkeyIDdataICV RC4 encrypted

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Security Flaws of WEP Authentication Flaws: The challenge-response authentication scheme is vulnerable to the known-plaintext attack because of the exclusive-or operation Example:  Malice can intercept the challenge response pair (cha, res) between AP & a legitimate STA.  She calculates k i =c i  r i for i=1,2,…,16  She sends a request to the AP and waits for challenge string cha’  She then generates the response message res’ using the keys calculated above and sends res’ and the previously captured IV V to AP  According to the WEP protocol, AP applies RC4 to V||K, generates the same sub-key stream k 1, k 2, k 3,… k 16, verifies k i  res’ = cha’, and authenticates Malice’s device

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Integrity Check Flaws: CRC weaknesses  CRC is linear: CRC (x  y) = CRC(x)  CRC(y)  The linearity allows the attacker to modify a message without changing its CRC  CRC does not use secret keys, which allows the attacker to inject new messages Message Tempering Message injections Fragmentation attacks Security Flaws of WEP

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Message Tampering: Alice sends to Bob: C = (M|| CRC 32 (M))  RC4(V||K) Malice intercepts and modifies C as follows, with a desired new string Γ: C’ = (Γ || CRC 32 (Γ)  C Bob receives a new message M’ = Γ  M with the correct ICV of CRC 32 (M’): Security Flaws of WEP

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Message Injection: Suppose (M,C) is known and V is the initialization vector for generating C Then (M  C) yields the key stream for encrypting M (i.e., sub-keys generated from RC4(V||K) ) Let Θ be any message Malice wants to inject to the network Note that V is transmitted in plaintext Malice computes CRC 32 (Θ) and injects V||(Θ|| CRC 32 (Θ))  RC4(V||K) if V is reused, the message above can be authenticated Security Flaws of WEP

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Fragmentation Attacks: Take advantage of LLC frame header to inject new messages  LLC frame Has eight fixed values  Attacker obtains eight sub keys using XOR Attacker’s tricks:  Inject 64-byte LLC by segmenting the LLC frame up to 16 segments into 4-byte fragment  Use V and the sub-key stream k 1, k 2, …, k 8 to encrypt 4 byte fragments and the 4-byte integrity check value  Put it to a MAC frame and inject it to network Security Flaws of WEP

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Confidentiality flaws Repeating Initialization Vectors  A 24 -bit IV allows 16,777,216 different sub-key streams  However, it follows from the Birthday Paradox that repetition occurs with probability > ½ in 1.24 √2 24 = 5102 frames RC4 weak keys  WEP keys can often be learned from weak V ’s  A number of WEP cracking software tools based on the FMS attack Security Flaws of WEP

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Outline 6.1 Wireless Communications and WLAN Standards 6.2 WEP: Wired Equivalent Privacy 6.3 WPA: Wi-Fi Protected Access 6.4 IEEE i/WPA2 6.5 Bluetooth Security 6.6 Wireless Mesh Network Security

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Published in 2003 by the Wi-Fi Alliance Based on an early version (draft 3) of the IEEE i standard Three major objectives:  Correct all the security flaws in WEP  Make existing WEP hardware also support WPA  Ensure WPA is compatible with the i standard Use 802.1X for authentication Temporal Key Integrity Protocol (TKIP):  Use Michael Algorithm, a specifically designed integrity check algorithm  Use a new key structure to prevent message replays and de-correlate public initialization vectors from weak RC4 keys WPA Overview

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Home-and-small-office WPA:  For home and small office  Use WEP’s preset secret key Enterprise WPA:  Secure corporate WLANs  Uses Authentication Server (AS)  Different user has different pre-shared secret key with the AS  Pre shared secrets are presented in the form of passwords  Adopts 802.1X Port Based Network Access Control protocol to authenticate STAs Device Authentication and Access Control

J. Wang. Computer Network Security Theory and Practice. Springer STA sends a request to AP. AP asks for the identity of STA. 2. STA sends AP its identity and signature using the master key shared with the AS. AS verifies STA and passes decision to AP. AP then informs STA about AS’s decision. 3. STA is granted access to WLAN X in a Nutshell

J. Wang. Computer Network Security Theory and Practice. Springer 2008 AS first generates a 256-bit pairwise master key (PMK)  AS sends PMK to AP using pre-shared secret key between AS and AP  AP sends PMK to STA using pre-shared secret key between AP and STA For each new session, based on PMK and other info, TKIP generates four 128-bit secret pairwise transient keys (PTK):  Data Encryption Key: for data encryption  Data MIC key: for data integrity checks  EAPoL key: for Extensible Authentication Protocol Over LAN (EAPoL) encryption  EAPoL MIC key: for EAPoL integrity checks TKIP Key Generation

J. Wang. Computer Network Security Theory and Practice. Springer 2008 TKIP uses 4 ways handshakes to exchange Pairwise Transient Keys (PTK). 1. AP sends ANonce to STA Message 1 = (AMAC, Anonce, sn) 2. STA sends SNonce to AP Message 2 = (SMAC,Snonce,sn) || MIC(Snonce,sn) || RSNIE STA 3. AP acknowledges STA. Message 3 = (AMAC, Anonce,sn+1) || MIC(Anonce,sn+1) || RSNIE AP 4. STA acknowledges AP Message 4 = (SMAC,sn+1) || MIC(sn+1) 4 Ways Handshakes

J. Wang. Computer Network Security Theory and Practice. Springer 2008 TKIP Message Integrity Code It uses the Michael algorithm to generate Message Integrity Code (MIC) Creates a 64-bit message authentication code using a 64- bit secret key K K: a 64-bit secret key divided into two halves K 0 and K 1 of equal length Michael Algorithm generates MIC for M using K as follow: (L 1,R 1 ) = (K 0,K 1 ), (L i+1,R i+1 ) = F(L i XOR M i, R i ) i = 1,2,…,n MIC = L n+1 R n+1 Where F is Feistel type of substitution Then F(l,r) is defined as follow: r 0 = r. l 0 = l, r 1 = r 0 xor (l 0 <<< 17) l 1 = l 0 xor 32 r 1, r 2 = r 1 xor XSWAP( l 1 ), l 2 = l 1 xor 32 r 2, r 3 = r 2 xor ( l 2 <<< 3), l 3 = l 2 xor 32 r 3, r 4 = r 3 xor ( l 2 >>> 2), l 4 = l 3 xor 32 r 4, F(l, r) = (l 4, r 4 ) XSWAP(l) swaps the left-half of l with the right-half of l More secure than CRC 32

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Attacker creates a message and attaches a 64-bit binary string as a MIC and tries to find the correct MIC without knowing the secret key  Tries all 2 64 to find the correct MIC  Uses a differential cryptanalysis attack which requires 2 29 tries Solution to the problem:  STA deletes its keys and disengages with AP when two failed forgeries are detected within a second Michael Algorithm Vulnerability

J. Wang. Computer Network Security Theory and Practice. Springer 2008 Generates a per-frame key using a key mixing algorithm for each frame.  Uses a 48-bit IV V divided into three 16-bit blocks V 2, V 1, V 0  Consist of two mixing phases pk 1 = mix 1 (a t, V 2 V 1, k t ), pk 2 = mix 2 (pk 1, V 0, k t ), Where a t is the 48-bit MAC address of the transmitter k t is the 128-bit data encryption of the transmitter pk 2 is a 128-bit per-frame key for RC4  Uses Two S-boxes S0 and S1 to substitute a 16-bit string with a 16- bit string. S(X) = S 1 (X 1 ) S 0 (X 0 ) Where X = X 1 X 0 TKIP Key Mixing

J. Wang. Computer Network Security Theory and Practice. Springer 2008 WPA Encryption

J. Wang. Computer Network Security Theory and Practice. Springer 2008 WPA Security Strength and Weakness Superior to WEP Vulnerable to DoS attack:  After computing MIC of M, WPA encrypts fragments of M || ICV(M) to F 1, F 2, …  For each F i, WPA generates a 48-bit IV V i to create a WEP IV and WEP key  IV is transmitted in plaintext, the attack may intercept an MAC frame and replace the IV with a larger value.  The encrypted frame will be discarded for incorrect decryption  A legitimate MAC frame arrives later will be rejected for the IV has been used