Overview of IEEE 802.16 Security Advisor: Dr. Kai-Wei Ke Speaker: Yen-Jen Chen Date: 03/26/2007.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Security Issues in Mobile WiMAX(IEEE e) Frank, A Ibikunle Covenant University, Electrical and Information Engineering Department, Ota IEEE.
Security in e 1. Outline  e Security Introduction  e Network Architecture  Security Architecture  X.509 cerf.  PKMv1  RSA Authentication.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
WiMAX CS441 Dr. Kemal Akkaya 12/8/2011 By: Chun-Cheng Chuang.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
& WEP Tzachy Reinman System and Network Security Course
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
IEEE Wireless Local Area Networks (WLAN’s).
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
1 Security in d and e Advisor: Dr. Kai-Wei Ke Speaker: Yen-Jen Chen Date: 03/04/2008.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
WMAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE family of standards Protocol layering TDD frame.
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
Vulnerabilities Prasad Narayana, Yao Zhao, Yan Chen, Judy Fu (Motorola Labs) Lab for Internet & Security Tech, Northwestern Univ.
WiMax Security Introduction About WiMax WiMax security
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
CSCE 715: Network Systems Security
WEP Protocol Weaknesses and Vulnerabilities
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
11 WiMAX 安全子層於嵌入式系統下之 探討與實現 Speaker: Yen-Jen Chen ( 陳燕仁 ) Advisor: Dr. Kai-Wei Ke ( 柯開維 博士 ) Date: 07/28/2008 The research and implementation of WiMAX.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Sunday, December 20, 2015 ARCHITECTURE OF A SERVER- AIDED SIGNATURE SERVICE (SASS) FOR MOBILE NETWORKS Source: P. Lorenz and P. Dini (Eds.): ICN 2005,
WiMax/ Threat Analysis Michel Barbeau ACM Q2SWinet Oct 2006 Ji, Sung-bae.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
802.16: WiMAX A World Without Wires Presented by Eric Goldman 1 – First Published May 2007.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
整合 Wi-Fi 和 WiMAX 之無線網路管理系統 Wireless Network Management System for Wi-Fi and WiMAX Integrated Networks 報告人:李建毅 指導教授:周立德 教授 國立中央大學資工系.
Wireless Networks Spring 2007 WiMAX: Broadband Wireless Access.
History and Implementation of the IEEE 802 Security Architecture
IEEE WiMAX.
Security Of Wireless Sensor Networks
WiMAX: Broadband Wireless Access
Security of Wireless Sensor Networks
WiMAX安全子層於嵌入式系統下之探討與實現
Counter With Cipher Block Chaining-MAC
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

Overview of IEEE Security Advisor: Dr. Kai-Wei Ke Speaker: Yen-Jen Chen Date: 03/26/2007

Outline Introduction to IEEE IEEE Security Architecture IEEE Security Issues IEEE Security Flaws Conclusion References

Introduction to IEEE

IEEE WiMAX For the wide area( ranging up to 50 Km) Last mile connectively Provide the higher speed connectively for the data, voice and video(32-134Mbps) Low cast

IEEE WiMAX

Comparing Technologies WiFi WiMAX Mobile-FI UMTS 3G Bandwidth Mbps sharedShare up to 70 Mbps Up to 1.5 Mbps each 384 Kbps – 2 Mbps Range (LOS) Range (NLOS) 100 meters 30 meters 30 – 50 km km (’07) 3 – 8 km Coverage is overlaid on wireless infrastructure Mobility PortableFixed (Mobile - 16e)Full mobility Frequency/ Spectrum 2.4 GHz for b/g 5.2 GHz for a 2-11 GHz for a GHz for <3.5 GHz Existing wireless spectrum Standardization a, b and g standardized , a and REVd standardized, other under development in development Part of GSM standard Backers Industry-wide Intel, Fujitsu, Alcatel, Siemens, BT, AT&T, Qwest, McCaw Cisco, Motorola, Qualcom and Flarion GSM Wireless Industry

IEEE Security Architecture

MAC Protocol Stack

MAC CS Sub-layer ● CS Layer: Receives data from higher layers Classifies the packet Forwards frames to CPS layer

MAC CPS Sub-layer ● Performs typical MAC functions such as addressing Each SS assigned 48-bit MAC address Connection Identifiers used as primary address after initialization ● MAC policy determined by direction of transmission Uplink is DAMA-TDM Downlink is TDM ● Data encapsulated in a common format facilitating interoperability Fragment or pack frames as needed Changes transparent to receiver

MAC Privacy Sub-layer ● Provides secure communication Data encrypted with cipher clock chaining mode of DES ● Prevents theft of service SSs authenticated by BS using key management protocol

IEEE Security Architecture

IEEE Security Issues

WMAN Threat Model PHY threats Water torture attack, jammings No protection under MAC threats Typical threats of any wireless network Sniffing, Masquerading, Content modification, Rouge Base Stations, DoS attacks, etc

IEEE Security Model DOCSIS (Data Over Cable Service Interface Specifications) Assumption : All equipments are controlled by the service provider. Flaw : May not be suitable for wireless environment. Connection oriented (e.g. basic CID, SAID) Connection Management connection Transport connection Identified by connection ID (CID) Security Association (SA) Cryptographic suite (i.e. encryption algorithm) Security info. (i.e. key, IV) Identified by SAID

Security Association Data SA 16-bit SA identifier Cipher to protect data: DES-CBC 2 TEK TEK key identifier (2-bit) TEK lifetime 64-bit IV Authorization SA X.509 certificate  SS 160-bit authorization key (AK) 4-bit AK identification tag Lifetime of AK KEK for distribution of TEK = Truncate-128(SHA1(((AK| 0 44 ) xor ) Downlink HMAC key = SHA1((AK|0 44 ) xor 3A 64 ) Uplink HMAC key = SHA1((AK|0 44 ) xor 5C 64 ) A list of authorized data SAs

X.509 certificate

Security Association BS use the X.509 certificate from SS to authenticate. No BS authentication Negotiate security capabilities between BS and SS Authentication Key (AK) exchange AK serves as authorization token AK is encrypted using public key cryptography Authentication is done when both SS and BS possess AK

IEEE Security Process

Authentication SS →BS: Cert(Manufacturer(SS)) SS →BS: Cert(SS) | Capabilities | SAID BS →SS: RSA-Encrypt(PubKey(SS), AK) | Lifetime | SeqNo | SAIDList Key lifetime: 1 to 70 days, usually 7days

Authorization state machine flow diagram

Authorization FSM state transition matrix

Data Key Exchange Data encryption requires data key called Transport Encryption key (TEK). TEK is generated by BS randomly TEK is encrypted with Triple-DES (use 128 bits KEK) RSA (use SS ’ s public key) AES (use 128 bits KEK) Key Exchange message is authenticated by HMAC-SHA1 – (provides Message Integrity and AK confirmation)

Key Derivation KEK = Truncate-128(SHA1(((AK| 0 44 ) xor ) Downlink HMAC key = SHA1((AK|0 44 ) xor 3A 64 ) Uplink HMAC key = SHA1((AK|0 44 ) xor 5C 64 )

Data Key Exchange

Data Encryption

Encrypt only data message not management message DES in CBC Mode 56 bit DES key (TEK) No Message Integrity Detection No Replay Protection

Data Encryption

IEEE Security Flaws

Lack of Explicit Definitions Authorization SA not explicitly defined SA instances not distinguished: open to replay attacks Solution: Need to add nonces from BS and SS to the authorization SA Data SA treats 2-bit key as circular buffer Attacker can interject reused TEKs SAID: 2 bits  at least 12 bits (AK lasts 70 days while TEK lasts for 30 minutes) TEKs need expiration due to DES-CBC mode Determine the period: can safely produce 2^32 64-bit blocks only.

IEEE Security Flaws Lack of the mutual authentication Authentication is one way BS authenticates SS No way for SS to authenticate BS Rouge BS  possible because all information's are public Possible enhancement : BS certificate Limited authentication method – SS certification

IEEE Security Flaws Authentication Key (AK) generation BS generates AK No contribution from SS SS must trust BS for the generation of AK

IEEE Security Flaws Data protection errors 56-bit DES … does not offer strong data confidentiality( Brute force attack) Uses a PREDICTABLE initialization vector (while DES- CBC requires a random IV) CBC-IV = [IV Parameter from TEK exchange]XOR [ PHY Synchronization field] Chosen Plaintext Attack to recover the original plaintext Generates each per-frame IV randomly and inserts into the payload. Though increases overhead, no other choice.

IEEE Security Flaws No Message Integrity Detection, No replay protection Active attack AES in CCM Mode 128 bit key (TEK) Message Integrity Check Replay Protection using Packet Number

Conclusion

WiMAX PKM Protocol SS BS 認證資訊 (authentication information) X.509 certificate 授權請求 (authorization request) X.509 certificate, capability, Basic CID 1. 確認 SS 身分 2. 產生 AK, 並用憑證中 的 public key 將之加密 授權答覆 (authorization reply) encrypted AK, SAIDs, SQN AK,… AK exchange 密鑰請求 (key request) SAID, HMAC-Digest,… 密鑰答覆 (key reply) encrypted TEK, CBC IV, HMAC-Digest,… 將 AK 解開 1. 利用 SHA 演算法驗證 HMAC-Digest 2. 產生 TEK 3. 由 AK 產生 KEK 用以 加密 TEK 1. 利用 SHA 驗證 HMAC-Digest 2. 由 AK 計算出 KEK 以解開 TEK 資料交換 ( 利用 TEK 加密 ) TEK exchange ( 每一個資料傳輸連 線都必須先做此動作 ) HMAC-Digest :用以驗證資料的完整性

Conclusion It need the bidirectional authorization Require more flexible authentication method EAP Authentication Improve Key derivation Include the system identity (i.e., SSID) Key freshness – include random number from both SS and BS Prefer AES to DES for data encryption

References IEEE Std standard for the local and metropolitan Area Networks,part 16 “ ZAir interface for Fixed BroadBand Wireless Access Systems, ” IEEE Press, 2001 IEEE Std (Revision of IEEE Std ) Johnson, David and Walker, Jesse of Intel (2004), “ Overview of IEEE Security ”,published by the IEEE computer society