KIRAN CHAMARTHI NETWORK SECURITY

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Mobile and Wireless Communication Security By Jason Gratto.
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Port Based Network Access Control
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
History and Implementation of the IEEE 802 Security Architecture
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
On and Off Premise Secure Access
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

KIRAN CHAMARTHI NETWORK SECURITY WIRELESS LAN SECURITY KIRAN CHAMARTHI NETWORK SECURITY

Definition WLAN is a local area network that uses radio communication to provide mobility to the network users, while maintaining the connectivity to the wired network. A WLAN typically extends an existing wired local area network. WLANs are built by attaching a device called the access point (AP) to the edge of the wired network. Clients communicate with the AP using a wireless network adapter which is similar in function to a traditional Ethernet adapter.

What is Access Point? WLAN transmits over the air by using the radio waves that travel between the client and the access point. Wireless access points (APs or WAPs) are specially configured nodes on wireless local area networks (WLANs). Access points act as a central transmitter and receiver of WLAN radio signals.

What is BSS? WLAN uses spread spectrum technology that is based on radio waves to enable communication between devices in a limited area, also known as Basic Service Set. Network security remains an important issue for WLANs. Random wireless clients must usually be prohibited from joining the WLAN.

Standard for Wireless LAN The IEEE standard which describes wireless LAN is 802.11 Evolution of WLAN Security:- 1997 the original 802.11 standard only offers - SSID (Service Set Identifier) - MAC Filtering (Media Access Control) - and WEP (Wired Equivalent Privacy) 1999 several industry players forms WECA (Wireless Ethernet Compatibility Alliance) for rapid adaption of 802.11 network products. 2001 Fluhrer, Mantin and Shamir had identified some weaknesses in WEP. IEEE started Task Group i. 2002 WECA was renamed as WI-FI

2003 Wi-Fi introduced the Wi-Fi Protected Access (WPA) 2003 Wi-Fi introduced the Wi-Fi Protected Access (WPA). - Should be an interim solution for the weakness of WEP. 2004 The WPA2 was introduced. - It based on the final IEEE 802.11i standard.

Components Wireless Access Point Wireless Network Card Wireless Bridge Antenna

Wireless Access Point An AP is often a hardware device (but it can also be software based) that connects wireless communication devices. WAP is used to relay the data between wireless networks and wired network devices and other wired network resources. AP is a two-way transceiver that broadcasts data within a specific frequency spectrum. AP also performs security functions such as authentication and encryption for the wireless clients and data transmission through the wireless network.

Wireless Network Card(NIC) A device such as a workstation or laptop requires a NIC to connect to the wireless network through radio waves. The NIC scans the available frequency spectrum for connectivity and associates the spectrum to an AP.

Wireless Bridge They are optional components that are used to connect multiple LANs at the MAC – layer level. They can be used in building-to-building wireless scenario, because they can cover longer distances.

Antenna The function of an antenna is to radiate the modulated signal through the air so that wireless clients can send and receive transmissions. They are required on both AP and the wireless client.

WLAN Security The Security of WLAN can be divided into two main components: Authentication:- Strong authentication mechanisms enforce access control policy to allow authorized users to connect to the wireless network. Encryption:- Data encryption helps ensure that only authorized recipients understand the transmitted data.

Features to Secure WLAN SSID MAC Authentication Client Authentication Static WEP WPA, WPA2 and 802.11i 802.1x and EAP WLAN NAC WLAN IPS VPN IPsec

Service Set Identifiers SSID is an arbitrary ID or name for a wireless LAN network that logically segment the subsystem i.e. an SSID is used to identify WLAN network and provide access for a device to join the network. Although SSID does not act as security mechanism to provide data privacy or authentication , it can be used to prevent unauthorized access to clients that do not have a valid SSID to connect. So in order to get configured to WLAN each client should be configured with the correct SSID.

MAC Authentication MAC authentication allows the network access to known MAC addresses. The access point verifies the client MAC address against a locally configured list of allowed addresses or against an external authentication server. Access points can be preconfigured with all the wireless client MAC addresses in the MAC table that is maintained on the access point. When a client requests association to the access point, the MAC table is checked, and if the MAC address of the client matches, the authentication is successful. The client is associated to the access point and can transmit data through the AP. Note that the MAC authentication feature can be easily circumvented by using a MAC spoofing technique.

Client Authentication 802.11 support following Client authentication mechanisms : Open Authentication:- -authenticates anyone who requests it. -provides a null authentication process. -In addition to an SSID , open authentication can be implemented to provide an additional layer to the access control on the access point. Open authentication involves WEP keys which allow authorized clients with correct WEP key to associate with access points and transmit data. Initiator Responder Authentication request Authentication response

Shared – key authentication:-Shared key authentication is similar to Open authentication in which it uses a WEP key along with SSID, but in this case the access point sends the client a challenge packet. The client replies to the challenge packet by encrypting with its WEP key. Initiator Responder Authentication request “challange“ text string WEP encryption of challange text WEP decryption of encrypted text „challange“ text string Encrypted with shared key Positive / negative response based on decryption result

Static Wired Equivalent Privacy (WEP) A Static WEP key is composed of either 40 or 128 bits that is statically defined by the user on the access point and on all the individual wireless clients that need to associate with access point. This approach is not scalable because it requires entering the static WEP key on each wireless device in the WLAN network. Vulnerability:- WEP key can be sniffed using tools such as AirSnort and deciphered. In this case the attacker must capture enough packets with a weak initialization vector to computationally compute the WEP key. In order to mitigate the WEP vulnerabilities the IEEE developed an enhancement standard 802.11i and included two encryption enhancements. Temporal Key Integrity Protocol(TKIP) Advanced Encryption Standard (AES – CCMP)

WPA WPA stands for Wi-Fi protected Access . It is a standard security solution from the Wi-Fi Alliance that addresses all known WEP vulnerabilities in the original IEEE 802.11 security implementation and provides protection from WLAN attacks. Wi-Fi Protected Access (WPA and WPA2) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless. WPA uses Temporal Key Integrity Protocol (TKIP) for encryption based on RC4 algorithm . WPA supports the pre shared key (PSK) and IEEE 802.1x/EAP modes of operation for authentication.

WPA2 WPA2 is the next generation of wireless security. WPA2 provides a stronger encryption algorithm stronger mechanism through AES encryption algorithm. WPA and WPA2 have two operation modes:- Personal mode – PSK mode of operation for authentication is used. What is a PSK mode? Enterprise mode – Supports PSK and IEEE 802.1x/EAP modes of operation for Authentication. WPA and WPA2 standard adopts the EAP method types for authentication.

802.1x and EAP IBNS extends network security based on the 802.1x technology by using EAP (Extensible Authentication Protocol). EAP is a universal authentication framework, not a specific authentication mechanism. EAP provides common functions and communication specifications for an authentication mechanism. These varying mechanisms are called EAP methods. EAP methods can be used in 802.1x solutions to provide identity based network access control.

Some of the EAP methods used in access control solutions are as follows:- 1) EAP Message Digest 5 (EAP – MD5) 2) EAP Transport Level Security (EAP– TLS) 3) EAP Tunneled Transport Level Security (EAP – TTLS) 4) EAP Flexible Authentication via Secure Tunneling (EAP-FAST) 5) Protected EAP (PEAP) 6) Cisco Lightweight Extensible Authentication Protocol (Cisco-LEAP)

EAP Message Digest 5 (EAP – MD5) EAP-MD5 is on of the IETF open standard, non proprietary EAP types. It is popular because of the ease of deployment but it is not one of the most secure types the MD5 hashing function is susceptible to various attacks such as offline dictionary attacks. What is an offline dictionary attack?  There are two kinds of dictionary attacks, the online attacks and the offline attacks. An offline attack is one such that the attacker got enough data to "test" passwords on his own machines, at a rate which is limited only by whatever computational power he can muster. For instance, the attacker got a copy of the hash of a password. On the other hand, an online attack is one where the attacker must interact with an "honest" system (one which knows the correct password, e.g. a target server, or the client itself) for each guess.

EAP does not support mutual authentication or key generation.

EAP Transport Layer Security EAP – TLS is another open standard IETF standard, which is developed by Microsoft as an extension of PPP to provide authentication within PPP, with TLS providing integrity of negotiation and key exchange. EAP – TLS offers per – packet confidentiality and integrity to protect identification and a standardized mechanism for key exchange. EAP-TLS uses the X.509 PKI infrastructure to provide certificate-based 802.1x port-based access control. EAP-TLS addresses a number of weaknesses in other EAP protocols such as EAP-MD5. Deployment of EAP-TLS increases in complexity because it requires mutual authentication, negotiation of encryption methods, and, most important, requires installing certificates on the client supplicant and server.

EAP-TLS Message Exchange

EAP Tunneled Transport Layer Security (EAP – TTLS)  EAP-TTLS is widely supported across wireless platforms because it offers the same level of security and integrity as EAP-TLS without the overhead of installing PKI certificates on the client.  EAP-TTLS requires a server-side certificate only on the authentication server. Note that despite the fact that EAP-TTLS requires only a certificate on the server side, the server is still able to authenticate the client after the secure tunnel has been established. EAP-TTLS is an EAP type that utilizes TLS to establish a secure connection between a client and server, through which additional information may be exchanged. The initial TLS handshake may mutually authenticate client and server; or it may perform a one-way authentication, in which only the server is authenticated to the client.

EAP Flexible Authentication via Secure tunneling (EAP – FAST) EAP-FAST was developed by Cisco to address the weaknesses of LEAP. EAP-FAST uses the TLS tunnel, thereby providing a strong level of encryption. Similar to other EAP types that use the TLS approach, EAP-FAST offers confidentiality and integrity to protect user identification. Although the concept is similar to other EAP types using TLS tunnel, the major differentiator is that EAP-FAST does not use the PKI infrastructure for user identity (server certificate is optional) to establish the tunnel. The client server architecture in EAP-FAST is based on strong shared secret keys that are unique on every client. These shared secret keys are called Protected Access Credential (PAC). The shared secret keys are distributed automatically to the client device via in-band provisioning or manually via out-band provisioning.

EAP-FAST is significantly faster because of the PAC architecture that expedites the tunnel establishment. Tunnel establishment using a shared secret key is inherently faster than using a PKI certificate-based exchange method. EAP-FAST remains popular among the other EAP-based solutions that provide encrypted EAP transactions. EAP-FAST negotiation occurs in two phases: In Phase 1, the supplicant client and the authentication server perform mutual authentication using the PAC and establish the TLS tunnel. In Phase 2, the client exchanges the user credentials using the protected tunnel.

EAP – FAST Message Exchange

Protected EAP (PEAP) PEAP is a hybrid authentication protocol that creates a secured TLS tunnel and design architecture that is similar to EAP-TTLS. Two PEAP subtypes are certified for the WPA and WPA2 standard: PEAPv0 with EAP-MSCHAPv2 PEAPv1 with EAP-GTC PEAP establishes the TLS tunnel in Phase 1, thereby creating a secure channel that can then be used to initiate any other EAP type that uses the protected tunnel in Phase 2. 

 PEAP with EAP-MSCHAPv2 Message Exchange

Cisco Light Weight EAP (LEAP) Cisco introduced LEAP in 2000 offering the first WLAN authentication method. Cisco LEAP is a mutual authentication algorithm that uses a logon password as the shared secret that is known by the client and is used to respond to the challenges between the client and the authentication server. LEAP provides dynamic per-user, per-session encryption keys. As the authentication is password based , Cisco is LEAP is more susceptible to dictionary attacks. The only way to safe gaurd such attacks is to create a strong password policy.

WLAN NAC Network Admission Control for WLAN is a set of technologies and solutions used to enforce security policy compliance on all devices seeking network access and resources, there by limiting damage from emerging security threats. NAC is lead by CISCO.

WLAN IPS Cisco offers an Intrusion Prevention System for LAN to provide intrusion detection capability while simultaneously forwarding data over the air. It allows an access point to monitor real time wireless data and scan for potential virus threats to wireless devices. Cisco WLAN IPS is the first to offer wired and wireless security solution.

VPN IPsec Virtual Private Network IP Security is a framework and architecture of open standards for ensuring secure private communications over IP networks. VPN IPsec offers :- Confidentiality Integrity Authenticity of data

Cisco Unified Wireless Network This is composed of five interconnected elements that work together to deliver a unified enterprise-class wireless solution. These elements are Client Devices Access points Network Unification Network Management Mobility Services

Conclusion WLAN are increasingly deployed throughout the organization to provide greater mobility, scalability, and productivity. The Cisco Unified Wireless Network offered a best secure WLAN using a component of interconnected elements that work together to deliver a unified enterprise class wireless solution. Those elements are Client devices Access Points Network Unification Network Management Mobility Services

References Bhaji, Yusuf. Network Security Technologies and Solutions, Indianapolis: CISCO, 2008. Print Nasre, Sara. Wireless LAN Security. 2009. Pdf. Web Behrouz A.Fourouzan TCP/IP Protocol Suite. Fourth Edition. http://security.stackexchange.com/questions/6020/dictionary-attack-on-wifi http://compnetworking.about.com/cs/wirelessproducts/g/bldefwlan.htm www.cisco.com http://www.wifi.org http://fengnet.com/book/CCIE.Professional.Development.Series.Network.Security.Technologies.and.Solutions/final/ch12lev1sec2.html

THANK YOU