Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wireless Security Chi-Shu Ho, Raymond Chi CS265 Cryptography and Computer Security SJSU November 18, 2003.
WEP and i J.W. Pope 5/6/2004 CS 589 – Advanced Topics in Information Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Networking & Security Greg Stabler Spencer Smith.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Understand Wireless Security LESSON Security Fundamentals.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
A Wireless LAN Security Protocol
Security Issues with Wireless Protocols
Presentation transcript:

Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research Vanderbilt University

Security concerns Eavesdropping a major concern Eavesdropping a major concern Unprotected wireless access points are an easy of entry for mobile hackers Unprotected wireless access points are an easy of entry for mobile hackers Many rogue Wireless LANS were put up in corporate networks without IT support or adequate security Many rogue Wireless LANS were put up in corporate networks without IT support or adequate security War Driving / War Chalking War Driving / War Chalking Some war driving / freeloading happens in residential settings Some war driving / freeloading happens in residential settings

Positioning your wireless network Libraries should already have a network security architecture that separates public access computing from the business network Libraries should already have a network security architecture that separates public access computing from the business network Adding a wireless LAN is easy when the library already has a solid security environment in place Adding a wireless LAN is easy when the library already has a solid security environment in place

Encryption necessary to ensure security Sensitive data must be encrypted when transmitted across any untrusted network Sensitive data must be encrypted when transmitted across any untrusted network Most Encryption algorithms uses a secure key to encode the data and decode it after transmission Most Encryption algorithms uses a secure key to encode the data and decode it after transmission The longer the key, the more difficult it is to use brute force to decrypt the message The longer the key, the more difficult it is to use brute force to decrypt the message WEP uses 40, 64, or 128 (WEP2) bit keys WEP uses 40, 64, or 128 (WEP2) bit keys

Wired Equivalency Privacy Optional Encryption scheme part of the b specification Optional Encryption scheme part of the b specification RC4 encryption RC4 encryption Single key encrypts all traffic Single key encrypts all traffic No system for key management No system for key management Hackers can easily recover the key Hackers can easily recover the key WEP often not enabled WEP often not enabled WEP can be defeated by sophisticated hackers WEP can be defeated by sophisticated hackers Provides a barrier to most potential intruders Provides a barrier to most potential intruders

Wireless Hacking tools At least two open source tools are available for recovering WEP keys: At least two open source tools are available for recovering WEP keys: WEPCrack WEPCrackhttp://wepcrack.sourceforge.net/ AirSnort AirSnort

802.11i Security Standard for the arena Security Standard for the arena Includes WPA and RSN (Robust Security Network) Includes WPA and RSN (Robust Security Network) Relies on 802.1x specification for port- based user and device authentication Relies on 802.1x specification for port- based user and device authentication Ratified June 2004 Ratified June 2004 Marketed as WPA2 Marketed as WPA2

WPA Wi-Fi Protected Access Wi-Fi Protected Access Enhanced security over WEP Enhanced security over WEP TKIP TKIP Available now Available now Backwardly compatible with WEP – requires only a firmware upgrade. Backwardly compatible with WEP – requires only a firmware upgrade.

Temporal Key Integrity Protocol (TKIP) 128 bit encryption keys 128 bit encryption keys Each packet encrypted with a different key based on a 48-bit serial number, incremented with each use. Each packet encrypted with a different key based on a 48-bit serial number, incremented with each use. Avoids replay attacks Avoids replay attacks Relies on a base key with is generated when a device associates with the base station Relies on a base key with is generated when a device associates with the base station Ideally unique base keys transmitted during 802.1x authentication Ideally unique base keys transmitted during 802.1x authentication Pre-shared keys used otherwise Pre-shared keys used otherwise

WPA2 WPA + AES = WPA2 WPA + AES = WPA2 Advanced Encryption Standard instead of TKIP Advanced Encryption Standard instead of TKIP Stronger encryption algorithm Stronger encryption algorithm Not guaranteed to be backwardly compatible with existing WEP equipment Not guaranteed to be backwardly compatible with existing WEP equipment Personal version uses pre-shared key Personal version uses pre-shared key Enterprise version uses 802.1X authentication through RADIUS server. Enterprise version uses 802.1X authentication through RADIUS server.

WPA/802.1x Diagram See: See: img/20FEwifi_in-x.gif img/20FEwifi_in-x.gif

Wi-Fi Security Services SecureMyWiFi ( SecureMyWiFi ( RADIUS authentication and security key distribution service RADIUS authentication and security key distribution service Operates with AP’s that support WPA- Enterprise or WPA2-Enterprise Operates with AP’s that support WPA- Enterprise or WPA2-Enterprise $29 annual fee $29 annual fee

Virtual Private Networks (VPN) A technology that offers strong security A technology that offers strong security Common approach for remote users that rely on accessing organizational resources through the Internet Common approach for remote users that rely on accessing organizational resources through the Internet Applicable to wireless users on premises Applicable to wireless users on premises Enhances security / adds inconvenience. Enhances security / adds inconvenience.

WEP Security

VPN Security

Conclusions Solutions are available that provide solid security for wireless networks Solutions are available that provide solid security for wireless networks Trade-off between convenience and security. Trade-off between convenience and security. Open wireless networks can be operated without jeopardizing the library’s business network Open wireless networks can be operated without jeopardizing the library’s business network