Lecture 24 Wireless Network Security modified from slides of Lawrie Brown.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 24: Wireless Network Security.
Wireless Network Security
Cryptography and Network Security
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
6: Wireless and Mobile Networks Wireless LANs.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
IEEE Wireless LAN Standard
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
Network and Internet Security
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
1 Chapter Overview Wireless Technologies Wireless Security.
Lecture 1 Wireless Networks CPE 401/601 Computer Network Systems slides are modified from Jim Kurose & Keith Ross All material copyright J.F.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Chapter 5 WIRELESS NETWORK SECURITY
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Presented by: Dr. Munam Ali Shah
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Network Security Lecture 8 Presented by: Dr. Munam Ali Shah.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Security Standards. IEEE IEEE 802 committee for LAN standards IEEE formed in 1990’s – charter to develop a protocol & transmission specifications.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
WLAN.
Wireless security Wi–Fi (802.11) Security
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Network Security CSIS 5857: Encoding and Encryption.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Understand Wireless Security LESSON Security Fundamentals.
Chapter 6 Wireless and Mobile Networks
Lecture 24 Wireless Network Security
Chapter 4: Wireless LANs
CSE 4905 Network Security Overview
Securing Wireless LANs
Wireless LAN Security 4.3 Wireless LAN Security.
Mobile ad hoc networking: imperatives and challenges
Presentation transcript:

Lecture 24 Wireless Network Security modified from slides of Lawrie Brown

Wireless and Mobile Networks # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected devices – laptops, Internet-enabled phones promise anytime untethered Internet access two important (but different) challenges – wireless: communication over wireless link – mobility: handling the mobile user who changes point of attachment to network

Seems Inescapable by the Internet Wireless nodes will soon dominate the Internet. Currently ~1B nodes, including wireline. Urgent response to the exploding wireless demand is a necessity.

Wireless Capacity – NOW! Scary trends in mobile wireless demand – 2+ times increase per year since – “18-fold by 2016!” Cisco, February “More than 80% is landing on WiFi”, Opportunistic wireless networking is well accepted by the users!

Cellular is Full “Sorry, America: Your wireless airwaves are full”, CNN, Feb 21, 2012.

Elements of a wireless network network infrastructure

wireless hosts  laptop, smartphone  run applications  may be stationary (non- mobile) or mobile  wireless does not always mean mobility Elements of a wireless network network infrastructure

base station  typically connected to wired network  relay - responsible for sending packets between wired network and wireless host(s) in its “area”  e.g., cell towers, access points Elements of a wireless network network infrastructure

wireless link  typically used to connect mobile(s) to base station  also used as backbone link  multiple access control (MAC) protocol coordinates link access  various data rates, transmission distance Elements of a wireless network network infrastructure

10

11

infrastructure mode  base station connects mobiles into wired network  handoff: mobile changes base station providing connection into wired network Elements of a wireless network network infrastructure

ad hoc mode  no base stations  nodes can only transmit to other nodes within link coverage  nodes organize themselves into a network: route among themselves Elements of a wireless network

Wireless network taxonomy single hop multiple hops infrastructure (e.g., APs) no infrastructure host connects to base station (WiFi, WiMAX, cellular) which connects to larger Internet no base station, no connection to larger Internet (Bluetooth, ad hoc nets) host may have to relay through several wireless nodes to connect to larger Internet: mesh net no base station, no connection to larger Internet. May have to relay to reach other wireless nodes: MANET, VANET

Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements are the same: – confidentiality, integrity, availability, authenticity, accountability – most significant source of risk is the underlying communications medium

Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: – Channel Wireless networking typically involves broadcast communications, which is far more susceptible to eavesdropping and jamming than wired networks Wireless networks are also more vulnerable to active attacks that exploit vulnerabilities in communications protocols – Mobility Wireless devices are far more portable and mobile, thus resulting in a number of risks – Resources Some wireless devices, such as smartphones and tablets, have sophisticated operating systems but limited memory and processing resources with which to counter threats, including denial of service and malware – Accessibility Some wireless devices, such as sensors and robots, may be left unattended in remote and/or hostile locations, thus greatly increasing their vulnerability to physical attacks

Wireless Networking Components

Wireless Network Threats accidental association malicious association ad hoc networks nontraditional networks identity theft (MAC spoofing) man-in-the middle attacks denial of service (DoS) network injection

Securing Wireless Transmissions principal threats are eavesdropping, altering or inserting messages, and disruption countermeasures for eavesdropping: – signal-hiding techniques – encryption the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions

Securing Wireless Networks the main threat involving wireless access points is unauthorized access to the network principal approach for preventing such access is the IEEE 802.1X standard for port-based network access control – provides an authentication mechanism for devices wishing to attach to a LAN or wireless network use of 802.1X can prevent rogue access points and other unauthorized devices from becoming insecure backdoors

Wireless Security Techniques use encryption use anti-virus and anti-spyware software and a firewall turn off identifier broadcasting change the identifier on your router from the default change your router’s pre-set password for administration allow only specific computers to access your wireless network

Mobile Device Security An organization’s networks must accommodate: – Growing use of new devices Significant growth in employee’s use of mobile devices – Cloud-based applications Applications no longer run solely on physical servers in corporate data centers – De-perimeterization There are a multitude of network perimeters around devices, applications, users, and data – External business requirements The enterprise must also provide guests, third-party contractors, and business partners network access using various devices from a multitude of locations

Security Threats

IEEE Terminology

Wireless Fidelity (Wi-Fi) Alliance b – first standard to gain broad industry acceptance Wireless Ethernet Compatibility Alliance – industry consortium formed in 1999 to address the concern of products from different vendors successfully interoperating – later renamed the Wi-Fi Alliance

Wireless Fidelity (Wi-Fi) Alliance term used for certified b products is Wi-Fi – has been extended to g products Wi-Fi Protected Access (WPA) – Wi-Fi Alliance certification procedures for IEEE security standards – WPA2 incorporates all of the features of the IEEE i WLAN security specification

IEEE 802 Protocol Architecture

General IEEE 802 MPDU Format MAC Protocol Data Unit

IEEE Extended Service Set

IEEE Services

Distribution of Messages Within a DS the two services involved with the distribution of messages within a Distribution System are: the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS distribution service enables transfer of data between a station on an IEEE LAN and a station on an integrated IEEE 802.x LAN integration

Association-Related Services transition types, based on mobility: – no transition a station of this type is either stationary or moves only within the direct communication range of the communicating stations of a single BSS – BSS transition station movement from one BSS to another BSS within the same ESS; delivery of data to the station requires that the addressing capability be able to recognize the new location of the station – ESS transition station movement from a BSS in one ESS to a BSS within another ESS; maintenance of upper-layer connections supported by cannot be guaranteed

Services association – establishes an initial association between a station and an AP reassociation – enables an established association to be transferred from one AP to another, allowing a mobile station to move from one BSS to another disassociation – a notification from either a station or an AP that an existing association is terminated

Wireless LAN Security Wired Equivalent Privacy (WEP) algorithm – privacy Wi-Fi Protected Access (WPA) – set of security mechanisms that eliminates most security issues – based on the current state of the i standard Robust Security Network (RSN) – final form of the i standard Wi-Fi Alliance certifies vendors in compliance with the full i specification under WPA2

802.11i RSN security services Authentication: between a user and an Authentication Server that provides mutual authentication and generates temporary keys to be used between the client and the AP over the wireless link Access control: enforces the use of the authentication function, routes the messages properly, and facilitates key exchange – It can work with a variety of authentication protocols Privacy with message integrity: MAC-level data are encrypted along with a message integrity code that ensures that the data have not been altered

Elements of IEEE i

IEEE i Phases of Operation

802.1X Access Control

MPDU Exchange authentication phase consists of three phases: – connect to AS the STA sends a request to its AP that it has an association with for connection to the AS; the AP acknowledges this request and sends an access request to the AS – EAP exchange authenticates the STA and AS to each other – secure key delivery once authentication is established, the AS generates a master session key and sends it to the STA

IEEE i Key Hierarchies

IEEE i Keys for Data Confidentiality and Integrity Protocols

Phases of Operation

Temporal Key Integrity Protocol (TKIP) designed to require only software changes to devices that are implemented with the older wireless LAN security approach called WEP provides two services:

Counter Mode-CBC MAC Protocol (CCMP) Intended for newer IEEE devices that are equipped with the hardware to support this scheme Provides two services:

Pseudorandom Function

Summary IEEE i wireless LAN security IEEE i services IEEE i phases of operation Discovery phase Authentication phase Key management phase Protected data transfer phase The IEEE i pseudorandom function Wireless Security – Wireless network threats – Wireless security measures Mobile device security – Security threats – Mobile device security strategy IEEE wireless LAN overview – The Wi-Fi alliance – IEEE 802 protocol – IEEE network components and architectural model – IEEE services