Mobile and Wireless Communication Security By Jason Gratto.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
7.3 Network Security Controls 1Network Security / G.Steffen.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Protected Extensible Authentication Protocol
Ariel Eizenberg PPP Security Features Ariel Eizenberg
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless LAN Security CS391. Overview  Wireless LAN Topology  Standards  Simple Security  WEP  802.1x  WPA  i.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
IEEE i Dohwan Kim.
Wireless Network Security
Security Issues with Wireless Protocols
Presentation transcript:

Mobile and Wireless Communication Security By Jason Gratto

WEP (Wired Equivalent Privacy) Intended to provide confidentiality Key size:40 bits Key distribution: Manual Meant to protect wireless communication from eavesdropping Also meant to prevent unauthorized access to wireless network

Goals of WEP Access Control Data Integrity Confidentiality

Protocol of WEP Uses a secret key between the computer and the access point – The secret key is used to encrypt the packets – No standard for sharing the key but in practice a single key is shared between all of the computers and access points.

WEP - Procedure Generates a checksum Generates a keystream with a chosen IV (Initialization Vector) v with RC4 XOR between message/checksum and the keystring Transmits the v and the ciphertext

WEP – Procedure

WEP - Defenses Integrity Check (IC) – Used to ensure packet wasn’t modified in transit Initialization Vector (IV) – Used to avoid encrypting two ciphertexts with the same key stream – Used to augment the shared key and produce a different RC4 for each packet

WEP – Vulnerabilities ICV insecure – ICV is a algorithm for creating the checksum, based on CRC32 and can be modified to match the contents of the message. IV key reuse – Because a small IV value is used, IV values end up being reused, compromising the security. Authentication forging – Using a recovered key stream and IV the authentication can be forged.

WEP – Attack types Passive – Eavesdropping on wireless traffic Active – Constructing it’s own encrypted packets when plaintext is known Active from both sides – Constructing it’s own encrypted packets when only header is known by guessing. Dictionary building – Computing the key stream using a decryption table

Wi-Fi Protected Access (WPA) Key size: 128 bits Hash method: ICV, MICHAEL Key distribution: TKIP (Temporal Key Integral Protocol) Inclusion of EAP certification for enterprise versions of WPA

MICHAEL MICHAEL generates a MIC (Message Integrity Code) – 8 bits long – Placed between the data and the ICV

TKIP Made to address security problems with WEP Looks to client’s configuration to determine what kind of key to use Sets a unique default key for each client

TKIP - Defenses Implements a key mixing function that combines a secret key with an IV before performing RC4 initialization If packets are received out of order, they are rejected by the access point Implements the MICHAEL integrity check to prevent forged packets from being accepted

Extensible Authentication Protocol (EAP) Is a transmission method and framework for authentication protocols – Works with many other authentication protocols such as RADIUS and Kerberos Uses a variety of different transport methods

EAP Originally designed for wired connections – To be used in a wireless environment, the “tunneled” EAP method was created, wrapping the EAP in a stronger encrypted EAP Common transport methods – EAP-TLS (Transport Layer Security) – EAP-TTLS (Tunneled Transport Layer Security) – PEAP (Protected EAP) – LEAP (Light EAP)

EAP Types PEAP – Interior MSCHAPv2 inside a secure TLS tunnel EAP-TTLS – Interior EAP-MD5 inside a secure TLS tunnel LEAP – Modified version of MSCHAP – Vulnerable to dictionary attacks

WPA –Vulnerabilities Denial of Service – Any time forged and unauthorized data is detected, it shuts the access point down for 60 seconds Because of this it is easy to shut down access points using little network activity

WPA2 Updated version of WPA Uses AES encryption and allows use of RADIUS (Remote Authentication Dial In User Service) authentication protocol

RADIUS Protocol for communication between Network Access Server (NAS) and a remote authentication server Requires clients and servers

RADIUS Data needed for authenticaiton – User data IP Name or address Shared secret key – User information Username and password – Session information Speed, port, NAS ID

RADIUS – Database The database can be stored in a number of different ways – A text file – Password file – Netware directory The database can authenticate in a number of ways as well – Username/password – SecurID Token Card

RADIUS After authentication is requested, the RADIUS server either accepts or rejects the NAS based on the following – Session timers – Filters – IP Address – IDSN Session Parameters

RADIUS ISP User Database ISP Modem Pool User dials modem pool and establishes connection UserID: bob Password: ge55gep UserID: bob Password: ge55gep NAS-ID: Select UserID=bob Bob password=ge55gep Timeout=3600 [other attributes] Access-Accept User-Name=bob [other attributes] Framed-Address= The Internet ISP RADIUS Server Internet PPP connection established ISP User Database ISP Modem Pool User dials modem pool and establishes connection UserID: bob Password: ge55gep UserID: bob Password: ge55gep NAS-ID: Select UserID=bob Bob password=ge55gep Timeout=3600 [other attributes] Access-Accept User-Name=bob [other attributes] Framed-Address= The Internet ISP RADIUS Server Internet PPP connection established

Sources /cubukcu.pdf /cubukcu.pdf eport/Kalina.ppt eport/Kalina.ppt u/pdfs/Wireless_EAP.pdf u/pdfs/Wireless_EAP.pdf chard/2-radius/index.htm