802.11 Networks: known attacks: technical review Nguyen Dinh Thuc University of Science, HCMC

Slides:



Advertisements
Similar presentations
Networks: hotspot security Nguyen Dinh Thuc University of Science, HCMC
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
An Introduction to Internetworking. Why distributed systems - Share resources (devices & CPU) - Communicate people (by transmitting data)
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Computer Networking Devices Seven Different Networking Components.
IEEE Wireless LAN Standard
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Autoimmunity Disorder in Wireless LANs By Md Sohail Ahmad J V R Murthy, Amit Vartak AirTight Networks.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Virtual Private Network
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Wireless and Security CSCI 5857: Encoding and Encryption.
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
DYNAMIC WAP BASED VOTING SYSTEM Bertrand COLAS Submission date: May 2002 School of Computing Bachelor of Engineering with Honours in Computer.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Abusing : Weaknesses in LEAP Challenge/Response – Defcon 2003 Slide 1 Weaknesses in LEAP Challenge/Response Joshua Wright
Copyright © 2013 Curt Hill SOAP Protocol for exchanging data and Enabling Web Services.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Lecture 24 Wireless Network Security
Doc.: IEEE /200 Submission September 2000 Ron Brockmann, Intersil Plug-n-Play Security in the Home & Small Business Ron Brockmann Intersil.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless Network Security CSIS 5857: Encoding and Encryption.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Introduction to Networking. What is a Network? Discuss in groups.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN Standard
1 Chapter 2: Wireless LANs and PANs  Introduction  Fundamentals of WLANs  IEEE Standard  HIPERLAN Standard  Bluetooth  HomeRF.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Instructor Materials Chapter 6 Building a Home Network
A Wireless LAN Security Protocol
Wireless LAN Security 4.3 Wireless LAN Security.
Comparison of LAN, MAN, WAN
An Introduction to Cloud Computing
An Introduction to Internetworking
Presentation transcript:

Networks: known attacks: technical review Nguyen Dinh Thuc University of Science, HCMC

Introduction wireless LAN Wired LAN Wireless LAN Laptop Laptop Access Point Mobile Pocket PC Palm Internet

Introduction wireless securityAuthentication Privacy Integrity

solutions Hotspot Express ( Concurrency License ) xPossible ( Concurrency License ) DOCOMO Inter-Touch Nokia Ovi VPN (Checkpoint, D-Link) …

Solutions access controlmember member Access Point New member access authentication

Solutions VPN Internet VPN Client No VPN Client hotspot Main Office VPN Server

A solution Access PointWireless Clients Internet Local Content Remote User Authentication Server Hotspot Controller Wireless Clients Access Point

Dis’ing attacks on networks: letter-envelop protocol Initially, the client randomly generates primes p1 and q1, then computes N1 = p1 q1. Similarly, the AP generates p2, q2 and computes N2 = p2 q2. During the authentication process between the client and the AP, the client sends an “envelop” that contains N1 to the AP, and AP sends an “envelop” containing N2 to the client When the client wants to disconnect from the AP, it sends either the de-authentication or the disassociation frame to the AP, together with p1 to the AP; we call this number “letter”. If this “letter” corresponds to the “envelop” previously sent, i.e. p1|N1 ( p1 divides N1) then the frame is authenticated and will be processed accordingly. Otherwise, the frame is rejected Similarly, if the AP wants to disconnect from the client, it sends the disassociation/de-authentication frame together with p2. The STA disconnects itself from the AP if p2|N2.

Dis’ing attacks on networks: implementation of letter-envelop protocol Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran†,Hai Vu, Neeraj Mittal, A lightweight solution for defending against de-authentication/disassociation attacks on networks, In IEEE 17th International Conference on Computer Communication and Networks (ICCCN), St. Thomas, US Virgin Islands, August 2008

Dis’ing attacks on networks: implementation of letter-envelop protocol After the authentication is finished, the client randomly generates two large primes number p1 and q1, computes N1 = p1 q1 and includes N1 in the Association Request frame (by putting the number in the frame body) sending to the AP On receiving the Association Request frame, the AP checks whether the Association ID (AID) of the client exists in the memory. There are two cases: Case 1: if the AID does not exist, then the STA has not been associated with the AP. The AP then stores N1 in the memory corresponding to the client’s record. If this is the first client associating to the AP, then the AP randomly generates two large primes p2 and q2, computes N2 = p2 q2 and includes it in the Association Response frame sending to the client. If there are clients already associated to the AP, then the AP just send the value ofN2 that has been previously sent to other clients. Note that the AP just needs one value of N2 for all the STAs associated to it. Whenever the AP wants to disconnect with all STAs, it just needs to broadcast a single disassociation frame containing N2. On receiving the Association Response frame, the client stores N2 in the memory corresponding to the AP it is associating with. When the AP receives the de-authentication frame or disassociation frame with a value of “letter” k from a client, it checks in the memory the values of N1 corresponding to that client. If k|N1 then the AP clears the information related to that client in the memory