Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),

Slides:



Advertisements
Similar presentations
Chapter 07 Designing and Implementing Security for WLAN
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
WLAN What is WLAN? Physical vs. Wireless LAN
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
Mobile and Wireless Communication Security By Jason Gratto.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Measuring of the time consumption of the WLAN’s security functions Jaroslav Kadlec, Radek Kuchta, Radimír Vrba Dept. of Microelectronics.
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless Authentication Protocol Presented By: Tasmiah Tamzid Anannya Student Id:
CSE 4905 WiFi Security II WPA2 (WiFi Protected Access 2)
Wireless Protocols WEP, WPA & WPA2.
IEEE i Dohwan Kim.
Wireless Network Security
Presentation transcript:

Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005), Jan. 2005, pp. 424 – 428 Reporter: Jung-wen Lo ( 駱榮問 ) Date: 2005/7/14

2 Outline Introduction WEP Format & Working of 64bits RC4 WEP Encryption & Decryption Weakness in WEP Type of Attack WEP Extensions Appendix

3 Introduction WEP (Wired Equivalent Privacy) optional encryption standard Implemented in the MAC layer Relies on RC4 Provide User authentication Data privacy Data integrity

4 WEP Format & Working of 64-bit RC4 ※ ICV: Integrity check value = CRC32(Plain Text)

5 WEP Encryption & Decryption

6 Weakness in WEP (1/2) Key management & Key size Key management is not specified in WEP One single WEP key shared between every node on the network Key size 40 bits in standard Vendors extend up to 104 bits IV (Initialization Vector) is too small Size=24 bits  16,777,216 RC4 Cipher streams If RC4 cipher stream found, attacker can decrypt packets with same IV IV starts from 0 in incremental order IV chooses randomly

7 Weakness in WEP (2/2) Integrity Check Value (ICV) algorithm is not appropriate CRC32 is linear function of the message Attacker can modify an encrypted message & easily fix the ICV Weak of WEP using RC4 9000/16million weak keys Reveal in 2000 – 4000 packets  Extend WEP key to 104 bits Authentication messages can be easily forged define two forms authentication Shared key authentication: Reduce DoS attack Open system authentication: Give better network security

8 Type of Attack Passive attack Attacker collects two same key stream cipher text packets  Reveal key Active attack to insert traffic Attacker knows plaintext & cipher text pair  Generate key stream & new cipher text Active attack from both ends Attacker predicts both information & destination address  Modify address Table based attack Attacker builds a table of IVs & corresponding key stream Dictionary building attack Allows real time automated decryption of all traffic

9 WEP Extensions (1/3) 802.1X Entities Supplicant (End user machine) Authentication server  Grant or deny authentication by help of authenticator Authenticator server  Compare credentials supplied by supplicant with information in its database Drawbacks No authenticity or integrity protection between access point & client

10 WEP Extensions (2/3) TKIP (Temporal Key Integrity Protocol) Components MIC (Message Integrity Check)  Protect Header & Payload Packet sequencing  Employ packet sequencing number and synchronization to prevent replay attack Per packet keying  Keys have fixed lifetime and replaced frequently  Phase 1: Create intermediate key  Phase 2: Encrypt the packet sequence number by intermediate key Re-keying  Solve the problem of re-using IVs in WEP  Three key types  Temporal keys: 128-bit for encryption and 64-bit for data integrity  Key encryption keys: protect temporal keys  Master keys: secure for communication between client and AP

11 WEP Extensions (3/3) i AES uses 128-bit temporal key & 48-bit IV in MIC calculation & encryption process Other alternatives VPN’s VPN client associates to an AP the establishes an authenticated encrypted session with VPN server SSL Authenticate client & server via public key cryptography

12 Apendix 1 TKIP Part of a draft standard from the IEEE i working group RSN (Robust Secure Network) RSN Part of i standard Cipher Suites Code 1: WEP Code 2: TKIP Code 3: WRAP (Wireless Robust Authenticated Protocol) Code 4: CCMP (Counter mode with Cipher block chaining Message authentication code Protocol) Code 5: WEP-104

13 Appendix 2 WPA (Wi-Fi Protected Access) 802.1x + TKIP EAP: Extensible Authentication Protocol