Wireless Networking.

Slides:



Advertisements
Similar presentations
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Advertisements

How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wireless Security Chi-Shu Ho, Raymond Chi CS265 Cryptography and Computer Security SJSU November 18, 2003.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
& WEP Tzachy Reinman System and Network Security Course
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Security+ Guide to Network Security Fundamentals, Fourth Edition
Chapter 9: Protecting Advanced Communications Security+ Guide to Network Security Fundamentals Second Edition Instructor by Sukchatri PRASOMSUK.
Chapter 7: Protecting Advanced Communications Security+ Guide to Network Security Fundamentals Second Edition.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Chapter 7: Protecting Advanced Communications
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
WLAN Security1 Security of WLAN Máté Szalay
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Wireless Protocols WEP, WPA & WPA2.
Wireless Local Area Network (WLAN)
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Antti Miettinen (modified by JJ)
Presentation transcript:

Wireless Networking

Outline Wireless Network Communications Background Security Issues WEP / WPA cs490ns - cotter

Hardening Wireless Local Area Networks (WLAN) By 2007, >98% of all notebooks will be wireless-enabled Serious security vulnerabilities have also been created by wireless data technology: Unauthorized users can access the wireless signal from outside a building and connect to the network Attackers can capture and view transmitted data Employees in the office can install personal wireless equipment and defeat perimeter security measures Attackers can crack wireless security with kiddie scripts cs490ns - cotter

4/21/2017 IEEE 802.11 Standards A WLAN shares same characteristics as a standard data-based LAN with the exception that network devices do not use cables to connect to the network RF is used to send and receive packets In September 1999, a new 802.11b High Rate was amended to the 802.11 standard. It added two higher speeds, 5.5 and 11 Mbps to original speeds of 1, 2 Mbps Communications distance varies with bandwidth to a maximum range of up to 300 ft. With faster data rates, 802.11b quickly became the standard for WLANs cs490ns - cotter cs490ns-cotter

IEEE 802.11 Standards At same time, the 802.11a standard was released 802.11a has a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions at 5 GHz 802.11g added in 2003. It adds transmission rates of 18, 36, and 54 Mbps to the rates available under 802.11b. 802.11n draft product in 2007, standardized in 2009. Added rates up to 600 mbps cs490ns - cotter

Data Rates / Range 802.11b 1 Mbps / 90+ m. 2 Mbps / 75 m. All of 802.11b 18 Mbps / 50 m. 36 Mbps / 35 m. 54 Mbps / 20 m. 802.11n – per stream (4 streams max) 20 MHz band 7.2, 14.4 … 72.2 Mbps 40 MHz band 15, 30 … 150 Mbps “Twice the distance of 802.11g” Typical configurations 2 transmit / receive streams Can transmit on 2.4 or 5 GHz cs490ns - cotter

WLAN Components Each network device must have a wireless network interface card installed Wireless NICs are available in a variety of formats: Type II PC card – Mini PCI CompactFlash (CF) card – USB device USB stick cs490ns - cotter

WLAN Components (cont) An access point (AP) consists of three major parts: An antenna and a radio transmitter/receiver to send and receive signals An RJ-45 wired network interface that allows it to connect by cable to a standard wired network Special bridging software cs490ns - cotter

Basic WLAN Security Two areas: Enterprise WLAN security Basic WLAN security uses two new wireless tools and one tool from the wired world: Service Set Identifier (SSID) beaconing MAC address filtering Wired Equivalent Privacy (WEP) cs490ns - cotter

Service Set Identifier (SSID) Beaconing A service set is a technical term used to describe a WLAN network Three types of service sets: Independent Basic Service Set (IBSS) Basic Service Set (BSS) Extended Service Set (ESS) Each WLAN is given a unique SSID cs490ns - cotter

MAC Address Filtering Another way to harden a WLAN is to filter MAC addresses The MAC address of approved wireless devices is entered on the AP A MAC address can be spoofed When wireless device and AP first exchange packets, the MAC address of the wireless device is sent in plaintext, allowing an attacker with a sniffer to see the MAC address of an approved device cs490ns - cotter

MAC Address Filtering cs490ns - cotter

Wired Equivalent Privacy (WEP) 4/21/2017 Wired Equivalent Privacy (WEP) Optional configuration for WLANs that encrypts packets during transmission to prevent attackers from viewing their contents Uses shared keys―the same key for encryption and decryption must be installed on the AP, as well as each wireless device Keys: 40 bit (5 byte) key + 24 bit IV = 64 bits 104 bit (13 byte) key + 24 bit IV = 128 bit No data integrity function cs490ns - cotter cs490ns-cotter

WEP - Shared Key Authentication Client Access Point Authentication Request Challenge Text Encrypt Challenge w/key Compare Authentication Frame cs490ns - cotter

WEP Encryption 1 Text CRC = Text ICV 2 Secret Key PRNG = Keystream IV + 3 4 XOR Ciphertext IV 5 ICV = Integrity Check Value IV = initialization Vector

WEP Frame layout IV Data >=1 ICV Inititialization Vector Key ID encrypted IV Data >=1 ICV 4 bytes Inititialization Vector Key ID 3 bytes 1 byte ICV = Integrity check value (CRC)

(WEP) (cont) cs490ns - cotter

WEP Weaknesses IV sent as cleartext. Since key never changes, once we know two packets share the same IV, we know their keys are identical XOR the two ciphertext messages XOR of plaintext will have same value as XOR of ciphertext! We will know some of the transmitted data ARP requests DNS Etc.

Untrusted Network The basic WLAN security of SSID beaconing, MAC address filtering, and WEP encryption is not secure enough for an organization to use One approach to securing a WLAN is to treat it as an untrusted and unsecure network Requires that the WLAN be placed outside the secure perimeter of the trusted network cs490ns - cotter

Untrusted Network (continued) cs490ns - cotter

4/21/2017 Trusted Network It is still possible to provide security for a WLAN and treat it as a trusted network Wi-Fi Protected Access (WPA) Developed by WECA in 2002 as interim solution Intended to be a software upgrade for WEP (use RC4) WPA-2 – 802.11 standard Has two Domains: Personal Wireless Security Enterprise Wireless Security WECA (Wireless Ethernet Compatibility Alliance) cs490ns - cotter cs490ns-cotter

Personal Wireless Security WPA -1 Authentication – Based on Pre-Shared Key Encryption – Temporal Key Integrity Protocol Mixes IV and Extended IV with secret key EIV includes sequence counter Adds 8 byte Message Integrity Check Uses RC4 as encryption mechanism Includes ICV for backward compatibility encrypted MAC h. IV EIV Data >=1 MIC ICV FCS

Personal Wireless Security WPA -2 Authentication – Based on Pre-Shared Key Encryption – AES – CCMP Counter mode-CBC MAC Protocol Mixes IV and Extended IV with secret key EIV includes sequence counter Adds Message Integrity Check Uses AES as encryption mechanism encrypted MAC h. IV EIV Data >=1 MIC FCS

Enterprise Wireless Security Network supporting the 802.1x protocol consists of three elements: Supplicant: client device, such as a desktop computer or personal digital assistant (PDA), which requires secure network access Authenticator: serves as an intermediary device between supplicant and authentication server Authentication server: receives request from supplicant through authenticator cs490ns - cotter

4/21/2017 IEEE 802.1x cs490ns - cotter cs490ns-cotter

Enterprise Authentication Extensible Authentication Protocol Used to pass information from supplicant to AS WN AP AS Security Capabilities Discovery Authentication Key management Key Distribution Data protection

IEEE 802.1x (cont) Several variations of EAP can be used with 802.1x: 4/21/2017 IEEE 802.1x (cont) Several variations of EAP can be used with 802.1x: EAP-Transport Layer Security (EAP-TLS) Lightweight EAP (LEAP) EAP-Tunneled TLS (EAP-TTLS) Protected EAP (PEAP) Flexible Authentication via Secure Tunneling (FAST) cs490ns - cotter cs490ns-cotter

Enterprise Wireless Security Data Encryption – WPA 1 TKIP Data Encryption – WPA 2 AES - CCMP

Wireless Security Summary Broadcast nature of Wireless LAN makes communication more vulnerable than wired networks Several mechanisms can be used to limit access Encryption used to protect data transmission (and access). cs490ns - cotter

References: Wireless Security 802.1x - tldp.org/HOWTO/802.1X-HOWTO IPSec – tldp.org/IPSec-HOWTO cs490ns - cotter

Summary Wireless Network Communications Background Security Issues WEP / WPA cs490ns - cotter