WIRELESS LAN SECURITY AND LABORATORY DESIGNS

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
IEEE Wireless Local Area Networks (WLAN’s).
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Networks Olga Agnew Bryant Likes Daewon Seo.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Wireless Networks: Personal, Local, Metropolitan Speedups, Security, Power John Schafer University of Michigan Ann Arbor CSG 10 May 2000
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
WLAN What is WLAN? Physical vs. Wireless LAN
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Wireless Networking.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.
Wireless Networks Tamus, Zoltán Ádám
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Communication Research Labs Sweden AB Introduction to Wireless communication and WLAN.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
WEP Protocol Weaknesses and Vulnerabilities
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Network Security and Interworking
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
History and Implementation of the IEEE 802 Security Architecture
Chapter 4: Wireless LANs
Wireless LAN Security 4.3 Wireless LAN Security.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

WIRELESS LAN SECURITY AND LABORATORY DESIGNS Yasir Zahur T. Andrew Yang University of Houston – Clear Lake 17th CCSC Southeastern Conference Georgia Perimeter College - Dunwoody, GA CCSCSE 2003

Agenda Introduction Standards & Specifications Vulnerabilities Alternate Security Solutions Laboratory Setup CCSCSE 2003

Where Does WLAN Fit ? CCSCSE 2003

Source: http://www. jiwire. com/. cid=95&kw=802. 11&se=google (Nov Source: http://www.jiwire.com/?cid=95&kw=802.11&se=google (Nov. 6, 2003) Traveler's Quick Finder Browse by location    Free Hotspots  510 hotspots   Hotels  5,910 hotspots   Airports  432 hotspots   Cafes  5,344 hotspots CCSCSE 2003

Growth of WLAN CCSCSE 2003

Infrastructure Mode of WLAN CCSCSE 2003

Typical WLAN Architecture CCSCSE 2003

IEEE 802.11 Standards Standard Description Current Status CCSCSE 2003 Standard for WLAN operations at data rates up to 2 Mbps in the 2.4-GHz ISM band Approved in July 1997 IEEE 802.11a Standard for WLAN operations at data rates up to 54 Mbps in the 5-GHz UNII band Approved in Sept 1999. End-user products began hipping in early 2002 IEEE 802.11b Standard for WLAN operations at data rates up to 11 Mbps in the 2.4-GHz ISM band Sept 1999. End-user products began shipping in early 2000 IEEE 802.11g High-rate extension to 802.11b allowing for data rates up to 54 Mbps in the 2.4-GHz ISM band Draft standard adopted Nov 2001. Full ratification expected late 2002 or early 2003 IEEE 802.11e Enhance the 802.11 MAC to improve and manage Quality of Service, provide classes of service, and enhanced security and authentication mechanisms. These enhancements should provide the quality required for services such as IP telephony and video streaming Still in development, i.e., in the task group (TG) stage IEEE 802.11f Develop recommended practices for an Inter- access Point Protocol (IAPP) which provides the necessary capabilities to achieve multi-vendor AP interoperability across a DS supporting IEEE P802.11 Wireless LAN Links IEEE 802.11i Enhance the 802.11 Medium Access Control (MAC) to enhance security and authentication mechanisms CCSCSE 2003

Interferences (802.11b) 2.4GHz Cordless Phone Some other wireless network Microwave oven Access Point CCSCSE 2003

IEEE 802.11b Specifications (a brief overview) Transmission of approximately 11 Mbps of data Half Duplex protocol Use of CSMA/CA (collision avoidance) instead of CSMA/CD (collision detection) Total of 14 frequency channels. FCC allows channels 1 through 11 within the U.S in 2.4 GHz ISM band Only channels 1, 6 and 11 can be used without causing interference between access points Wired Equivalent Privacy (WEP) based on Symmetric RC4 Encryption algorithm Use of Service Set Identifier (SSID) as network identifier CCSCSE 2003

General WLAN Vulnerabilities Eavesdropping Invasion and Resource Stealing Traffic Redirection Denial Of Service Attack Rogue Access Point No per packet authentication No central authentication, authorization, and accounting (AAA) support CCSCSE 2003

802.11b Vulnerabilities MAC address based authentication One-Way authentication SSID Static WEP Keys WEP key vulnerabilities Manual Key Management Key Size Initialization Vector Decryption Dictionaries CCSCSE 2003

WEP Encryption CCSCSE 2003

IEEE 802.1x IEEE 802.1x is a port based authentication protocol. It forms the basis for IEEE 802.11i standard. There are three different types of entities in a typical 802.1x network including a supplicant, an authenticator, and an authentication server. In an un-authorized state, the port allows only DHCP and EAP (Extensible Authentication Protocol) traffic to pass through. CCSCSE 2003

EAPOL Exchange CCSCSE 2003

IEEE 802.1x – Pros / Cons Dynamic Session Key Management Open Standards Based Centralized User Administration User Based Identification Absence Of Mutual Authentication Lack of clear communication between 802.11 and 802.11i state machines and message authenticity CCSCSE 2003

Absence Of Mutual Authentication Supplicant always trusts the Authenticator but not vice versa This opens the door for “MAN IN THE MIDDLE ATTACK” CCSCSE 2003

Session Hijack Attack 802.11 State Machine 802.11i State Machine CCSCSE 2003

Session Hijack Attack (…cont) CCSCSE 2003

Alternate Solutions Virtual Private Networks (VPN) Cisco LEAP User Authentication Encryption Cisco LEAP Mutual Authentication Per Session based Keys Secure Socket Layer (SSL) Digital Certificates CCSCSE 2003

WEP Attack CCSCSE 2003

Man In The Middle & Session Hijack Attacks CCSCSE 2003

LEAP Enabled Access Point Cisco LEAP Setup LEAP Enabled Client LEAP Enabled Access Point AAA Server CCSCSE 2003

Pass Through Access Point VPN Setup VPN Client Pass Through Access Point VPN Server CCSCSE 2003

Pass Through Access Point SSL Setup SSL Client Pass Through Access Point SSL Server CCSCSE 2003

A Specialized Computer Security Lab NSF CCLI A&I grant: 2003-2005 Two Focuses: DCSL: Distributed Computer Security Lab Between UHCL and UHD Possibly extended to other small or medium-sized colleges Customizable testbed for various security-related experiments/projects Module-based Computer Security Courseware Design On-going Looking for collaborators, courseware developers, users, … CCSCSE 2003

CCSCSE 2003

Computer Security Courseware Module-based Computer Security Courseware Design Units: Modules, submodules, artifacts, … CCSCSE 2003

References John Pescatore, “Wireless Networks: Can Security Catch Up With Business?” Arunesh Mishra, William A. Arbaugh, “An Initial Security Analysis of the IEEE 802.1x Standard”, Department Of Computer Science, University Of Maryland, Feb 06 2002 WLAN Association, “Wireless Networking Standards and Organizations”, WLANA Resource Center, April 17 2002 Cisco Networks, “Cisco Aironet Response to University of Maryland’s paper” John Vollbrecht, David Rago, and Robert Moskowitz. “Wireless LAN Access Control and Authentication”, White Papers at Interlink Networks Resource Library, 2001 Nikita Borisov, Ian Goldberg, and David Wagner “Security of WEP Algorithm”, ISAAC, Computer Science Department, University Of California Berkely CCSCSE 2003