Doc.: IEEE 802.11-09/0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced 802.11 Security Date: 2008-07-10 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Advertisements

Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Secure Pre-Shared Key Authentication for IKE
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
Doc.: IEEE /0598r0 Submission May 2012 Steve Grau, Juniper NetworksSlide 1 Layer 3 Setup with Dynamic VLAN Assignment Date: Authors:
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Doc.: IEEE r1 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Doc.: IEEE /0946r3 Submission August 2012 A proposal for next generation security in built on changes in ac 23 August 2012 Slide.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Submission doc.: IEEE 11-12/0589r2 July 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Submission doc.: IEEE /1015r1 September 2015 Guido R. Hiertz et al., EricssonSlide 1 Proxy ARP in ax Date: Authors:
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
Doc.: IEEE /0580r0 Submission May 09 Myles et al (Cisco)Slide 1 Discussion on the proposal to start a new Security SG in WG.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /1429r2 Submission January 2012 Dan Harkins, Aruba NetworksSlide 1 A Protocol for FILS Authentication Date: Authors:
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Doc.: IEEE /1164 r00 Submission September 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Some Par and 5C Requirements Date: Authors:
Doc.: IEEE /0123r0 Submission January 2009 Dan Harkins, Aruba NetworksSlide 1 Secure Authentication Using Only A Password Date:
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /0946r1 Submission July 2012 A proposal for next generation security in built on changes in ac 16 July 2012 Slide 1 Authors:
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Doc.: IEEE /1468r1 Submission Jan 09 Ashish Shukla, Marvell SemiconductorSlide 1 ERP Protection in IEEE s Mesh Network Date:
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
Doc.: IEEE /1145r1 Submission August WG Slide 1 Mutual Authentication Date: Authors: Slide 1.
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
Doc.: IEEE /0899r2 Submission July2010 Dan Harkins, Aruba NetworksSlide 1 Secure PSK Authentication Date: Authors:
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Submission doc.: IEEE r1 March 2012 Dan Harkins, Aruba NetworksSlide 1 The Pitfalls of Hacking and Grafting Date: Authors:
Doc.: IEEE /0099r2 Submission Jan 2013 A resolution proposal comments related to for next generation security in built on changes in ac.
Enhanced Security Date: Authors: May 2009 May 2009
Secure PSK Authentication
Authentication and Upper-Layer Messaging
Wireless Protocols WEP, WPA & WPA2.
Enhanced Security Features for
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
Enhanced Security Features for
Secure PSK Authentication
Key Descriptor Version in EAPOL Key Frames
WNG SC Agenda Authors: May 2009 Date: March 2009
Security Properties Straw Polls
Password Authenticated Key Exchange
Changes to SAE State Machine
TGr Authentication Framework
TGr Authentication Framework
Password Authenticated Key Exchange
A Better Way to Protect APE Messages
Presentation transcript:

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 2 Abstract This document describes some missing features from and proposes a way to add them to IEEE

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 3 Security Services in Key Management –Authentication: A STA can prove its identity to the network and vice versa –Authorization and Access Control: Once authenticated a STA can be given access to the network, or a subset of it, or denied access to the network. –Key derivation: each side derives a key known bound to each other. Ciphers –Data Confidentiality: Data sent between the STA and AP is hidden from all but the source and destination of the data. –Data Integrity: The recipient of a frame is able to verify that the frame was not modified in transit and that a false frame has not been substituted for a valid frame. –Data Source Authentication: The recipient of a frame is able to ascertain the origin of the frame and it is not possible for anyone else to masquerade as the claimed originator.

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 4 How are These Services Provided Today? Wired Equivalent Privacy (WEP) –Key Management Shared key: insecure simple proof-of-possession of a shared key –Cipher WEP: insecure, numerous fundamental flaws in design Robust Security Network (RSN) –Key Management 802.1x: provides mutual authentication, allows for authorization and access control decision making, generates secure and cryptographically strong keys. PSK: provides a limited type of authentication, generates weak keys that void some features of RSN ciphers. –Ciphers TKIP: provides confidentiality, data integrity (sub-optimally), and data source authentication. CCMP: provides confidentiality, data integrity, and data source authentication.

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 5 What’s The Problem? ’s current cryptographically strong security is limited to one particular use case– the enterprise-- where: –a AAA server is used to aggregate security services and policy. –strict roles are enforced: clients obtain network access through APs ’s current cryptographically strong security doesn’t really work for other deployments. –Small office/home office– a stand-alone AAA server is problematic. –Networks of consumer electronics devices– a stand-alone AAA server is a non-starter and there is no real “client” and “AP” role. –Mesh and peer-to-peer applications– there is no “client” and “AP” role. The PSK mode of i is insecure. This is a source of continued bad press for – “ is still not secure”. CCM in software is reaching performance limits with current high-rate PHYs

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 6 What’s the Problem? People right now want to use in ways that are not supported: – bluetooth-sig-liaison-report-may-2009 Need for secure high-speed data transfer between personal devices (non-AP STAs) but doesn’t support that. So, use insecure Bluetooth key management to get a key and then use for data transport. –Wi-Fi Alliance liaison report from May 2009 (verbal) There is a compelling use case for peer-to-peer use of but that isn’t supported in , so WFA is defining a new layer to provide the appearance of peer-to-peer. PSK mode in is insecure but a compelling use case for PSKs still exists so WFA is trying to come up with an adjunct protocol to lessen the security exposure– it does not eliminate it though, the solution does not achieve provable security.. People will soon want to use in ways that are not supported: –“smart grid” applications People trade security for usability because does not give them both (see wng-future-security-activities).

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 7 What’s The Solution? Support currently unsupported use cases in to make hacks by other SDOs unnecessary. Provide security and usability to A Study Group to come up with a PAR & 5C to work on: –Secure, de-centralized, peer-to-peer authentication and key management protocols– address the Bluetooth and WFA issues A password-based key exchange that is resistant to attack A certificate-based key exchange –Definition (not development) of new ciphers AES-GCM: a high-performance, single-pass, cipher for authenticated encryption AES-SIV: a misuse-resistant cipher for authenticated encryption

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 8 A Focus on Enhanced Security Tight focus ensures timely results –Keep a focus on security enhancements to existing functionality and not creation of new security algorithms, ciphers, etc. –Much of this has already been designed– GCM, SIV, SAE– so it’s a problem of defining use in There is a need for de-centralized security in –Use of a PSK/password is widespread and will remain so. Unfortunately it is not secure; we should make it so. –There is market demand as shown by the work of other SDOs. –It makes sense for to provide it instead of hoping other organizations do it (and do it right). Data rates keep increasing, ciphers cannot be bottlenecks! More efficient ciphers consume less power which results in longer battery life, and it’s also green. Do security work in a security group; keep experts focused on their area of expertise.

doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 9 Motion Move to request the Working Group to approve and forward to the IEEE 802 Executive Committee the creation of a new IEEE Study Group, called the Enhanced Security Study Group (ESSG), to investigate ways to provide security enhancements to on the following: –Secure, robust, de-centralized, peer-to-peer key management. –Faster, more robust, or more power-efficient ciphers. Upon confirmation of feasibility and per 802 operating rules, the ESSG shall draft a PAR and 5 criteria to be submitted to the WG. Moved: Seconded: Yes: No: Abstain: