Wireless Unification Theory William Arbaugh University of Maryland College Park.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
Wireless LAN  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD  Securing.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
WiMAX Network Architecture and Emergency - Status Update – 7th Emergency Services Workshop College Park, MD, USA May 2010 Contact:
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Wireless LAN Security Framework Backend AAA Infrastructure RADIUS, TACACS+, LDAP, Kerberos TLSLEAPTTLSPEAPMD5 VPN EAP PPP x EAP API.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
IEEE 802.
Windows 2003 and 802.1x Secure Wireless Deployments.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011.
Eugene Chang EMU WG, IETF 70
By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE ) this would be an access.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Lecture 11 Wireless security
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleIEEE MBWA Security Architecture.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Network Security and Interworking
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
802.1X in SURFnet 22 May 2003.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Wireless Network Security CSIS 5857: Encoding and Encryption.
N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Port Based Network Access Control
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
History and Implementation of the IEEE 802 Security Architecture
Authentication and handoff protocols for wireless mesh networks
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
An Example Protocol for FastAKM
Authentication and handoff protocols for wireless mesh networks
An Example Protocol for FastAKM
Presentation transcript:

Wireless Unification Theory William Arbaugh University of Maryland College Park

Bureaucracy  Speakers please introduce yourself to me and provide a copy of your slides to the note taker  Workshop should be interactive- ask questions, answer questions

What do you want from the Workshop? ?

Welcome!  Program consists of talks and discussions  Want to focus on discussions (more to follow)  Goal is to identify hard research problems and potential bureaucratic and standardization stumbling blocks

Technical Trends  Wireless access is becoming ubiquitous and broadband in nature  Users are become more mobile  Mobility for data access is changing from “discrete mobility” to “continous mobility”  Base stations are cheaper with less physical security  All of the wireless technologies have differing authentication and access control frameworks!  Interworking

Threat  Interworking allows attackers to find the “path of least resistance” and establish “man in the middle attacks” The network with the weakest security will be the entry point The network with the weakest security will be the entry point  Providers will either not allow networks with weak security to join (limit Interworking growth) or allow it which introduces security problems.

Workshop Goals  How do we tie these networks together in a secure fashion? Deal with legacy networks? Deal with legacy networks? Deal with future networks? Deal with future networks? Vertical/Horizontal roaming? Vertical/Horizontal roaming?

Technical  Patch work of technology EAP A5 PEAP TLS AES-CCM CAVE CHAP AKA HLR VLR

Standardize it? IRTF IETF IEEE WWRF ISO 3GPP

How do we do it?  I have no idea!  One of the main motivations for this workshop!

Things to think about  What are the research questions?  What are the problems? Standardization problems Standardization problems Technical problems Technical problems Policy problems Policy problems

Technical Overview  IEEE 802.1x  EAP  Roaming

IEEE 802.1x  Provides access control and key distribution method to AP/base station  Centralized authentication  Uses EAP

Dual Port Model Controlled PortUncontrolled Port Authenticator System Port unauthorized LAN Access Point Access Server Client / Supplicant

Trust Relationships EAP method Possibly via RADIUS shared secret Note: I am using trust here loosely since only a security association is established.

Trust Relationships EAP method Possibly via RADIUS shared secret Note: I am using trust here loosely since only a security association is established. Transitively derived

Trust Relationships  Note that the client and the AP/Base station have no direct trust relationship  It is derived transitively if and only if the infrastructure establishes a trust relation between the AP and the RADIUS server

EAP Session Authentication Server SupplicantAuthenticator EAP REQUEST/IDENTITY EAP RESPONSE/IDENTITY (MyID) EAP REQUEST/OTP, OTP Challenge EAP RESPONSE/OTP, OTP PW EAP Success Port authorized

EAP Authentication  Authentication may not be mutual  Loss of anonymity due to identity request  What are you authenticating? User? User? Device? Device? Do we need both? Do we need both?

Roaming Challenges  What is equivalent security?  Hand-off’s between differing physical and MAC layers in under 30ms? Soft hand-over easy at layers 2 and below but more difficult at layer 3 and above Soft hand-over easy at layers 2 and below but more difficult at layer 3 and above Hard hand-over just plain hard Hard hand-over just plain hard  Some authentication methods are complex, compute intensive, and take too long

What did I miss?