Lecture Notes 2005.10.6. Thursday Sue B. Moon.

Slides:



Advertisements
Similar presentations
Chapter 8 Network Security
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
IPsec Internet Headquarters Branch Office SA R1 R2
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Chapter 6 outline 6.1 Introduction Wireless
IEEE Wireless Local Area Networks (WLAN’s).
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
Network security and Hot topics in networking EECS 489 Computer Networks Z. Morley Mao Wednesday, April 11,
WLAN What is WLAN? Physical vs. Wireless LAN
Voice Traffic Performance over Wireless LAN using the Point Coordination Function Wei Supervisor: Prof. Sven-Gustav Häggman Instructor: Researcher Michael.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Wireless Ethernet IEEE Standard Overview Dirk Grunwald Assoc. Professor Dept. of Computer Science University of Colorado, Boulder.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
25-1 Last time □ Firewalls □ Attacks and countermeasures □ Security in many layers ♦ PGP ♦ SSL ♦ IPSec.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Wireless and Security CSCI 5857: Encoding and Encryption.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Lecture 2 – IEEE
Secure connections.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Networking.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
1 WEP Design Goals r Symmetric key crypto m Confidentiality m Station authorization m Data integrity r Self synchronizing: each packet separately encrypted.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
1 MAC Management. 2 Outline Introduction - Authentication, Association - Address filtering, Privacy - Power Management, Synchronization MAC Management.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 5: Mobile security,
1 Chapter 8 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3.
Wireless LANs Prof. F. Tobagi MAC Management 1.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Introduction to IEEE
CSE 5/7349 – April 5 th 2006 Wireless Networking.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
1/49 Power Management in IEEE Yu-Chee Tseng.
1/23 Power Management in IEEE Yu-Chee Tseng.
Wireless Network Security CSIS 5857: Encoding and Encryption.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Chapters 6 & 8 WiFi and Its Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
25-1 Last time □ Firewalls □ Attacks and countermeasures □ Security in many layers ♦ PGP ♦ SSL ♦ IPSec.
Robust Security Network (RSN) Service of IEEE
Security in the layers 8: Network Security.
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Ad Hoc/Sensor Networks: From IEEE 802
Wireless Mesh Networks
Power Management in IEEE
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
Protocol Details John Bellardo UCSD.
Is for “Wireless Fidelity” Or IEEE Standard By Greg Goldman
Mobile and Wireless Network Security
Presentation transcript:

Lecture Notes Thursday Sue B. Moon

From Last Class on AODV Waiting time for a response on a RREQ? –If a route is not received within NET_TRAVERSAL_TIME ms, then a node may broadcast another RREQ, up to a maximum of RREQ_RETRIES –Use exponential backoff for next waiting time: 2 * NET_TRAVERSAL_TIME, 4 *..., 8 *... –A node should not originate more than RREQ_RATELIMIT RREQ messages per second –Refer to RFC3561 for further details How scalable is the protocol? –Modifications made for scalability: expanding ring search, query localization, local repair –S-J Lee et al., “ Scalability Study of the Ad Hoc On-Demand Distance Vector Routing Protocol, ” Int ’ l Journal on Network Management, Mar- Apr

MAC Frame Format Types –control frames, management frames, data frames Sequence numbers –important against duplicated frames due to lost ACKs Addresses –receiver, transmitter (physical), BSS identifier, sender (logical) Miscellaneous –sending time, checksum, frame control, data Frame Control Duration/ ID Address 1 Address 2 Address 3 Sequence Control Address 4 DataCRC bytes Protocol version TypeSubtype To DS More Frag Retry Power Mgmt More Data WEP 2241 From DS 1 Order bits111111

MAC Frame Type/Subtype Management (00) –Association/reassociation/probe request/response –Beacon, ATIM –Disassocation, authentication/deauthentication Control (01) –Power Save (PS) –poll –RTS/CTS –ACK, CF-End, CF-End+CF-Ack Data (11) –Data, Data+CF-Ack, Data+CF-Poll, Data+CF-Ack+CF-Poll –CF-Ack, CF-Poll, CF-Ack + CF-Poll

Beacon Frame Body Timestamp Beacon interval Capability information SSID Supported rates FH Parameter set DS Parameter set CF Parameter set: CFPCount/Period/MaxDur... IBSS Parameter set TIM –DTIM count, DTIM period, Bitmap control, Partial virtual bitmap

Power saving with wake-up patterns (infrastructure) TIM interval t medium access point busy D TTD T TIM D DTIM DTIM interval BB B broadcast/multicast station awake p PS poll p d d d data transmission to/from the station

Power-Saving with PCF/DCF Superframe = CFP (PCF) + CP (DCF)

Power saving with wake-up patterns (ad-hoc) awake A transmit ATIM D transmit data t station 1 B1B1 B1B1 B beacon frame station 2 B2B2 B2B2 random delay A a D d ATIM window beacon interval a acknowledge ATIM d acknowledge data

IEEE security War-driving: drive around Bay area, see what networks available? –More than 9000 accessible from public roadways –85% use no encryption/authentication –packet-sniffing and various attacks easy! Securing –encryption, authentication –first attempt at security: Wired Equivalent Privacy (WEP): a failure –current attempt: i

Wired Equivalent Privacy (WEP): authentication as in protocol ap4.0 –host requests authentication from access point –access point sends 128 bit nonce –host encrypts nonce using shared symmetric key –access point decrypts nonce, authenticates host no key distribution mechanism authentication: knowing the shared key is enough

WEP data encryption Host/AP share 40 bit symmetric key (semi-permanent) Host appends 24-bit initialization vector (IV) to create 64-bit key 64 bit key used to generate stream of keys, k i IV k i IV used to encrypt ith byte, d i, in frame: c i = d i XOR k i IV IV and encrypted bytes, c i sent in frame

WEP encryption Sender-side WEP encryption

Breaking WEP encryption Security hole: 24-bit IV, one IV per frame, -> IV ’ s eventually reused IV transmitted in plaintext -> IV reuse detected Attack: –Trudy causes Alice to encrypt known plaintext d 1 d 2 d 3 d 4 … –Trudy sees: c i = d i XOR k i IV –Trudy knows c i d i, so can compute k i IV –Trudy knows encrypting key sequence k 1 IV k 2 IV k 3 IV … –Next time IV is used, Trudy can decrypt!

802.11i: improved security numerous (stronger) forms of encryption possible provides key distribution uses authentication server separate from access point

AP: access point AS: Authentication server wired network STA: client station 1 Discovery of security capabilities 3 STA and AS mutually authenticate, together generate Master Key (MK). AP servers as “pass through” 2 3 STA derives Pairwise Master Key (PMK) AS derives same PMK, sends to AP 4 STA, AP use PMK to derive Temporal Key (TK) used for message encryption, integrity i: four phases of operation

wired network EAP TLS EAP EAP over LAN (EAPoL) IEEE RADIUS UDP/IP EAP: extensible authentication protocol EAP: end-end client (mobile) to authentication server protocol EAP sent over separate “ links ” –mobile-to-AP (EAP over LAN) –AP to authentication server (RADIUS over UDP)

Network Security (summary) Basic techniques …... –cryptography (symmetric and public) –authentication –message integrity –key distribution …. used in many different security scenarios –secure –secure transport (SSL) –IP sec –802.11

Acknolwedgements Slides on WEP and security from: –Kurose and Ross’s book distribution