Download presentation
Presentation is loading. Please wait.
Published byCarsten Schäfer Modified over 6 years ago
1
Secure Authentication System for Public WLAN Roaming
Authors Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga Computer Science Division Univ. of California, Berkeley Berkeley, CA, U.S.A. Ana Sanz Merino Computer Science Division Univ. of California, Berkeley Berkeley, CA, U.S.A. Manish Shah Computer Science Division Univ. of California, Berkeley Berkeley, CA, U.S.A. Takashi Suzuki Multimedia Laboratories NTT DoCoMo, Inc. Yokosuka, Kanagawa, Japan Randy H. Katz Computer Science Division Univ. of California, Berkeley Berkeley, CA, U.S.A. Presented by Ali Ali Secure Authentication System For Public WLAN Roaming
2
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
3
Abstract WLANs Service providers Serious Challenges
Different trust relationship Support their own authentication Most service providers cannot deploy many access point.
4
Roaming Model Abstract Security mechanism Are Req.
5
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
6
Introduction * Main challenges
Define Security mechanisms that protect user and network Network Requirements Security User Requirements Ease of use Functionality
7
Introduction What is the Solution?
8
and Web authentication scheme.
Introduction Single sign-on (SSO) Authentication Technologies Developed Client-side Policy engine Developed a compound Layer 2 (L2) and Web authentication scheme.
9
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
10
Related Work Link layer authentication IEEE 802.1X standard
IEEE i Web-based authentication and network layer access control
11
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
12
Single sign-on confederation model
Examples of identity providers ISPs credit-card companies roaming service providers (wireless LAN aggregators) cellular network operators
13
Single sign-on confederation model
Our architecture is independent of the authentication methods of service providers Allows users to choose their preferred identity provider and authentication scheme We considered two industry-standard SSO authentication standards RADIUS (Remote Authentication Dial In User Service) Liberty Architecture
14
Single sign-on confederation model
RADIUS (Remote Authentication Dial In User Service)
15
Single sign-on confederation model
Liberty Architecture
16
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
17
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
Designed an architecture that can accommodate alternative authentication methods Traditional System. (Weakness) The Adv. Of our design All the providers do not need to support the same authentication scheme
18
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
Our Design The Framework Allow each provider to support more than one authentication scheme permitting it to communicate with a larger number of providers In case WLAN services provider support multiple authentication; Users can select the method they prefer A user can select one depending on their trust level with the service provider.
19
Server Authentication Capabilities
AUTHENTICATION FLOW ADAPTATION FRAMEWORK Server Authentication Capabilities Server Requirements determine their level of trust charging schemes ( Payment Method, Price, Period, etc.)
20
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
Authentication Flow Adaptation Sequence
21
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
Architecture Model
22
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
It can be observed that there can be more than one authentication server at the service provider each corresponding to a different authentication technology. Two main flow sequences are possible The client does not have the authentication negotiation client installed The user’s terminal has an authentication negotiation client
23
Authentication Negotiation Protocol
AUTHENTICATION FLOW ADAPTATION FRAMEWORK Authentication Negotiation Protocol A new XML web-based protocol The Authentication Negotiation Protocol
24
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
25
Authentication Negotiation Protocol
AUTHENTICATION FLOW ADAPTATION FRAMEWORK Authentication Negotiation Protocol We used a protocol that close to OASIS SAML protocol which is based on XML-based framework for exchanging security information. SAML protocol; Define particular queries and statements for specific kinds of information to be Exchange which are encapsulated inside general SAML request and response Structures. In our protocol We avoid some of the security overhead of SAML messaging not needed in our protocol ( Example)
26
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
The queries and statements defined by the Authentication Negotiation Protocol are the following: Authentication Capabilities Query Authentication Capabilities Statement Authentication Query
27
AUTHENTICATION FLOW ADAPTATION FRAMEWORK
Client Graphical User Interface
28
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
29
POLICY ENGINE The purpose of policy engine The advantages
30
The policy check component
POLICY ENGINE Component Blocks The policy check component Root component Secure component Specific component
31
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
32
Securing Web Based Auth. & Access Control
Security Threats in Web-based Authentication Compound Layer 2 and Web Authentication System Security Analysis
33
Security Threats in Web-based Authentication
Securing Web Based Auth. & Access Control Security Threats in Web-based Authentication • Spoofing IP or MAC address • Eavesdropping • Message alteration • Denial of service attack
34
Securing Web Based Auth. & Access Control
Compound Layer 2 and Web Authentication
35
Securing Web Based Auth. & Access Control
System Security Analysis Theft of Service Eavesdropping/Message Alteration Denial-of-Service
36
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
37
Conclusion Questions?
38
Outline Abstract Introduction Related work
Single sign-on confederation model Authentication Flow Adaptation Framework Policy Engine Securing WEB-Based Authentication and Access Control Conclusion References
39
References [1] HotSpotList.com,http://www.hotspotlist.com/
[2] IETF,RFC2865“RemoteAuthenticationDialInUserService(RADIUS)”,June2000. [3] LibertyAllianceProject,“LibertyID-FFArchitectureOverview”,Version1.2,November2003. [4] Wi- FiAlliance,“BestCurrentPracticesforWirelessInternetServiceProvider(WISP)Roaming”,ver.1.0,2003. [5] S.HadaandM.Kudo,“AccessControlModelwithProvisionalActions”,IEICETrans.Fundamentals,V ol.E84-A,No.1,Jan.2001. [6] OASIS,“eXtensibleAccessControlMarkupLanguage(XACML)”,Version1.0,February2003. [7] IEEEStd802.1X-2001,“Port-BasedNetworkAccessControl”,June2001. [8] IEEEStd802.11i/D7.0,”MediumAccessControl(MAC)SecurityEnhancements”,October2003. [9] IETF,RFC2716,“PPPEAPTLSAuthenticationProtocol”,Oct.1999.
40
References [10] Internet-Draft, “EAP Tunneled TLS Authentication Protocol”, draft-ietf-pppext-eap- ttls-03.txt, work in progress. [11] IETF RFC 2402, “IP Authentication Header”, Nov [12] D. Jablon, “Strong Password-Only Authenticated Key Exchange”, Computer Communication Review, Vol.26, 1996. [13] [14] V. Bahl, A. Balachandran, S. Venkatachary, “The CHOICE Network: Broadband Wireless Internet Access In Public Places”, Microsoft Technical Report, MSR-TR , Feb [15] OASIS, “Assertions and Protocol for the OASIS Assertion Markup Language (SAML)”, Committee Specification 01, May 2002.
41
References [16] http://www.open1x.org/
[16] [17] N. C-Winget, R. Housley, D. Wagner, J. Walker, “Security flaws in data link protocols”, Communications of the ACM, 46(5), May 2003, pp [18] J. Bellardo and S. Savage, “ Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions”, Proceedings of the USENIX Security Symposium, August 2003. [19] IETF, RFC2759 “Microsoft PPP CHAP Extensions, Version 2”, Jan
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.