CNS2009handout 18 :: wireless security1 computer and network security matt barrie.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
CWSP Guide to Wireless Security
CWSP Guide to Wireless Security
CWSP Guide to Wireless Security Secure Wireless Authentication.
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Block Cipher Modes of Operation and Stream Ciphers
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
1 Intercepting Mobile Communications: The Insecurity of …or “Why WEP Stinks” Dustin Christmann.
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
1 MD5 Cracking One way hash. Used in online passwords and file verification.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
Wireless Privacy: Analysis of Security Nikita Borisov UC Berkeley
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Foundations of Network and Computer Security J J ohn Black Lecture #34 Dec 5 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
IEEE Wireless Local Area Networks (WLAN’s).
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Networking & Security Greg Stabler Spencer Smith.
WEP Case Study Information Assurance Fall or Wi-Fi IEEE standard for wireless communication –Operates at the physical/data link layer –Operates.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Giuseppe Bianchi Warm-up example WEP. Giuseppe Bianchi WEP lessons  Good cipher is far from being enough  You must make good USAGE of cipher.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless Protocols WEP, WPA & WPA2.
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

CNS2009handout 18 :: wireless security1 computer and network security matt barrie

CNS2009handout 18 :: wireless security2 mobile computing Main forms: –3rd Generation Mobile Phones (CDMA2000, etc.) – Wireless Ethernet (Wireless LANs) – Wireless Personal Area Networks (e.g. Bluetooth) – Wireless Broadband Of main concern to wireless networking is –802.11b operating at 2.4GHz ISM band (11Mbps) –802.11a operating at 5GHz ISM band (54Mbps) –802.11g Mixed mode operation (a & b) –802.11c Bridging. –802.11f Roaming, Access Point (AP) Hand Off. –802.11i Security / WPA2 –.. MIMO etc..

CNS2009handout 18 :: wireless security is taking off Most if not all new laptops ship with built-in Soon all desktops will ship with built-in Many PDAs have already Many VoIP products are being developed to use Many mobile phone products are being developed for

CNS2009handout 18 :: wireless security4 WLAN vulnerabilities Physical access to the network is no longer required Most wireless networks are inside the firewall –No more network perimeter Most wireless networks link to insecure machines –Particularly laptops, soon PDAs and mobile phones Passive and active attacks are easier to launch Less audit trails Less security mechanisms (for now) Attackers can get away with relative impunity Denial of service

CNS2009handout 18 :: wireless security5 war driving The wireless equivalent of –war dialing scanning all carriers within an area code with a modem –port scanning scanning all machines and ports on a network The concept is simple: –Drive around in a car listening for networks. –Plot signal strengths on a map using a hand held GPS unit. Tools –Net stumbler –Airsnort –WEPcrack –Antenna (21dB directional $200) –Amplifier (up to 10W over the Internet ~$1,000) –Laptop (war driving) –Palmtop (war walking)

CNS2009handout 18 :: wireless security6 war driving

CNS2009handout 18 :: wireless security b b is protected by the Wired Equivalent Privacy (WEP) protocol. –Claimed to be “equivalent security” to a fixed wired network but in fact is much worse. WEP Security Goals: –Confidentiality Prevent an attacker from eavesdropping –Access Control Prevent an attacker from accessing your network –Integrity Prevent an attacker modifying messages in transit The following is an exercise in how security protocols should not be designed.

CNS2009handout 18 :: wireless security8 WEP overview A master key k 0 (either 40 or 104 bits) is shared between two parties wishing to communicate a priori. Each packet (header|data) is then protected by: –An integrity check field IC = h(header|data) –A random initialisation vector IV The master key and IV are used to generate a keystream using RC4 in stream cypher mode k = RC4(k 0, IV) The data and IC are then encrypted by this keystream E k (m) = m  k

CNS2009handout 18 :: wireless security9 WEP packet header IV encrypted data IC RC4 generated keystream packet random header packet = header | IV | E k (data | IC)

CNS2009handout 18 :: wireless security10 RC4 stream cypher WEP protects the confidentiality of the payload through RC4 in stream cypher mode. Senders use RC4 seeded with the IV and master key k 0 to generate a keystream. This keystream is then xord with the plaintext. Receivers likewise generate the same keystream using the master key (shared a priori) and the received IV (sent in the clear). They then xor this with the cyphertext to obtain the plaintext (the keys cancel): m = c  k = m  k  k

CNS2009handout 18 :: wireless security11 attacks on WEP overview WEP is broken. There are a surprising large number of attacks possible on the protocol: –Passive attacks to decrypt traffic based on statistical analysis. –Active attacks to decrypt traffic, based on tricking the access point. –Active attack to inject new traffic from unauthorized mobile stations. –A memory tradeoff attack that allows real-time automated decryption of all traffic. –An active inductive chosen plaintext attack which allows decryption of traffic. –An attack on the key scheduling algorithm of RC4.

CNS2009handout 18 :: wireless security12 stream cypher problems RC4 is effectively being used as a pseudo-one time pad. Problem: Two messages must never be sent using the same key or you end up with a two time pad: c 1  c 2 = m 1  k  m 2  k = m 1  m 2 This is effectively a running key cipher with English as the key. –As the messages have a low entropy (parts are very easily guessed), an attacker can trivially decode both messages. Even worse, an attacker can obtain the original keystream.

CNS2009handout 18 :: wireless security13 stream cypher problems They keystream in this mode of RC4 depends on only an IV and k 0. The master key k 0 is a long-term, fixed key –In many setups all users share this key (so much for WEP at a “hot spot”) –As it is user chosen it is most likely guessable (dictionary attack). Thus the keystream is only really dependent on IV –Which is 24 bits long (16 million values) If any two packets ever have the same IV, the keystream is reused (hence packets can be decrypted). The IV is transmitted in the clear, making it simple for an attacker to know when a collision occurs.

CNS2009handout 18 :: wireless security14 birthday attack on the IV To attack the IV in WEP, any packet collision will do. According to the birthday paradox, if C(N,q) is the probability of collision throwing q balls randomly into N different buckets then if also 1 ≤ q ≤ √(2N) we know: C(N,q) ≥ 0.3 q(q-1)/N Solving for C(N,q) = 0.5 and N = 2 24 gives q = 5,288 packets Thus on average a collision will occur every 5,288 packets.

CNS2009handout 18 :: wireless security15 IV implementation is broken In reality, the problem is much worse. Most cards initialise the IV as zero on power on and increment per packet sent rather than use random values. –Finding a collision becomes trivial as they will occur every time a laptop is powered on. Furthermore, in most arrangements the master key k 0 is shared between all users on the network. –Thus an attacker can find collisions between any user on the network –Any direction of all users on all channels.

CNS2009handout 18 :: wireless security16 a memory tradeoff attack on the IV An adversary can mount a known plaintext attack on the IV in WEP easily: –Send a WEP user a known message (e.g. via ) –The adversary records the IV for the message –They then XOR the plaintext and the cyphertext to store the keystream –This keystream is stored in a table, indexed by the IV value –Next time a message is sent with that IV, the message can be fully decrypted. Likewise an adversary can mount this attack with no known plaintext if they see a packet collision (thus can decrypt the third packet sent).

CNS2009handout 18 :: wireless security17 refining the IV memory tradeoff attack A full table for all IVs for a given master key k 0 will take at most 1,500 bytes * 2 24 = 24GB (a cheap hard drive). –Most likely one won’t need the full 1,500 bytes (500 may do). Note the table is independent of the size of the master key k 0. If the cards are using non random IVs (e.g. initialised to zero), then the IVs (and hence the tables) will be much smaller, making the attack much easier. Furthermore the standard dictates that changing the IV with each packet is optional!

CNS2009handout 18 :: wireless security18 the integrity check field In WEP, the Integrity Check field (IC) is a 4 byte value used to verify message integrity (and, in fact message authentication). Thus a receiver will accept a message if the IC is valid. The issue with WEP is that the IC is the CRC-32 cyclic redundancy check, a simple checksum. –CRCs are good for detecting transmission errors –CRCs do nothing to stop malicious errors There are two major problems here –CRCs are linear i.e. h(m  k) = h(m)  h(k) –The CRC is independent of the master secret k 0 and the IV

CNS2009handout 18 :: wireless security19 a modification attack on the IC The attacker records a message (known or not known) The attacker then modifies m in a known way to produce m’ m’ = m  Δ Since CRC-32 is linear, they can compute a new valid integrity check field IC : IC’ = IC  h(Δ) Which will be valid for the new cyphertext c’ c’ = c  Δ = k  (m  Δ) = k  m’ Thus an attacker xors the original packet by (Δ | h(Δ))

CNS2009handout 18 :: wireless security20 WEP packet header IV m k IC k packet Δh(Δ) header IV m’ k IC’ k modified packet

CNS2009handout 18 :: wireless security21 keystream recovery attack If an attacker knows the plaintext of a single WEP protected packet, they can inject any packet into the network An attacker records a packet c = m  k where m is known –e.g. the attacker s the victim The attacker then recovers the keystream k = c  m for that IV Say an attacker wishes to inject message m’. They compute: IC’ = h(m’) = CRC32(m’) The attacker then computes the encrypted part of the packet c = (m’|IC’)  k The attacker now has a valid packet header | IV | (m’ | IC’)  k

CNS2009handout 18 :: wireless security22 keystream recovery attack The fundamental problem here is that they checksum is not dependent on any shared secret. As a result, if CRC-32 is replaced by a secure hash function (e.g. MD5) this attack would still be possible. Far better would have been to use a keyed MAC dependent on some secret.

CNS2009handout 18 :: wireless security23 attack on the authentication protocol The authentication protocol in WEP is used to prove that a client wishing to access the network knows master secret k 0 –The base station sends a challenge [ x | h(x) ] to the client. –The client sends back the challenge encrypted with k 0 [ x | h(x) ]  k where k = RC4(IV, k 0 ) –The base station verifies the response is encrypted with k 0. Problem: An eavesdropper has just seen a plaintext/cyphertext pair (and hence can use it in any of the attacks mentioned before - including extracting the keystream). An eavesdropper can replay the response to gain access to the network, spoofing the authentication protocol.

CNS2009handout 18 :: wireless security24 authentication spoofing Alice tries connecting to the network. Bob (the base station) sends out a challenge [ x | h(x) ]. Alice replies with [ IV, (x | h(x))  k ]. Eve extracts IV and k from this message by xoring the challenge with the response. Now Eve tries connecting to the network. Bob sends out a challenge string y. Eve replies with [ IV, (y | h(y))  k ]. Bob accepts Eve onto the network.

CNS2009handout 18 :: wireless security25 message decryption attacks Although an adversary does not know k 0 through any of the attacks so far, there are several attacks in which they can trick the base station to decrypt messages for them: Decryption by double encryption. WEP decapsulation through message redirection. Reaction attacks.

CNS2009handout 18 :: wireless security26 double encryption An attacker records a packet they wish to decrypt. Say this packet has the value IV = v as the initialisation vector. The attacker waits until the base station resets (or wraps) and the base station IV = v-1. The attacker then forwards this packet over a separate connection through the base station (joined through authentication spoofing). The base station will encrypt the encrypted packet: [m | h(m)]  RC4(v, k 0 )  RC4(v, k 0 ) = [m | h(m)] The plaintext is thus sent over the air.

CNS2009handout 18 :: wireless security27 message redirection This attack is even easier than double encryption in that it removes timing issues. An attacker records a packet they wish to decrypt. They then modify the header so that the destination IP address is a machine they control somewhere on the Internet. The attacker then calculates a new IC checksum: –Remember if m’ = m  Δ, then IC’ = IC  h(Δ) ( CRC-32 is linear) The attacker then joins the network using authentication spoofing. The attacker then injects this packet onto the network. The base station will forward the packet to the Internet, stripping the WEP encapsulation (decrypting it).

CNS2009handout 18 :: wireless security28 reaction attacks This attack allows an adversary to decrypt a packet even if the base station is not connected to the Internet. The target packet to decrypt needs to be a TCP packet (though others can likely be sent as TCP packets). Lemma: It is possible using the TCP checksum to make the checksum be valid or invalid depending on whether a particular bit in the message is a 0 or 1. An attacker modifies the recorded packet to check if bit0 of the message is a 0 and sends it on the network. –If the base station responds with an ACK, bit0 is 0. –If the base station responds with a NACK, bit0 is 1. The adversary repeats for each bit in the message.

CNS2009handout 18 :: wireless security29 inductive chosen plaintext attack Principle: Guess at some plaintext in an encrypted message. Based on this we know n bytes of the keystream. Leverage redundancy in the CRC-32 checksum to learn more information (one byte at a time) about the keystream.

CNS2009handout 18 :: wireless security30 inductive chosen plaintext attack Example: Wait for a DHCP discover message (where we know the source address is and the destination address is ). We now have 24 bytes of keystream for a particular IV (if we xor the known plaintext with the cyphertext we get the keystream). Create a new packet now (say a “ping” packet) that is = 21 bytes long. Xor this part with the first 21 bytes of the keystream we know.

CNS2009handout 18 :: wireless security31 inductive chosen plaintext attack Example: Compute the checksum IC for the message, but only append the first 3 of 4 bytes to the packet. Xor this with the remaining bytes of the keystream we know. Add the last byte of the checksum and guess at the next byte of keystream to xor. If the packet is accepted we got it right (repeat 256 times until we get it correct). When we get it right we learn one more byte of the keystream (for a given IV).

CNS2009handout 18 :: wireless security32 inductive chosen plaintext attack packet known keystream header IV valid encrypted data data IC guessed byte of keystream packet accepted if this byte is correct

CNS2009handout 18 :: wireless security33 inductive chosen plaintext attack Discussion: This attack is possible regardless of the length of the IV or the key size. This attack is stopped by use of a keyed MAC for the hash function (again, instead of CRC-32). Replay prevention would also help. An attacker making 100 guesses/second will, on average obtain a 1,500 byte keystream (for a given IV) in 32 minutes. Note: failures are not logged by the OS (hence attackers are not noticed).

CNS2009handout 18 :: wireless security34 IV cascading Once an attacker has one IV, the others are trivial to obtain. An adversary needs only transmit a packet which is echoed back by the access point (e.g. a ping packet). The access point will pick a new IV to encrypt the known plaintext. Hence an attacker can quickly fill the remaining values from the 2 24 possible combinations. Broadcast pings are even better, returning many packets for each one sent.

CNS2009handout 18 :: wireless security35 the key scheduling algorithm in RC4 After all this, RC4 is used poorly in the protocol. There are large numbers of “weak” keys where a few bits in the key leads to large numbers of determined bits out of the key scheduling algorithm (KSA) and output stream. Combined with this is a related key attack which allows an adversary to obtain the rest of the secret bits when they have access to parts of the input key to RC4. In WEP they can modify the IV; remember the stream cypher is RC4(IV, k 0 ). This attack is only linear in complexity with increasing key size. Hence 128-bit WEP2 keys are also vulnerable.

CNS2009handout 18 :: wireless security36 problems with Significant problems (you should have picked up from this class) –The IC hash should be a keyed MAC, not a linear checksum. –24 bit initialisation vectors are too small, and should be randomly chosen. –The master secret k 0 is likewise too small (at 40 bits) and should be arranged to be different for each machine - and not user chosen. –The key scheduling algorithm of RC4 is broken. The cypher should be replaced with another (many alternatives). –Nonces should be incorporated to avoid replay issues. –The authentication protocol is weak and keys used should be separate from those used to protect confidentiality. –New versions should not allow backwards compatibility! Other major problems: –The underlying b management frames are unauthenticated and may be spoofed Whole slew of problems (AIR-JACK, WLAN-JACK, MONKEY-JACK, KRACKER-JACK)…

CNS2009handout 18 :: wireless security37 WEP security reality Confidentiality –Your network is vulnerable from 10 kilometres away. –All your traffic can easily be decrypted. Access Control –Anyone can join your network whenever they feel like it. –Most likely your internal network. Integrity –All your traffic is vulnerable to modification and replay. –I own your DHCP server- all traffic now routes via my laptop Reliability –Your network can be taken down at a moment’s notice.

CNS2009handout 18 :: wireless security38 securing Minor recommendations : –Enable WEP (better than having it off) –Enable key rotation (where available) –Turn broadcasting of SSID off (although spoofing can reveal) –Block null ESSID connections –Restrict access by MAC (MACs can be faked) Major enhancements: –VPNs over –802.1X –Other EAP variants –TKIP –Wireless IDS –RF Signal Shaping

CNS2009handout 18 :: wireless security39 VPNs over Not that simple Most IPsec tunnel mode products shipping are proprietary –Not IETF Interoperability is poor Many of the proprietary extensions have security flaws –Microsoft CHAP, CHAPv2 in PPTP –Microsoft MPPE RC4 encryption protocol –Others Many VPNs are still vulnerable to man in the middle –Strong, mutual authentication is mandatory Client machines may still be vulnerable

CNS2009handout 18 :: wireless security x Standard for passing EAP over wired/wireless LAN –EAP encapsulation over LANS (EAPOL) –“Network Port Authentication” Extensible Authentication Protocol (EAP) –General framework for many authentication schemes Passwords, challenge-response tokens, public-key infrastructure certificates.. No per-packet overhead Requires only firmware update Fits well with existing infrastructure –EAP originally designed as part of PPP authentication

CNS2009handout 18 :: wireless security x

CNS2009handout 18 :: wireless security x mechanism 1.Authenticator sends an "EAP-Request/Identity" packet to the supplicant as soon as it detects that the link is active 2.Supplicant sends an "EAP-Response/Identity" packet to the authenticator, which is then passed on to the authentication (RADIUS) server. 3.The authentication server sends back a challenge to the supplicant via the authenticator using EAPOL 4.The supplicant responds to the challenge via the authenticator and passes the response onto the authentication server. 5.If the supplicant provides proper identity, the authentication server responds with a success message, which is then passed onto the supplicant. 6.The authenticator now allows access to the LAN- - possibly restricted based on attributes that came back from the authentication server. –For example, the authenticator might switch the supplicant to a particular virtual LAN or install a set of firewall rules.

CNS2009handout 18 :: wireless security x problems Is not a complete replacement for WEP –Confidentiality is not provided for, only key negotiation and management Poor authentication protocols are vulnerable to attack –e.g. dictionary attacks on password authentication Session Hijacking –After authentication, force supplicant to disconnect and steal session Man in the middle –There is no mutual authentication, thus access points can be spoofed 802.1x authentication mechanisms are vendor-implemented Variety of denial-of-service attacks –Sending spoofed EAPOL Start, Identifier, Success and Failure packets

CNS2009handout 18 :: wireless security44 other EAP variants (PEAP, LEAP, EAP-TLS, WPA, WPA2) –Vendor driven, various pros and cons TKIP (WEP2) –Temporal key integrity protocol –Too little too late Wireless IDS –Monitor suspicious activity on the network RF Signal Shaping –Directional antennae –Low access point power

CNS2009handout 18 :: wireless security45 references Sites (interest only) – – – –