Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
1 Authentication Celia Li Computer Science and Engineering York University.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
IEEE i Dohwan Kim.
Presentation transcript:

Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks

2 Overview 1  Introduction 2  Authentication in WMN using exisitng protocols 3  Emerging Security Issues 4  Authentication protocol based on WMN properties 5  Security Analysis 6  Conclusion

3 Introduction What is Wireless Mesh Network (WMN)? Mesh Nodes: Devices with at least two radio interfaces Mesh nodes form together a wireless network (Ad-Hoc) Second interface (AP) is used by mobile clients to connect to the network Hot Spots (HS): Mesh Nodes equipped with a wired internet connection Transient Access Points (TAP): Mesh Nodes without wired internet connection  Provide Internet Access to Mobile Clients by using the WMN as a backhaul

4 Authentication in WMN using existing protocols (1) Authentication protocols for the State of the Art of Wireless Networks IEEE : First WiFi standard released in 1997 Provides Data encryption and authentication IEEE i: Most recent security standard released in 2004 Provides a robust data encryption and includes an external authentication framework

5 Authentication in WMN using existing protocols (2) IEEE Encryption Protocol  Wired Equivalent Privacy (WEP), based on shared-key (Key length 64 or 128 bit) Authentication based on the knowledge of the shared-key Security Goals: Prevent Eavesdropping  PRIVACY Prevent Message Modification  INTEGRITY Network Access Control  AUTHENTICATION Weaknesses – None of the security goals are met: Key stream reuse  PRICACY CRC attacks  INTEGRITY Authentication Spoofing  AUTHENTICATION

6 Authentication in WMN using existing protocols (3) IEEE i Encryption Protocol  WiFi Protected Access 1 & 2 (WPA1 & WPA2) Provides robust security properties Authentication performed using the Extensible Authentication Protocol (EAP) Needs a centralize authentication server Different authentication possibilities (EAP methods)

7 Authentication in WMN using existing protocols (4) Extensible Authentication Protocol (EAP) Used in wireless and fixed networks Port Based Network Access Authentication framework Currently about 40 different EAP methods Commonly used methods : EAP-TLS, EAP-TTLS

8 Emerging Security issues (1) Problems with the standard protocols Originally developed for the State of the Art of Wireless Networks Security only for the first wireless link  no End-To-End features Privacy: No data encryption after the first hop Authentication: No Layer 2 authentication after the first hop Single point of failure: Centralized Authentication Server Mesh nodes cannot be considered as trustworthy No topology authentication

9 Emerging Security issues (2) What are the problems related to the architecture of a WMN? Mesh nodes cannot be considered as trustworthy They are often deployed in a hostile environment An attacker can spoof and/or take over a mesh node No topology authentication An attacker can easily inject a malicious node into the WMN Gain access to the network Perform Denial of Service (DoS) Perform Man in the Middle Attacks (MitM)

10 Definition of a new authentication protocol (1) Why a new protocol? No standardized security protocols for WMN The existing protocols do not meet the requirements What should the protocol provide? “Real-time/Continuous” Authentication  Acceptable performance Authentication of every participating node of WMN  Topology authentication Authentication of the network traffic Trustworthy mesh nodes  Mesh Node Access Control Attack Detection/Reaction mechanism

11 Definition of a new authentication protocol (2) How does it work? Based on digital signatures to verify integrity and authenticity Hybrid authentication protocol using symmetric and asymmetric cryptography Offers the best properties in terms of security and performance The administrator plays the role of the CA Provides the needed keys to the Nodes

12 Definition of a new authentication protocol (3) What are the required keys? Every node is in possession Personal Public Key Personal Private Key Personal Secret Key  symmetric Public Key of the Administrator Nodelist  Containing the allowed communication neighbors After initialization  different public/secret keys of neighbor nodes The procedure can be subdivided in two operations: I)  Initialization of a new node II)  Information transmission }  asymmetric

13 Definition of a new authentication protocol (4) Initialization of a new node (asymmetric) Node A wants register to the WMN NodelistCert(A) WMN Signature broadcast Initialization message The receiving node B Checks if it is included in the node list (NL) Checks the signature  Using the Public Key of the Admin B encrypts its secret key and sends it to A After a successful decryption, A encrypts its secret key and sends it to B A :

14 Definition of a new authentication protocol (5) Initialization of a new node (asymmetric) Node A wants register to the WMN Node B (1) Broadcast: NL, Cert(A), SIG{[NL,Cert(A)], PrivK(Admin)} (2) ENC{[Cert(B),K(B),T 1 ], PubK(A)} (3) ENC{[K(A),T 2 ], PubK(A)} Node A

15 Definition of a new authentication protocol (6) Information transmission (symmetric) Every node needs to have the secret key of its neighbor nodes  Initialization Symmetric Signature  Message Authentication Code (MAC) = Fingerprint encrypted using a secret key  Faster Node A wants to send a message to node C via node B DataTimestamp C Signature Message to be transferred A : Send via node B

16 Definition of a new authentication protocol (7) Information transmission (symmetric) Signature verification and newly generated at every hop of the transmission path A different Timestamp guarantees a different signature Node ANode BNode C (1) MSG, T 1, SIG{(MSG,T 1 ), K(A)}(2) MSG, T 2, SIG{(MSG,T 2 ), K(B)} (4) MSG, T 4, SIG{(MSG,T 4 ), K(B)}(3) MSG, T 3, SIG{(MSG,T 3 ), K(C)}

17 Definition of a new authentication protocol (8) How to create trustworthy nodes? We need to guarantee that a attacker cannot retrieve the sensitive data (Keys, Nodelist, …) form a mesh node Mesh Node Access Control Before an attacker gains access to a node, the keys are erased a replaced by dummy values Consequence  Neighbor nodes will fail to verify the messages form the attacked node and drop them Passive attack detection The node is automatically excluded form the WMN

18 Definition of a new authentication protocol (9)

19 Security Analysis (1) Security & Performance Requirements Acceptable performance : YES  Using symmetric signatures Topology authentication : YES  Every node participating in a communication is authenticated Authentication of the traffic : YES  The source of every message is known Trustworthy mesh nodes : YES  Mesh Node Access Control Attack Detection and Reaction : YES  Corrupt Nodes are detected and excluded form the WMN

20 Security Analysis (2) Other Security features No replay attacks using timestamps No single point of failure  No centralized entity Node Spoofing/Injection not possible  Topology authentication  The attacker does not know the needed keys Man in the Middle Attack can be used to perform DoS If an attacker modifies a transient message, it will be discarded

21 Conclusion What’s next? Extend the authentication protocol Implementation of a prototype Client/User authentication Add an administration procedure Remotely reintroduce attacked node into the WMN Attack reporting Privacy and Performance on WMN need to be considered as well Release of a security standard for WMN IEEE s?

22 The end … Thank you for your attention Questions? Wiki.uni.lu/Secan-Lab