Security in Wireless LAN 802.11 Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.

Slides:



Advertisements
Similar presentations
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Advertisements

WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Wireless Network Security Issues By Advait Kothare SJSU CS265 Fall 2004.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
& WEP Tzachy Reinman System and Network Security Course
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Review of Wireless LAN Security Chapter-9
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Module-8 Wireless LAN Security ,Vulnerabilities and Attack Methods
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless LAN Security CS391. Overview  Wireless LAN Topology  Standards  Simple Security  WEP  802.1x  WPA  i.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
CSE 5/7349 – April 5 th 2006 Wireless Networking.
How To Not Make a Secure Protocol WEP Dan Petro.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp

5 basic threats to WLAN Sniffing - eavesdropping Invasion – steal valid STA’s access to gain access to network Traffic redirection – change in ARP table Denial of service (DOS) – Flood the network – Disrupt connection between machines – Prevent a STA from connecting to WLAN Rogue networks and station redirection – Man- in- the- middle attacks.

IEEE Authentication – Open Key Uses null authentication, Simple Is the default authentication 2 steps: A sends a request authentication to B B sends the result back to A If dot11 Authentication Type at B is set to "Open System"  Returns "success"  A is mutually authenticated; Otherwise A is not authenticated

Shared key Authentication Provides a better degree of authentication. Station must implements WEP (Wired Equivalent Privacy) 4 steps: 1. Request sends an Authentication frame to AP. 2. AP replies with a random challenge text generated by the WEP engine( 128 bit). 3. STA copy the challenge text, encrypt it with a shared key then send the frame to the AP. 4. AP decrypt the received frame, then verifies the 32- bits CRC “ICV”, and that the challenge text matches the one it sends earlier to the station. 5. Successful/negative authentication if match/mismatch

Identity Problems Open System authentication Null authentication. Messages sent in clear. Any one can impersonate either the station or the access point. Shared key authentication Only station authenticates itself. No mechanism for AP to prove its identity to the station therefore malicious AP. Only the station is authenticated not the user of the station.

Shared key vulnerabilities (cont…) Exchanging both challenge and response occurs over the wireless link and is vulnerable to a man-in-the-middle attack.

IEEE Wired Equivalent Privacy (WEP) Protocol The goal is to provide data privacy to the level of a wired network. (WEP) algorithm is used to prevent eavesdropping. An encapsulation of data frame. 64- bits key (40-bit secret key,24-bit "init" vector). Symmetric algorithm because the same key is used for cipher and decipher. Data integrity checked with CRC-32.

WEP Encryption A key shared among members of the BSS. Sender calculates CRC of the frame's data. WEP appends a new generated 24-bit initialization vector (IV) to the shared key. WEP PRNG (RC4) is used to generate a key stream. XORs key stream against (payload + CRC) to produce ciphertext. The sender also inserts the IV into frame header, and sets the WEP encrypted packet bit indicator.

WEP Decryption Receiver extracts IV from the frame appends IV to the BSS shared key, and generates the "per- packet" RC4 key sequence ciphertext is XORed against the key steam to extract plaintext. Verification: performs integrity check on plaintext Compares ICV1 result with the ICV transmitted.

WEP Decryption

ICV Weakness How is the attacker able to modify ICV to match the bit-flipped changes to the frame?

WEP Problems-with RC4 flip a bit in the ciphertext (C)  the corresponding bit in the plaintext will be flipped. Eavesdropper intercepts 2 ciphertext encrypted with the same key stream  possible to obtain the XOR of the 2 plaintexts. c1 = p1  b c2 = p2  b  c1  c2 = (p1  b)  (p2  b) = p1  p2

WEP Problems-with IV IV is 24 bits cleartext, part of a message. A small space of initialization vectors guarantees the reuse of the same key stream. AP constantly send 1500 byte pkt at 11 Mbps will exhaust the space of IV after 1500 * 8/(11 * 10 ^ 6 ) * 2 ^ 24 = 18000s = 5h When the same key is used by all mobile stations more chances of IV collision.

Cisco enhancements to WEP to increase security Mutual authentication instead of one-way authentication Secure key derivation using one way hash function Dynamic WEP keys instead of static WEP keys Initialization Vector changes

Today & future control Service Set Identifier (SSID) Each AP has an SSID of the AP to identify itself. STA have to know the SSID of the AP to which it wants to connect. SSID keeps a STA from accidentally connecting to neighboring AP. This does not solve other security issues and does not keep an attacker from setting up a "rogue" AP that uses the same SSID as the valid AP

Today & future control (cont.) MAC filters AP check MAC addresses of STAs before being connected to the network – AP keep a list of MAC addresses in long- term memory. – AP may send a RADIUS request with the MAC address as the userID (and a null password ) to a central RADIUS server to check the list for an address.

The End