WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WEP Protocol Weaknesses and Vulnerabilities
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Networking & Security Greg Stabler Spencer Smith.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Protocols WEP, WPA & WPA2.
Methods of Securing LANs
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
Presentation transcript:

WIRELESS NETWORK SECURITY

Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack

AD-HOC networks

WAR DRIVING Searching for Wi-Fi by person in moving vehicle

MAN-IN-THE-MIDDLE Hotspots have little security Entices computers to log into soft Access Point Hacker connects to real AP – offers steady flow of traffic Hacker sniffs the traffic Forces you to loose connection + reconnect within the hackers AP.

CAFFE LATTE ATTACK Targets the Windows wireless stack Possible to obtain the WEP key from a remote client Sends flood of encrypted ARP requests Attacker can obtain the WEP key within minutes

Wireless Intrusion Prevention System (WIPS) Robust way to counteract wireless security risks PCI Security Standard Council published guidelines for large organizations

WEP: Wired Equivalent Privacy 1999 Secret Keys [Codes to Encrypt Data] Secondary Goal : Control Network Access

WEP 64,128, 256 bit key 24 bits used for Initialization Vector Each packet includes integrity check

Stream Ciphers RC4 is a stream cipher Expands a key into an infinite pseudo-random keystream

What about IVs? RC4 keystream should not be reused. Use initialization vector to generate different keystream for each packet by augmenting the key IV reuse(24 bits)=>16.7 million variations Same shared key in both directions Encryption is vulnerable to collision-based attacks.

Linear Checksum Encrypted CRC-32 used as integrity check Fine for random errors, but not deliberate ones CRC is linear Can maliciously flip bits in the packet Can replay modified packets!

WEP Problem #1: No Limit on using the same IV Value more than once.This makes the encryption vulnerable to collision- based attacks. Problem #2 The IV is only 24 bits, there are only 16.7 million possible variations.

WEP Problem: #3: Master Keys are used directly, when they should be used to generate other temporary keys. Problem #4: Users don’t change their keys very often on most networks, giving attackers ample time to try various techniques.

802.11i TKIP [Temporal Key Integrity Protocol] AES is a cryptographic algorithm - new hardware may be required 802.1X: used for authentication

802.1X Keeps the network port disconnected until authentication is complete. The port is either made available or the user is denied access to the network.

WPA: Wifi Protected Access Subset of i Master keys are never directly used. Better key management. Impressive message integrity checking.

WPA: Wifi Protected Access Advantages: IV length has increased to 48 bits, over 500 trillion possible key combinations IVs better protected through the use of TKIP sequence counter, helping to prevents reuse of IV keys.

WPA: Wifi Protected Access Master keys are never directly used Better key management Impressive message integrity checking.

802.11i WPA2 WPA2 uses AES (Advanced Encryption Standard) to provide stronger encryption. Enterprise uses IEEE 802.1X and EAP to provide authentication. Consumer uses a pre-shared key, or password. New session Keys for every association- unique to that client. Avoids reuse.

WPA = TKIP X To get a Robust Secure Network, the hardware must use CCMP [Counter Mode CBC MAC Protocol] WPA2 = CCMP+802.1X

TIPS Change default Administrator Passwords for router. Turn on WPA/WEP Encryption Change the Default SSID Enable Mac Address Filtering

TIPS Disable SSID Broadcast Do Not Auto-Connect to Open Wi-Fi Networks Assign Static IP Addresses to Devices Turn off DHCP on the router access point

TIPS Ensure firewall is enabled on your router and also each computer connected.

TIPS Position the router or Access Point Safely Turn Off the Network during Extended Periods of Non-Use.

Questions ?