Wireless Network Security for Future Internet

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Network Security.
Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
Wireless LAN  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD  Securing.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Awareness: Applying Practical Security in Your World
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Mobile and Wireless Communication Security By Jason Gratto.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Wireless Networking & Security Greg Stabler Spencer Smith.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Configuring and Troubleshooting Routing and Remote Access
Chapter 12 Communications Security & Countermeasures
MIAKO.net Public Wireless Internet Service in Kyoto
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

Wireless Network Security for Future Internet Yasuo Okabe Academic Center for Computing and Media Studies Kyoto University

Overview What is Network Security? W-LAN Security Technologies Security Issues on Public Wireless Internet Access Services Location Privacy Summary

1. What is Network Security? a brief introduction

What is Network Security? sender message recipient adversary? interruption eavesdropping masquerade fabrication modification

Active Attacks and Passive Attacks Interruption denial of service (DoS) Masquerade Fabrication replay Modification Passive Attacks Eavesdropping (or Wiretapping) get the content of messages without the sender/recipient being aware of it Monitoring observe who sends a message to whom at when Passive attacks are more difficult to detect than active attacks

Repudiation ? ? sender message recipient adversary? The sender denies the fact he have sent the message The sender tells a lie. The recipient tells a lie. An adversary fabricated the message. The recipient denies the fact she have received the message An adversary masqueraded as the recipient. The received message is different from what is sent. The sender tells a lie The recipient tells a line An adversary modified it. }Both It is meaningless one can believe firmly the opponent tells a lie but he cannot prove it to a third person.

Network Security Attributes in Computer Security Authentication Confidentiality Integrity Availability Authentication confirm both the sender and the recipients surely have the authority to do the act a the communication Nonrepudiation prevent either the sender or the recipient from denying the communication When a message is sent, the recipient can prove that the message is sent from the sender, and vice versa. Concealment assure to be kept unnoticed the fact communication is done between the sender and the recipients to others

2. W-LAN Security Technologies

Wireless LAN IEEE802.11 Wi-Fi (Wireless Fidelity) A set of standards for wireless local area networks (W-LAN) Developed by IEEE LAN/MAN Standards Committee (IEEE802). IEEE 802.11 (1997), 11b (1999), 11a (1999), 11g(2003) IEEE 802.11i (2004) Wi-Fi (Wireless Fidelity) A family of related specifications based on IEEE802.11 but slightly modified. Specified by Wi-Fi Alliance

W-LAN Security Access Control at Access Points Stealth ESSID stop announcement of ESSID (Extended Service Set ID) But, ESSID can be sniffed by monitoring. MAC Address Registration deny packets from a client whose MAC addresse is not registerred But, MAC addresses can be sniffed and be spoofed. WEP, WPA, … 〔T.B.D. later〕 Restriction at Access Points IP address restriction/port filtering Disabling direct communication among clients

WEP (Wired Equivalent Privacy) Authentication and Encryption by a WEP Key 64bit WEP (40bit key+24bit IV) 128bit WEP (104bit key+24bit IV) Two mode of authentication Open System authentication No actual authentication at association, but data is encrypted by WEP key Shared Key authentication Four-way challenge-response handshake at association

WEP Encryption Details CRC32 Data (plain text) ICV (Integrity Check Value) RC4 XOR (exclusive OR) WEP key Key stream IV (Initial Vector) (encrypted) MAC header IV Data (encrypted) ICV FCS (Frame Check Sum) IV and hence key stream are frequently changed, so as to protect against brute-force attack.

Vulnerability of WEP Relatively shortness of IV Key remains static 224 ≒ 16,000,000 The same number of packets may be sent only in 10 minutes in 54Mbps W-LAN. Crackers can get the XOR of plain-text data if he find two frames with the same IV (D1+K) + (D2+K) = D1+D2, where D1 and D2 are original data and K is the key stream. Key remains static sometimes yearly… RC4 is known to be weak. Note that cracking can be done passively

Cracking Tools AirSnort Aircrack-ng http://airsnort.shmoo.com/ http://www.aircrack-ng.org

demo

WPA (Wi-Fi Protected Access) WPA-TKIP Improvement of WEP Use a temporal key instead of WEP key Key is assigned per client, per association and periodically changed TKIP: Temporal Key Integrity Protocol Key stream is generated by RC4 from 48bit IV (initial vector) avoid reuse same IV. WPA-AES Use of AES (Advanced Encryption Standard) instead of RC4.

WPA-PSK WPA-PSK (Pre-Shared Key) Weakness Replacement of WEP Initial association between AP and client is done with a pass phase as a pre-shared key Weakness Attacker who have the pre-shared key can eavesdrop all packets. Dictionary attack may succeed if the pre-shared key is not choose enough long and not guessable.

WPA-EAP EAP (Extensible Authentication Protocol) EAP-TLS Authentication based on 802.1x with a Radius authentication server EAP-TLS Based on PKI Server and client mutually authenticate by certificates EAP-PEAP ID/Password based Use of PKI is optional MS-CHAP v2 Server and client mutually authenticate via ID/password EAP-SIM Using SIM (GSM Subscriber Identity Module) Corresponding Node Authentication Server Access Point Mobile Node

Comparison of IEEE802.1X EAP-TLS EAP (Extensible Authentication Protocol) 方式 Client Authentication Server Authentication Security Level Operation Cost EAP-TLS Certificate High EAP-TTLS ID/Password Mid. EAP-PEAP LEAP Low EAP-MD5 ---

How to use EAP-TLS based on PKI Application Server (web) RA CA RA Administrator Apply CA Administrator Authority Delegation Smart Card Identify Authorize User RA Operator Admin Server (web) Issue Request Issue Certificate LDAP RADIUS AP

OpenWRT http://openwrt.org/ Alternative firmware for commodity W-LAN routers Supports many platforms, including Buffalo’s products Open source based on Linux CLI Supports many features like 802.1x with Radius, VPN, etc. Customizable by users themselves. DD-WRT http://www.dd-wrt.com/wiki/ A branch of OpenWRT GUI

3. Security Issues on Public Wireless Internet Access Service

Status of public wireless Internet access Remarkably rapid deployment of IEEE802.11b/g W-LAN in these 10 years Now almost all Note PCs have W-LAN build in. Security risks/incidents have become a social problem. “Public wireless LAN” or “wireless HotSpot” Public Internet Access Service using W-LAN technology Attracts attention of the mass media. In U.S. Bankruptcy of MobileStar (2001) In Japan Paid services are not necessarily satisfactory MIS stops the service (2002) Livedoor Wireless canceled the plan of extending the coverage Each of NTT group company provides service in unsystematic way. HOTSPOT (NTT.com), M-Zone (NTT DoCoMo), Wireless LAN Club (NTT BP), FletsSpot (NTT East/West)

Difficulty in the business model of public wireless Internet access service Issues in cover area Conflict among service providers at public hot spots like railway stations, airports, hotels Number of channels of IEEE802.11b/g is very small In most places only one service available Users who subscribes the service can use it. Most of the spots are located at metropolis, few in local cities. Covers only spots, not area Enormous investment is needed to cover area, compared to 3G mobile phone service Several projects conducted by local governments are suspended in U.S.

Free Wireless Services FON http://www.fon.com Google WiFi http://wifi.google.com eduroam http://www.eduroam.org FreeSpot http://www.freespot.com

Google WiFi A free wireless Internet service in Mountain View by Google More than 400 APs. Service area: almost the whole areal of 18km2 Unique user:15,000/month “We're offering to the city of Mountain View as part of our ongoing efforts to reach out to our hometown.” http://wifi.google.com/city/mv/apmap.html

eduroam W-LAN roaming architecture among academic and research institutes in Europe and other countries. IEEE802.1x (EAP-TTLS)+raduis federation Roaming between commercial service providers in Europe (experimental)

Is FREE service really possible? We already have Internet Infrastracuture. Most of office/shops/houses have broadband access. ADSL (1~10Mbps) ⇒ FDDH (100Mbps~1Gbps) Providing it to visitors is feasible We rarely consumes the bandwidth fully Wireless service needs little cost. The issue is security Risk of providing network access to unknown visitors Access to the private network can be prohibited but Malicious access to the Internet is hard to limit

Security in public wireless Internet services What is the difference between W-LAN and public Wireless Access? For users: Eavesdropping, MIM (man-in-the-middle) attack Masquerading (Impersonation) For host people of access points Accounting (in paid service only) Avoiding anonymous use

Limitation of Wireless-LAN authentication and encryption technologies for public wireless service Stealth ESSID? ESSID must be announced to public MAC address filtering Can very easily be spoofed Issues in scalability WEP (encryption) Pre-shared key The key is shared by all users WPA-EAP IEEE802.1x Cannot be used in public services. Encryption is done only in Wireless section (between AP and client)

ISP type W-LAN service Features Centralized Management by ISP Wireless AP and Access Network are owned by ISP ISP manages Authentication Server and issues acounts Subscriber must rely on ISP Issues Contract is needed between the ISP and subscribers Corresponding Node ISP Network Authentication Server Access Point 1. 2. AS: authentication server AP: access point MN: mobile node CN: corresponding node Authorization Data Mobile Node

Wireless Internet Service by a single ISP MN (mobile node) Auth Server AP (Access Point) ISP Internet CN (corresponding node) Mutual Authentication ISP’s private network Mutual trust relation

WLAN roaming among ISPs CN Internet (exapmple) iPass eduroam Home ISP AAA server Roam ISP Access points Authentication MN Trust relation between Home ISP And Roam ISP is necessary Mutual trust relation

Self-managed model Features Managed typically with one or a few APs, independently Daily operational cost is not so high. Security policy depends on the host person Grass-root deployment is possible Issues Very costly to assure security level as high as the user can be traced when an incident occurs. No protection if the host person has malicious attempt. Corresponding Node 2. Host person’s network Access Point (1.) Mobile Node

Self-managed FreeSpot (Free Service) CN Internet Host person of APs Eavesdrop Masquerade Fabrication AP Malicious adversary Naïve authentication MN Repudiation

Autonomous Distributed Model Comparison of Public WLAN Service Models Autonomous Distributed Model High ISP Model Framework to enhance the security of self-managed network model Security Self-Managed Model Low High Management Cost Low

Autonomous Distributed Model Network of Authentication System Corresponding Node Authentication Server assuming little confidentiality AP host’s Network Access Point Authorization Authentication Data Mobile Node

Categorization of Security Procedures of Autonomous Distributed Public WLAN services Categorize authentication mechanisms based on the following two aspects: Authentication Transaction at Access Point Relayed Passed Through Data Path Tunneling Direct [ Pros and Cons of Four Models ] Authentication Treatment at AP Relayed: Eliminate malformed authentication Make an AP busier Data Path Tunneling: Acquire location privacy of MNs Detour via AS is forced In the other case, pro and con go across. [ Properties and Name of Each Model ] Data Path No Auth. at AP Auth. at AP Tunnel PATP RATP Direct PADP RADP

[ ] [ ] Relayed Authentication, Passed-through Authentication, Tunneling & Authentication Server 2. 4. Corresponding Node Corresponding Node 5. Tunneling Server 2. (Relay of 1.) 1. Access Point 3. Access Point Authorization 1. Authentication VPN Tunnel Data Mobile Node Mobile Node [ ] [ ] Passed-through Authentication, Tunneling Path (PATP) Model Relayed Authentication, Tunneling Path (RATP) Model

[ ] [ ] Passed-through Authentication, Direct Path (PADP) Model Corresponding Node 4. 2. Corresponding Node 3. 3. Authentication Server 1. 2. Authentication Server Access Point Access Point ID Info. Exchange 1. Authentication Data Mobile Node Mobile Node [ ] Passed-through Authentication, Direct Path (PADP) Model [ ] Relayed Authentication Direct Path (RADP) Model

Implementation in MIAKO.net CN Internet VPN server AP Pass through but VPN protocols only AP hosts Users’ own or By ISP MN Mutual trust relation

4. Location Privacy

What is Location Privacy? Location privacy is the combination of information of when and where you are, and who you are Your location privacy is expected to be disclosed to neither of corresponding node authentication server access point Trade off with Anonymity v.s. security Location-aware service Authentication Server Corresponding Node Access Point Mobile Node You are here!

Location privacy in ISP type W-LAN service The authentication server knows who you are where you are now To whom you are communicating Users are forced to rely on the service provider Mobile phone carriers does. Corresponding Node Authentication Server Access Point 1. 2. Authorization Mobile Node Data

Location Privacy in Roaming Service Authentication Server Corresponding Node Authentication server knows who you are where you are Access point may know to whom you are communicating Corresponding node will know where the MN is Access Point Mobile Node

How pseudonym conceals location privacy in roaming service Home ISP Authentication Server Access point may know where you are to whom you are communicating which is your home ISP, not who you are Authentication server may know who you are which roam ISP you are using, not where you are Corresponding Node Roam ISP Access Point Authentication proxy server Access with pseudonym Mobile Node

Location privacy in VPN-based Tunneling Path Model Home ISP Authentication server knows who you are where you are Access point cannot know to whom you are communicating Corresponding node cannot know where the MN is Corresponding Node Tunneling Server Access Point Roam ISP Authorization VPN Tunnel Data Mobile Node

5. Summary

Summary Security issues of W-LAN roaming services Proposal of autonomous distributed public wireless Internet access architecture MIAKO.net A service model for implementing ubiquitous networking with a grass-root W-LAN roaming with enough security.

Categorized security problems of public WLAN services [ Concluding Remarks ] Categorized security problems of public WLAN services Proposed an Autonomous Distributed public WLAN service model Compared some security procedures of Autonomous Distributed public WLAN service Each procedure has its pros and cons therefore we cannot say which is the best for future use MIAKO.NET public wireless service This is based on PATP model [ References ] A. Balanchandran et al., ‘Wireless Hotspots: Current Challenges and Future Cirections’, 2003 N. Borisov et al., ‘(In)Security of the WEP Algorithm’, 2001 D. Golombek, ‘Single Computer Breaks 40-bit RC4 in under 8 Days’, 1996 T. Komura et al., ‘The MIAKO.NET Public Wireless Internet Service in Kyoto’, 2003 Y. Matsunaga et al., ‘Secure Authentication System for Public WLAN Roaming’, 2003 L. Ackerman et al., ‘Wireless Location Pricay: Low and Policy in the U.S., EU and Japan’, - ISOC Member Brefing, 2003