KAIS T Security architecture in a multi-hop mesh network Conference in France, 2006 2006. 9. 26. Presented by JooBeom Yun.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Secure Mobile IP Communication
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
A Survey of Secure Wireless Ad Hoc Routing
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
A Survey of WAP Security Architecture Neil Daswani
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
IEEE Wireless Local Area Networks (WLAN’s).
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Proposed Transport Layer Security (TLS) Evidence Extensions Russ Housley IETF 67 – TLS WG Session.
1 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada draft-urien-badra-eap-tls-identity-protection-00.txt
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Karlstad University IP security Ge Zhang
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Lecture 24 Wireless Network Security
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
Multi-hop PANA IETF Currently: –“For simplicity, it is assumed that the PAA is attached to the same link as the device (i.e., no intermediary IP.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Wireless Network Security CSIS 5857: Encoding and Encryption.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Cryptography CSS 329 Lecture 13:SSL.
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
CSCE 715: Network Systems Security
SSL Protocol Figures used in the presentation
Presentation transcript:

KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun

2 / 18 Security architecture in a multi-hop mesh network Contents Introduction Problematic State of the art and related works Ad-hoc network security Users’ access to wireless networks Proposed security architecture PANA framework Technical description Security analysis of the solution Future works Conclusions

3 / 18 Security architecture in a multi-hop mesh network Introduction Multi-hop mesh network Extension of a wireless mesh network by an ad hoc network Authentication mechanism is essential In wireless network and in an ad hoc network The biggest problem Authentication of the mobile node

4 / 18 Security architecture in a multi-hop mesh network Problematic Multi-hop mesh network inherits from the security problems Ad-hoc networks Passive eavesdropping, message replaying, message distorsion, active impersonation DoS Mesh network (Fake APs) Eavesdropping, tampering, DoS Access control enforced by operators Authentication, authorization Protect data exchanges

5 / 18 Security architecture in a multi-hop mesh network State of the art and related works Ad-hoc network security Covers secure routing, key establishment, authentication, certification/revocation services Secure routing designed security protocols - ARAN[1], Ariadne[2], SAODV[3] Certification and revocation services Threshold cryptography[5,6], ID-based cryptography[7], both cryptography[8] Users’ access to wireless networks IEEE 802.1X standard EAP(Extensible Authentication Protocol) messages between the user and the AP PANA(Protocol for Carrying Authentication and Network Access) protocol Medium independent solution EAP messages to be carried over IP

6 / 18 Security architecture in a multi-hop mesh network Proposed security architecture IEEE 802.1X Mobiles may be authenticated by the mesh AR Authentication is done at layer 2 (MAC address) The mobile is assumed to be directly attached to the mesh routers PANA Authenticate using the IP protocol EAP lower-layer Any EAP method is suitable for authentication PANA framework Technical description Security analysis of the solution

7 / 18 Security architecture in a multi-hop mesh network PANA framework PANA Client (PaC) Request authentication, provide the credentials PANA Authentication Agent (PAA) Interacts with the AS to determine the access control state and communicates EP Enforcement Point (EP) Controls access of a new node to the network Authentication Server (AS) Verify the credentials of a node requiring access to the network Asked by the PAA

8 / 18 Security architecture in a multi-hop mesh network Technical description (1/3) Configuration (e.g. DHCPv4) PANA Discovery phase and begin of Authentication and authorization phase Authorization [IKE-PSK, PaC-DI, Session-id] PANA-Bind-Request / PANA-Bind-Answer IKE SASA

9 / 18 Security architecture in a multi-hop mesh network Technical description (2/3) Encapsulation of EAP packets during PANA authentication

10 / 18 Security architecture in a multi-hop mesh network Technical description (3/3) EAP-MD5 Login/password Known vulnerabilities (dictionary and brute-force attacks) Does not support mutual authentication EAP-TLS Secure and robust against attacks Mutual authentication Protect network access by providing an IKE-PSK

11 / 18 Security architecture in a multi-hop mesh network PANA/EAP-TLS authentication procedure (1/2) PANA-Auth-Request (EAP-Request/Identity) PANA-Auth-Answer (EAP-Response/ Identity (MyID))Access-Request (EAP-Response/ Identity (MyID)) Access-Challenge(EAP-Request/EAP-Type=EAP-TLS(TLS Start))PANA-Auth-Request(EAP-Request/EAP-Type=EAP-TLS(TLS Start)) PANA-Auth-Answer(EAP-Response/EAP-Type=EAP-TLS(TLS Client-hello)) Access-Request(EAP-Response/EAP-Type=EAP-TLS(TLS Client-hello)) Access-Challenge(EAP-Request/EAP-Type=EAP-TLS(TLS Server_hello, TLS certificate, [TLS server_key_exchange,][TLS Certificate_request,] TLS server_hello_done)) PANA-Auth-Request(EAP-Request/EAP-Type=EAP-TLS(TLS Server_hello, TLS certificate, [TLS server_key_exchange,][TLS Certificate_request,] TLS server_hello_done)) ① ② ③ ④ ⑤

12 / 18 Security architecture in a multi-hop mesh network PANA/EAP-TLS authentication procedure (2/2) PANA-Auth-Answer (EAP-Response/ EAP-Type=EAP-TLS (TLS Certificate, TLS client_key_exchange, [TLS certificate_verify,] TLS Change_cipher_spec, TLS finished)) Access-Request (EAP-Response/ EAP-Type=EAP-TLS (TLS Certificate, TLS client_key_exchange, [TLS certificate_verify,] TLS Change_cipher_spec, TLS finished)) PANA-Auth-Answer (EAP-Response/ EAP-Type=EAP-TLS)EAP-Response/ EAP-Type=EAP-TLS Access-Challenge(EAP-Request/EAP-Type=EAP-TLS(TLS Change_cipher_spec, TLS finished)) Access-Accept(EAP-Success)PANA-Bind-Request (EAP-Success,Device-Id,[protection-Cap],MAC) PANA-Auth-Request(EAP-Request/EAP-Type=EAP-TLS(TLS Change_cipher_spec, TLS finished)) PANA-Bind-Answer (Device-Id,[protection-Cap],MAC) ⑥ ⑦

13 / 18 Security architecture in a multi-hop mesh network IPsec/IKE protection Multi-hop environment Access control need to operate at the network layer or upper layers IPsec protocol suite Support strong access control to authenticate packets’ origin Provide data encryption (using ESP) In order to setup an IPsec security initiate IKE exchanges authenticate to each other.

14 / 18 Security architecture in a multi-hop mesh network Security analysis of the solution (1/2) Protection against replay attacks Spoofing messages Sequence numbers are randomly initialized at the beginning of the session Protection against PaC DoS attacks Spoofed message MAC protection Providing message integrity Service theft attack provides message integrity and protects the PaC’s identifier. Spoofing PAA message An attacker can spoof PAA messages Less secure authentication method negotiate parameters after the establishment of PANA security association

15 / 18 Security architecture in a multi-hop mesh network Security analysis of the solution (2/2) PAA DoS attack Overload the PAA with PANA-PAA-Discover messages Add a cookie (Device ID) to the PANA-Start-Request message DHCP DoS attack DoS attacks are possible by depleting the IP address space Other possible attacks Ad-hoc and mesh networks vulnerable to passive eavesdropping, message replaying, message distorsion, easy man-in-the-middle, active impersonation, DoS, IP spoofing Cryptographic technics(IPsec) – prevent eavesdropping, message distorsion, active impersonation Mesh networks Worst DoS is not possible (using access control) Access control, cryptographic technics

16 / 18 Security architecture in a multi-hop mesh network Future works The proposed architecture combines PANA with EAP-TLS in a multi-hop mesh network. EAP-TLS Mutual authentication and strong robustness against attacks Heavy treatment (the use of asymmetric cryptography) Need PKI EAP-MD5 Simpler Vulnerable to eavesdropping attacks Working combine the simplicity of EAP-MD5 and the robustness of EAP-TLS PANA exposes to IP address starvation in IPv4. Adapting IEEE 802.1X to multi-hop mesh networks (new research direction)

17 / 18 Security architecture in a multi-hop mesh network Conclusions Access network security in a multi-hop mesh network access control data protection IEEE 802.1X standard can be extended to support authentication in multi-hop mesh networks It’s not easy (modify the standard) A combination of EAP-TLS over PANA and IPsec has been proposed. PANA is relying on the availability of IP addresses. IPv6 Temporary private addresses

18 / 18 Security architecture in a multi-hop mesh network Q & A