Wireless Network Security and Interworking

Slides:



Advertisements
Similar presentations
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
1 © NOKIA MitM.PPT (v0.2) / 6-Nov-02 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI.
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Network Security Issues By Advait Kothare SJSU CS265 Fall 2004.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
CSI5175 Wireless and Mobile Electronic Commerce Networks and their Applications Mao Zhang Wireless Hotspots: Current Challenges and Future Directions.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Chapter 4 Application Level Security in Cellular Networks.
WEP Protocol Weaknesses and Vulnerabilities
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Mobile Telephone System And GSM Security. The Mobile Telephone System First-Generation Mobile Phones First-Generation Mobile Phones Analog Voice Analog.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless security Wi–Fi (802.11) Security
Wireless Unification Theory William Arbaugh University of Maryland College Park.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
1 An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland College Park,MD,USA.
1 Rogue Mobile Shell Problem Verizon Wireless October 26, 2000 Christopher Carroll.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Authentication and handoff protocols for wireless mesh networks
Wireless Protocols WEP, WPA & WPA2.
Secure Authentication System for Public WLAN Roaming
IEEE MEDIA INDEPENDENT HANDOVER DCN:
LM 7. Cellular Network Security
Presentation transcript:

Wireless Network Security and Interworking MINHO SHIN, JUSTIN MA, ARUNESH MISHRA, AND WILLIAM A. ARBAUGH University of Maryland, College Park, University of California, San Diego, La Jolla THE IEEE, VOL. 94, NO. 2, FEBRUARY 2006 Mong Nam Han m0ng01@an.kaist.ac.kr AN Lab, CS dept. KAIST, Korea 안녕하세요, 저는 AN연구실의 석사과정 한몽남입니다.

Overview Challenge to the interworking Security in cellular system Security in 802.11 WLAN 3G / WLAN interworking Conclusion, Q & A

Challenge to the interworking Variety of wireless have Different coverage and bandwidth Vastly different security architecture Security issue Contradictory security assumption The authentication process Long authentication delay during handover

Security in cellular system: ~2G 1G (analog) Cloning Channel hijacking Eavesdropping 2G Short authentication signature: 18bit Broken encryption algorithm: CMEA in ‘97, ORYX in ’98 GSM Security through obscurity: go through or around Disclosed master key of SIM card Reverse engineered function A5

Security in 3G Security challenges New revenue-related fraud The full range of threats similar on Internet Vulnerability to malicious access

Security in 3G: UMTS Enhancements Features Mutual authentication, encryption with 128 bit key lengths Features Network access security access control of users and MS, data confidentiality/integrity, and user identity privacy Network domain security security within provider domain User domain security User-USIM-terminal Application domain security Visibility, Configurability, Temporary identity

Security in 3G: UMTS AKA (Authentication and Key Agreement) protocol Mutual authentication Three entities User (MS or USIM) Serving node (VLR/SGSN) Home environment (HLR/AuC) Three stages Initiation Transfer of credentials Challenge-response exchange

Security in 3G: UMTS AKA process

Security in 3G: CDMA 2000 AKA with an optional extension New cryptographic function f11 generate a UIM Authentication Key (UAK) UMAC message authentication function on UAK Advanced Encryption Standard (AES)

Security in 3G Security issues in AKA Trust relationship between roaming partners One-pass challenge-response mechanism not full mutual authentication User only verifies a MAC Permanent identity (IMSI) in plain text when registering at first time

Security in 802.11 WLAN Authentication Access Control Open system authentication Shared key authentication: standard challenge and response Challenge text: WEP PRNG with the shared secret and IV Response: 32bit CRC integrity check (ICV) Access Control Closed network access control: SSID Access control lists: MAC address Security problems published in countless papers

Security in 802.11 WLAN: WPA WiFi Protected Access Three entities Security framework Three entities Supplicant: user Authenticator: switch, access point Authentication server

Security in 802.11 WLAN: EAP Extensible Authentication Protocol : Authentication mechanism built around challenge-response Four types of message EAP request: a challenge to supplicant EAP response: response EAP success: outcome EAP failure : outcome Features Extensible: encapsulation within EAP Flexible: operated at the network layer Dual-port model

Security in 802.11 WLAN: Problems Denial of service attack Management frame are not protected nor authenticated Session hijacking When not encrypted Trust relationship implicit trust

3G / WLAN interworking Roaming model and three typical authentication scenarios Case1: NY-WLAN operates independently, and Bill already have an account with NY-WLAN Case 2: IL-3G, Bill’s home network, has a roaming agreement with NY-WLAN Case 3: IL-3G and NY-WLAN do not have a roaming agreement, but NY-3G and NY-WLAN do

Case 2: Centralized internetworking Authentication EAP-SIM Lack of mutual authentication Weak 64 bit cipher key EAP-AKA Require synchronized sequence number Weakness of EAP Lacks for identity protection, protected method negotiation, protected termination possible man-in-the-middle attack Authentication latency: O(N2) Interdomain proactive key distribution Fast handoff scheme: reduce authentication latency Use neighbor graph Require reasonably accurate handoff prediction system AAA-broker Reduce total number of association: O(N) Be close, trustworthy, require strong security association between broker and home network man-in-the-middle attack: 공격자 자신이 대화에 끼어들거나 대화를 도청하거나, 아니면 그 내용을 변경해 버리는 것입니다. 예를 들어 공격자는 적절한 자격을 갖춘 클라이언트와 서버 간의 SMB 세션을 도청하여 패킷을 캡처한 다음 나중에 다시 재생하여 해당 서버에 연결합니다. SMB Reflection Attack은 공격자와 서버가 동일한 컴퓨터 상에 위치한, 특이한 유형의 man-in-the-middle 공격입니다

Case 3: Context transfer Security context: current state Authentication state: identifier Authorization state: services and functions Communication security parameter: encryption algorithm, session keys Reactive context transfer: after visit Context transfer protocol (CTP): at L3 Inter access point protocol (IAPP): at L2 Inter domain key exchange (IDKE): for seamless handover Proactive context transfer: before visit Soft handoff Prediction Ticket forwarding: issue ticket (context) to the client Kerberos

Case 3: Context transfer Discussion Benefit: performance, flexible trust relationships Issue Accounting and billing Post hoc authentication Full authentication or reauthentication

Conclusion, Q & A Good security will be developed in an open environment with the collaboration

Q & A