Wireless Network Security CSIS 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Advertisements

Secure Socket Layer.
CN8816: Network Security 1 Security in Wireless LAN i Open System Authentication Security Wired Equivalent Privacy (WEP) Robust Security Network.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Securing the Network.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wired Equivalent Privacy (WEP)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Protected Extensible Authentication Protocol
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
IEEE Wireless LAN Standard
Network and Internet Security
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Wireless Networking.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Chapter 5 WIRELESS NETWORK SECURITY
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Chapter 21 Distributed System Security Copyright © 2008.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Security Standards. IEEE IEEE 802 committee for LAN standards IEEE formed in 1990’s – charter to develop a protocol & transmission specifications.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
WLAN.
Wireless security Wi–Fi (802.11) Security
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Port Based Network Access Control
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Module 48 (Wireless Hacking)
CompTIA Security+ Study Guide (SY0-401)
Wireless Protocols WEP, WPA & WPA2.
Presentation transcript:

Wireless Network Security CSIS 5857: Encoding and Encryption

Wireless LAN Terminology Station: Device capable of IEEE wireless connectivity (wireless laptop, etc.) Distribution System: Backbone system for long- distance communication (lines/satellite/etc.) Access point: Bridge between station and distribution system (or between stations in same BSS) Basic Service Set (BSS): Set of stations in range of access point

Wireless LAN Structure

Differences from LAN security: Any transmission may be listened to by any device in range of access point  All transmissions must be secured Other wireless devices in range of AP can attempt to connect to it  Any device wishing to communicate through access point must be authenticated

802.11i RSN Services Access control: –Preventing access to access point until authentication Authentication: –Mutual authentication between stations and access points, and key generation Privacy: –Encrypting/hashing/etc. of messages to insure confidentiality/information integrity/etc.

Authentication Server Authentication server –Contacted by AP when station requests access –Uses authentication protocol to establish station identity –AP blocks communication with rest of network until authentication complete

IEEE i Operation Phases

Discovery Phase Station contacts AP –Challenge-response can be used to authenticate AP Station passes security suite to AP (like SSL) AP responds with chosen algorithms

Authentication Phase Station sends request to AP for connection to authentication server Extensible authentication protocol (EAP) used for mutual authentication AS generates keys for secure information exchange

Authentication Phase Extensible Authentication Protocol: –Based on challenge-response –Station and AS share secret information (such as symmetric key) –AS sends challenge to station (via AP) –Station sends response –May repeat with multiple challenges (10 – 20) for added protection against replay attacks

Key Management Phase Possible methods: –Station and AP already share pre-shared key (PSK) previously installed on station –AS generates and sends master session key (MSK) to station as part of EAP challenge response Used to generate pairwise master key

Key Management Phase HMAC-SHA1 used to generate Pairwise transient key from –Pairwise master key –MAC address of station and AP (prevents replay attacks) PTK consists of –Key used for confirmation of other keys –Key used to encrypt other keys –Actual temporal key used to securely transmit data

Key Management Phase Handshake between station and AP used to establish and confirm keys used for secure transmission