180 likes | 282 Views
Security in wireless networks. Wireless networks more vulnerable no inherent physical protection: sending/receiving messages do not need physical access to network infrastructure broadcast communication As a consequence eavesdropping is easy injecting bogus messages is easy
E N D
Security in wireless networks • Wireless networks more vulnerable • no inherent physical protection: sending/receiving messages do not need physical access to network infrastructure • broadcast communication • As a consequence • eavesdropping is easy • injecting bogus messages is easy • replaying previously recorded messages is easy • illegitimate access to network & services is easy • denial of service is easy (jamming)
Outline • Security in WLAN • Thwarting malicious behavior • Thwarting selfish behavior
Securing 802.11 WLAN • first attempt • Wired Equivalent Privacy (WEP), 1999 • current attempt • IEEE 802.11i or RSN (Robust Security Network) or WPA2 (WiFi protected access 2), 2004 • intermediate solution • IEEE Temporary Key Integrity Protocol (TKIP) or WPA, 2003 • subset of 802.11i
Wired Equivalent Privacy (WEP) • specified in 802.11 standard for WLAN MAC • protocol goals • confidentiality: prevent eavesdropping • access control: prevent unauthorized access • data integrity: prevent tampering of messages • failure: none of the security goals is attained
WEP components • Authentication • before association to AP • Encryption • using RC4 stream cipher
4 3 2 3 2 2 1 1 1 Recall 802.11 association BBS 1 BBS 1 BBS 2 BBS 2 AP 1 AP 1 AP 2 AP 2 H1 H1 • Active Scanning: • Probe Request frame broadcast from H1 • Probes response frame sent from APs • Association Request frame sent: H1 to selected AP • Association Response frame sent: H1 to selected AP • Passive Scanning: • beacon frames sent from APs • association Request frame sent: H1 to selected AP • association Response frame sent: H1 to selected AP
WEP Authentication • before association, host needs to authenticate itself to AP • authentication procedure: • host requests authentication from AP • AP sends 128 bit nonce • host encrypts nonce using shared symmetric key • AP decrypts nonce, authenticates host • once authenticated, host can send an association request • no key distribution mechanism • authentication: knowing the shared key is enough
WEP encryption: RC4 stream cipher • host/AP share 40 bit symmetric key (semi-permanent) • host appends 24-bit initialization vector (IV) to create 64-bit key • 64 bit key used to generate stream of keys, kiIV • kiIV used to encrypt i-th byte, di, in frame: ci = diXORkiIV • IV and encrypted bytes, ci sent in frame
802.11 WEP encryption Sender-side WEP encryption
Security hole in 802.11 WEP encryption • 24-bit IV, one IV per frame -> IV’s eventually reused • Common PCMCIA cards sets IV to zero and increment it by 1 for each packet • IV transmitted in plaintext -> IV reuse detected
802.11 WEP encryption • one attack: • Trudy causes Alice to encrypt known plaintext d1 d2 d3 d4 … • Trudy sees: ci = diXORkiIV • Trudy knows cidi, so can compute kiIV • Trudy knows encrypting key sequence k1IV k2IV k3IV … • Next time IV is used, Trudy can decrypt!
WEP – Lessons learnt engineering security protocols is difficult combining strong building blocks in a wrong way -> insecure system at the end don’t do it alone security is a non-functional property it is extremely difficult to tell if a system is secure or not using expert in design phase pays out (fixes after deployment will be much more expensive) experts will not guarantee your system is 100% secure but at least they know many pitfalls they know the details of crypto algorithms
802.11i: improved security • stronger encryption (using AES instead of RC4 ) • extensible set of authentication mechanism • borrowed from 802.1X (for wired LAN) • key distribution • uses authentication server • run on AP for small network • or separate from AP • can serve multiple APs • centralize authentication decision
1 Discovery of security capabilities 3 2 3 4 STA, AP use PMK to derive Temporal Key (TK) used for message encryption, integrity 802.11i authentication & access control AP: access point STA: client station AS: Authentication server wired network STA and AS mutually authenticate, together generate Master Key (MK). AP serves as “pass through” STA derives Pairwise Master Key (PMK) AS derives same PMK, sends to AP
EAP: extensible authentication protocol • EAP: end-end client (mobile) to authentication server protocol • EAP sent over separate “links” • mobile-to-AP (EAP over LAN) • AP to authentication server (RADIUS over UDP) wired network EAP TLS EAP RADIUS EAP over LAN (EAPoL) IEEE 802.11 UDP/IP
TKIP: intermediate solution • runs on old hardware (supporting RC4) • WEP weaknesses are corrected • new message integrity protection mechanism called Michael • use IV as replay counter • increase IV length to 48 bits in order to prevent IV reuse • per-packet keys to prevent attacks based on weak keys
TKIP – Generating RC4 keys 48 bits data encryption key from PTK IV upper 32 bits lower 16 bits 128 bits key mix (phase 1) MAC address key mix (phase 2) dummy byte RC4 seed value IV d IV per-packet key 3x8 = 24 bits 104 bit