270 likes | 651 Views
Wireless Network Security. CSIS 5857: Encoding and Encryption. Wireless LAN Structure. Wireless LAN Terminology. Station : Device capable of IEEE 802.11 wireless connectivity (wireless laptop, etc.) Distribution System : Backbone system for long-distance communication (lines/satellite/etc.)
E N D
Wireless Network Security CSIS 5857: Encoding and Encryption
Wireless LAN Terminology • Station: Device capable of IEEE 802.11 wireless connectivity (wireless laptop, etc.) • Distribution System: Backbone system for long-distance communication (lines/satellite/etc.) • Access point: Bridge between station and distribution system (or between stations in same BSS) • Basic Service Set (BSS): Set of stations in range of access point
Wireless LAN Structure • Differences from LAN security: • Any transmission may be listened to by any device in range of access point All transmissions must be secured • Other wireless devices in range of AP can attempt to connect to it Any device wishing to communicate through access point must be authenticated
Authentication Server • Authentication server • Contacted by AP when station requests access • Uses authentication protocol to establish station identity
Discovery Phase • Station contacts AP and they pass identifiers • Station passes security suite to AP (like SSL) • AP responds with chosen algorithms
Authentication Phase • AP blocks communication with rest of network until authentication complete • AS performs all authentication functions • AP just passes data back and forth
Authentication Phase • Station sends request to AP for connection to authentication server • Extensible authentication protocol used for mutual authentication • AS generates keys for secure informationexchange
Authentication Phase • Extensible Authentication Protocol: • Based on challenge-response • Station and AS share secret information (such as symmetric key) • AS sends challenge to station (via AP) • Station sends response • May repeat with multiple challenges (10 – 20) for added protection against replay attacks
Key Management Phase • Possible methods: • Station and AP already share pre-shared key (PSK) previously installed on station • AS generates and sends master session key (MSK) to station as part of EAP challenge response • Used to generate pairwise master key
Key Management Phase • HMAC-SHA1 used to generate Pairwise transient key from • Pairwise master key • MAC address of station and AP (prevents replay attacks) • PTK consists of • Key used for confirmation of other keys • Key used to encrypt other keys • Actual temporal key used to securely transmit data
Key Management Phase • Handshake between station and AP used to establish and confirm keys used for secure transmission
Protected Data Transfer • Data transferred securely between station and AP • Keys generated by AS and passed to AP • Cipher suite agreed to in discovery phase
Wireless Application Protocol • Standards for connecting mobile devices (smart phones, tablets, etc.) to the Web • Requires secure connections between mobile devices and gateways to servers
Wireless TLS • Wireless version of Transport Layer Security protocol used for web communication • WAP end-to-end security: • TLS used between gateway and server • WTLS used between client and gateway
Wireless TLS • Basic stages of handshake similar to TLS/SSL
Wireless TLS • Secure message generation similar to TLS/SSL
History • 802.11b first broadly accepted standard • Goal: Insure interoperability of devices • Wireless Ethernet Compatibility Alliance (WECA) industry consortium formed 1999, later renamed Wi-Fi (Wireless Fidelity) Alliance • created a test suite to certify interoperability • initially for 802.11b, later extended to 802.11g
History • Original 802.11 spec had security features: • Wired Equivalent Privacy (WEP)algorithm • major weaknesses found • 802.11i addressed WLAN security issues • Wi-Fi Alliance Wi-Fi Protected Access (WPA) • final 802.11i Robust Security Network (RSN) • Wi-Fi Alliance certifies vendors in compliance with 802.11i specification under the WPA2 program.
802.11i RSN Services • Access control: • Preventing access toaccess point until authentication • Authentication: • Mutual authentication between stations and access points, and key generation • Privacy: • Encrypting/hashing/etc. of messages to insure confidentiality/information integrity/etc.