270 likes | 572 Views
IEEE 802.11 Family. Dr. Muid Mufti ID Technologies Islamabad. 802.11 Variants. IEEE 802.11d Additional regulatory domains IEEE 802.11e for improved quality of service IEEE 802.11f to regulate inter-access point hand offs IEEE 802.11i to improve WLAN security IEEE 802.11n
E N D
IEEE 802.11 Family Dr. Muid Mufti ID Technologies Islamabad
802.11 Variants • IEEE 802.11d • Additional regulatory domains • IEEE 802.11e • for improved quality of service • IEEE 802.11f • to regulate inter-access point hand offs • IEEE 802.11i • to improve WLAN security • IEEE 802.11n • Enhanced Speed and Robustness
IEEE 802.11i Wireless Security
Basic 802.11 Security • WEP • Wire Equivalent Privacy • Stream Cipher: RC4 • 40-bit key+24-bit Initialization Vector (IV)=64-bit RC4 key
Basic 802.11 Vulnerabilities • No AP Authentication (i.e. two way auth.) • Key distribution problem • Shared key (i.e. key is the same for everyone) • No privilege and permission scheme can be defined • One can decrypt others information • The secret which is known by everyone is not secret! • Pair wise keys defined but rarely used
WEP Weaknesses • Small IV space (IV Collision Problem) • Replay attacks once WEP key is revealed • Predictable IV due to poor implementation • CRC as integrity checking algorithm • RC4 vulnerability to known plain text attack • Static keys – in contrast to session / temporal keys
802.11i • Open Authentication • Pair wise keys • Session keys • 128 bit keys • Enhanced Encryption • TKIP • DES • CCMP – AES • IEEE 802.1X
TKIP • Based on RC4 • 128-bit Key (per packet) • One key pair for each direction • Per packet key –temporal part • Per session key –Pair-wise Master Key (PMK) • Key encryption key • Pair-wise transient key (PTK) • MAC address of the station (TA) –i.e. unique for every client • 48-bit packet serial number
CCMP • Counter Mode with Cipher Block Chaining Message Authentication Code Protocol • AES based
Authentication 802.1X • Port-based network access control • Controlled port • Authorized • Unauthorized • Uncontrolled port
EAP • Extensible Authentication Protocol (EAP) (RFC 2284) • EAP-MD5 • EAP-TLS (Certificates) • EAP-TTLS (Certificates and Passwords) • EAP-SIM • PEAP (Cisco) • LEAP (Cisco) • EAP over LAN (EAPOL)
Authentication Authenticator Authentication Server Supplicant
Wi-Fi Alliance • WPA • Wireless Protected Access • WPA-2
IEEE 802.11e Qualitiy of Service
802.11e • EDCF - Enhanced DCF • HCF - Hybrid Coordination Function • QBSS • HC – Hybrid Controller • TC – Traffic Categories • TXOP – Transmission Opportunity • – granted by EDCF-TXOP or HC- poll TXOP • AIFS – Arbitration Interframe Space
IEEE 802.11n High Speed
802.11n • Expected to be finalized by Nov 2009 • High Data rates – 300 Mbps or above • Improved OFDM • Greater Stability • Shorter Cyclic Prefix • Block Ack • Frame Aggrgation
MIMO Technology Multiple Antenna
WiFi Alliance • Wi-Fi Alliance is certifying 802.11n products based on Draft 7 – Nov 2008