270 likes | 548 Views
Wireless security Wi–Fi (802.11) Security. Seminar by: Jigar Shah Guide: Prof. G.K. Kharate. Content. Introduction to Wi-Fi Types of attacks Traditional security with ref. to Wi-Fi How IEEE 802.11 WEP works Why WEP is not secured IEEE 802.11i and RSN WPA: An intermediate solution
E N D
Wireless securityWi–Fi (802.11) Security Seminar by: Jigar Shah Guide: Prof. G.K. Kharate
Content • Introduction to Wi-Fi • Types of attacks • Traditional security with ref. to Wi-Fi • How IEEE 802.11 WEP works • Why WEP is not secured • IEEE 802.11i and RSN • WPA: An intermediate solution • Wi-Fi security in Real World
Example: Man – In – Middle attack • Listen to message from Mob to AP • Read message till end of “check-word” • Transmit a sudden burst of noise to corrupt check-word • Forge ack. message with AP’s address and send it to MOB • Recalculate check-word and send captured msg. to AP • Wait for ACK from AP and corrupt check-word again so MOB rejects it
Conventional Security Architecture firewall UntrustedZone Trusted Zone Remote User in “Trusted Bubble” firewall UntrustedZone VPN Trusted Zone User Traditional security Architecture
Wireless User in Untrusted Zone firewall VPN Trusted Zone UntrustedZone User Treating a Wi-Fi LAN user Like a Remote User firewall VPN Trusted Zone UntrustedZone WLAN Wireless LAN security option 1
How 802.11 WEP works • Authentication • Message Encryption
Authenticate (request) STA AP Authenticate (success) Open Authentication
Authenticate (request) Authenticate (challenge) Authenticate (response) Authenticate (success) WEP Authentication STA AP
Combined RC4 key IV Secret Key RC4 Algorithm C B A $ W & WEP Message Encryption using RC4 stream cipher
Adding ICV Compute check DATA ICV Encrypt Unencrypted Adding IV and KeyID bits IV Key ID Data & ICV Encrypted Mechanics of WEP
Why WEP is not secure • Authentication • Access control • Replay prevention • Message modification • Message privacy • IV reuse • RC4 weak keys • Direct key attacks
Basic requirements for authentication • Robust method of proving identity • Method of preserving identity over subsequent transaction that cannot be transferred • Mutual authentication • Independent keys. i.e. independent from encryption keys
Transition to 802.11i (RSN): The ultimate solution • Encryption algorithms • TKIP • CCMP – AES. • WRAP • Message Integrity – A strong data integrity algorithm (Michael Message Integrity Check) is applied. • Mutual Authentication – 802.11i uses 802.1X/EAP for user authentication. • Other security features - secure IBSS, secure fast handoff, and secure deauthentication and disassociation. • Roaming Support
Relationship of Wireless LAN Security Layers Authentication Layer Authentication Server Authentication Client (Kerberos V5, TLS, PEAP,EAP-SIM) Corporate Network Operating System Access Control Layer Authenticator (Access Control) (EAP, IEEE 802.1X, RADIUS) Supplicant Wireless LAN Layer Wireless LAN Wireless LAN Access Point Mobile Devices
An intermediate solution: WPA • Goals of WPA • be a strong • Interoperable security replacement for WEP • be software upgradeable to existing Wi-Fi CERTIFIED products • be Applicable for both home and large enterprise users • be available immediately
WPA (Wi-Fi Protected Access) • Implements 802.1X EAP based authentication • Apply Temporal Key Integrity Protocol (TKIP) on existing RC4 WEP • Use Michael Message Integrity Check