480 likes | 622 Views
A Methodology for Evaluating Wireless Network Security Protocols . David Rager Kandaraj Piamrat. Outline. Introduction Explanation of Terms Evaluation Methodology Analysis of WEP, WPA, and RSN Graphical Results Conclusion . Introduction.
E N D
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat
Outline • Introduction • Explanation of Terms • Evaluation Methodology • Analysis of WEP, WPA, and RSN • Graphical Results • Conclusion
Introduction • Difference properties of wireless network comparing to wired network • Two lines of defense in wireless network security • Preventive approach • Intrusion Detection and Response approach • WEP WPA RSN
Explanation of Terms • WEP – Wired Equivalent Protocol (attempt #1) • WPA – Wi-Fi Protected Access (attempt #2) • RSN – Robust Secure Network (attempt #3) • EAP – Extensible Authentication Protocol • TKIP – Temporal Key Integrity Protocol • AES – Advanced Encryption Standard
Explanation of Terms (cont.) • CCMP – Counter mode with Cipher block Chaining Message authentication code Protocol • ICV – Integrity Check Value • MIC – Message Integrity Check • RADIUS – Remote Authentication Dial in User Service • IV – Initialization Vector
Evaluation Methodology • Authentication Capability • Encryption Strength • Integrity Guarantees • Prevention of Attacks • Identity Protection • Ease and Cost of Implementation • Power Consumption • Novel Ideas
Scores of WEP • Authentication Capability (0/8) • Encryption Strength (0/16) • Integrity Guarantees (0/4) • Prevention of Attacks (0/6) • Identity Protection (4/4) • Ease and Cost of Implementation (17/18) • Power Consumption (2/4) • Novel Ideas (0/2) Total Score = 2.44/8 = 30.56 %
Scores of WPA • Authentication Capability (6/8) • Encryption Strength (14/16) • Integrity Guarantees (2/4) • Prevention of Attacks (4/6) • Identity Protection (0/4) • Ease and Cost of Implementation (5/18) • Power Consumption (1/4) • Novel Ideas (0/2) Total Score = 3.32/8 = 41.49 %
Scores of RSN • Authentication Capability (6/8) • Encryption Strength (15/16) • Integrity Guarantees (4/4) • Prevention of Attacks (4/6) • Identity Protection (0/4) • Ease and Cost of Implementation (4/18) • Power Consumption (2/4) • Novel Ideas (0/2) Total Score = 4.08/8 = 50.95 %
Conclusion • We have defined specific metrics for protocol evaluation. • We evaluate different wireless security protocol based on these metrics. • Questions ?