[Intro. to Computer Security Course Note] Ch 24
Ch24. Wireless Network Security
Wireless Security
- Key factors: contributing to higher security risks (v.s. wired networks)
- Channel
- Vulnerabilities in communication protocols
- Mobility
- Resources
- Smartphones/tablets: sophisticated OS but limited memory and processing resources
- Accessibility
- Sensors/robots: may be left unattended in remote and/or hostile locations
- Channel
Wireless Network Threats
Wireless Security Measures
- Securing wireless transmissions
- Principal threats: eavesdropping, altering, inserting, messages, disruption
- eaves (屋簷)
- Countermeasures for eavesdropping
- Signal-hiding techniques
- Encryption
- For altering and inserting
- Encryption and authentication protocols
- Securing wireless networks
- Wireless APs: unauthorized access to the network
- Principal approach: IEEE 802.1X (port-based network access control)
- Prevent rogue APs and other authorized devices
Wireless Network Security Techniques
Mobile Device Security
- An organization’s networks must accommodate
- Growing use of new devices
- Cloud-based apps
- De-perimeterization
- A multitude of network perimeters around devices, apps, user, and data
- External business requirements
Security Threats
Mobile Device Security Strategy
- Device security
- Traffic security
- Based on encryption and authentication
- via VPN
- Barrier security
- Firewall
IEEE 802.11 Wireless LAN Overview
Terminology & Services
- Access point (AP)
- Any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations
- Basic service set (BSS)
- A set of stations controlled by a single coordination function
- Coordination function
- The logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs
- Distribution system (DS)
- A system used to interconnect a set of BSSs and integrated LANs to create an ESS
- Extended service set (ESS)
- A set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSS
- MAC protocol data unit (MPDU)
- The unit of data exchanged between two peer MAC entities using the services of the physical layer
- MAC service data unit (MSDU)
- Information that is delivered as a unit between MAC users
- Station
- Any device that contains an IEEE 802.11 conferment MAC and physical layer
Distribution of Messages within a DS
- Two services involved
- Distribution: exchange MPDUs between two BSS
- Integration: data transfer between a Wi-Fi station and a LAN station on an integrated IEEE 802x LAN
Association-Related Services
- Transition types, based on mobility:
- No transition
- BSS transition
- ESS transition
Distribution Service
- Association
- Establishes an initial association between a station and an AP
- Reassociation
- Enables an established association to be transferred from one AP to another
- Disassociation
Wireless Fidelity (Wi-Fi) Alliance
- 802.11b
- First 802.11 standard to gain broad industry acceptance
- Wireless Ethernet Compatibility Alliance (WECA)
- Industry consortium(合夥) formed in 1999: interoperation between vendors
- Term used for certified 802.11b products: Wi-Fi
- Wi-Fi Protected Access (WPA)
- Certification procedures for IEEE 802.11 security standards
- Most recent version: WPA2
IEEE 802.11 Protocol Stack
General IEEE 802 MPDU Format
IEEE 802.11i Wireless LAN Overview
- Wired Equivalent Privacy (WEP) algorithm
- 802.11 privacy
- Wi-Fi Protected Access (WPA)
- Set of security mechanisms: eliminates most 802.11 security issues
- Based in the current state of the 802.11i standard
- Robust Security Network (RSN)
- Wi-Fi Alliance certifies vendors in compliance with the full 802.11i (WPA2)
Five Phases of Operation for an RSN
- Phase 1: Discovery Phase
- Security capabilities
- Confidentiality and MPDU integrity protocols
- Authentication method
- Cryptography key management approach
- Cipher suite (Confidentiality/Integrity)
- WEP, TKIP, CCMP
- AKM: Authentication and Key Management
- IEEE 802.11x, pre-shared key
- 802.1X Access Control
- Security capabilities
- Phase 2: Authentication Phase
- IEEE 802.11x AC
- 802.1X Control channel is unblocked
- 802.11 data channel is blocked
- Three phases
- Connect to AS
- EAP exchange
- Secure key delivery
- EAP Authentication Protocol
- Initiated by the server (authenticator)
- Authentication is mutual between the client and authentication server
- Popular EAP Methods
- Cisco LEAP (Lightweight EAP)
- complex passwords are required
- EAP-FAST (EAP-Flexible Authentication via Secure Tunneling)
- No need of strong password or any certificate
- Using a PAC (Protected Access Credential) to establish a TLS tunnel
- EAP-TLS
- Using PKI: both client and AS need a certificate (X509 certificates)
- One of the most secure EAP standards available
- PEAP (Protected EAP)
- Encapsulating EAP within a potentially encrypted and authenticated TLS tunnel
- Only the server authentication is performed using PKI certificate
- Client is authenticated using either EAP-GTC or EAP-MSCHAPv2 within the tunnel
- EAP-GTC (Generic Token Card)
- EAP-MSCHAPv2 (Microsoft’s Challenge Handshake Authentication Protocol)
- Cisco LEAP (Lightweight EAP)
- IEEE 802.11x AC
- Phase 3: Key Management Phase
- Pairwise keys: for communication between a STA and an AP
- Pre-shared key (PSK)
- Master session key (MSK)
- Pairwise master key (PMK)
- PSK or derived from MSK
- Pairwise transient key (PTK)
- Hierarchy
- Group keys: for multicast communication
- Group master key (GMK)
- Group temporal key (GTK)
- Hierarchy
- IEEE 802.11i Phases of Operation
- 4-way Handshake
- Group Key Handshake
- 4-way Handshake
- Pairwise keys: for communication between a STA and an AP
- Phase 4: Protected Data Transfer Phase
- Temporal Key Integrity Protocol (TKIP)
- Only software changes are required to old WEP
- Message integrity
- Message Integrity Code (MIC)
- 64-bit: source/destination MAC address + data filed + key material
- Data confidentiality
- Encrypting MPDU + MIC using RC4
- 256-bit TK
- Two 64-bit keys for MIC: one key for each direction
- 128 bits: generate the RC4 key for encryption
- TKIP sequence counter (TSC): monotonically increasing
- Included with each MPCU and protected by MIC -> against replay attack
- Combined with session TK -> dynamic encryption key
- Counter Mode-CBC MAC Protocol (CCMP)
- 需要硬體支援
- Message integrity
- Cipher block chaining message authentication code
- Data confidentiality
- CTR block cipher mode of operation with AES
- Same 128-bit AES key for both
- A 48-bit packet number: a nonce(暫時) to prevent replay attack
- IEEE 802.11i Pseudorandom Function (PRF)
- A pseudorandom bit stream: HMAC-SHA-1
- A message and a key (at least 160 bits) -> 160-bit hash value
- SHA-1 property: change of a single bit -> a new hash value with no apparent connect
- PTK:
- K = PMK
- A = “Pairwise key expansion”
- B = Concatenation of two MAC address and two nonces
- Len = 384 bits
- A pseudorandom bit stream: HMAC-SHA-1
- Temporal Key Integrity Protocol (TKIP)