+ All Categories
Home > Technology > Wi Fi Security

Wi Fi Security

Date post: 12-Apr-2017
Category:
Upload: yousef-emami
View: 490 times
Download: 0 times
Share this document with a friend
20
WiFi Security: WEP, WPA, and WPA2 YOUSEF EMAMI [email protected] 07/05/2022 Network Security,CE&IT Faculty,Shiraz University of Technology 1
Transcript
Page 1: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 1

WiFi Security:WEP, WPA, and WPA2

YOUSEF [email protected]

Page 2: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 2

AgendaWhy security is more of a concern in wireless?Wireless communication security requirementsWEP – Wired Equivalent PrivacyWEP – Access controlWEP – Message confidentiality and integrityWEP flawsOverview of 802.11i WPATKIPTemporal Key Integrity Protocol(TKIP)WEP vs. WPAWPA2Conclusion

Page 3: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 3

Why security is more of a concern in wireless?no inherent physical protection

– physical connections between devices are replaced by logical associations

– sending and receiving messages do not need physical access to the network infrastructure (cables, hubs, routers, etc.) broadcast communications

– wireless usually means radio, which has a broadcast nature

– transmissions can be overheard by anyone in range

– anyone can generate transmissions, which will be received by other devices in range which will interfere with other nearby transmissions and may prevent their correct reception (jamming) eavesdropping is easy replaying previously recorded messages is easy illegitimate access to the network and its services is easy denial of service is easily achieved by jamming

Page 4: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 4

Wireless communication security requirements

Confidentiality– messages sent over wireless links must be encrypted

Authenticity– origin of messages received over wireless links must be verified

Replay detection– freshness of messages received over wireless links must be checked

Integrity– modifying messages on-the-fly (during radio transmission) is not so easy,but possible ...– integrity of messages received over wireless links must be verified

Access control– access to the network services should be provided only to legitimateentities

Page 5: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 5

WEP – Wired Equivalent Privacy

Part of the IEEE 802.11 specificationGoal– make the WiFi network at least as secure as a wired LANWEP has never intended to achieve strong security (at the end, it hasn’t achieved even weak security)Services– access control to the network– message confidentiality– message integrity

Page 6: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 6

WEP – Access control

Before association, the STA needs to authenticate itself to the APAuthentication is based on a simple challenge-response protocol:• STA AP: authenticate request• AP STA: authenticate challenge (r) // r is 128 bits long • STA AP: authenticate response (eK(r))• AP STA: authenticate success/failure• once authenticated, the STA can send an association request, and the

AP will respond with an association response• if authentication fails, no association is possible

Page 7: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 7

WEP – Message confidentiality and integrity

Page 8: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 8

WEP flaws

Authentication is one-way only

– AP is not authenticated to STA– STA may associate to a rogue AP

The same shared secret key is used for authentication and encryption -weaknesses in any of the two protocol can be used to break the key– different keys for different functions are desirable

no session key is established during authentication

There’s no replay protection at all– IV is not mandated to be incremented after each message

Page 9: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 9

ContinueIV reuse– IV space is too small IV size is only 24 bits there are 16,777,216 possible IVs, after

around 17 million messages, IVs are reused a busy AP at 11 Mbps is capable for transmitting 700 packets per

second IV space is used up in around 7 hoursSTA can be impersonatedattacker can manipulate messages despite the ICV mechanism and

encryption

Page 10: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 10

Avoid the use of WEP (as much as possible)

Page 11: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 11

Overview of 802.11i

After the collapse of WEP, IEEE started to develop a new security architecture 802.11i

Main novelties in 802.11i – Access control model is based on 802.1X– Flexible authentication framework (based on EAP)– Authentication can be based on strong protocols (e.g., TLS)– Authentication process results in a shared session key (which prevents session hijacking)– Different functions (encryption, integrity) use different keys derived from the session key using a one-way function– Integrity protection is improved– Encryption function is improved

Page 12: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 12

Continue802.11i defines the concept of RSN (Robust Security Network)– integrity protection and encryption is based on AES (in CCMP mode)– nice solution, but needs new hardware cannot be adopted immediately802.11i also defines an optional protocol called TKIP – integrity protection is based on Michael– encryption is based on RC4, but WEP’s problems have been avoided– ugly solution, but runs on old hardware (after software upgrade)• industrial names• –TKIP WPA (WiFi Protected Access)• – RSN/AES-CCMP WPA2

Page 13: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 13

WPATemporal Key Integrity Protocol (TKIP)Longer IV + Key mixing to get Per-Packet Key + MICUse the same encryption (RC4) Firmware upgrade ⇒All access points and subscribers need to use WPAWPA+WEP WEP⇒Separate keys for authentication, encryption, and integrity48b TKIP sequence counter (TSC) is used to generate IV and avoid replay attack.

Page 14: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 14

TKIPA good method for enhancing WEP security without performance

degradation.

Integrity protection using message integrity code.

Preventing from replay attacks by frames numbering techniques.

Using new encryption key for each frame so that attacks such as FMS to be prevented.

Page 15: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 15

Temporal Key Integrity Protocol(TKIP)WEP: same base key is used in all packetsTKIP: New packet key is derived for each packet from source address ,48 b TKIP Seq counter , and 104b base key

Page 16: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 16

WEP vs. WPA

Page 17: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 17

WPA2Advanced Encryption Standard(AES)Need hardware supportAES is a block cipher it has many modes.CTR mode is used for encryption in place of RC4Cipher Block Chaining Message Authentication Code (CBC-MAC) in place of

MichaelCCM=CTR+CBC-MAC for confidentiality and integrity.CCM Protocol (CCMP) header format is used.Packet Number is used to prevent replay attacks.CCM is based on AES .CCM use new temporal key for each session. Unlike TKIP ,CCM using AES no need

to generate dynamic key for each packet.

Page 18: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 18

Page 19: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 19

ConclusionWEP is good training ground for security attacks.Almost all components are weak.

TKIP provide a quick way to upgrade firmware and fix many of the flaws.(WPA)

CCMP adds a stronger AES encryption and message integrity check but requires new hardware.(WPA2)

Page 20: Wi Fi Security

05/03/2023 Network Security,CE&IT Faculty,Shiraz University of Technology 20

Thank you for your kind attention


Recommended