Top Banner
By: Alex Feldman
18

By: Alex Feldman. A mobile station is connected to the network wirelessly through another device. In case of WiFi (IEEE 802.11) this would be an access.

Dec 29, 2015

Download

Documents

Bryce Cook
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

By: Alex Feldman

Page 2: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

A mobile station is connected to the network wirelessly through another device.

In case of WiFi (IEEE 802.11) this would be an access point.

In case of WiMax (IEEE 802.16) it is a base station.

Page 3: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

The mobile station may need to change its connection point to the network.

The connection point “Hands Over” the connection to the new point.

It has to be secure It has to be fast It has to be standardized

Page 4: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Supplicant (Sta)– the station entering the network to be authenticated.

Authenticator (Au) – the access point directly connected to the station, and acting as a proxy to the authentication server.

Authentication Server (AS) – database containing credentials for all users, reachable by the authenticator.

Page 5: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.
Page 6: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Extensible Authentication Protocol -Transport Layer Security

Widely supported but rarely used.8-way handshake. Very secure but

also very time consuming.Doesn’t scale well when clients

handoff often.

Page 7: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

PMK - Pairwise Master KeyPTK – Pairwise Transient KeyEMSK – Extended Master Session Key

RADIUS – Remote Authentication Dial In User Service. Uses a shared secret to cipher and authenticate the communication.

Page 8: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

1. Authentication – PMK and EMSK generated on SA and Station.

2. AS moves PMK to Au by using RADIUS.

3. 4-way handshake – PTK generated by Au and Station

Page 9: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

When a station changes access points, re-authenticating the PMK is slow.

Only the PTK needs to be renewed, and PMK can be left alone.

How do we transmit the PMK from Au1 to Au2????

Page 10: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Au1 is a bad guy. Pushes false PMK Sta is a bad guy that

gets access to Au2 Sta is a good guy that

gets a denial of service

Au2 is a bad guy.Pulls PMK from Au1.Now it can decipher traffic.

Page 11: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Don’t use AS for re-authentication! Pull/Push policies to transfer keys. Provides good performance. More complicated.

Use when: Handover speed is crucial & path to the AU

is long Don’t want to be dependant on the AU

server

Page 12: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Contact the Au on every handover.

Slower performance.Gained security.

Possible danger if the protocol used to move PMK is not strong. Need good reasons to transfer PMKs.

Page 13: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Goal: reduce the number of packets required for TLS exchange by re-using information generated in the first authentication.

EMSK remained on the Authentication Server, so it can be used to re-authenticate the Station

Page 14: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Based on contacting the Authentication serverBased on contacting the Authentication server

Au

PTK

Page 15: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

EAP-TLS took 2.34 seconds

on average

Proposed protocol took 0.62 seconds on average

74% improvement over EAP-TLS!

82% improvement when including retransmissions

Page 16: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Internet Engineering Task Force (IETF) – working on new standard to used the EMSK for re-authentication.

Pull and push methods to transfer keys for nodes within same mobility domains

Page 17: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

EAP-TLS is slow for re-authentication.

Big improvements can be made by following the proposed protocol, which Reduces number of packets required Reduces retransmissions Decreases time

Page 18: By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE 802.11) this would be an access.

Original paper written by:

Romano Fantacci, Leonardo Maccari, and Tommaso Pecorella

from: University of Florence

Federico Frosalifrom: Telecom Italia Lab