Top Banner
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28
49

Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

Design of Efficient and Secure Multiple Wireless Mesh Network

Speaker: Hsien-Pang TsaiTeacher: Kai-Wei Ke

Date: 2005/06/28

Page 2: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

2

Outline

Introduction Background Secure Wireless Mesh Network Security Analysis Conclusion

Page 3: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

3

Introduction

Wireless Mesh Network Secure Architecture Tree Topology

Security Analysis

Page 4: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

4

Outline

Introduction Background

Wireless Mesh Network Wireless Security

Secure Wireless Mesh Network Security Analysis Conclusion

Page 5: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

5

Wireless Mesh Network (WMN)

Last-mile broadband Internet access.

Similar to ad hoc network. Provides:

Reliability, Market Coverage, Scalability.

Page 6: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

6

Infrastructure Network

Wired Network

APAP

Mobile

Mobile

MobileMobile

Mobile

Page 7: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

7

Ad hoc Network

Mobile

Mobile

Mobile

Mobile

Mobile

Mobile

Page 8: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

8

WMN’s ArchitectureWired Network

Wireless Birdge

AP

AP

Mobile

Mobile

Mobile

Mobile

Wireless Birdge

Access Point

Mobile

Page 9: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

9

WMN’s Actor Wireless Gateway:

Bridge wired and wireless traffic. Access Point (AP):

Provide service to mobile user. Connect with other AP.

Mobile: End Users.

Page 10: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

10

Wireless Security

A wireless network is broadcast by nature, and the media is reachably-broadcast.

Authentication and data encryption.

Page 11: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

11

Attacks

Man-in-Middle (MIM) Forge AP Session Hijack Route Swindle Denial of Service (DoS)

Page 12: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

12

Man-in-Middle

An intruder introduces himself as a new node between a valid host and its AP or between AP and AP.

a b a b

(a) (b)

Page 13: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

13

Forge AP

a

d

h i j

e f

cb a

d

h i j

e f

cb

k

(a) (b)

Page 14: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

14

Session Hijack

Supplicant Authenticator Attacker

1.Authentication

2.Association

3.EAP req

4.EAP res

5.Req_auth(auth_info)

6.Resp_auth

7.Resp_success

8.Disassociation

9.Transmission

Page 15: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

15

Route Swindle

Modify the hop count filed in the routing packet.

a

c

b

f

e

d

h

g

a

c

b

f

e

d

h

g

(a) (b)

Page 16: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

16

Denial of Service (DoS) DoS attacks are a big problem for all t

ypes of networks. Limited CPU and memory. Continually send streams of associati

on and disassociation packets.

Page 17: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

17

Security Solution

Wired Equivalent Privacy (WEP) IEEE 802.1x Public Key Infrastructure

Page 18: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

18

WEPRC4(iv, k)

P = {M, c(M)}

Ciphertext

Page 19: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

19

Problems with WEP

Key size is too small (40 bits) be crackable in less than 50 hrs by brute f

orce. Key Sequence Reuse (Initial Vector) Message can’t be Authenticated

Page 20: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

20

IEEE 802.1x IEEE 802.1x is a security framework must pr

ovide network access authentication.

AuthenticatorSupplicant

Authentication Server

Page 21: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

21

IEEE 802.1x (1)Supplicant Authenticator Authentication Server

Authentication

Association

EAP req

EAP res

forward(unicast,Auth_message)

req_auth(unicast,auth_info)

req_auth(auth_info)

res_auth(auth_info)

res_success

session key exchange

EAPOL start

Page 22: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

22

Public Key Infrastructure

Two problems with shared-key : Key distribution Digital signatures

Key feature of public key cryptosystem Two keys: Public Key & Private Key Computational infeasible to determine d

ecryption key.

Page 23: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

23

Outline

Introduction Background Secure Wireless Mesh Network

Tree Topology Two functions of Wireless Mesh

Network Security Analysis Conclusion

Page 24: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

24

The Properties of WMN Similar to ad hoc network

AP will select a routing path to transfer data.

The routing path is always fix. Most data flow is transfer to

wireless gateway. Combine all routing path, we can

create a hierarchy architecture - Tree Topology.

Page 25: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

25

Tree Topology

d

a

g

b

e

h

c

f

ba c

d e f

g h

Page 26: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

26

WMN’s Relationship(b)

A

Authentication Agent

Supplicant

D

E

F

G

H

I

JManagement system(MS)

Page 27: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

27

The Actors of Secure WMN Supplicant:

A new AP wants to join WMN Authentication Agent (AA):

Helps supplicant to authenticate with management system.

Create secure tunnels with supplicants.

Page 28: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

28

The Actors of Secure WMN (1)

Management System (MS) Authentication Server Maintain the topology of WMN Create signature for APs

Page 29: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

29

Two functions of WMN

Self-Organization Self-Configuration

Self-Reconfiguration Self-Healing

Page 30: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

30

Self-Organization

d

a

g

b

e

h

c

f

1.Broadcast Req_Start

2.Return Resp_Start

3.Choise authentication agent4.Send Req_Join

5.Send Req_Join_f

6.Forward Req_Join_f

7.Authorization

8.Send Resp_Join_f

9.Send Req_Auth.

Page 31: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

31

Self-Organization (1)Supplicant Authentication Agent Management System

1.Req_Start(broadcast)

2.Resp_Start(unicast,infos)

3.Req_Join(unicast,join_message)

5.Req_Join_f(unicast,join_message)

6.Resp_join_f(unicast,auth_infos)

7.Req_Auth(unicast)

8.Resp_Auth(unicast,auth_info)

9.Resp_Success(nodie_id,Sign)

10.Session Key Exchange

4. Session Key Exchange

Page 32: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

32

Trust Model

First, a new AP should do… Register its “MAC Address”, “Confirm

Key” to MS. Get “Group Key” and “WMN public ke

y” from MS. When it gets Resp_Join…

Use “WMN public key” to determine the legal nodes.

Page 33: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

33

Trust Model (1) Use “Group Key” to start session key ex

change process with its AA. When it gets Req_Auth…

AA has get “Confirm Key” from MS. Return its “Confirm Key” to response R

eq_Auth, then AA will compare these “Confirm Key”.

Page 34: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

34

Choose Authentication Agent Two factors

Hop count Node loading

1. Choose the node has smallest hop count value.2. If there are two nodes has equal hop count value.

1. Compare their node loading value.2. Select the smaller one.

Page 35: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

35

Session Key Exchange

The session key should be modified periodically.

Default Key: Supplicant use “KeyUpdate” messa

ge to notify AA exchange key.

groupK

Page 36: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

36

Send Key_Update to Authentication

Agent

Receive Key_Update &

Generate a new key

Finish

Supplicant Authentication Agent

Send new key encrypted by old key to Supplicant

Receive new key

Send Key_Updated

encrypted by new key

Receive Key_Updated

Is decrypted right?

Send Key_Update_ok

to Supplicant

yes

Is receive Key_Update_o

k?

yes

Restore old key

no

Page 37: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

37

Self-Configuration

Self-Healing Self-Reconfiguration

Page 38: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

38

Self-Healing

a

d

h i j

e f

b c a

d

h i j

e f

b ca

d

h i j

e f

b c a

d

h i j

e f

c

(a) (b) (c) (d)

1. Determine the authentication agent fail.

2. Start Self-Organization process.

Page 39: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

39

Self-Reconfigurationa

e

i j k

f g

b c

m n o

l

h

d

p

a

e

i j k

f g

b c

n o

l

h

d

p

a

e

i j k

f g

b c

n o

l

h

d

p

a

e

i j k

f g

b c

m n o

l

h

d

p

(a) (b)

(c) (d)

Page 40: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

40

Outline

Introduction Background Secure Wireless Mesh Network Security Analysis Conclusion

Page 41: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

41

MIM

Supplicant use secret key to establish a secret tunnel with AA. Attacker can’t read the transmission

data directly. Supplicant will update new key

with its AA periodically. Attacker can’t collect enough packets

to determine the secret key.

Page 42: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

42

Forge AP

Supplicant will update new key with its AA periodically. Attacker doesn’t know what the key is

used now.

Page 43: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

43

Session Hijack

Session key exchange first Supplicant should start session key

exchange before authentication. Attacker can’t hijack any session.

Page 44: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

44

Route Swindle

When AP receive Req_Start, it returns Resp_Start (signature). Signature can prove its legality. Supplicant will only trust the legal Resp_

Start.

Page 45: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

45

Denial of Service

There are not any solution to solve this problem.

When a node be crashed, the self-healing process will be started by other nodes.

Page 46: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

46

Outline

Introduction Background Secure Wireless Mesh Network Security Analysis Conclusion

Page 47: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

47

Conclusion

Propose tree topology for secure WMN.

Define WMN’s basic functions of WMN.

Analysis security problems.

Page 48: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

48

Future Work

Consider more available attacks. Consider performance in “choose

AA” . Other application:

Sensor network Ad hoc network

Page 49: Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.

49

The End