Top Banner
IEEE 802.16 WiMax Security Dr. Kitti Wongthavarawat Wireless Security R&D ThaiCERT, NECTEC Presents at NAC 2005 March 28, 2005
18

IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Nov 19, 2019

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

IEEE 802.16 WiMaxSecurity

Dr. Kitti WongthavarawatWireless Security R&DThaiCERT, NECTEC

Presents at NAC 2005March 28, 2005

Page 2: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Agenda

Introduction to IEEE 802.16 WiMaxIEEE 802.16 Security ModelIEEE 802.16 Security AnalysisConclusions

Page 3: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Introduction to IEEE 802.16 WiMax

Complement existing last mile wired networks (i.e., xDSL, Cable modem)Fast deployment, cost savingHigh speed data, voice and video servicesFixed BWA, Mobile BWA

ISPBase Station(BS)

SSSS

SubscriberStation

(SS)

Page 4: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Introduction to IEEE 802.16 WiMax

Fixed BWA (IEEE 802.16)

Mobile BWA (IEEE 802.16e)

Page 5: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

IEEE 802.16 Evolution802.16(2001)

Fixed BWA at 10-66 GHzLine of sight

802.16a(2003)

802.16 - 2004

802.16e(2005 ?)

Fixed BWA at 2-11 GHzNone line of sight

Revision of 802.16Combine previous 802.16 standards

Mobile BWA based on 802.16-2004(802.16a)Roaming with vehicular speed

802.16 - 2004

Page 6: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

IEEE 802.16 Security Model

Standard was adopted from DOCSIS specification (e.g. cable modem spec.)

Assumption: all equipments are controlled by the service provider May not be suitable for wireless environment

Connection oriented (i.e., Basic CID, SAID)

Page 7: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

IEEE 802.16 Security Model

ConnectionManagement connectionTransport connectionIdentified by connection ID (CID)

Security Association (SA)Cryptographic suite (i.e., encryption algorithm)Security Info (i.e., key, IV)Identified by SAID

BSSS SS

Page 8: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

IEEE 802.16 Security Analysis

IEEE 802.16 security processSecurity mechanisms

AuthenticationAccess controlMessage encryptionMessage modification detection (Integrity)Message replay protectionKey management

Key generationKey transport, Key protectionKey derivationKey usage

Page 9: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

IEEE 802.16 Security Process

BSSS

1. (Re) Authentication

2. Data Key exchange

3. Data encryption

Page 10: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

AuthenticationBSSS

[SS Certificate, Security Capabilities, SAID]Authorization Request

Authorization Reply

[AK (encrypted with RSA-1024 SS’s public key), Key lifetime, Selected Security Suite]

Verify SS Certificate

AK (128bits) AK (128bits)

Key Derivation(KEK, HMAC Key)

Key Derivation(KEK, HMAC Key)

Page 11: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Authentication – Vulnerabilities

No mutual authentication – Rogue BSLimited authentication method – client certificationNew authentication method requires changing the authentication message

Page 12: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

AuthenticationBSSS

[SS Certificate, Security Capabilities, SAID]

[AK (encrypted with RSA-1024 SS’s public key), Key lifetime, Selected Security Suite]

AK (128bits)

Verify SS Certificate

AK (128bits)

Key Derivation(KEK, HMAC Key)

2. Data Key exchange

Key Derivation(KEK, HMAC Key)

Authorization Reply

Authorization Request

Page 13: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Key Derivation

Authentication Key - AK (128bits)

Key Encryption Key - KEK (128bits) HMAC Key for Uplink (160 bits)

HMAC Key for Downlink (160 bits)

Page 14: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Data Key ExchangeBSSS

[AK Sequence Number, SAID, HMAC-SHA1]TEK Key Request

TEK Key Reply

[Encrypted TEK, TEK key lifetime, CBC-IV, HMAC-SHA1] ]

TEK Generation

TEK (128bits) TEK (128bits)

Page 15: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Data Key Exchange

Transport Encryption Key (TEK)TEK is generated by BS randomlyTEK is encrypted with

3DES (use 128 bits KEK)RSA (use SS’s public key)AES (use 128 bits KEK)

Key Exchange message is authenticated by HMAC-SHA1 – (provides Message Integrity and AK confirmation)

Page 16: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Data Key ExchangeBSSS

[AK Sequence Number, SAID, HMAC-SHA1]TEK Key Request

TEK Key Reply

[Encrypted TEK, TEK key lifetime, CBC-IV, HMAC-SHA1] ]

TEK Generation

TEK (128bits) TEK (128bits)

3. Data encryption

Page 17: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Data Encryption

Encrypt only data message not management messageDES in CBC Mode

56 bit DES key (TEK)No Message Integrity DetectionNo Replay Protection

AES in CCM Mode128 bit key (TEK)HMAC-SHA1Replay Protection using Packet Number

Page 18: IEEE 802.16 WiMax Security - NECTEC · Introduction to IEEE 802.16 WiMax Complement existing last mile wired networks (i.e., xDSL, Cable modem) Fast deployment, cost saving High speed

Conclusions

Require mutual authenticationRequire more flexible authentication methodPrefer AES to DES for data encryption