Top Banner
Network Access Control and Wireless Lennart Franked Avdelningen för informationssystem och -teknologi (IST) Mittuniversitetet December 4, 2014 Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 1 / 42
107

Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Apr 21, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access Control and Wireless

Lennart Franked

Avdelningen för informationssystem och -teknologi (IST)Mittuniversitetet

December 4, 2014

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 1 / 42

Page 2: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Overview

1 Network Access Control (NAC) and IEEE 802.1XNetwork Access ControlExtensible Authentication ProtocolIEEE 802.1x

2 Wireless Network SecurityWireless Security

3 802.11 Wireless Overview802.11 - Wireless LANWireless LAN Security

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 2 / 42

Page 3: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Literature

The lecture covers chapter 5.1 - 5.3 and chapter 7 “Wireless NetworkSecurity” in [1]. To check that you have fully understood these chapters,you should solve problems 7.1, and 7.2

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 3 / 42

Page 4: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access Control

Figure: [1].Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 4 / 42

Page 5: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Access RequestorNetwork Access Control

Figure: [1].

Access RequestorAccess Requestor, Client,Supplicants, peerAccess the network.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 5 / 42

Page 6: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Policy ServerNetwork Access Control

Figure: [1].

Policy ServerEnforce access restrictions.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 6 / 42

Page 7: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access ServerNetwork Access Control

Figure: [1].

Network Access ServerControl access to Network.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 7 / 42

Page 8: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access Enforcement MethodsNetwork Access Control

IEEE 802.1X - EAP over LAN.VLAN.Firewall.DHCP management.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 8 / 42

Page 9: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access Enforcement MethodsNetwork Access Control

IEEE 802.1X - EAP over LAN.VLAN.Firewall.DHCP management.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 8 / 42

Page 10: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access Enforcement MethodsNetwork Access Control

IEEE 802.1X - EAP over LAN.VLAN.Firewall.DHCP management.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 8 / 42

Page 11: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Network Access Enforcement MethodsNetwork Access Control

IEEE 802.1X - EAP over LAN.VLAN.Firewall.DHCP management.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 8 / 42

Page 12: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Extensible Authentication Protocol

Figure: [1].

Framework for network accessand authentication protocols.Mostly encountered in wirelessnetworks and PPP-connections.Extension to PPP

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 9 / 42

Page 13: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Extensible Authentication Protocol

Figure: [1].

Framework for network accessand authentication protocols.Mostly encountered in wirelessnetworks and PPP-connections.Extension to PPP

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 9 / 42

Page 14: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Extensible Authentication Protocol

Figure: [1].

Framework for network accessand authentication protocols.Mostly encountered in wirelessnetworks and PPP-connections.Extension to PPP

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 9 / 42

Page 15: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Authentication MethodsExtensible Authentication Protocol

Figure: [1].

EAP authentication methods.EAP-TLS.EAP-TTLS.EAP-GPSK.EAP-IKEv2.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 10 / 42

Page 16: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Authentication MethodsExtensible Authentication Protocol

Figure: [1].

EAP authentication methods.EAP-TLS.EAP-TTLS.EAP-GPSK.EAP-IKEv2.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 10 / 42

Page 17: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Authentication MethodsExtensible Authentication Protocol

Figure: [1].

EAP authentication methods.EAP-TLS.EAP-TTLS.EAP-GPSK.EAP-IKEv2.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 10 / 42

Page 18: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Authentication MethodsExtensible Authentication Protocol

Figure: [1].

EAP authentication methods.EAP-TLS.EAP-TTLS.EAP-GPSK.EAP-IKEv2.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 10 / 42

Page 19: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

EAP ExchangesExtensible Authentication Protocol

Figure: EAP Protocol Exchange [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 11 / 42

Page 20: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

EAP MessagesExtensible Authentication Protocol

Figure: EAP Message Flow [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 12 / 42

Page 21: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.1x

Figure: IEEE 802.1x operation [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 13 / 42

Page 22: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.1x EAPOL Message typesIEEE 802.1x

EAPOL-EAP – Encapsulated EAP packet.EAPOL-Start – Initiates the start of EAP authentication process.EAPOL-Logoff – Closes the EAP session.EAPOL-Key – Exchange key information.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 14 / 42

Page 23: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.1x EAPOL Message typesIEEE 802.1x

EAPOL-EAP – Encapsulated EAP packet.EAPOL-Start – Initiates the start of EAP authentication process.EAPOL-Logoff – Closes the EAP session.EAPOL-Key – Exchange key information.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 14 / 42

Page 24: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.1x EAPOL Message typesIEEE 802.1x

EAPOL-EAP – Encapsulated EAP packet.EAPOL-Start – Initiates the start of EAP authentication process.EAPOL-Logoff – Closes the EAP session.EAPOL-Key – Exchange key information.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 14 / 42

Page 25: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.1x EAPOL Message typesIEEE 802.1x

EAPOL-EAP – Encapsulated EAP packet.EAPOL-Start – Initiates the start of EAP authentication process.EAPOL-Logoff – Closes the EAP session.EAPOL-Key – Exchange key information.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 14 / 42

Page 26: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Overview

1 Network Access Control (NAC) and IEEE 802.1XNetwork Access ControlExtensible Authentication ProtocolIEEE 802.1x

2 Wireless Network SecurityWireless Security

3 802.11 Wireless Overview802.11 - Wireless LANWireless LAN Security

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 15 / 42

Page 27: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Security

Wireless Network Security

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 16 / 42

Page 28: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security issuesWireless Security

Why wireless network are more susceptible to attacks.Broadcast communication allows eavesdropping.Jamming trafficMobile devicesImplemented on a variety of devices with limited memory andcomputational resources.Easy to access.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 17 / 42

Page 29: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security issuesWireless Security

Why wireless network are more susceptible to attacks.Broadcast communication allows eavesdropping.Jamming trafficMobile devicesImplemented on a variety of devices with limited memory andcomputational resources.Easy to access.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 17 / 42

Page 30: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security issuesWireless Security

Why wireless network are more susceptible to attacks.Broadcast communication allows eavesdropping.Jamming trafficMobile devicesImplemented on a variety of devices with limited memory andcomputational resources.Easy to access.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 17 / 42

Page 31: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security issuesWireless Security

Why wireless network are more susceptible to attacks.Broadcast communication allows eavesdropping.Jamming trafficMobile devicesImplemented on a variety of devices with limited memory andcomputational resources.Easy to access.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 17 / 42

Page 32: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security issuesWireless Security

Why wireless network are more susceptible to attacks.Broadcast communication allows eavesdropping.Jamming trafficMobile devicesImplemented on a variety of devices with limited memory andcomputational resources.Easy to access.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 17 / 42

Page 33: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 34: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 35: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 36: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 37: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 38: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 39: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 40: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wireless Network ThreatsWireless Security

ThreatsAccidental AssociationMalicious AssociationAd hoc NetworksNontraditional NetworksMAC SpoofingMan-in-the-middle attacksDoSNetwork Injection

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 18 / 42

Page 41: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 42: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 43: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 44: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 45: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 46: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 47: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

CountermeasureWireless Security

Signal-hiding techniquesI Hide SSID (Security by obscurity)I Reducing Signal Strength

Encryption (Confidentiality)AuthenticationMAC (Integrity)IEEE 802.1x

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 19 / 42

Page 48: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 49: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 50: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 51: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 52: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 53: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 54: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Mobile device SecurityWireless Security

Lack of physical ControlUse of untrusted mobile devicesUse of untrusted networkUse of applications created by unknown partiesInteraction with other systemsUse of untrusted contentUse of location services

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 20 / 42

Page 55: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Overview

1 Network Access Control (NAC) and IEEE 802.1XNetwork Access ControlExtensible Authentication ProtocolIEEE 802.1x

2 Wireless Network SecurityWireless Security

3 802.11 Wireless Overview802.11 - Wireless LANWireless LAN Security

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 21 / 42

Page 56: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 57: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 58: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 59: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 60: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 61: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 62: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 63: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 - Wireless LAN

IEEE 802 work group.I Develops standards for LAN.I 802.11 was formed 1990

Wi-Fi AllianceI Wireless Ethernet Compatibility Alliance (WECA)I Certifies compatibility between Wi-Fi vendors.I 802.11a,b,g,n,ac,adI Creates security standards as well.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 22 / 42

Page 64: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Terminology802.11 - Wireless LAN

Access pointBasic Service SetExtended Service SetDistribution SystemProtocol Data UnitService Data Unit

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 23 / 42

Page 65: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Terminology802.11 - Wireless LAN

Access pointBasic Service SetExtended Service SetDistribution SystemProtocol Data UnitService Data Unit

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 23 / 42

Page 66: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Terminology802.11 - Wireless LAN

Access pointBasic Service SetExtended Service SetDistribution SystemProtocol Data UnitService Data Unit

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 23 / 42

Page 67: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Terminology802.11 - Wireless LAN

Access pointBasic Service SetExtended Service SetDistribution SystemProtocol Data UnitService Data Unit

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 23 / 42

Page 68: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Terminology802.11 - Wireless LAN

Access pointBasic Service SetExtended Service SetDistribution SystemProtocol Data UnitService Data Unit

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 23 / 42

Page 69: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Terminology802.11 - Wireless LAN

Access pointBasic Service SetExtended Service SetDistribution SystemProtocol Data UnitService Data Unit

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 23 / 42

Page 70: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11 protocol stack802.11 - Wireless LAN

Figure: 802.11 protocol stack [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 24 / 42

Page 71: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11 Architectural Model802.11 - Wireless LAN

Figure: 802.11 Architectural Model [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 25 / 42

Page 72: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 73: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 74: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 75: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 76: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 77: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 78: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 79: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 80: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 81: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11 services802.11 - Wireless LAN

Table: IEEE 802.11 Services [1]

Service Provider Used to support

Association Distribution system MSDU deliveryReassociation Distribution system MSDU deliveryAuthentication Station LAN access and SecurityDeauthentication Station LAN access and SecurityPrivacy Station LAN access and SecurityDisassociation Distribution system MSDU deliveryDistribution Distribution system MSDU deliveryIntegration Distribution system MSDU deliveryMSDU delivery Station MSDU delivery

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 26 / 42

Page 82: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security Comparison – Wired vs. WirelessWireless LAN Security

Wireless LANAny station within then range of a wireless AP can transmit and receivedata on the LAN.

Wired LANOnly devices with a physical connection to the network can send andreceive data on the LAN.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 27 / 42

Page 83: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Security Comparison – Wired vs. WirelessWireless LAN Security

Wireless LANAny station within then range of a wireless AP can transmit and receivedata on the LAN.

Wired LANOnly devices with a physical connection to the network can send andreceive data on the LAN.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 27 / 42

Page 84: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11iWireless LAN Security

Wired Equivalent Privacy (WEP)Wi-Fi Protected Access (WPA)

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 28 / 42

Page 85: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11iWireless LAN Security

Wired Equivalent Privacy (WEP)Wi-Fi Protected Access (WPA)

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 28 / 42

Page 86: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WEPWireless LAN Security

Use RC4 stream cipher.128 bit random number used as a challange.64 bit (40 bit user generated) or 128 bit (104 bit user generated) keysizes.24 bit initialization vector

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 29 / 42

Page 87: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WEPWireless LAN Security

Use RC4 stream cipher.128 bit random number used as a challange.64 bit (40 bit user generated) or 128 bit (104 bit user generated) keysizes.24 bit initialization vector

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 29 / 42

Page 88: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WEPWireless LAN Security

Use RC4 stream cipher.128 bit random number used as a challange.64 bit (40 bit user generated) or 128 bit (104 bit user generated) keysizes.24 bit initialization vector

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 29 / 42

Page 89: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WEPWireless LAN Security

Use RC4 stream cipher.128 bit random number used as a challange.64 bit (40 bit user generated) or 128 bit (104 bit user generated) keysizes.24 bit initialization vector

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 29 / 42

Page 90: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WEP Encryption processWireless LAN Security

Figure: WEP encryption process

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 30 / 42

Page 91: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wi-Fi Protected Access (WPA)Wireless LAN Security

Replace WEP802.11i - Robust Security NetworkRSN services

I AuthenticationI Access ControlI Privacy with message integrity

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 31 / 42

Page 92: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wi-Fi Protected Access (WPA)Wireless LAN Security

Replace WEP802.11i - Robust Security NetworkRSN services

I AuthenticationI Access ControlI Privacy with message integrity

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 31 / 42

Page 93: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wi-Fi Protected Access (WPA)Wireless LAN Security

Replace WEP802.11i - Robust Security NetworkRSN services

I AuthenticationI Access ControlI Privacy with message integrity

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 31 / 42

Page 94: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wi-Fi Protected Access (WPA)Wireless LAN Security

Replace WEP802.11i - Robust Security NetworkRSN services

I AuthenticationI Access ControlI Privacy with message integrity

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 31 / 42

Page 95: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wi-Fi Protected Access (WPA)Wireless LAN Security

Replace WEP802.11i - Robust Security NetworkRSN services

I AuthenticationI Access ControlI Privacy with message integrity

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 31 / 42

Page 96: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Wi-Fi Protected Access (WPA)Wireless LAN Security

Replace WEP802.11i - Robust Security NetworkRSN services

I AuthenticationI Access ControlI Privacy with message integrity

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 31 / 42

Page 97: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WPAWireless LAN Security

Figure: Elements of 802.11i [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 32 / 42

Page 98: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

WPAWireless LAN Security

Figure: 802.11i Phases of operation [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 33 / 42

Page 99: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11i - Discovery/Authentication phaseWireless LAN Security

Figure: Discovery, authentication and association [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 34 / 42

Page 100: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

802.11i - Key HierarchiesWireless LAN Security

Figure: Key Hierarchies [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 35 / 42

Page 101: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Keys used in Wi-Fi Protected AccessWireless LAN Security

Pairwise KeysI Used for communication between a pair of devices.

Pre-Shared KeyI A secret key installed outside the scope of 802.11i

Master Session KeyI Master key generated using IEEE 802.1x EAPOL

Pairwise Master KeyI Derived from MSK or PSK

Pairwise Transient KeyI Consists of three keys:I Key Confirmation Key (KCK)I Key Encryption Key (KEK)I Temporal Key (TK)

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 36 / 42

Page 102: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Group KeysWireless LAN Security

Used for multicast communicationTwo keys are used

I Group Master Key - Used to generate Group Temporal KeyI Group Temporal Key - Used to encrypt the MPDUsI Changed every time a devices leaves the group.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 37 / 42

Page 103: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11i Four-way HandshakeWireless LAN Security

Figure: Four-way handshake and Group Key Handshake [1]

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 38 / 42

Page 104: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Protected Data TransferWireless LAN Security

TKIP (Temporal Key Integrity Protocol)I Software backward compatible with WEP devicesI Message integrity using a MAC (Michael)I Encrypts data using RC4.

CCMP (Counter Mode-CBC MAC Protocol)I Use CBC-MAC for message integrityI Encrypts data using AES-CTR.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 39 / 42

Page 105: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11i PRFWireless LAN Security

Used for amongst other things generating nonces.Built on the HMAC-SHA1 hash algorithm.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 40 / 42

Page 106: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

IEEE 802.11i PRFWireless LAN Security

Figure: IEEE 802.11i PRF [1]Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 41 / 42

Page 107: Network Access Control and Wirelessver.miun.se/courses/security/lectures/wireless.pdf · AuthenticationMethods Extensible Authentication Protocol Figure:[1]. EAP authentication methods.

Referenser

[1] William Stallings. Network security essentials : applications andstandards. 5th ed. International Edition. Pearson Education, 2013.ISBN: 978-0-273-79336-6.

Lennart Franked (MIUN IST) Network Access Control and Wireless December 4, 2014 42 / 42