Top Banner
WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235 Computer Security Instructor: T. Andrew Yang Student Name: Truyen Van Le
18

WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Dec 29, 2015

Download

Documents

Thomas Barrett
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

WiMax Security

Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion

Course: CSCI 5235 Computer SecurityInstructor: T. Andrew Yang Student Name: Truyen Van Le

Page 2: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Introduction About WiMax WiMax: Worldwide

interoperability for Microwave Access – IEEE802.16.

Higher bandwidth, larger coverage, and greater number of users.

WiMax actually can provide two forms of wireless service: none-line-of-sight and line-of-sight.

WiMax system includes two main parts WiMax receiver and WiMax tower.

Page 3: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

WiMax Security The transition from Line of Sight (LOS) and Point to Multi Point (PMP)

higher frequency (10-66 GHz) to lower frequencies (2- 11 GHz) and NLOS mobile systems the security issues increased tremendously

WiMAX uses radio channels which are open channels and hence pose a very serious security problem for traffic confidentiality and integrity

WiMAX uses air as a medium which exposes the PHY and MAC layers

The the large coverage area of WiMax adding more challenges to secure the connections when attackers is on the move.

Page 4: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Security Architecture Two main layers: Medium

Access Control (MAC) layer and Physical layer (PHY).

SAPs (Service Access Point) are interfacing points.

Page 5: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Security Architecture Convergence layer: adapts

units of data of higher level protocols to the MAC SDU format and vice versa.

Common part: construct MAC PDUs, establish the connections, manage the bandwidth, and exchanges MAC SDUs. It is integrated tightly with the security sub-layer.

Page 6: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Security Architecture

Security layer: address authentication, authorization, encryption, and exchanges MAC PDUs with the physical layer.

Page 7: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Security Mechanisms Authentication:

RSA Authentication based on X.509 Certificates.

EAP (Extensible Authentication Protocol)

HMAC (Hashed Message Authentication Code)

Page 8: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Security Mechanisms Authorization:

Follow the authentication process. SS request AK along with SAID (Security Association ID).

Authorization message includes SS's X.509 certificate, encryption algorithm, and cryptographic ID.

After authorization, BS send back the SS a public key, a lifetime key and a SAID.

Page 9: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Security Mechanisms

Encryption:

Traffic Encryption Key (TEK) is used to encrypt the data traffic

Page 10: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Vulnerabilities Authentication of the SS-

Man-in-the-Middle and Forgery

SS authenticates itself through its certificate, however, the BS does not .

Rogue BS could place himself between SS and real BS and try to force SS to authenticate itself and initiate a session by transferring an AK (forgery attack).

The attacker can generate his own Authorization Reply Message containing a self-generated AK and thus gain control over the communication of the attacked SS.

Page 11: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Vulnerabilities Key Material Exchange Phase-Attacks on the Key

Sequence Number: After the authorization phase, the SS requests key material (TEKs),

necessary for data encryption.

It periodically sends Key Request Messages referring to one of its valid SAIDs.

The BS replies with a Key Reply Message containing valid key material for the given SAID.

One potential replay attack is possible due to the Key Sequence Number of the TEK, which has a length of only two Bits.

This Sequence Number is part of the TEK parameter within the Key Reply Message.

It is used in a circle buffer changing its values to the tiny range of 1 to 4.

An attacker is able to capture TEK messages and replay them to gain information needed in order to decrypt data traffic.

Page 12: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Vulnerabilities Replay-and DoS-Attack against SS:

The SS send Authentication Information Messages to transmit all relevant information to the BS.

The BS responds to the last message with an Authorization Reply Message.

The BS can fall victim to a replay attack by which the attacker intercepts an Authorization Request Message from an authorized SS and stores it.

He will not be able to derive the AK from the Authorization Response Message (since he does not possess the associated private key), he can repeatedly send the message to the BS, burdening the BS with the effect that this declines the real/authentic SS.

Page 13: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

VulnerabilitiesPHY attack: Jamming: Attacker introduce a source of noise strong enough to

significant reduce the capacity of channel.

Scrambling:

It is sort of jamming but for a short intervals of time.

It is targeted to a specific frames or parts of frames.

Scramblers can select what they want to scramble i.e. control information or management information to affect the normal operations of the network.

Scrambling becomes a major problem when the network deals with time sensitive messages.

Page 14: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Improvement SS-Man-in-the-Middle and Forgery, Replay and DoS-

Attack

A countermeasure against Replay/DoS-Attacks is to furnish the Authorization Request Message with a time stamp together with a signature of the SS.

These additional parameters, would guarantee message authenticity.

The signature should use the private key of the SS in order to protect sensible information within this message.

Page 15: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Improvement Key Material Exchange Phase-Attacks on the Key Sequence

Number

Increasing the sequence number length so that a satisfactory amount of TEK Sequence Numbers can be generated and transmitted within the longest validity duration of the AK.

Using 70 days as highest duration of an AK and 30 minutes for the smallest duration of a TEK , a Data SA could theoretically consume 3.360 TEKs over a complete AK- Lifetime

Page 16: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Conclusion As the popularity of WiMAX increases, the threats are

also increased.

Malicious elements are working round the clock to break the security of the various networks.

Researchers and engineers have to work tirelessly to come up with solid, robust and most important of all long lasting solutions to the problems relating to security.

Page 17: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

References[1] Yi Yang, and Rui Li, Toward Wimax Security. IEEE Xplore 2009.

http://libproxy.uhcl.edu:2086/stamp/stamp.jsp?isnumber=5362501&arnumber=5362996&punumber=5362500

[2] Syed Shabih Hasan, Mohammed Abdul Qadeer, Security Concerns in WiMAX. http://libproxy.uhcl.edu:2086/stamp/stamp.jsp?isnumber=5340254&arnumber=5340365&punumber=5338529

[3] Muhammad Sakibur Rahman, Mir Md. Saki Kowsar. IEE Xplore 2009. WiMAX Security Analysis and Enhancement. http://libproxy.uhcl.edu:2086/stamp/stamp.jsp?isnumber=5407064&arnumber=5407321&punumber=5398764&tag=1

[4] How WiMax work http://computer.howstuffworks.com/wimax1.htma

Page 18: WiMax Security Introduction About WiMax WiMax security Security Architecture Security Mechanisms Vulnerabilities Improvement Conclusion Course: CSCI 5235.

Q&A