National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN...

15
[1] National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189 Under the guidance of Mr. Siddhartha Bhusan Neelamani

Transcript of National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN...

Page 1: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[1]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

Wireless LAN Security

Presented By SWAGAT SOURAV Roll # EE 200118189

Under the guidance of

Mr. Siddhartha Bhusan Neelamani

Page 2: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[2]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

• It is also easy to interfere with wireless communications. A simple jamming transmitter can make communications impossible. For example, consistently hammering an access point with access requests, whether successful or not, will eventually exhaust its available radio frequency spectrum and knock it off the network.

• Advantages of WLAN

• Disadvantages WLAN

Introduction

Page 3: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[3]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WLAN Authentication• Wireless LANs, because of their broadcast nature, require the addition of:

User authentication Data privacy • Authenticating wireless LAN clients.

Client Authentication Process

Page 4: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[4]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WLAN Authentication• Types Of Authentication

Open Authentication

• The authentication request

• The authentication response Shared Key Authentication

• requires that the client configure a static WEP key

Service Set Identifier (SSID) MAC Address Authentication

• MAC address authentication verifies the client’s MAC address against a locally configured list of allowed addresses or against an external authentication server

Page 5: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[5]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WLAN Authentication Vulnerabilities

• SSID

An eavesdropper can easily determine the SSID with the use of an 802.11 wireless LAN packet analyzer, like Sniffer Pro.

• Open Authentication

Open authentication provides no way for the access point to determine whether a client is valid.

• Shared Key Authentication Vulnerabilities

The process of exchanging the challenge text occurs over the wireless link and is vulnerable to a man-in-the-middle attack

• MAC Address Authentication Vulnerabilities

A protocol analyzer can be used to determine a valid MAC address

Page 6: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[6]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WEP Encryption • WEP is based on the RC4 algorithm, which is a symmetric

key stream cipher. The encryption keys must match on both the client and the access point for frame exchanges to succeed

Stream Ciphers

Encrypts data by generating a key stream from the key and performing the XOR function on the key stream with the plain-text data

Page 7: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[7]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WEP Encryption Block Ciphers

Fragments the frame into blocks of predetermined size and performs the XOR function on each block.

Page 8: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[8]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WEP Encryption Weaknesses • There are two encryption techniques to overcome WEP encryption weakness

Initialization vectorsFeedback modes

• Initialization vectors

Page 9: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[9]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WEP Encryption Weaknesses

• Feedback Modes

Page 10: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[10]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

WEP Encryption Weaknesses

• Statistical Key Derivation—Passive Network Attacks

A WEP key could be derived by passively collecting particular frames from a wireless LAN

• Inductive Key Derivation—Active Network Attacks

Inductive key derivation is the process of deriving a key by coercing information from the wireless LAN

Initialization Vector Replay Attacks

Bit-Flipping Attacks

• Static WEP Key Management Issues

Page 11: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[11]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

Component of WLAN Security

• The Authentication Framework (802.1X)

• The EAP Authentication Algorithm

Mutual Authentication

User-Based Authentication

Dynamic WEP Keys

• Data Privacy with TKIP (Temporal Key Integrity Protocol )

A message integrity check (MIC

Per-packet keying

Broadcast Key Rotation

Page 12: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[12]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

Future of WLAN Security• AES (Advanced Encryption Standard )

AES-OCB Mode

Page 13: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[13]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

Future of WLAN Security AES-CCM Mode

Page 14: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[14]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

ConclusionWireless LAN deployments should be made as secure as possible. Standard 802.11 security is weak and vulnerable to numerous network attacks. This paper has highlighted these vulnerabilities and described how it can be solved to create secure wireless LANs.

Some security enhancement features might not be deployable in some situations because of device limitations such as application specific devices (ASDs such as 802.11 phones capable of static WEP only) or mixed vendor environments. In such cases, it is important that the network administrator understand the potential WLAN security vulnerabilities.

Page 15: National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

[15]

Nati

onal In

stit

ute

of

Sci

en

ce &

Tech

nolo

gy

WIRELESS LAN SECURITY

Swagat Sourav

Thank You!!!