WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

23
WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae

description

CS710 Topics in Computer Architecture 2/22 Introduction: The IEEE standard a broadband wireless access technology being defined by the IEEE and WiMax Forum. aims to prepare formal specifications for the global deployment of broadband Wireless Metropolitan Area Networks. higher bandwidth IP-based mobile and wireless access handover between networks of different technologies and management authorities. Amendments to the standard the IEEE c standard defines profiles of typical implementations. the IEEE a standard consists of control enhancements, introduction of a mesh mode and support of additional frequencies. the IEEE d standard is a consolidation and an improvement of the IEEE standard and the amendments c and a. An amendment to the standard, IEEE (formerly known as IEEE e), addressing mobility, was concluded in It defines additional mechanisms to support mobile subscribers at vehicular speed and data authentication. This is sometimes called “Mobile WiMAX”

Transcript of WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

Page 1: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

WiMax/802.16 Threat Analysis

Michel BarbeauACM Q2SWinet 2005

19 Oct 2006Ji, Sung-bae

Page 2: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

22/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Contents

IntroductionThe IEEE 802.16 standard / WiMAX

MethodologyThree criteria: Likelihood, Impact and Risk

AnalysisPhysical Layer ThreatsMAC Layer Threats

Conclusions

Page 3: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

33/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Introduction: The IEEE 802.16 standard

a broadband wireless access technology being defined by the IEEE and WiMax Forum.aims to prepare formal specifications for the global deployment of broadband Wireless Metropolitan Area Networks.

higher bandwidth IP-based mobile and wireless accesshandover between networks of different technologies and management authorities.

Amendments to the standardthe IEEE 802.16c standard defines profiles of typical implementations.the IEEE 802.16a standard consists of control enhancements, introduction of a mesh mode and support of additional frequencies.the IEEE 802.16d standard is a consolidation and an improvement of the IEEE 802.16 standard and the amendments 802.16c and 802.16a.An amendment to the standard, IEEE 802.16-2005 (formerly known as IEEE 802.16e), addressing mobility, was concluded in 2005. It defines additional mechanisms to support mobile subscribers at vehicular speed and data authentication. This is sometimes called “Mobile WiMAX”

Page 4: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

44/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Introduction: WiMAX

Although the 802.16 family of standards is officially called WirelessMAN, it has been dubbed “WiMAX” by an industry group called the WiMAX Forum.The acronym WiMAX expands to "Worldwide Interoperability for Microwave Access".The role of the WiMax Forum is

to define profiles using the broad range of 802.16 available optionsto promote and certify compatibility and interoperability of broadband wireless productsto define additional mechanisms for networking such as

user-network mutual authentication,integration with other kinds of wireless access technologies (WiFi/802.11, 2G/3G cellular)transfer of security and quality of service state information during handovers.

Page 5: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

55/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Methodology (1/2)

A threat assessment methodology proposed by the ETSIThe evaluation is conducted according to three criteria:

LikelihoodThe Likelihood evaluates the possibility that attacks associated with the threat are conducted.Two factors are taken into account:

the technical difficulties that have to be resolved by an attacker the motivation for an attacker to conduct an attack

ImpactThe Impact criterion evaluates the consequences of an attack directed to a single user or a system serving several usersFactors are taken into account:

the number of affected users (in the case of "System")the duration of loss of service or outagesfinancial losseslaw violations

RiskThe Risk value is defined as the product of the Likelihood value and Impact value.

Page 6: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

66/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Methodology (2/2)

This type of analysis is subjective. Risk values may vary according to the author(s) of the analysis and information available to the author(s). We believe, although, that it is a nice tool for identifying security flaws and ranking them by order of importance. Hence, more emphasis could be put on countermeasures for threats which receive high priority.

Page 7: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

77/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis

The protocol architecture of WiMax/802.16 is structured into two main layers:

Medium Access Control (MAC) layerCommon Part sub layer

the central element of the layered architectureConnections are established and bandwidth is managed.constructs MAC protocol data units (PDUs).exchanges MAC service data units (SDUs) with the Convergence layer.tightly integrated with the Security sub layer

Security sub layeraddresses authentication, establishment of keys and encryption.exchanges MAC PDUs with the Physical layer.

Convergence layeradapts units of data (e.g. IP packets or ATM cells) of higher level protocols to the MAC SDU format, and vice versa. sorts the incoming MAC SDUs by the connections to which they belong.

Physical layera two-way mapping between MAC PDUs and Physical layer frames received and transmitted through coding and modulation of RF signals.

Service Access Points (SAPs): interfacing points

Page 8: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

88/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: Physical Layer (1/2)

Downlink subframes and uplink subframesSequence of frames are of equal length.

Two modes of operationFrequency Division Duplex (FDD)

The downlink subframe and uplink subframe are simultaneous, but don’t interfere because they are sent on different frequencies.

Time Division Duplex (TDD)The downlink subframe and uplink subframe are consecutive.A frame duration of 0.5, one or two millisecondsThe portion allocated for the downlink and portion allocated to the uplink may vary.

The uplink is time division multiple access (TDMA)

Each time slot is allocated to an individual mobile station (MS) being served by the base station (BS).

Page 9: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

99/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: Physical Layer (2/2)

A downlink subframe consists of two main parts:The first part contains control information

Preamble: for frame synchronization purposesTwo maps

Downlink map: announces the start position and transmission characteristics of the following data burstsUplink map: announces the allocation of the bandwidth to the MSs for their transmission.

The second part contains data.A sequence of burstsEach burst is transmitted according to a profile of modulation and a kind of forward error correction.They are sent in an increasing degree of demodulation difficulty

An MS may only receive the bursts while it has the capability to do it and ignores the bursts it cannot demodulate.

Page 10: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1010/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: Physical Layer Threats - Jamming

Since the security sub-layer is above it, the physical layer is unsecured. WiMax/802.16 is vulnerable to physical layer attacks such as jamming and scrambling.

Jammingachieved by introducing a source of noise strong enough to significantly reduce the capacity of the channel.either unintentional or maliciousLikelihood: Likely (3)Impact: Low (1)

easy to detect with radio spectrum monitoring equipment and to locate sources using radio direction finding toolsLaw enforcement can be involved to stop jammersJammed segments of bandwidth, once detected, can also be avoided in a spread spectrum scheme.Resilience to jamming can be augmented by increasing the power of signals or increasing the bandwidth of signals

using spreading techniques (e.g. frequency hopping or direct sequence spread spectrum)using a more powerful transmitter or a high gain transmission/receiving antenna.

Risk: Major (3)

Page 11: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1111/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: Physical Layer Threats - Scrambling

Scramblinga sort of jamming, but for short intervals of time and targeted to specific frames or parts of frames.Scramblers can selectively scramble control or management information with the aim of affecting the normal operation of the network.The problem is of greater amplitude for time sensitive messages, which are not delay tolerant. more difficult to detect because of the intermittent nature of the attack and the fact that scrambling can also be due to natural sources of noise. Scrambling and scramblers can be detected by monitoring anomalies in performance criteria.Likelihood: Possible (2)

relatively more difficult than jamming because of the need to interpret control information and to send noise during specific intervals. But the technical difficulties are solvable.

Impact: Low (1)annoyance to a limited number of usersResults are reversible, e.g. by retransmission.

Risk: Minor (2)

Page 12: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1212/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer - Connections

The MAC layer is connection oriented.There are two kinds of connections:

Management connectionsBasic connection

created for each MS when it joins the networkused for short and urgent management messages

Primary connectioncreated for each MS at the network entry timeused for delay tolerant management messages

Secondary connectionused for IP encapsulated management messages (e.g. DHCP, SNMP, TFP)

Data transport connectionscan be provisioned or can be established on demand.used for user traffic flows

A security association (SA)the security parameters of a connection: keys and selected encryption algorithmsThe basic and primary management connections don’t have SAs. Although, integrity of management messages can be secured.The secondary management connection can have, on an optional basis, a SA.Transport connections always have SAs,

Page 13: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1313/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer - Security Model (1/2)

The security keys and associations established between an MS and a BS during the authorization step at network entryEach SA has an identifier (SAID), a cryptographic suite identifier (selected algorithms), Traffic Encryption Keys (TEKs) and initialization vectors.

Primary SAone for each MSestablished when the MS is initializedIts scope is the secondary management connection.shared exclusively between an MS and its BS.

Static SAone for the basic unicast servicecreated by the BS during the initialization of an MSThere are as many additional static SAs as there are subscribed additional services.

Dynamic SAcreated on the fly when new flows are openeddestroyed when their flow is terminated

Static SAs and dynamic SAs can be shared among several MSs, when multicast is used.

Page 14: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1414/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer - Security Model (2/2)

Core data entities are the X.509 certificate, AK (Authorization Key), KEK (Key Encryption Key) and HMAC Key (message authentication key).

Every MS is preconfigured with an X.509 certificate.It contains the Public Key (PK) of the MS.The MS uses it for its authentication with the BS.

All other keys are established during authorization. They must be refreshed on a periodic basis through reauthorization.

The BS determines the AK and passes it to the MS, encrypted using the PK.The AK has a sequence number (from 0 to 15) and a lifetime.For the purpose of smooth transitions, two AKs may be simultaneously active with overlapping lifetime. The lifetime ranges from 1 day to 70 days, with a default value of 7 days.The MS uses the AK to determine the KEK and HMAC Key.The sequence number of the AK implicitlybelongs to the HMAC Keys as well.KEKs are used to encrypt TEKs during their transfer.

Page 15: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1515/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer - Network Entry Steps

The network entry of an MS consists of the following steps:Downlink scanning and synchronization with a BS.

During scanning, the MS looks up for downlink signals by going through the available frequencies. It does search for downlink subframes.

Downlink and uplink description acquisition; available uplink channel discovery.Whenever a channel is found, it gets the downlink and uplink description. The MS obtains the downlink map and uplink map in the physical frame headers (they tell the structure of the subframes in terms of bursts).The downlink/uplink channel descriptors are obtained as MAC management messages (they tell the properties of the bursts in terms of data rate and error correction).

Ranging.The MS synchronizes its clock with the BS and determines the level of power required to communicate with the BS during a ranging intervalThe basic connection and primary connection are assigned during ranging.

Capability negotiation.Capabilities, e.g. in terms of supported security algorithms, are negotiated on the basic connection.

Authorization, authentication and key establishment.device list-based, X.509 certificate-based or EAP-based

Registration.results in the establishment of a secondary management connection and provisioned connections.

Page 16: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1616/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer - MAC PDU

A MAC layer PDU consists of a MAC header, a payload and an optional CRC.The payload may consist of user traffic or management messages.The MAC header contains a flag, which indicates whether the payload of the PDU is encrypted or not. MAC headers themselves are not encrypted.All MAC management messages shall be sent in the clear.

Each transport connection has either one SA (which applies to both the uplink and downlink) or two SAs (one for the uplink and another for the downlink).

Packet Numbera unique identityseparate ranges of values for the uplink and downlink

Confidentiality for the payload of MAC PDUsDES in the CBC modeAES in the CCM mode

Integrity protection mechanismCBC-MAC (as a component of AES-CCM)

Page 17: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1717/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer Threats - Eavesdropping

The eavesdropping threat,for management messages

Management messages (never encrypted) can provide valuable information to an attacker (e.g. to verify the presence of a victim at its location before perpetrating a crime).They can be intercepted by a passive listener within communication.Likelihood: likely (3)

no serious technical difficulties to resolve by an attacker

Impact (2:1)From the user perspective: medium (limited financial loss)From the system perspective: low (may not create outages)

Risk: critical for users and major to a system (6:3)

for user trafficusing DES-CBC or AES-CCMRisk (1): minor threat (no need for countermeasures)

Page 18: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1818/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer - Authentication

The applicable kinds of authentication in WiMax/802.16Device level authentication.

useful for detecting stolen devices and blocking their access to the networkRSA / X.509 certificate-based authenticationThe certificate can be programmed in a device by its manufacturer.It is unilateral, i.e. BSs are not authenticated.

Mutual authentication at user-network levelafter scanning, acquisition of channel description, ranging and capability negotiationbased on the Extensible Authentication Protocol (EAP)For WiMax/802.16, EAP can be actualized with specific authentication methods such as EAP-TLS (X.509 certificate-based) or EAP-SIM.

Page 19: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

1919/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer Threats - BS/MS Masquerading

Any weakness in authentication is an enabler for the BS or MS masquerading threat.Identity theft attack

reprogramming a device with the hardware address of another deviceThe address can be stolen over the air by intercepting management messages.

CDMA phone cloning: subscriber ID module (SIM) cardsRogue BS attack

confuses a set of MSs trying to get service through what they believe being a legitimate BS.

Device list based (3☓3 = 9)The likelihood of a BS or MA masquerading attack is likely and impact can be high. The risk is therefore critical.

X.509 basedLikelihood (2:1)

for a user: possible rogue BS attack because of the asymmetry of the mechanism.for a system: unlikely

Impact (3:2)for a user: high (loss of service for long periods of time)for a system: medium (limited financial loss due to theft of air time)

Risk: critical for a user and minor for a system (6:2)EAP-based

Likelihood of a BS or MS masquerading attack: possible because some of the EAP methods are being defined; security flaws are often uncovered in unproven mechanisms. (2)Impact: the same as for the X.509 certificate-based authentication (3:2)Risk: critical for a user and major for a system (6:4)

Page 20: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

2020/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer Threats - Modification

MAC management message modificationMAC management messages are never encrypted and not always authenticated.Authentication mechanisms for MAC layer management messages:

Hashed Message Authentication Code (HMAC): SHA-1 based, no replay protectionOne-key Message Authentication Code (OMAC): AES-based, replay protection

Weaknesses in management messages authentication open the door to aggressions such as the man in the middle attack, active attack and replay attack.The management message modification threat

Likelihood is likely, possible or unlikely if no authentication, HMAC or OMAC is used respectively for management messages.In all cases, the impact can be high because it might affect the operation of the communications.

Data traffic modificationLikelihood: very unlikely to occur if AES is used, likely otherwiseImpact: low (annoyance)Risk: minor if AES is used, major otherwise

Page 21: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

2121/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: MAC Layer Threats - DoS

Denial of Service (DoS) attackscreated by the fact that authentication operations trigger the execution of long proceduresflooding a victim with a high number of messages to authenticateLikelihood: likelyImpact

medium on a systembut could be high on a user because of lower computational resources available

Risk: critical on a user and major on a system

Page 22: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

2222/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Analysis: Summary

Page 23: WiMax/802.16 Threat Analysis Michel Barbeau ACM Q2SWinet 2005 19 Oct 2006 Ji, Sung-bae.

2323/22/22CS710 Topics in Computer Architecture <Next Generation Wireless Networks and Security>

Conclusions

WiMax/802.16 threats associated with the physical layer and MAC layer are reviewd.The likelihood, impact and risk are evaluated according to a threat assessment methodology proposed by the ETSI.Threats are listed and ranked according to the level of risk they represent.Countermeasures (e.g. a second line of defense) need to be devised for networks using the security options with critical or major risks. This work can be used to prioritize future research directions in WiMax/802.16 security.