wireless network security csis 5857: encoding and encryption

13
Wireless Network Security CSIS 5857: Encoding and Encryption

Upload: agnes-charles

Post on 18-Jan-2018

240 views

Category:

Documents


0 download

DESCRIPTION

Wireless LAN Structure

TRANSCRIPT

Page 1: Wireless Network Security CSIS 5857: Encoding and Encryption

Wireless Network Security

CSIS 5857: Encoding and Encryption

Page 2: Wireless Network Security CSIS 5857: Encoding and Encryption

Wireless LAN Terminology• Station: Device capable of IEEE 802.11 wireless

connectivity (wireless laptop, etc.)

• Distribution System: Backbone system for long-distance communication (lines/satellite/etc.)

• Access point: Bridge between station and distribution system (or between stations in same BSS)

• Basic Service Set (BSS): Set of stations in range of access point

Page 3: Wireless Network Security CSIS 5857: Encoding and Encryption

Wireless LAN Structure

Page 4: Wireless Network Security CSIS 5857: Encoding and Encryption

Wireless LAN Structure• Differences from LAN security:

• Any transmission may be listened to by any device in range of access point

All transmissions must be secured

• Other wireless devices in range of AP can attempt to connect to it

Any device wishing to communicate through access point must be authenticated

Page 5: Wireless Network Security CSIS 5857: Encoding and Encryption

802.11i RSN Services• Access control:

– Preventing access toaccess point until authentication

• Authentication:– Mutual authentication between stations and access points,

and key generation• Privacy:

– Encrypting/hashing/etc. of messages to insure confidentiality/information integrity/etc.

Page 6: Wireless Network Security CSIS 5857: Encoding and Encryption

Authentication Server• Authentication server

– Contacted by AP when station requests access– Uses authentication protocol to establish station identity– AP blocks communication with rest of network until

authentication complete

Page 7: Wireless Network Security CSIS 5857: Encoding and Encryption

IEEE 802.11i Operation Phases

Page 8: Wireless Network Security CSIS 5857: Encoding and Encryption

Discovery Phase• Station contacts AP

– Challenge-response can be used to authenticate AP• Station passes security suite to AP (like SSL)• AP responds

with chosen algorithms

Page 9: Wireless Network Security CSIS 5857: Encoding and Encryption

Authentication Phase• Station sends request to AP for connection to

authentication server• Extensible authentication

protocol (EAP) used for mutual authentication

• AS generates keys for secure informationexchange

Page 10: Wireless Network Security CSIS 5857: Encoding and Encryption

Authentication Phase• Extensible Authentication Protocol:

– Based on challenge-response– Station and AS share secret information (such as

symmetric key)– AS sends challenge to station (via AP)– Station sends response– May repeat with multiple challenges (10 – 20) for

added protection against replay attacks

Page 11: Wireless Network Security CSIS 5857: Encoding and Encryption

Key Management Phase• Possible methods:

– Station and AP already share pre-shared key (PSK) previously installed on station

– AS generates and sends master session key (MSK) to station as part of EAP challenge response

• Used to generate pairwise master key

Page 12: Wireless Network Security CSIS 5857: Encoding and Encryption

Key Management Phase• HMAC-SHA1 used to generate Pairwise transient key from

– Pairwise master key– MAC address of station and AP (prevents replay attacks)

• PTK consists of– Key used for confirmation of other keys– Key used to encrypt other keys– Actual temporal key used to

securely transmit data

Page 13: Wireless Network Security CSIS 5857: Encoding and Encryption

Key Management Phase• Handshake between station and AP used to

establish and confirm keys used for secure transmission