17
WIRELESS SECURITY Lecture 21 COMPSCI 726 Network Defence and Countermeasures Source of some slides: Missouri State University , University of Twente and University of Trento Nalin Asanka Gamagedara Arachchilage September 16, 2021 Slides from Muhammad Rizwan Asghar

WIRELESS SECURITY Lecture 21

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WIRELESS SECURITY Lecture 21

Slide titleIn CAPITALS

50 pt

Slide subtitle 32 pt

WIRELESS SECURITYLecture 21COMPSCI 726

Network Defence and Countermeasures

Source of some slides: Missouri State University, University of Twente and University of Trento

Nalin Asanka Gamagedara Arachchilage

September 16, 2021

Slides from Muhammad Rizwan Asghar

Page 2: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

2

WHAT IS WiFi?

§ WiFi stands for Wireless Fidelity§ WiFi is a wireless technology that uses radio frequency to transmit

data through the air§ It is also known as Wireless LAN (WLAN)§ It is based on IEEE 802.11 § IEEE established the 802.11 group in 1990§ Specifications ratified in 1997§ IEEE modified the standard in 1999 to include

– 802.11b– 802.11a – 802.11g

§ There are variants of 802.11 based on data rate, range and bandwidth

Page 3: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

3

WLAN ADVANTAGES

§ Freedom– You can work from any location that you can get a signal

§ Setup cost– No cabling required

§ Flexibility– Quick and easy to setup

§ Scalable– Can be expanded with growth

§ Mobile access– Can access the network on the move

Page 4: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

4

WLAN DISADVANTAGES

§ Speed– Slower than cable

§ Range– Affected by various medium– Travels best through open space– Reduced by walls, glass and water

§ Security– Greater exposure to risks

§ Eavesdropping§ Unauthorised modification§ Denial of Service (DoS)

Page 5: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

5

WLAN COMPONENTS

§ Wireless Station (STA)– A desktop, laptop PC, smartphone or other wireless device

with a wireless 802.11 NIC (Network Interface Card)

§ Access Point (AP)– A bridge between wireless and wired networks– Composed of

– Radio– Wired network interface (usually 802.3)– Bridging software

– Aggregates access for multiple wireless stations to wired network

Page 6: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

6

TWO WLAN MODES

§ Infrastructure mode– Basic Service Set (BSS)

§ One AP– Extended Service Set (ESS)

§ Two or more BSSes forming a single subnet

– Most corporate LANs in this mode

§ Ad-hoc mode– Independent BSS– Set of 802.11 wireless stations that communicate directly

without AP– Useful for quick and easy wireless networks

Page 7: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

7

INFRASTRUCTURE MODE

Basic Service Set (BSS) –Single cell

Extended Service Set (ESS) –Multiple cells

Access Point

Station

Page 8: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

8

AD-HOC MODE

Independent Basic Service Set (IBSS)

Page 9: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

9

CONNECTION AND SSID

§ Before data can be transmitted, AP and STA must establish a connection

– Scan for APs– Authentication and association

§ A 32-octet Service Set Identifier (SSID) is a human readable identifier of the network

Page 10: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

10

ACCESSING WLAN

§ When STA enters range of one or more APs– STA probes for the channel– APs send beacons– AP beacon can include SSID– AP chosen on signal strength and observed error rates

§ Periodically, all channels surveyed– To check for stronger or more reliable APs– If found, re-associates with new AP

Page 11: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

11

WLAN SECURITY MECHANISMS

§ SSID based– Open mode

§ No security– Closed mode

§ No crypto

§ MAC Access Control List (ACL)

§ Wired Equivalent Privacy (WEP)

§ WiFi Protected Access (WPA) and 802.11i– Actual standard for security in 802.11

Page 12: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

12

SSID

§ STA must specify SSID to AP when requesting association

§ Multiple APs with same SSID form ESS

§ Two modes– Open mode

§ APs broadcast their SSID– Closed mode

§ SSID is not broadcasted in beacons§ Association requests from clients contains SSID in clear

Page 13: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

13

MAC ACL

§ Every network device has a unique Media Access Control (MAC) address

§ MAC filtering only allows certain addresses access– Using Access Control List (ACL)

§ Mostly for home use

§ Issues– Masquerading– Tedious to implement on a large scale

Page 14: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

14

WEP

§ WEP is a protocol to protect link-level data during wireless transmission between STA and AP

§ Original security solution offered by the IEEE 802.11 standard

§ Security services– Authentication– Confidentiality– Integrity

Page 15: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

15

WEP DETAIL

§ A simple authentication protocol

§ A pre-shared key K between all STAs and all APs

§ Manual configuration of the pre-shared key K

§ Uses RC4 encryption as cryptographic primitive with pre-shared keys and 24-bit initialisation vectors

§ Uses CRC-32 for integrity protection

Page 16: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

16

TO BE CONTINUED

§ See the next lecture

Page 17: WIRELESS SECURITY Lecture 21

Top right corner for fieldcustomer or partner logotypes. See Best practice for example.

Slide title 40 pt

Slide subtitle 24 pt

Text24 pt

520 pt

17

Questions?

Thanks for your attention!