DOC PREVIEW
SJSU CS 265 - Wireless Network Security Issues

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Wireless Network Security IssuesIntroductionIntroduction (Cont.)Standard Security MechanismsShared Key AuthenticationShared Key Authentication (Cont.)Weaknesses in Shared Key Auth.Shared Key Auth. (Cont)Shared Key Flaw (Cont.)Shared Key AttackConclusions & Future WorkQuestion & CommentsWireless Network Security IssuesBy Advait KothareSJSU CS265 Fall 2004SJSU CS265 Fall 2004IntroductionA presentation of the paper “Your 802.11 Wireless Network has No Clothes” by –William A. Arbaugh,Narendra Shankar,Y.C. Justin Wan at Univ. Maryland at College ParkExplosive growth in wireless networks.But many security issues initially left open by 802.11 standards committee.Result : weak or non-existent security solutions for current deployments.Introduction (Cont.)In the Wired World emphasis on protection from external compromise. (Firewalls)Wireless Networks provide an access point for any adversary beyond physical controls.A “back door” is opened for an attacker, which can be exploited. (Parking lot attacks)And a simple eavesdropping attack against 802.11 shared key authentication.Standard Security MechanismsWired Equivalent Privacy protocol (WEP)–For confidentiality of network traffic–Demostrated to be vulnerableOpen Systems Authentication–Authenticates anyone who requests authentication–Management frames sent in clear even with WEPShared Key Authentication–Uses a standard challenge and response protocolShared Key AuthenticationInitiator ResponderAuthentication RequestSeq # 1Authentication ChallengeSeq # 2Authentication ResponseSeq # 3Authentication ResultSeq # 4Shared Key Authentication (Cont.)Initator sends an authentication req. management frameResponder replies by sending mgmt. Frame with 128 octets of challenge text.–Text Generated using WEP PRNG with shared secret and a random initialization vector (IV)Initiator copies the text into a new frame, encrypts with WEP using shared secret and a new IVResponder verifies text and 32-bit CRC (ICV)Weaknesses in Shared Key Auth.Passive attack, eavesdropping 1 leg of auth.Works because fixed structure of protocolRandom challenge is the only diffrence between two Authentication messages.Also because of weakeness in WEPWEP = Pseudo Random Number GeneratorK = Shared keyIV = Initialization Vector (Sent in clear)P = Plain text challenge textC = Cipher textR = Challenge textShared Key Auth. (Cont)•Messages based on sequence numbersSequence #Status CodeChallenge TextWEP Used1 Reserved Not PresentNO2 Status Present NO3 Reserved Present YES4 Status Not PresentNOShared Key Flaw (Cont.)Attacker captures 2nd & 3rd frames.–2nd Frame => Random challenge in clear (P)–3rd Frame => Encrypted challenge (C)PRNG stream–WEPK,IVP R = C P–Stream can be derived from above without knowing the shared Key (K)Shared Key AttackAttacker requests authentication from an APAP responds with challenge text (R) in clearAttacker takes R and PRNG to get valid authentication response by XOR-ing the 2Attacker computes a new integrity check value (ICV)Valid response allows Attacker to join the network.Conclusions & Future WorkAll deployed 802.11 networks are at riskWEP can make it harder but vulnerable as keys are static and hard to changeVendors have used un-authenticated Diffie-Hellman for key exchange.Worse solution as Man In The Middle attack can give the Key to the attacker.Question &


View Full Document

SJSU CS 265 - Wireless Network Security Issues

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Wireless Network Security Issues
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Wireless Network Security Issues and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Wireless Network Security Issues 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?