NYCU-LYX

24-Wireless Network Security

24.1  Wireless Security

wireless environment consists of three components that provide point of attack:

  1. wireless client
    1. mobile phone, a Wi-Fi enabled laptop or tablet, a wireless sensor, a Bluetooth device
  2. wireless access point
    1. mobile phone towers, Wi-Fi hot spots, and wireless access points to wired local or wide-area networks
  3. transmission medium
    1. carries the radio waves for data transfer

Wireless Network Threats

Accidental association:

Malicious association:

Ad hoc networks:

Nontraditional networks:

Identity theft (MAC spoofing):

Man-in-the-middle attacks:

Denial-of-service (DoS):

Network injection:

Wireless Security Measures

Securing wireless transmissions

Securing Wireless access Points

Securing Wireless Networks

techniques for wireless network security:

  1. Use encryption. Wireless routers are typically equipped with built-in encryption mechanisms for router-to-router traffic.
  2. Use anti-virus and anti-spyware software, and a firewall. These facilities should be enabled on all wireless network endpoints.
  3. Turn off identifier broadcasting. Wireless routers are typically configured to broadcast an identifying signal so that any device within range can learn of the router’s existence. If a network is configured so authorized devices know the iden- tity of routers, this capability can be disabled to thwart attackers.
  4. Change the identifier on your router from the default. Again, this measure thwarts attackers who will attempt to gain access to a wireless network using default router identifiers.
  5. Change your router’s pre-set password for administration. This is another prudent step.
  6. Allow only specific computers to access your wireless network. A router can be configured to only communicate with approved MAC addresses. Of course, MAC addresses can be spoofed, so this is just one element of a security strategy.

24.2  Mobile Device Security

Security Threats

Mobile Device Security Strategy

24.3  IEEE 802.11 Wireless LAN Overview

  1. IEEE 802 ➝ LANs
  2. IEEE 802.11 ➝ wireless LANs (WLANs)

Table 24.1 IEEE 802.11 Terminology

Access point (AP) Any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations
Basic service set (BSS) A set of stations controlled by a single coordination function
Coordination function The logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs
Distribution system (DS) A system used to interconnect a set of BSSs and integrated LANs to create an ESS
Extended service set (ESS) A set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs
MAC protocol data unit (MPDU) The unit of data exchanged between two peer MAC entities using the services of the physical layer
MAC service data unit (MSDU) Information that is delivered as a unit between MAC users
Station Any device that contains an IEEE 802.11 conformant MAC and physical layer

The Wi-Fi Alliance

IEEE 802 Protocol Architecture

Physical Layer

Medium Access Control (MAC)

MPDU format

  1. MAC layer
    1. responsible for detecting errors and discarding any frames that contain errors.
  2. LLC layer
    1. optionally keeps track of which frames have been successfully received and retransmits unsuccessful frames.

IEEE 802.11 Network Components and Architectural Model

  1. basic service set (BSS) : smallest building block of a wireless LAN
  2. distribution system (DS) : backbone
  3. BSS ➝ access point (AP) ➝ DS

IEEE 802.11 Services

two ways of categorizing IEEE 802.11 services

  1. The service provider can be either the station or the DS.
  2. Three of the services ➝ used to control IEEE 802.11 LAN access and confidentiality

Six of the services ➝ used to support delivery of MSDUs between stations

Table 24.2 IEEE 802.11 Services

Service Provider Used to support
Association Distribution system MSDU delivery
Authentication Station LAN access and security
Deauthentication Station LAN access and security
Disassociation Distribution system MSDU delivery
Distribution Distribution system MSDU delivery
Integration Distribution system MSDU delivery
MSDU delivery Station MSDU delivery
Privacy Station LAN access and security
Reassociation Distribution system MSDU delivery

Distribution of messages within a DS

Distribution Service

24.4  IEEE 802.11i Wireless LAN Security

IEEE 802.11i Services

The 802.11i RSN security specification defines the following services:

Figure 24.6a indicates the security protocols used to support these services

Figure 24.6b lists the cryptographic algorithms used for these services

IEEE 802.11i Phases of Operation

IEEE 802.11i security is concerned only with secure communication between the STA and its AP

five distinct phases of IEEE 802.11i RSN:

Five Phases of Operation for an RSN

Sure, here is a summary of each key point of the listed paragraph:

Discovery

Authentication

Key Management

Protected data transfer

Connection termination

Discovery Phase

Security capabilities

MPDU Exchange

Network and security capability discovery:

Open system authentication:

Association:

Authentication Phase

EAP Authentication Protocol

Key Management Phase

4-way handshake

###

Protected Data Transfer Phase

The IEEE 802.11i Pseudorandom Function

PTK = PRF(PMK, “Pairwise key expansion,” min(AP-Addr, STA-Addr) }  
max (AP-Addr, STA-Addr)   min(Anonce, Snonce)   max(Anonce, Snonce), 384)

K = PMK

A = the text string “Pairwise key expansion”

B = a sequence of bytes formed by concatenating the two MAC addresses and the two nonces

Len = 384 bits

Similarly, a nonce is generated by

Nonce = PRF(Random Number, “Init Counter,” MAC } Time, 256)

GTK = PRF(GMK, _“_Group key expansion,” MAC   Gnonce, 256)

24.5  Key Terms, Review Questions, and Problems

24.1 What is the basic building block of an 802.11 WLAN?

The basic building block of an 802.11 WLAN is the Basic Service Set (BSS). A BSS is a wireless network that consists of two or more stations that communicate directly with each other without the need for an access point (AP). Ad hoc

24.2 Define an extended service set.

An Extended Service Set (ESS) is a collection of two or more BSSs that are interconnected by a distribution system. This allows stations to roam freely between different BSSs within the ESS, as if they were all part of a single logical LAN.

24.3 List and briefly define IEEE 802.11 services.

The IEEE 802.11 standard defines a number of services, including:

24.4 Which assumptions form the basis of security policy for mobile devices?

The following assumptions form the basis of security policy for mobile devices:

24.5 List the seven major security concerns for mobile devices.

The seven major security concerns for mobile devices are:

24.6 Briefly describe the pseudorandom stream generation of the IEEE 802.11i scheme and list some uses of the pseudorandom function.

The pseudorandom stream generation of the IEEE 802.11i scheme is based on the Counter Mode with Cipher Block Chaining Message Authentication Code (CCM) algorithm. The CCM algorithm uses a pseudorandom function (PRF) to generate a keystream, which is then used to encrypt and authenticate data frames. The PRF is also used to generate other cryptographic keys, such as the pairwise master key (PMK) and the transient key (TK).

24.7 Briefly describe the four IEEE 802.11i phases of operation.

The four IEEE 802.11i phases of operation are:

24.8 What is the difference between TKIP and CCMP?

TKIP (Temporal Key Integrity Protocol) and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code) are two encryption algorithms used in IEEE 802.11i. TKIP is a legacy algorithm that is less secure than CCMP. CCMP is the preferred algorithm for new deployments.