Title: Security And Availability For Wireless Communication
1Security And Availability For Wireless
Communication
Organization Post Telestyrelse Anders
Rafting Coach Lars
Adolfsson Co-Coach Fredrik
Lilieblad
Mehdi Ghasemi
Xiaodong Hu
Yvonne Grunnevall
2Security And Availability For Wireless
Communication
Presentation disposition
- Goals
- What is Wireless Security?
- Threats in wireless LAN
- Security implementations in
- HiperLAN/2, IEEE 802.11a, b and Bluetooth
- IP-Roaming (WVPN)
- OS security
- Conclusion
3Security And Availability For Wireless
Communication
Goals
- Classifying security threats in WLAN
- Security implementation in HiperLAN/2, 802.11 and
Bluettoth - Comparing HiperLAN, 802.11 and Bluetooth with
each other - Seamless IP-Roaming
- Security solutions
- Inventory of terminals on the market
4Security And Availability For Wireless
Communication
What is WLAN Security?
5Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Passive attacks
- Active attacks
6Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Passive attacks Eavesdropping (sniffering)
- Very easy in the radio environment.
- If the wireless LAN is inside a building, the
eavesdropping could actually occur from an
external point
7Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Active attacks
- Social Engineering
- Impersonation
- Exploits
- Data Driven
- Transitive Trust
- Infrastructure
- Denial of Service
Similar in Wired Wireless Communication
8Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Social Engineering
- Fooling the victim for fun and profit
- Example
- Please change your password to fooble
- Attacker then logs in as user from our network
- System bugs exploited to gain complete run of
system
9Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Impersonation
- Stealing access rights of authorized users
- Example
- Attacker with network sniffer (tcpdump,nitsniff,
etc) at trade show or network captures complete
login session - Attacker later logs into system with user-id and
stolen password
10Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Exploits
- Exploiting a hole in software or
operatingsystems - Example
- Attacker sends a message to invalid recipient
that appears to have come from a program
invocation
11Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Data Driven
- Trojans, trapdoors, viruses
- Example
- Attacker logs into user's account
12Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Transitive Trust
- Attacker fools the mobile host into trusting a
base station controlled by the attacker - Wireless LANs offer an interface to an attacker
requiring no physical arrangements
13Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Infrastructure
- Taking advantage of protocol or infrastructure
features or bugs - Infrastructure attacks are based on weaknesses in
the system software bugs, configuration
mistakes, hardware failures, etc. - Similar to problems in wired LANS.
- Protection against this type of attacks is nearly
impossible. Efforts should be made to minimize
potential damage.
14Security And Availability For Wireless
Communication
Threats in Wireless Communication
- Denial of Service
- Preventing system from being used
- As result of the nature of radio transmissions,
wireless LANs are very vulnerable to DOS attacks - With a powerful enough transceiver, an attacker
can easily generate enough interference to jam
communications
15Security And Availability For Wireless
Communication
- Security Implementation in
- IEEE 802.11
- HiperLAN
- Bluetooth
16Security And Availability For Wireless
Communication
802.11 Wired Equivalent Privacy (WEP)
- Designed to be computationally efficient,
self-synchronizing and exportable - All users of a given access point share the same
encryption key - Shared key authentication
- Vulnerable to attack
- Data headers remain unencrypted so anyone can see
the source and destination of the data stream
17Security And Availability For Wireless
Communication
802.11 Service Set ID (SSID)
- SSID is the network name for a wireless network
- Can be required to specifically request the
access point by name (lets SSID act as a
password) - The more people that know the SSID, the higher
risks for misuse - Changing the SSID requires communicating the
change to all users of the network
18Security And Availability For Wireless
Communication
802.11 MAC Address
- Can control access by allowing only defined MAC
addresses to connect to the network - Must compile, maintain, and distribute a list of
valid MAC addresses to each access point - This address can be spoofed
- Not a valid solution for public applications
19Security And Availability For Wireless
Communication
Bluetooth
- Three security modes
- Non-secure
- Link level security, four entities
- Service levle security, three security levels
20Security And Availability For Wireless
Communication
HiperLAN/2
- Authentication
- Pre-shared key
- Public key
- Encryption
21Security And Availability For Wireless
Communication
Comparison between the standards
22Security And Availability For Wireless
Communication
Interoperability
- 802.11a and 802.11b work on different
frequencies, so Can coexist in one network - Interference between 802.11b and Bluetooth (near
each other) - HiperLAN/2 is not interoperable with 802.11a or
802.11b
23Security And Availability For Wireless
Communication
Wireless VPN
- Security and seamless IP-Roaming
- IP Mobility
- Session Mobility
24Security And Availability For Wireless
Communication
IP Mobility
25Security And Availability For Wireless
Communication
Session Mobility
26Security And Availability For Wireless
Communication
OS Security
27Security And Availability For Wireless
Communication
Windows Security
28Security And Availability For Wireless
Communication
Unix security
29Security And Availability For Wireless
Communication
Conclusion
- Wireless LANs very useful and convenient, but
current security state not ideal for sensitive
environments. - Growing use and popularity require increased
focus on security - Cannot forget client security
- Strong end user security policies and
configurations - The nature of the radio communication makes it
practically impossible to prevent some attacks,
like denial of service using radio interference - Firewalls
- Wireless VPN
30Security And Availability For Wireless
Communication
Questions?
31Security And Availability For Wireless
Communication
What is WLAN (Wireless Local Area Network) ?
32Security And Availability For Wireless
Communication
HiperLAN/2,IEEE 802.11 and Bluetooh
33Security And Availability For Wireless
Communication
IP-Roaming
34Security And Availability For Wireless
Communication
802.11
- 2.4GHz operating frequency
- 1 to 2 Mbps throughput
- Can choose between frequency hopping or direct
sequence spread modulation
35Security And Availability For Wireless
Communication
802.11a
- Operates in 5GHz band (less RF interference than
2.4GHz range) - Users Orthogonal Frequency Division Multiplexing
(OFDM) - Supports data rates up to 54 Mbps
- Currently no products available, expected in
fourth quarter
36Security And Availability For Wireless
Communication
802.11b
- Operates in 2.4GHz band
- Data rates can be as high as 11 Mbps
- Only direct sequence modulation is specified
- Most widely deployed today
37Security And Availability For Wireless
Communication
HiperLAN/2
- Development led by the European
Telecommunications Standards Institute (ETSI) - Operates in the 5 GHz range, uses OFDM
technology, and support data rates over 50Mbps
like 802.11a - QoS
38Security And Availability For Wireless
Communication
VPN (Virtual Private Network)
- Provides a scaleable authentication and
encryption solution - Does require end user configuration and a strong
knowledge of VPN technology - Users must re-authenticate if roaming between VPN
servers
39Security And Availability For Wireless
Communication
WEP Encapsulation
- WEP Encapsulation Summary
- Encryption Algorithm RC4
- Per-packet encryption key 24-bit IV
concatenated to a pre-shared key - WEP allows IV to be reused with any frame
- Data integrity provided by CRC-32 of the
plaintext data (the ICV) - Data and ICV are encrypted under the per-packet
encryption key
40Security And Availability For Wireless
Communication
Difference between HiperLAN/2 and 802.11
- Higher efficiency with regard to throughput
- Main difference is at MAC-layer
- Can be used in a vriouse core network envoironment
41Security And Availability For Wireless
Communication
Vulnerability