Title: Security Enhancement of WLAN Clients Using Smart Card Technology
1United Arab Emirates University College of
Engineering Department of Electrical
Engineering Graduation Project (II) First
Semester 2003/2004
Security Enhancement of WLAN Clients
Using Smart Card Technology
Faculty Advisor Dr.
Mohammad Abdul Hafez Group members Abdulrahman-R-
Almasri
980211475 Alaaeldin FM Al-Anqar
980211476 Ahmad Mohd Alymmahi
980710581
2Overview
- To improve the security system of wireless Local
Area Network (WLAN) clients using the technology
of smart cards.
- The demand on wireless technology is increasing.
- The security of WLAN is difficult to guarantee
!! - Large companies and banks avoid WLANs !!
- Smart Card Technology is the latest technology
that came out to markets. - Users should be convinced !!
3Overview
- Deploying a wireless LAN.
- Different security solutions like MAC address
authentication, WEP Encryption, IEEE 802.1x, EAP
Protocols, and the Radius Server were implemented
and tested to evaluate their security level. - The Smart Cards solution was implemented and
tested .
4Presentation Contents
- Projects Impacts Safety Considerations.
- Task (1) RF Design Using AVAYA Wireless
- Solution.
- Task (2) Implementing of Existing WLAN
Security - Solutions.
- Task (4) Smart Cards Solution .
- Conclusions Recommendations.
5Projects Plan
Major tasks of GP1 shown in Gantt chart
6Projects Budget
Number Item Quantity Availability Pric per unit EAD Total EAD. Unavailable Price EAD.
1 PC 1 v 2000 2000 --
2 Radius Server (Software) 1 v Free -- --
3 PCMCIA 4 v 385.35 1541.4 --
4 Access point 2000 AP-3 2 v 1427.63 2855.26 --
5 Smart cards (Raak) 2 v 110 220 --
6 UTP CAT5 cables 20m X 1Dr / m 40 40
7 RJ-45 Connectors 10 X 3.67 36.7 36.7
8 Sniffer Software 1 v 4771 4771 --
9 Laptops 2 X 1000 2000 2000
Total -- -- - 13484 2096.7
7Projects Impacts
8Safety Considerations
- The output power of wireless LAN systems is
very low. - A little exposure to RF energy is provided to
those in - the area of a wireless LAN system.
- No adverse health affects have ever been
attributed to - wireless LANs.
9RF Design Using AVAYA Wireless Solution
- Avaya access point 3 provides a dual slot
architecture. - It enables users to have a flexible and smooth
migration to 5 GHz technologies. - The Avaya Wireless AP-3 can deliver a data rate
of both 11 Mbps and/or 54 Mbps. - It provides great security capabilities via
Avaya Silver and Gold PC cards. - Users get robust, reliable connectivity and a
high performance.
Dual slot architecture of AP-3
10RF Design Using AVAYA Wireless Solution
- A site survey was done at the 1st floor
- of the EE Department (Male campus).
- Objectives.
- Methodology
- A laptop was used to give a reasonable
mobility to users.
- Client Manager software was used to
verify the quality of the wireless link.
- Two different locations of the access point
were chosen.
- The laptop was moved through a fixed path.
- The RF strength was measured at different
locations through the area.
11RF Design Using AVAYA Wireless Solution
Exc Excellent VG Very Good
Indicates the RF strength by he color and the
number of columns.
Point Location A B C D E F G H I J L
1 Exc Exc Exc Exc Exc Exc Exc Exc VG VG VG
2 Exc Exc Exc Exc Exc VG VG VG Exc Exc Exc
Site survey measurements of radio frequency
strength
12Network Analyzer Tools used
- AirSnare
- Netasyst
- Wlanexpert
- WinePcape-3-1
- Biongo
- PCTL
- Fakeap 0.3
13Network Analyzer Tools used
AirSnare
It monitors network traffic for MAC addresses and
alerts you when a MAC address is found.
Netasyst
It provides the flexibility to monitor Wireless
and LAN networks simultaneously. Also, it
captures frames, and builds a database of network
objects from observed traffic to detect network
anomalies.
SMAC
Its a MAC Address Modifying Utility.
14 Implementation of existing security solutions to
WLAN
Medium Access Control (MAC) Address Filtering
- Overview
- Assigning the MAC addresses of clients in list
in the access point. - Only assigned clients can get access to the
network!! - Advantages
- Easy to implement, easy to use, suitable for
small networks! - Disadvantages
- MAC address can be stolen.
- MAC address can be changed.
15MAC Address Filtering (Cont.)
Testing
- MAC Address authentication was enabled in the
access point.
- MAC Addresses of clients were assigned into the
table.
16MAC Address Filtering (Cont.)
- Netasyst was used to analyze the network
- All clients using the network and their MAC
Addresses were picked.
17Gantt Chart for Graduation Project (2)
18MAC Address Filtering (Cont.)
- The network was detected using AirSnare
- All MAC addresses of clients using the network
were shown.
- SMAC was used to change the MAC address in order
to get into the network.
19 Implementation of existing security solutions to
WLAN
Wired Equivalent Privacy (WEP)
Overview
- A security protocol that provides a high level
of security. - It relies on a secret shared key between an
access point and a client. - The (Ron's Code 4) RC4 encryption algorithm is
used in WEP.
20WEP Encryption (Cont.)
(1) An initial authentication frame is sent.
(2) A challenge text (128 bytes) is sent from the
AP to the station.
(3) The challenge key is encrypted with the
shared key and then sent back.
(4) The challenge key is decrypted with the
shared key at the AP and then compared.
Shared Key Authentication
21WEP Encryption (Cont.)
Advantages
- More secure than MAC Authentication.
- Users should have the key in order connect the
network. - RC4 is simple enough that most programmers can
quickly implement it in software.
Disadvantages
- The key can be obtained easily using some
hacking tools. - Lack of key distribution and key management .
22WEP Encryption (Cont.)
Testing
The length of the key was chosen
The WEP encryption was enabled
The keys were entered
Key 1 was chosen to be the IV
23Netasyst Some important commands
- Wired Equivalent Privacy (WEB) Analyses
-Netasyst Provides the user with 802.11 WEP
shared key. -The number of packets observed on
the wireless LAN indicates that Wired Equivalent
Policy encryption was used on the
packet. -Netasyst includes 64 and 128 bits web
data encryption
24Netasyst Some important commands
The encrypted data of IEEE 11.b
25 Implementation of existing security solutions to
WLAN
802.11x Authentication
Overview
- A protocol that used to enforce authentication
and access control for wireless networks. - It works in conjunction with the EAP.
- 802.1x acts as the gate keeper while EAP acts as
the authentication mechanism.
26802.1x Authentication
Components of 802.1x
- Supplicant which is simply wireless client
software - Authenticator access point or network port
-
- authentication server
27802.1x Authentication
Advantages
- Multi-vendor standard framework for securing the
network. - Allows the addition of newer authentication
methods without replacing network equipment. - Supports both wired and wireless networks.
- Uses industry standard authentication servers
(example RADIUS Server).
28802.1x Authentication
Disadvantages
- Weaknesses in WEP .
- EAP is not secure enough (EAP packets can be
spoofed and changed).
29 Implementation of existing security solutions to
WLAN
Extensible Authentication Protocol (EAP)
Overview
- A mechanism that defines a standard message
exchange between devices. - Internet Protocol (IP) is not required.
- It transports messages between devices.
- EAP supports a number of authentication
protocols.
30EAP Encryption (Cont.)
Protocols of EAP
- EAP-MD5 (Message-Digest 5).
- EAP-TLS (Transport Level Security).
- EAP-TTLS (Tunneled TLS).
- EAP-PEAP (Protected EAP Protocol).
- Cisco LEAP (Lightweight EAP).
                                                           Â
                                                           Â
Components of EAP
- Client / Supplicant.
- Authenticator.
- Authenticator Server.
31EAP Encryption (Cont.)
802.1x and EAP Authentication
Unauthorized State
- The supplicant requests access to the
authenticator -
- The client can send a start EAP Message
-
- The supplicant returns its identity
EAP Message is returned
The identity is forwarded to the server
Acceptance/Rejection Message
Authorized State
32EAP Encryption (Cont.)
Advantages
- Supports multiple authentication protocols.
- There is no need to reprogram it!!
- Easy to implement and deploy.
Disadvantages
- The authentication mechanism is weak!!
- Attackers can recover passwords easily .
33 Implementation of existing security solutions to
WLAN
Radius Server
Overview
- RADIUS Remote Authentication Dial In User
Service. - It remotes users according to a database.
- It assigns an IP address to the wireless device
or establishing a time limit on the session. - RADIUS servers Steel-Belted, WinRadius, NAVIS,
Merit, Kerberos, Microsoft IAS.
34Radius Server
Architecture of a WLAN with RADIUS Server
solution
35WinRadius Server Implementation
- WinRaduis server was implemented as part of WLAN
security solution
Step1 Installation
1-WinRadius was launched. 2- The "Configure
ODBC automatically" button was clicked at
"Settings/Database.
36WinRadius Server Implementation
37WinRadius Server Implementation
Step1 Installation
3- WinRadius was restarted. Now, all settings of
WinRadius are OK. 4- Some users were added to
WinRadius by clicking "" toolbar button as shown
in Figure
38WinRadius Server Implementation
Step1 Installation
5- Radius Test was used to test the functionality
of WinRadius.
39WinRadius Server Implementation
40WinRadius Server Implementation
Step 2 WLAN configuration
In Windows XP, IEEE 802.1x was enabled and
MD5-Challenge was chosen as EAP type. Thus
WinRadius will use 802.1x to authenticate the
WLAN users.
41Enabling the Access Point
Enabling The Servers Status
Entering The IP Address of the Radius Server
Entering The Radius Server Destination port
Entering The shared key
42Enabling the Access Point
Entering The IP Addresses of the users
Entering The Destination ports of the users
Entering The shared keys
43WinRadius Server Advantages
- Lower purchase cost The cheapest in the world!!
- Lower running cost.
- More safe than ever.
- Easy to understand and easy to manage.
44Testing the Network
Data sent and received were recognized in the
access point and the server
45Radius Server Implementation
46Radius Server Implementation
47Radius Server Implementation
48Radius Server Implementation
49 Smart Cards Solution
Smart Card Technology
Overview
- A wallet sized plastic card that is integrated
with a circuit-chip. - It can be programmed to perform tasks and store
information. - The microprocessor on the smart card is there
for security. - The host computer and card reader actually
"talk" to the microprocessor.
50Smart Cards Solution
Configuration of Smart Cards
                              Â
51Smart Cards Solution
Security of Smart Cards
- Smart cards are extremely secure!!
- It is impossible for a hacker to duplicate or
corrupt the data stored on a card. - All standard encryption algorithms can be
implemented DES, 3-DES, RSA, ECC - 4 different lengths of the same key are used to
give the network a powerful security.
52Smart Cards Solution
- Chip is tamper-resistant.
- Information stored on the card can be PIN
protected and/or read-write protected. - Capable of performing data encryption.
- Capable of processing (not just storing)
information.
Advantages
Disadvantages
- The card can be stolen!!
- PIN Codes can be forgetting.
53Implementation of Smart Cards Solution
- Raak Technology was used.
- The solution consists of a smart card or token,
a digital certificate, and a full featured 802.1X
client. - Raak smart cards and tokens were printed and
configured for the end-user, and is ready to use
right out of the box. - Raak smart cards and tokens allows the user to
use them with multiple computers in multiple
locations. - A user needs both the physical Smart Card and
the Smart Card PIN code in order to authenticate.
54Smart Cards Solution Implementation
C7 Cards
The C7 is protected with a user configurable PIN
(Personal Identification Number). Using the smart
card requires both the card and the PIN, for
complete two-factor authentication.
Features
- Custom printed in full color.
- Personalized with users own digital certificate.
- Supports Windows XP Pro, XP Home, 2000.
- Powerful cryptographic co-processor.
- RSA 512, 768, 1024, 2048 keys.
55Smart Cards Solution Implementation
T8 Tokens
The Raak T8 USB smart Token is printed with the
token ID number,
Features
- Printed with the token ID.
- Complete with a small USB connector.
- Supports Windows XP Pro, XP Home, 2000.
- Powerful cryptographic co-processor.
- RSA 512, 768, 1024, 2048 keys.
56WinRadius
- WinRadius is a standard RADIUS server for network
authentication and accounting - It is used for telecommunication wireless Local
area Network. - There are more than 5000 users of WinRadius in
the world
571 K. Chen, "Medium Access Control of Wireless
LANs for Mobile Computing," IEEE Network,
September / October 1994. 2 Pike. James,
Cisco Networking Security, Library of Congress,
2001. 3 Agrawal. Dharma, Zeng. Qing-An,
Wireless and mobile systems, University of
Cincinnati, 2003. 4 Geier. Jim, Wireless
LANs implementing interoperable networks,
Macmillan Technical Publisher, 1999. 5
www.cisco.com. 6 www.iss.com.
7 www.avaya.com.
8 http//www.iec.org/online/tutorials/smartcard
/index.html.
58 59THANK YOU!!
For Attending and listening!!! We would
appreciate your questions and recommendations !!!