Wireless Networked Systems
|
|
- Fay Quinn
- 6 years ago
- Views:
Transcription
1 Wireless Networked Systems CS 795/895 - Spring 2013 Lec #5: Medium Access Control High Throughput, Security Tamer Nadeem Dept. of Computer Science
2 High Throughput Networks (802.11n) Slides adapted from Wireless Networking, J. Bernardini Page 2 Spring 2013 CS 795/895 - Wireless Networked Systems
3 802.11n Overview n Enhancements PHY new features MAC new features Page 3 Spring 2013 CS 795/895 - Wireless Networked Systems
4 802.11n PHY Enhancements Page 4 Spring 2013 CS 795/895 - Wireless Networked Systems
5 PHY Key Features MIMO Technology o Enable 2x2 MIMO operation in 20 MHz => 100 Mbps o Up to 4x4 MIMO => 200 Mbps HT Channel Technology o Bandwidth extension option: Using double channel (40 MHz) to achieve higher data rate Page 5 Spring 2013 CS 795/895 - Wireless Networked Systems
6 MIMO - Overview Page 6 Spring 2013 CS 795/895 - Wireless Networked Systems
7 MIMO - Overview Page 7 Spring 2013 CS 795/895 - Wireless Networked Systems
8 MIMO - Multiple-input Multiple-output Ø Mapping of a data stream to multiple parallel data streams and demapping multiple received data streams into a single data stream Ø Sending signals on multiple Tx antenna at the same carrier frequency o Transmitting independent streams of data Space Division Multiplexing (SDM) => increases throughput o Beamforming technology/coding across the antenna Space-Time Coding (STC) => increase range / robustness Transmitter x Receiver MIMO Tx Rx MIMO 2 3 2x x x4 Page 8 Spring 2013 CS 795/895 - Wireless Networked Systems
9 MIMO Multiple Data Streams Page 9 Spring 2013 CS 795/895 - Wireless Networked Systems
10 Antenna Beamforming and Diversity Beamforming (beam steering) employs two transmit antennas to deliver the best multipath signal Diversity (receive combining) uses two receive antennas to capture the best multipath signal MIMO uses multiple transmitters, receivers and antennas to send multiple signals over the same channel, multiplying spectral efficiency. Page 10 Spring 2013 CS 795/895 - Wireless Networked Systems
11 Transmit Beamforming (TxBF) n optional feature Multiple transmitter antennas focus the signal to a receiver Used by radar; phased-array antenna systems Transmitter is the beamformer Receiver is the beamformee Maximum transmission range, fixed power/antenna Std n Feedback from the beamformee allows the beamformer to adjust the antennas (steering matrix) and signal to improve SNR Four forms of TxBF: one implicit method and three explicit methods. Tx Rx Page 11 Spring 2013 CS 795/895 - Wireless Networked Systems
12 Transmit Beamforming (TxBF) Implicit TxBF: o The steering matrix is created by the transmitter o Radio calibration is required by the transmitter to calibrate the difference between its transmit and receive chains. o Radio calibration is achieved using feedback from the receiver. Explicit TxBF: o The receiver make a direct channel estimate and sending this feedback to the transmitter. o The steering matrix can be calculated by either the transmitter or receiver. o Three types of feedback: ² Channel state information: the receiver sends channel information to the transmitter to compute the steering matrix ² Non-compressed beamforming: the receiver calculates and sends the steering matrix to the transmitter ² Compressed beamforming: the receiver sends a compressed steering matrix to the transmitter Page 12 Spring 2013 CS 795/895 - Wireless Networked Systems
13 Beamforming Calibration a) STA A initiates the frame exchange sequence by sending an unsteered PPDU to STA B. The PPDU includes a training request (TRQ= 1) in a +HTC MPDU. b) STA B sends a sounding PPDU in response to the training request from STA A. c) On receiving the sounding PPDU, STA A uses the resulting channel estimate to compute steering matrices, and uses these to send a steered PPDU back to STA B. Page 13 Spring 2013 CS 795/895 - Wireless Networked Systems
14 MIMO Advantage Page 14 Spring 2013 CS 795/895 - Wireless Networked Systems
15 802.11n HT Channel Technology n uses OFDM (just as ag) n has option to use 20 MHz and 40 MHz channels n can use can combine channels for Channel Bonding n can use variable Guard Interval (GI) n can use various Modulation and Coding Schemes (MCS) Page 15 Spring 2013 CS 795/895 - Wireless Networked Systems
16 Non-HT and HT Channels a/g use 20 MHz OFDM channels, each of 52 subcarriers 48-subcarriers transmit data 4-subcarriers transmit pilot tones for calibrations n can use either 20 MHz or 40 MHz channels Each HT 20 MHz channel has 56 subcarriers 52-subcarriers transmit data 4-subcarriers transmit pilot tones for transmitter-receiver calibrations Each HT 40 MHz channel has 114 subcarriers 108-subcarriers transmit data 6-subcarriers transmit pilot tones for transmitter-receiver calibrations Page 16 Spring 2013 CS 795/895 - Wireless Networked Systems
17 Channel Bonding 40 MHz channels are formed by bonding two 20MHz channels When bonding two channels there no need for a guard band 5 GHz UNNI band allows twenty three 20 MHz channels to be bonded 2.4 GHz ISM band allows only one bonding of two 20 MHz channels (only 3 nonoverlapping channels) Page 17 Spring 2013 CS 795/895 - Wireless Networked Systems
18 Guard Interval (GI) Digital Symbol is a collection of bits If the bits overlap Inter-symbol Interference (ISI) is experienced ag uses a 800 ns guard interval between symbols n can use a 800 ns or 400 ns guard interval between symbols 400 ns GI improves throughput by 10% The 400 ns GI should only be used in a good RF environment Page 18 Spring 2013 CS 795/895 - Wireless Networked Systems
19 Modulation and Coding Schemes (MCS) n defines data rates as Modulation and Coding Schemes (MCS) MCS are based upon Modulation technique (BPSK, QPSK, 16-QAM, 64-QAM) Spatial streams (1, 4) Channel size (20 MHz, 40 MHz) Guard Interval (400 ns, 800 ns) n requires Eight mandatory 20 MHz MCSs Total of 78 MCSs Data rates vary from 6.5 Mbps to 600 Mbps Page 19 Spring 2013 CS 795/895 - Wireless Networked Systems
20 HT PHY and MPDU frame is a MAC Protocol Data Unit (MPDU) The payload is the MAC service Unit (MSDU) (layer 7-3 data) MPDU is made up of the header and body At the PHY layer is the Physical Layer Protocol Data Unit (PPDU) PPDU = MPDU + PHY preamble-header n defines three PHY preamble-headers Legacy format, HT Mixed, HT Greenfield CCRI J. Bernardini 20 Page 20 Spring 2013 CS 795/895 - Wireless Networked Systems
21 HT PPDU Formats Non-HT Legacy Mandatory for n Only 20 MHz channels Same format as ag HT Mixed Two part preamble First part can be decoded by ag Second part can not be decoded by ag HT Greenfield Preamble can not be decoded by ag Can use both 20 MHz and 40 MHz channels Page 21 Spring 2013 CS 795/895 - Wireless Networked Systems
22 802.11n MAC Enhancements Page 22 Spring 2013 CS 795/895 - Wireless Networked Systems
23 802.11n New MAC Features Frame Aggregation MSDU/PPDU RIFS: Reduced Inter-frame spacing Block ACK Protection Mechanisms Page 23 Spring 2013 CS 795/895 - Wireless Networked Systems
24 802.11n Frame Aggregation Motivation: Amortize PLCP & MAC overhead Page 24 Spring 2013 CS 795/895 - Wireless Networked Systems
25 802.11n Frame Aggregation A-MSDU Scheme: Multiple MSDUs are bundled to form a MPDU which could consist of multiple sub frames either from multiple sources or for multiple destinations. The PHY header, MAC header and FCS are appended to form PSDU. All MSDU are intended to be received by the same receiver. Sub frames have same sequence number and traffic identifier (TID) (priority). The maximum length of an A-MSDU frame can be 3839 or 7955 bytes Page 25 Spring 2013 CS 795/895 - Wireless Networked Systems
26 802.11n Frame Aggregation A-MPDU Scheme: Multiple MPDUs with a common PHY header are packed as an A-MPDU which can contain several MSDUs and/or A-MSDUs. Selective retransmission due to the presence of individual FCS for each MPDU All the MPDUs in an A-MPDU have same traffic identifier (TID). The maximum length size of an A-MPDU frame is 64 Kbytes. Page 26 Spring 2013 CS 795/895 - Wireless Networked Systems
27 802.11n Interframe Space Page 27 Spring 2013 CS 795/895 - Wireless Networked Systems
28 802.11n HTP Burst Trans. Page 28 Spring 2013 CS 795/895 - Wireless Networked Systems
29 802.11n Block ACK Page 29 Spring 2013 CS 795/895 - Wireless Networked Systems
30 802.11n Block ACK Immediate BlockACK Suitable for High-bandwidth, low latency traffic Delayed BlockACK Suitable for applications that tolerate moderate latency. Page 30 Spring 2013 CS 795/895 - Wireless Networked Systems
31 and n Comparison Page 31 Spring 2013 CS 795/895 - Wireless Networked Systems
32 Summary Page 32 Spring 2013 CS 795/895 - Wireless Networked Systems
33 Network Security Wireless Networking J. Bernardini Page 33 Spring 2013 CS 795/895 - Wireless Networked Systems
34 The Security Risk: RF Leakage Page 34 Spring 2013 CS 795/895 - Wireless Networked Systems
35 Infrastructure mode The association process Unauthenticated and unassociated Authenticated and unassociated Authenticated and associated " All access points transmit a beacon management frame at fixed interval. " A client listens for beacon to identify the access points, and selects the BSS to join. " The client and the access point perform a mutual authentication by exchanging several management frames (talk later) " The client sends an association request frame, and the access point responds with an association response frame. " The client can transmit data frames on the network. 35
36 WEP (Wired Equivalent Privacy) (encrypted traffic) The industry s solution: WEP (Wired Equivalent Privacy) Share a single cryptographic key among all devices Encrypt all packets sent over the air, using the shared key Goals : Confidentiality : Protection against eavesdropping Access Control : Restrict accessibility Data Integrity : Correctness of data Page 36 Spring 2013 CS 795/895 - Wireless Networked Systems
37 RC4 and Stream Ciphers RC4 encryption is Vernam Cipher RC4 is a stream cipher Generates pseudo random keystream from the key( IV Key) Encryption key Plain text data byte Pseudo-random number generator Cipher text byte Page 37 Spring 2013 CS 795/895 - Wireless Networked Systems
38 WEP Protocol Mobile station shares key with Access Point Transmitting a message M - Compute checksum (CRC32) of M and append it to M - Generate keystream using RC4(IV,Key) - Xor <M,C(M)> with keystream - Transmit IV and cipher text Upon receiving Reverse steps IV original unencrypted packet checksum key RC4 IV encrypted packet 24 bits Page 38 Spring 2013 CS 795/895 - Wireless Networked Systems
39 A Property of RC4 Keystream leaks, under known-plaintext attack Suppose we intercept a ciphertext C, and suppose we can guess the corresponding plaintext P Let Z = RC4(K, IV) be the RC4 keystream Since C = P Z, we can derive the RC4 keystream Z by P C = P (P Z) = Z This is not a problem... unless keystream is reused! If IV s repeat, confidentiality is at risk If we send two ciphertexts (C, C ) using the same IV, then the xor of plaintexts leaks (P P = C C ), which might reveal both plaintexts If there is redundancy, this may reveal both plaintexts Or, if we can guess one plaintext, the other is leaked Lesson: If RC4 isn t used carefully, it becomes insecure Page 39 Spring 2013 CS 795/895 - Wireless Networked Systems
40 Attack #1: Keystream Reuse WEP didn t use RC4 carefully The problem: IV s frequently repeat The IV is often a counter that starts at zero Hence, rebooting causes IV reuse Also, there are only 16 million possible IV s, so after intercepting enough packets, there are sure to be repeats Attackers can eavesdrop on traffic An eavesdropper can decrypt intercepted ciphertexts even without knowing the key Some implemented IV selection strategies: Random: Collision probability P n two packets will share same IV after n packets is P 2 = 1/2 24 for n = 2 and P n = P n 1 +(n 1)(1 P n 1 )/ 2 24 for n > 2. o 50% chance of a collision exists already after only 4823 packets!!! Page 40 Spring 2013 CS 795/895 - Wireless Networked Systems
41 How to get plaintext? IP traffic predictable - well defined structures and message content Login sequences and Welcome messages Sniffing Authentication challenge - plain and cipher text both Sending packets from outside - ping Broadcast packets in both encrypted and unencrypted form - for some implementations Page 41 Spring 2013 CS 795/895 - Wireless Networked Systems
42 Attack from both ends Internet Attacker sends data Attacker AP MS AP encrypts plaintext data Attacker Page 42 Spring 2013 CS 795/895 - Wireless Networked Systems
43 Attack #2: Spoofed Packets Attackers can inject forged traffic Learn RC4(K, IV) using previous attack Since the checksum is unkeyed, you can then create valid ciphertexts that will be accepted by the receiver Attackers can bypass access control All computers attached to wireless net are exposed Forgery Attack Recv-Addr, Src-Addr, Dest-Addr are all unprotected On packets from a STA to the AP, corrupt the Dest-Addr The AP will decrypt data and send it to the forged destination Page 43 Spring 2013 CS 795/895 - Wireless Networked Systems
44 Attack #3: Reaction Attacks P RC4(K) P RC4(K) 0x0101 ACK TCP ACKnowledgement appears TCP checksum on received (modified) packet is valid P & 0x0101 has exactly 1 bit set Attacker can recover plaintext (P) without breaking RC4 Page 44 Spring 2013 CS 795/895 - Wireless Networked Systems
45 Standard Security Mechanisms and Wired Equivalent Privacy (WEP) protocol Key Management Authentication Mechanisms Open System Authentication Shared Key Authentication Access Control Mechanism Closed Network Access Control Access Control Lists 45 Page 45 Spring 2013 CS 795/895 - Wireless Networked Systems
46 Shared Key Authentication Authentication Spoofing 1. Eavesdropping P and C 2. WEP_K_IV_PR = P XOR C size of the stream=size of the authentication frame 3. Send Request to the Access Point, get challenge R 4. CR = WEP_K_IV_PR XOR R and new CRC 5. Follow steps, setup authentication 46 Page 46 Spring 2013 CS 795/895 - Wireless Networked Systems
47 Robust Security Network (RSN) i defines a set of features to establish a RSN association (RSNA) between stations (STAs) Enhanced data encapsulation mechanism CCMP Optional: TKIP Key management and establishment Four-way handshake and group-key handshake Enhanced authentication mechanism for STAs Pre-shared key (PSK); IEEE 802.1x/EAP methods Page 47 Spring 2013 CS 795/895 - Wireless Networked Systems
48 Page 48 Spring 2013 CS 795/895 - Wireless Networked Systems 48 Robust Security Network (RSN) Out of scope of i standard Wireless Station Access Point Authentication Server EAP-TLS EAP 802.1X (EAPoL) RADIUS UDP/IP
49 Robust Security Network (RSN) Operational phases Station Access Point Security Capabilities Discovery 802.1x authentication RADIUS/EAP Authentication Server 802.1x Key Management RADIUS-based Key Distribution Data Protection Page 49 Spring 2013 CS 795/895 - Wireless Networked Systems
50 Robust Security Network (RSN) Discovery message exchange Station Probe Request Access Point Probe Response + RSN IE Open System Auth Open System (success) Association Requst + RSN IE Association Response (success) Page 50 Spring 2013 CS 795/895 - Wireless Networked Systems
51 Robust Security Network (RSN) 802.1x Authentication Centralize network admission policy decisions at the AS Mutual authentication of STA and AS The AS and station derive a Master Key (MK) A Pairwise Master Key (PMK) is derived from MK The AS distributed PMK to the AP In PSK authentication, the authentication phase is skipped PMK = PSK Page 51 Spring 2013 CS 795/895 - Wireless Networked Systems
52 Robust Security Network (RSN) 802.1x key management Station Access Point Authentication Server Use RADIUS to push PMK from AS to AP Use PMK and 4-way Handshake To derive, bind, and verify PTK Use Group Key Handshake to send GTK from AP to station Page 52 Spring 2013 CS 795/895 - Wireless Networked Systems
53 Robust Security Network (RSN) 4-Way Handshake Station EAPoL-Key( ANonce ) Access Point PTK=EAPoL-PRF(PMK, ANonce SNonce AP MAC Addr STA MAC Addr) EAPoL-Key(SNonce, MIC, STA RSN IE) Install TK EAPoL-Key(ANonce, MIC, AP RSN IE, encrypted(gtk)) EAPoL-Key(Unicast, MIC) Derive PTK Install TK Page 53 Spring 2013 CS 795/895 - Wireless Networked Systems
54 Data Encapsulation: Temporal Key Integrity Protocol (TKIP) Optional IEEE802.11i protocol for data confidentiality and integrity TKIP is designed explicitly for implementation on WEP legacy hardware Designed as a wrapper around WEP Can be implemented in software Reuses existing WEP hardware Runs WEP as a sub-component TKIP three new features: A cryptographic message integrity code (MIC) A new IV sequencing discipline The transmitter increments the sequence number with each packet it sends A per-packet key mixing function Page 54 Spring 2013 CS 795/895 - Wireless Networked Systems
55 Temporal Key Integrity Protocol (TKIP) TKIP frame processing Temporal key Transmitter address TKIP sequence counter (TSC) MIC key Source & destination addresses, priority, and payload Phase 1 Key mixing TSC2-TSC5 MICHAEL TTAK Frame payload + MIC Phase 2 Key mixing TSC0-TSC1 TSC0-TSC5 Fragmentation (if required) WEP IV WEP secret key Clear text frames WEP Processing Encrypted and authenticated frames for transmission Page 55 Spring 2013 CS 795/895 - Wireless Networked Systems
56 Temporal Key Integrity Protocol (TKIP) TKIP encapsulation Encrypted MAC Header IV/Key ID Extended IV Data MIC WEP ICV FCS TSC1 WEP Seed TSC0 Rsvd Ext IV Key ID TSC2 TSC3 TSC4 TSC5 Page 56 Spring 2013 CS 795/895 - Wireless Networked Systems
57 Counter Mode with CBC-MAC (CCMP) Both encryption and MIC use AES Uses counter Mode (CTR) to encrypt the payload and MIC Uses CBC-MAC to compute a MIC on the plaintext header and the payload Both encryption and authentication use the same key Encryption Header Payload MIC Authenticated Page 57 Spring 2013 CS 795/895 - Wireless Networked Systems
58 Counter Mode with CBC-MAC (CCMP) CCMP data processing Plaintext frame MAC header Data Packet # Temporal key Key Id Additional authentication data A2 Create nonce CCMP header CCM encryption MAC header CCMP header Data MIC FCS Page 58 Spring 2013 CS 795/895 - Wireless Networked Systems
59 Questions Page 59 Spring 2013 CS 795/895 - Wireless Networked Systems
05 - WLAN Encryption and Data Integrity Protocols
05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationChapter 17. Wireless Network Security
Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer
Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also
More informationWireless Network Security
Wireless Network Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
More informationCWNP PW Certified Wireless Analysis Professional. Download Full Version :
CWNP PW0-270 Certified Wireless Analysis Professional Download Full Version : http://killexams.com/pass4sure/exam-detail/pw0-270 QUESTION: 50 ABC Company is having VoWiFi latency problems on their 802.11g
More informationTroubleshooting WLANs (Part 2)
SharkFest 17 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 8. November 2017 Breaking News: Including KRACK!!! Rolf Leutert Leutert NetServices Switzerland
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationLink Security A Tutorial
Link Security A Tutorial Fortress Technologies, Inc. Slide 1 Five basic security services Data confidentiality Data integrity Access control and access rights Authentication/Roaming Non-repudiation These
More informationLink & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Outline Network Security EECE 412 Link & end-to-end protocols SSL/TLS WPA Copyright 2004 Konstantin Beznosov 2 Networks Link and End-to-End Protocols
More informationConfigure n on the WLC
Configure 802.11n on the WLC Document ID: 108184 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions 802.11n An Overview How Does 802.11n Provide Greater Throughput
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationSecurity and Authentication for Wireless Networks
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 5-21-2004 Security and Authentication for 802.11 Wireless Networks Michel Getraide
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationOverview of Security
Overview of 802.11 Security Bingdong Li Present for CPE 601 2/9/2011 Sources: 1 Jesse Walker (Intel) & 2. WinLab 1 Agenda Introduction 802.11 Basic Security Mechanisms What s Wrong? Major Risks Recommendations
More informationoutline background & overview mac & phy wlan management security
IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationWIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security
Objectives: 1) Understanding the basic operations of WLANs 2) WLAN security 3) Wireless body area networks (IEEE 802.15.6) Readings: 1. Kurose & Ross, Computer Networking: A Top-Down Approach (6th Edition),
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationStudent Workbook. Presentation Graphics Notes Areas Glossary. Presenter Keith R. Parsons, CWNE #3
Student Workbook Presentation Graphics Notes Areas Glossary Presenter Keith R. Parsons, CWNE #3 Page left intentionally blank. 802.11n Planning and Optimization Workshop Outline Section I: 802.11 Fundamentals
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationTable of Contents 1 WLAN Service Configuration 1-1
Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple
More informationSecurity in IEEE Networks
Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set
More informationWireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities
Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent
More informationWHITE PAPER n Demystified. Key considerations for n-abling the Wireless Enterprise
WHITE PAPER 802.11n Demystified Key considerations for n-abling the Wireless Enterprise Introduction IEEE 802.11n is a next generation wireless technology that delivers spectacular improvements in the
More informationCOSC4377. Chapter 8 roadmap
Lecture 28 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationPhysical and Link Layer Attacks
Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber
More informationSecurity in Data Link Protocols
Security in 802.11 Data Link Protocols Gianluca Dini Dept. of Ingegneria dell Informazione University of Pisa, Italy Via Diotisalvi 2, 56100 Pisa gianluca.dini@ing.unipi.it If you believe that any security
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA
More informationWireless Network Security
Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so
More informationWireless Security i. Lars Strand lars (at) unik no June 2004
Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for
More informationStatus of P Sub-Specification
Status of P1451.5 802.11 Sub-Specification June 7, 2004 Ryon Coleman Senior Systems Engineer 802.11 Subgroup rcoleman@3eti.com Agenda 1. IEEE 802.11 Architecture 2. Scope within the 1451 Reference Model
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project
More informationWPA-GPG: Wireless authentication using GPG Key
Università degli Studi di Bologna DEIS WPA-GPG: Wireless authentication using GPG Key Gabriele Monti December 9, 2009 DEIS Technical Report no. DEIS-LIA-007-09 LIA Series no. 97 WPA-GPG: Wireless authentication
More informationSharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert
SharkFest 18 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch Introduction 2 Rolf Leutert,
More informationAnalysis of Security or Wired Equivalent Privacy Isn t. Nikita Borisov, Ian Goldberg, and David Wagner
Analysis of 802.11 Security or Wired Equivalent Privacy Isn t Nikita Borisov, Ian Goldberg, and David Wagner WEP Protocol Wired Equivalent Privacy Part of the 802.11 Link-layer security protocol Security
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationAnnouncements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1
Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWNC-0300USB. 11g Wireless USB Adapter USER MANUAL
WNC-0300USB 11g Wireless USB Adapter USER MANUAL Contents 1. Introduction...3 1.1 Product Feature...3 1.2 System Requirement...3 2. Getting Start...3 2.1 LED Indicators...3 2.2 Install the 54Mbps Wireless
More informationSecurity in Data Link Protocols
Security in 802.11 Data Link Protocols Gianluca Dini!"#$%&'(&)*+"+*",-.&/"001)*(',2.3-'*" University of Pisa, Italy Via Diotisalvi 2, 56100 Pisa gianluca.dini@ing.unipi.it!"#$%&#'()*(+(#,-.,#./$#0(1&2*,$#32%')(4#1./#
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 16504 First edition 2011-11-15 Information technology Telecommunications and information exchange between systems MAC and PHY for operation in TV white space Technologies
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationEmerging IEEE Standards
1 Luke Qian a As the popularity of IEEE 802.11 wireless LANs (WLANs) grows rapidly, many new 802.11 wireless standards are emerging. New 802.11 standards are being developed in two major categories: specifications
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More information802.11n. Taking wireless to the next level. Carlo Terminiello Consulting SE Wireless & Mobility European Technology Marketing
802.11n Taking wireless to the next level Carlo Terminiello Consulting SE Wireless & Mobility European Technology Marketing ctermini@cisco.com 802.11n PVT 2008 Cisco, All rights reserved. Cisco Partners
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationThe security of existing wireless networks
Security and Cooperation in Wireless Networks Cellular networks o o GSM UMTS WiFi LANs Bluetooth Security in Wireless Networks Wireless networks are more vulnerable to security issues: Broadcast communications
More informationIEEE Wireless LANs
Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points
More informationAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous
More informationLaboratory of Nomadic Communication. Quick introduction to IEEE
Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationKey Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview
More informationSecuring Your Wireless LAN
Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationOverview of Emerging IEEE Protocols for MAC and Above
Overview of Emerging IEEE 802.11 Protocols for MAC and Above Sunghyun Choi Multimedia & Wireless Networking Laboratory (MWNL) School of Electrical Engineering Seoul National University schoi@snu.ac.kr
More informationThe Final Nail in WEP s Coffin
1/19 The Final Nail in WEP s Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy 2/19 WEP is the 802.11 standard for encryption.
More informationKRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017
KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Chaos Communication Congress (CCC), 27 December 2017 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that
More informationKRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018
KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Nullcon, 2 March 2018 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that s secure? Seems so! No attacks
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationKRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018
KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef @vanhoefm BlueHat IL, 24 January 2018 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned
More informationGuide to Deploying n Wireless LANs To learn more about n in the Enterprise visit
N E T W ORKS U P E RVIS ION Table of Contents Overview....................................................................... 2 802.11n Basics Layer 1 Enhancements... 3 MIMO.......................................................................
More informationWhat you will learn. Summary Question and Answer
What you will learn General overview of 802.11 Authentication Methods WEP Overview Key Hierarchy Encryption/Decryption WPA Overview Key Hierarchy Encryption/Decryption WPA2 Overview Encryption/Decryption
More information4Gon Tel: +44 (0) Fax: +44 (0)
This document describes the benefit of adopting 802.11n technology in a Meraki wireless network. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki is a registered trademark of Meraki,
More informationStream Ciphers. Stream Ciphers 1
Stream Ciphers Stream Ciphers 1 Stream Ciphers Generate a pseudo-random key stream & xor to the plaintext. Key: The seed of the PRNG Traditional PRNGs (e.g. those used for simulations) are not secure.
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationConfiguring Layer2 Security
Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring
More informationHP A-MSR Router Series WLAN. Command Reference. Abstract
HP A-MSR Router Series WLAN Command Reference Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended for network planners,
More informationThroughput Analysis of IEEE802.11n using OPNET
Throughput Analysis of IEEE802.11n using OPNET Abdulaziz M. Ghaleb, David Chieng, Alvin Ting, Kae Hsiang Kwong, MIMOS Berhad, Malaysia. {abdulaziz.saleh, ht.chieng, kee.ting, kh.kwong}@mimos.my Keywords
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationConfiguring the Wireless Parameters (CPE and WBS)
Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.
More informationConverged Access: Wireless AP and RF
This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient
More informationDay 1: Wi-Fi Technology Overview
Duration: 5days Hands on: Wireshark based real-life Wi-Fi packet trace analysis Demos : Alethea Wicheck multi-sta emulator for understanding performance of Wi-Fi APs and to study impact of multiple clients
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationImproved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018
Improved KRACK Attacks Against WPA2 Implementations Mathy Vanhoef @vanhoefm OPCDE, Dubai, 7 April 2018 Overview Key reinstalls in 4-way handshake New KRACKs Practical impact Lessons learned 2 Overview
More informationIEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering
by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationSecuring a Wireless LAN
Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access
More informationCITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule
1 next CITS3002 help3002 CITS3002 schedule The IEEE-802.11 Wireless LAN protocol We'll next examine devices implementing the IEEE-802.11 family of wireless networking protocols, and get an appreciation
More informationVulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal
Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Lazaridis Ioannis, Pouros Sotirios, Veloudis Simeon DEI College, Thessaloniki, Greece Abstract: This paper presents
More informationCSE 713: Wireless Networks Security Principles and Practices. Ad hoc networks security and sensor networks security (1 hour)
CSE 713: Wireless Networks Security Principles and Practices Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Lecture 2 February 6, 2017 Outline TKIP and AES-CCMP (1 hour) Break
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationConfiguring Parameters
Configuring the 802.11n Parameters, page 1 Configuring 802.11h Parameters, page 4 Configuring the 802.11n Parameters Information About Configuring the 802.11n Parameters This section provides instructions
More informationPW0-270_formatted. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.
PW0-270_formatted Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ CWNA PW0-270 Certified Wireless Analysis Professional (CWAP) Version: 5.0 CWNA PW0-270
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More information11ax MU-MIMO; how is it different from 11ac?
11ax MU-MIMO; how is it different from 11ac? Dr. Srikanth Subramanian, CKO, Nanocell Networks www.nanocellnetworks.com srikanth.s@nanocellnetworks.com 802.11ac MU-MIMO AP with maximum 8 streams and STAs
More informationCCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA
Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai
More informationChapter 4 WIRELESS LAN
Chapter 4 WIRELESS LAN Distributed Computing Group Mobile Computing Summer 2002 Overview Design goals Characteristics IEEE 802.11 Architecture Protocol PHY MAC Roaming Security a, b, d, etc. Short intermezzo
More information