On the IEEE i security: a denial-of-service perspective

Size: px
Start display at page:

Download "On the IEEE i security: a denial-of-service perspective"

Transcription

1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8: Published online 21 August 2014 in Wiley Online Library (wileyonlinelibrary.com) REVIEW ARTICLE On the IEEE i security: a denial-of-service perspective Rajeev Singh 1 * and Teek Parval Sharma 2 1 Govind Ballabh Pant University, Pantnagar, Udham Singh Nagar, Uttarakhand, India 2 National Institute of Technology, Hamirpur, Himachal Pradesh, India ABSTRACT The IEEE i standard provides authentication and security at the Medium Access Control layer in wireless local area networks (WLANs). It involves an authentication process followed by a four-way handshake to evolve a key for securing data sessions. The standard suffers under denial-of-service (DoS) attacks. These attacks often block the ongoing communication process and deprive services to the legitimate users. These are easy to conduct while maintaining anonymity of the attackers. It hence becomes imperative to learn about the attacks and their solutions in IEEE i-protected WLANs so that future research proposals and solutions to mitigate the attack may develop. The paper presents a review of DoS attacks and existing solutions pertaining to the IEEE i security standard. Copyright 2014 John Wiley & Sons, Ltd. KEYWORDS WLAN security; i; 802.1X; denial of service *Correspondence Rajeev Singh, Govind Ballabh Pant University, Pantnagar, Udham Singh Nagar, Uttarakhand, India. rajeevpec@gmail.com 1. INTRODUCTION Wireless local area network (WLAN) technology use, utility, and popularity are increasing day by day. This is attributed to easy access, ease of work, enhanced flexibility, sufficient bandwidth, and support provided for a large number of network applications. As the wireless medium is open for public access within a certain range, security is a concern. Research community and societies are working to make WLANs robust and secure. The initial security protocol, that is, Wired Equivalent Privacy (WEP), was the first effort in this direction used with IEEE local area networks (LANs) for security purposes. The protocol has several deficiencies like lack of key management mechanism, lack of initial vector (IV) generation mechanism, no replay protection, and a weak integrity-check mechanism. It is hence deprecated [1 4]. Wi-Fi Protected Access (WPA) is the second security solution for WLANs. WPA is a forward-compatible subset of the current security standard, that is, i [5]. It required driver updates on the communicating nodes. The complete security standard, that is, IEEE i [5] (also known as WPA2), which required firmware updates, came into existence in June i, the current standard, is used for establishing a secure communication at the Medium Access Control (MAC) layer in WLANs. The IEEE i security is mainly concerned with initial entity authentication, access control, and key management. For initial entity authentication and access control in large enterprises, 802.1X is used [6] X provides access into the network after verifying the user s entity at the authentication server (AS). Initial entity authentication is carried out using the Extensible Authentication Protocol (EAP) method. A four-way handshake is performed after the initial entity authentication for evolving a fresh session key X blocks the wireless station s (STA) communication at the access point (AP) till the entire process of initial entity authentication and four-way handshake is successfully completed. After completion of the 802.1X and handshake, regular data frame transmission follows i involves protection (encryption and message integrity code (MIC) calculation) using the Advanced Encryption Standard [7,8]. Despite the strong cryptographic protection, the standard is prone to several attacks and vulnerabilities [4,9 12], out of which the denial-ofservice (DoS) attacks are most prominent. DoS attacks are those where an attacker attempts to prevent users or other systems from accessing resources in a timely manner. These attacks are mainly motivated by monetary gain, self-actualization and boredom, revenge, and information warfare and may have associated financial or intangible costs [13] Copyright 2014 John Wiley & Sons, Ltd.

2 R. Singh and T. P. Sharma On the IEEE i security: a denial-of-service perspective A WLAN AP, in general, has limited capacity and limited resources like processing power and memory. Hence, an AP can easily fall prey to DoS attacks as its queue can be easily choked and flooded by attack packets. The attacker can even make the processor busy in computing a large number of cryptographic primitives like MIC verification, encryption/decryption, and so on. The DoS problem remained unsolved in WLANs since its inception. As per [14 21], the DoS problem in WLANs is very much practical and is not a wild cry. Easy availability of DoS attack tools and mechanisms deteriorates the situation. Several instances of WLAN DoS have been reported, for example, in gaming and poker events [22,23], in train operation disruption, in safety monitoring systems at a nuclear power plant, in bank ATMs, in car parking [24,25], and so on. The occurrences of these attacks have also been reported in various news and forums [25 28]. Among WLAN security protocols, WEP and WPA have no consideration for DoS attacks. IEEE i does not give enough priority to AP security because of computational limitations and for accommodating a large number of existing authentication methods. During initial entity authentication, the STA is authenticated to AS only, but not to the AP. Because of this, attacks like DoS pose a threat and deprive services to legitimate users [29] management frames like authentication/association and deauthentication/disassociation remained unprotected and unauthenticated; that is, they are neither authenticated nor encrypted. This means that these unauthenticated STA frames can be used to cause a DoS attack. The first message of the four-way handshake is not protected; it can be utilized in DoS attacks for blocking the protocol. IEEE w [30] is developed as a solution against DoS conducted using management frames, but it is not useful against all kinds of DoS attacks and in all phases of i [31,32]. Thus, no security protocol protects effectively against DoS attacks. This paper hence focuses mainly on DoS attacks and existing solutions that protect IEEE i security. This effort will help in providing insight into existing DoS solutions. This will also help in motivating researchers to develop novel and effective defense against DoS attacks, leading to strengthening of i security. The rest of the paper is divided into six sections. Section 2 provides a brief overview of the IEEE i protocol. Section 3 gives an insight to the existing DoS threats and attacks against i. Section 4 presents the existing solutions. Section 5 compares these solutions, while Section 6 provides discussions pertaining to these solutions. Section 7 provides conclusion and future directions. beacons. It is then followed by legacy authentication and association between STA and AP. A Robust Security Network (RSN) Information Element (IE) in probe response and association request message is used for negotiating the network capabilities between STA and AP. Accomplishment of association leads STA and AP to associated states. After this, the i authentication is performed. The IEEE i authentication specifies the pre-shared key and 802.1X as two RSNA authentication mechanisms. The latter is preferred in large networks [33]. It defines three software entities: supplicant, which is installed on STA; authenticator, which is installed on AP; and AS, which is a Remote Authentication Dial In User Service (RADIUS) server. EAP is utilized for STA authentication. Several EAP methods like Kerberos, Lightweight EAP, Protected EAP, Transport Layer Security (EAP-TLS), and Tunneled TLS are available for this purpose. The default method is EAP-TLS, which is based upon the digital certificate authentication. EAP packets are encapsulated in Layer-2 frames (802.1X) between STA and AP, which is known as EAP over LAN (EAPOL), whereas between AP and AS, these are encapsulated over RADIUS frames [33]. Accomplishment of EAP authentication leads to sharing of the Pairwise Master Key (PMK) at STA and AP. For confirming the possession of the same PMK on both STA and AP, a four-way handshake is performed after the authentication process. A handshake also evolves a fresh session key, that is, the Pairwise Transient Key (PTK) [4,8,34]. The first message (4H1 ) of the handshake is sent by the AP. The message contains the AP MAC address (AA) and nonce (ANonce). On receiving 4H1, STA selects its own nonce (SNonce) and generates PTK using a pseudorandom function (PRF). After generating the PTK, STA sends the second message (4H2) of the handshake to AP. The message contains the STA MAC address (SPA), nonce (SNonce), and RSN IE. As AP now has both ANonce and SNonce, it also generates the same PTK. The third message (4H3) containing RS NIE confirms possession of the correct PTK by the AP. RSN IE verification through 4H2 and 4H3 messages confirms the initial RSN IE negotiations. The fourth message (4H4) sent by STA acknowledges the receipt of 4H3 (at STA) to AP. The PTK that evolved in the four-way handshake is utilized for securing the data sessions between STA and AP using either the Temporal Key Integrity Protocol (TKIP) or Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). AP starts forwarding the encrypted data packets after the successful handshake. 2. OVERVIEW OF IEEE I IEEE i executes Robust Security Network Association (RSNA) establishment procedures starting with network and security capability discovery. The discovery is performed via probe request/response or via periodic For the sake of convenience, we are following naming conventions for handshake messages as per Park s scheme [34]. The symbol H denotes handshake. It is preceded by the handshake type, that is, 4 for four way and 3 for three way, and it is followed by the sequence number of the individual frame in the handshake; that is, the first message of a four-way handshake is denoted as 4H1, and the second message as 4H2. For a three-way handshake, it is 3H1 for the first message. Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd. 1379

3 On the IEEE i security: a denial-of-service perspective R. Singh and T. P. Sharma IEEE i DoS Attacks Authentication/ Association Authentication Request Floods Association Request Floods 802.1X Authentication 4-way Handshake Data communication Disconnection Procedure DoS via EAPOL frames Exception Triggered DoS Flooding DoS using first message of handshake DoS attack due to PTK inconsistencies DoS attack due to RSN IE poisoning Flooding DoS involving cryptographic calculations DoS in TKIP Deauthentication DoS Disassociation DoS Handshake failure due to invalid MIC Figure 1. DoS attacks in i: a classification. 3. DoS ATTACKS IN IEEE I In IEEE i, unauthenticated and unprotected management frames are a major source for conduction of DoS attacks. The attacker utilizes the authentication (or association) frames for conducting flooding DoS attacks on STA or AP [4,15 20,29,35,36]. Under a Transient Security Network environment, the STA s request for RSNA, that is, for using i, may be denied by the attacker through forged AP beacons and probe responses. The EAP-led i authentication process itself is prone to DoS attacks. The spoofed EAPOL frames are utilized for this process. The four-way handshake used for keyrefreshing purposes is prone to flooding DoS attacks conducted via the unprotected first message [4,37 45]. The handshake failure may also occur because of flaws in handling the MIC enforced by the attacker [34]. The RSN IE confirmation failure during handshake caused by poisoning of nonsignificant bits during negotiation results in protocol blocking (due to disassociation) [4]. The attacker may even cause DoS attacks by causing successive Michael MIC failures [4]. During data transmission, attacker may flood the receiver with frames bearing wrong MIC, making the receiver busy in verifying and discarding MICs. MIC verification requires time in the order of 1.5 ms [46]. This leads to computational DoS. In summary, almost all the phases of i are prone to DoS attacks, leading to DoS to the user. Availability of a large number of softwares and tools makes the attacker s task easier. For obtaining the network information including the MAC address of the associated AP, tools such as Tcpdump [47], Wireshark [48] (formerly ethereal), or Kismet [49] are utilized. Sniffing tools like Netstumbler [50], Dsniff [51], and so on are also useful for obtaining and analyzing network information. Spoofing and forging are major methods to cause DoS attacks. Tools like GNU MAC Changer [52], SpoofMAC [53], MAC address changer [54], and KisMAC [55] are utilized for Michael algorithm is TKIP s MIC calculation algorithm. spoofing, while for forging and injecting frames, tools like File2air [56] and Aireplay-ng [57] are utilized. DoS attacks can also be caused on the STAs by fake AP [58] and AirSnarf [59]. Management frame-based forging tools are most common for causing DoS attacks. Automated tools like AirJack [60], Void11 [61], file2air [56], aireplay-ng [57], and so on can be used to perform management frame-based DoS attacks against a victim. Tools are available even for cracking the security mechanism (Aircrack-ng [62]) and for causing the attack using the encrypted packets (Packetforge-ng [63]). Considering the vulnerabilities and attack tools, we find that the primary reasons for DoS threat in IEEE i are as follows: no authentication and no protection of management frames and EAPOL frames (frames used in the authentication process) [36], unsecured 4H1 (the first four-way handshake frame), poisoning of RSN IE, and lack of proper authentication of data frames. We hence categorize DoS attacks in five categories, namely (i) DoS attacks in authentication and association, (ii) DoS attacks in EAP-based authentication, (iii) DoS attacks in the four-way handshake, (iv) DoS attacks in the data communication phase, and (v) DoS attacks in deauthentication and disassociation. This categorization is mapped logically to the phases of the IEEE i standard and is shown in Figure DoS attacks in authentication and association IEEE i adopted the open authentication and association for the sake of backward compatibility. The open authentication does not involve AS and is performed with authentication request and response management frames. Association follows authentication of the STA by sending an association request to the AP. If AP permits STA to join the network, it sends a successful association response back to the station. Both authentication and association management frames are neither authenticated nor encrypted. As a result, these frames are easily spoofed 1380 Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd.

4 R. Singh and T. P. Sharma On the IEEE i security: a denial-of-service perspective by the attacker, enabling him to target the AP using repetitive authentication/association requests. A large volume of such requests is termed as a request flood. The authentication request flood(authrf) is easy to conduct. Any STA can start the attack by sending large fake authentication requests (Figure 2). For association request flood (AssRF), the STA must be in an authenticated state so that the AP can accept the association requests (Figure 3). AssRF results in an overflow of the association table and blocking of AP [17]. For conducting AuthRF and AssRF, the average attack rate considered is 250 management frames per second (physical bandwidth required is less than 0.11 Mbps), which is sufficient to make AP deny new Voice-over-Internet Protocol (VOIP) calls/transmission Control Protocol (TCP) connections and stop servicing the active VOIP calls/tcp connections. Both AuthRF and AssRF attacks cause significant performance degradations, memory exhaustion, and communication disconnections. Thus, the legitimate STA is left with little or no connection to the wireless network [64]. In Figures 2 and 3, STA2 (Supplicant2) is deprived of AP services under the AuthRF and AssRF DoS attacks. In these attacks, the attacker needs to be equipped with a high-energy source as the victim is under DoS only for the active attack period; that is, once the attacker stops the authentication/association requests, AP starts processing the victim requests. Void11 [61] is an automated tool used to execute an authentication/association flooding attack against the victim. It can even target many APs in a specific area if the attacker is equipped with a high-gain antenna [17,18]. If AP receives an association/ authentication request from an already associated client, then it starts a new connection, terminating the earlier connection. The DoS attacker uses this fact to trouble already associated STAs and deprive them of service DoS attacks in EAP-based authentication Unprotected messages like EAPOL-Start, EAPOL-Failure, and EAPOL-Logoff in 802.1X authentication are used for conducting DoS attacks. Repetitive forged EAPOL-Start frames by an adversary can prevent the 802.1X authentication. Forged EAPOL-Failure and EAPOL-Logoff are used to disconnect the supplicant in between, causing DoS [4,35,65 67]. Zhao et al. [68] presented the exceptiontriggered DoS attack in the TLS (the default EAP authentication method) handshake. In this attack, the attacker injects fake messages or misleading messages to trigger exception handling to bring down the whole protocol session. Authentication Request Authentication Response Supplicant1 Authenticator Supplicant2 DoS attack AuthRF Attacker Authentication Request No Response Figure 2. Authentication DoS attack. Supplicant1 Authentication Request Authentication Response Association Request Association Response Authenticator Authentication Request Supplicant2 Authentication Response Association Request DoS attack AssRF Attacker No Response Figure 3. Association DoS attack. Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd. 1381

5 On the IEEE i security: a denial-of-service perspective R. Singh and T. P. Sharma 3.3. DoS attacks in the four-way handshake The messages of the four-way handshake are embedded in EAPOL key frames of the IEEE 802.1X authentication protocol. IEEE MAC encapsulates these EAPOL key frames in data frames. The data frames received without a frame check sequence (FCS) error in WLANs are followed by the return of an acknowledgement (ACK). Also, the first frame (4H1) in the handshake is totally unprotected, while other frames are protected by MIC. Considering this background, we discuss a DoS attack in the four-way handshake categorized as flooding attacks, DoS due to PTK inconsistencies, RSN IE poisoning, and DoS due to MIC check failure Flooding DoS attack. An attacker causes 4H1 flooding DoS attacks (Figure 4) on the STA via a large number of forged 4H1s targeted toward STA. Each of these frames contains different ANonce values (ANonce, ANonce, ANonce N ). The STA is forced to calculate a new PTK (PTK, PTK,, PTK N ) every time it receives a forged 4H1. The new PTK and ANonce values overwrite previous ones. Thus, the STA is busy calculating PTKs using the PRF, and hence, CPU utilization DoS results. If STA stores ANonce and PTK without overwriting the previous ones, then this may lead to memory exhaustion (Figure 4). CPU and memory exhaustion results in handshake blocking, hence a DoS attack. IEEE i provides a mechanism to calculate a temporary PTK (TPTK) after receiving 4H1 to overcome it. TPTK is modified on reception of each new 4H1, leaving PTK unaffected. PTK is modified only after reception and verification of 4H3. MIC at the supplicant is calculated using TPTK, while 4H3 carries MIC calculated using PTK. Thus, if TPTK is affected under an attack, a mismatch between the two will occur, resulting in MIC failure and hence failure of the four-way handshake. A PMK identifier (PMKID) and link layer data encryption (LLDE) were also introduced to counter the problem [38 41]. PMKID was derived from PMK, and hence, only a legitimate authenticator can embed it in 4H1. But an attacker can spoof it after the actual authenticator s 4H1 packet and reuse it for DoS attacks. LLDE encrypts all but the first message of the four-way handshake, leaving 4H1 to the attacker arsenal. Thus, the attacker still can cause a DoS attack by choosing 4H1, after it is sent by the authenticator DoS attack due to PTK inconsistency. An intelligent attacker observes the handshake flows. It selects the time after STA has sent 4H2 to the AP and is waiting for 4H3 to launch the attack (Figure 5). The attacker creates 4H1 (containing the spoofed AP address and other copied values of 4H1) and sends it with a changed ANonce (ANonce ) value in the frame. On the receipt of this forged frame, STA calculates the new PTK (PTK ) and stores ANonce. STA soon receives 4H3 frames for the ongoing session with AP and tries to verify MIC with the stored PTK. The verification fails, and 4H3 is discarded by the STA. The AP again sends 4H3, which is again discarded because of a different PTK. After timeout, AP sends a deauthentication request to STA. STA again reauthenticates and follows the fourway handshake. The attacker also follows the same timings and attack steps. Repetitions of these steps again and again ultimately result in DoS to the STA [4,38 41,45] DoS attack due to RSN IE poisoning. RSN IE is meant for negotiating the authentication parameters, cipher suites, and other capabilities between the authenticator and supplicant. The authenticator embeds it in the beacon and in the probe response. The supplicant inserts it in the probe request. In order to confirm the authenticity of RSN IE, the RSN IE verification is performed at the supplicant after 4H3 message and at the authenticator after 4H2 message of the handshake. The attacker can poison the RSN IE [4] (changing of insignificant bits of RSN IE) such that initial authentication, association, and EAP authentication remain unaffected, while Attacker Supplicant Authenticator 4H1 Data (EAP-Key (Msg1, ANonce)) Calculate PTK Store ANonce and PTK 4H2 Data (EAP-Key (Msg2, SNonce, MIC )) 4H1 Data (EAP-Key (Msg1, ANonce')) Data (EAP-Key (Msg1, ANonce'')) Calculate PTK' Store ANonce' and PTK' Calculate PTK'' Store ANonce' and PTK'' Data (EAP-Key (Msg1, ANonce )) Calculate PTK Store ANonce' and PTK Figure 4. Flooding DoS attack on four-way handshake [39] Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd.

6 R. Singh and T. P. Sharma On the IEEE i security: a denial-of-service perspective Attacker Supplicant Authenticator 4H1 Data (EAP-Key (Msg1, ANonce)) Calculate PTK 4H2 Data (EAP-Key (Msg2, SNonce, MIC PTK)) 4H1 4H2 Data (EAP-Key (Msg1, ANonce')) Data (EAP-Key (Msg2, SNonce', MIC PTK )) Calculate PTK' Verify MIC using PTK' Discard 4H3 4H3 Data (EAP-Key (Msg3, ANonce, MIC PTK)) Deauthentication Timeout Figure 5. DoS attack due to PTK inconsistencies [34,39]. RSN IE verification during handshake results in failure. This failure due to poisoning by the attacker leads to disassociation and hence blocking of the protocol (Figure 6). Such repetitive blocking results in a DoS attack. This attack is successful because of three reasons [4,38]. First, management frames are not protected. Second, the period between RSN IE negotiation and confirmation is large. Many messages were exchanged and resources utilized in this duration. Third, a bit-wise computation of RSN IE is too strict Failure of four-way handshake due to invalid MIC. Consistency of the data frame during handshake is checked via FCS. An FCS failure at the MAC level is followed by data frame retransmission after a timeout interval (say t 1 ). After successful FCS verification, the ACK is sent back to the sender while the frame itself is forwarded to the 802.1X supplicant (or authenticator), who decapsulates it for the EAPOL key frame. MIC is now checked for the integrity and authenticity of the data in the EAPOL key frame. Its failure indicates that it was sent by an unauthorized party. This might also be due to either a channel error that was undetected by FCS or an internal processing error. The attacker can utilize this fact and can frequently cause MIC failures. The supplicant installs PTK after sending 4H4 (4H4 is meant for acknowledging 4H3) and expects an encrypted data packet from the authenticator [34]. It might happen (or be intentionally made by the attacker) that 4H4 passes the FCS check but fails in the Supplicant Becon + AA RSNIE Authenticator Forged Becon + Modified AA RSNIE Probe Request Probe Response + AA RSNIE Forged Probe Response + Modified AA RSNIE Open Authentication, Association, Mutual EAP-TLS Authentication RSNIE confirmation failed, Disassociation Msg3, AA, ANonce, MIC PTK, AA RSN IE 4H3 Dissassociate Supplicant Figure 6. DoS attack via RSN IE poisoning [4]. Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd. 1383

7 On the IEEE i security: a denial-of-service perspective R. Singh and T. P. Sharma MIC check [34]. Because of this failure, the authenticator silently drops the 4H4 frame and sends the 4H3 frame again after a timeout interval (say t 2 ). But the supplicant was expecting an encrypted frame; hence, it discards this unencrypted second 4H3 (Figure 7). The further 4H3s are also discarded at the supplicant, resulting in an unsuccessful termination of the handshake process. The crafted repetitive terminations in this manner by the attacker may lead to DoS to the STA and AP DoS attacks in data communication Flooding DoS involving cryptographic calculations. Flooding-based DoS attack is possible on the AP or STA by using encrypted data packets. The computing resources are utilized in decrypting the data packets. These packets do not contain any additional authentication information and hence depend upon the decryption using shared key for the authentication. The verification (authentication) takes place only after the decryption is over. The packets that fail in the verification are dropped. The attacker utilizes this fact and sends a large number of fake encrypted data frames. A lot of AP computing power is wasted, and it may even lead to DoS to the regular nodes. This attack is also possible if instead of authentication of frames via encryption, MIC is used for frame authentication as computation overheads are also involved in MIC calculations DoS in TKIP. TKIP uses the Michael algorithm for keyed MIC calculations. The Michael algorithm is subjected to forgery after 2 19 attempts (20-bit security). TKIP implements a countermeasure to protect from such forgery attempts against the Michael algorithm by an adversary. The countermeasure treats the first detected Michael MIC failure as a securityrelevant matter, while detection of a second failure within 60 s ceases transmission and reception for 60 s. The authenticator could re-key or deauthenticate the supplicant during this period. The countermeasure opens a DoS vulnerability in which an adversary can send unsuccessful forgery attempts to cause two Michael MIC failures and shut down the connection. For this, the attacker has to intercept the packet with a valid TKIP sequence counter, modify the corresponding FCS and integrity-check value, and send a modified packet every 2 min [4,69] DoS attacks in disconnection procedures Deauthentication and disassociation management frames are used for supplicant and authenticator disconnection. An attacker can easily forge these frames by putting spoofed MAC addresses and the service set identification (SSID) of the network. Spoofing of these frames is possible because of the lack of authentication and protection. The deauthentication DoS attack is caused by sending the forged deauthentication frames, while the disassociation DoS attack is caused by sending forged disassociation frames to the target. The disassociation DoS attack leaves the target in the authenticated state. Thus, the work performed by the target to undo the attack s effect is more in case of deauthentication DoS attack as compared with disassociation DoS attack [70 72]. The attack frames are sent successively so that the target receives another forged frame before it finishes fresh authentication and association (Figure 8). A high-rate attack blocks the target from using the network (DoS). These attacks can even target all the WLAN STAs by using a single frame (Figure 8). All the WLAN STAs can be disconnected by putting the destination address as FF:FF:FF:FF:FF:FF (broadcast address) in STA AP Supplicant MAC MAC Authenticator 4H3 Data (EAP-Key (Msg3, ANonce, MIC )) ACK t1 4H4 Data (EAP-Key (Msg4, MIC )) t2 Install PTK Activate Protection Dropped t1 ACK MIC Failure 4H3s t1: timeout1set at the MAC layer t2: timeout2 set at 802.1X Figure 7. MIC failure resulting in handshake failure [34] Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd.

8 R. Singh and T. P. Sharma On the IEEE i security: a denial-of-service perspective Supplicant1 Authenticator Supplicant2 Authentication Request Supplicant1 Disassociated Authentication Response Association Request Association Response DisAss Request Attacker1 Authentication Request Authentication Response Association Request Attacker2 Disassociate ALL Supplicant2 Disassociated Figure 8. DoS attacks in disconnection procedures [70,72]. the attack frame [73,17]. Repetitive broadcast of the attack frame results in DoS to all STAs; hence, more attack impact is caused with minimum effort. Once the user becomes deauthenticated, the attacker may also further mount damaging attacks like man-in-the-middle and session hijacking to take advantage of the situation [74]. 4. PROTECTION AGAINST DoS ATTACKS We classify the solutions against DoS attacks (Figure 9) into four categories: (i) solutions that detect spoofing (spoof detection); (ii) solutions that provide protection to management frames (including deauthentication/ disassociation management frames); (iii) solutions that provide protection during the four-way handshake; and (iv) solutions that consider protection against deauthentication/disassociation DoS attacks. Category (iv) includes solutions that target only the attacks conducted via deauthentication/disassociation management frames Spoof detection Use of reverse address resolution protocol. Reverse Address Resolution Protocol (RARP) used to detect spoofing is discussed by Cardenas in [75]. A host can send a RARP request to the administrative host to find the associated Internet Protocol (IP) address, and the return of more than one IP address by the host indicates spoofing. The solution does not work if the attacker spoofs IP along with MAC address or if the hosts in the network are permitted to use multiple IPs for the same network interface controller (NIC) Radiofrequency fingerprinting/transceiver printing. To identify spoofing, Hall et al. [76] utilized the unique hardware characteristics of a transceiver that cannot be easily forged. It is a hardware-based solution that detects transceiver-print anomaly. A unique transceiver-print (transient portion of a signal) is extracted when a transceiver is turned on. It is then bound with the MAC address of the transceiver (profile of the transceiver). The stored profile is then used by the intrusion detection system (IDS) to detect the anomaly and hence spoofing. The IDS is supposed to maintain the fingerprints of all the nodes, which is a difficult task in the WLAN networks because of node mobility Power hopping. Power hopping to prevent spoofing is proposed by Nagarajan et al. [77]. It refers to partitioning of the power levels of STA into k levels as follows: P ¼ fp 1 ; P 2 ; ; P k g where P i P min Here, P min is the minimum power required to transmit a packet from STA to AP. The power of STA is changed to random Pi at each time interval Δt i. STA sends the packet at a different power level at a different instance of time. The AP knows power level at which the STA is sending, but the attacker does not know this. Hence, the attacker s spoofed packets are rejected at the AP. The entire solution is divided into an initialization phase and a power hop phase [77]. The former involves setting initial parameters using received power and sent power of the AP beacons, STA authentication at the AP, and Hypertext Transfer Protocol Secure session (for transferring the STA seed and power level set securely to AP). In the power hop phase, AP calculates the index (i) in Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd. 1385

9 On the IEEE i security: a denial-of-service perspective R. Singh and T. P. Sharma Figure 9. DoS attack solutions in i: a classification. the power level set (the value at this index is referred to as Pi). AP matches this with the received STA power; a correct match indicates legitimate STA; else, it indicates spoofing. This method only filters attacker packets and will not prevent the attacker from masquerading a MAC address. The presence of noise can also affect the power received at the AP. Even though the STA is close to AP, it still has to transmit at a high power level, resulting in more energy consumption Use of sequence numbers for spoof control. Every frame has a sequence number (12 bits) starting from 0 to It is incremented by one each time a MAC Service Data Unit is sent. If the frame is fragmented, then its sequence number is kept the same, and its fragment number is incremented by 1. Wright et al. [78] have performed sequence number gap analysis and found that the packets with the same MAC address that differ in these sequence numbers by a large margin are spoofed. They neglected the case with small margin gaps. This may happen because of dropping of malformed frames or changing of transmit/receive channel. The solution has associated issues. First, a baseline of monitored MAC addresses and the sequence numbers in use need to be established at the IDS level. Second, if the client roams out of the range of the IDS and when the client returns back within range of the IDS, the sequence numbers that follow will appear anomalous because of the large gap in sequence values. For this, it is suggested that IDS invalidates the tracked sequence number pattern on detecting a delay of more than a few seconds between the receiving frames for the activity of a client, assuming that the client has roamed out of range or has reset its NIC card. Dasgupta et al. [79] used a fuzzy logic-based decision system (multilevel monitoring and detection system) to detect MAC address spoofing based on detection of sequence number anomaly. The collected spoofed sequence number traces are used to train the system. After training, the validation of effectiveness of the system is carried out by detection of new spoofing attacks. A sequence number can change because of lost frames, duplicated frames, and out-of-order frames. It is not clear that such fuzzy logic system can handle these cases. The system requires special devices and cannot be deployed at each node. Guo et al. [80] analyzed the patterns of sequence number change for a frame and proposed an algorithm. The algorithm defines the gap (G) between successive frame sequence numbers. The current frame is treated as a retransmitted frame or normal frame or frame under verification, depending upon the value of G for this frame. If the frame is under verification, then the result of verification determines whether the current frame under 1386 Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd.

10 R. Singh and T. P. Sharma On the IEEE i security: a denial-of-service perspective verification is spoofed or not. For detecting spoofing, the algorithm is run at the monitor machine. Moreover, it is capable of only detecting the spoofing, not protecting against it. An adaptive threshold-based MAC layer filtering mechanism utilizing sequence numbers is presented in [81] by Zhang. The mechanism protects only the clients, not the AP Relationship-based detection. Li et al. [82] proposed two different families of relationships for detecting spoofing. These families do not require explicit use of cryptographic material and are thus suitable for scenarios where the maintenance of keying material is not practical (ad hoc and sensor networks).the first family uses monotonicity of the sequence number field in transmitted packets, while the second family involves the implicit transmission and reception properties associated with the distribution of interarrival time between packets. A forge-resistant consistency check detector is used to identify the anomalous behavior resulting from the spoofing of another node s identity using these relationships. The detector discriminates between various normal, non-adaptive spoofed, and adaptive spoofed traffic patterns. Normal patterns may have occasional packet loss, non-adaptive patterns are ones where adversaries will blindly spoof the MAC address of a device without adjusting their sequence numbers, and adaptive patterns are ones where adversaries will spoof a MAC address of a device along with usage of previously observed sequence numbers to adapt their sequence number field. In order to facilitate multi-level classification, the detector is augmented with a measurement of the threat severity (benign, low spoofing, and more severe spoofing). The solution needs separate monitoring devices for monitoring the abnormalities. It can detect spoofing but cannot prevent it [82,83] Detecting detectors. Various IDS [84] utilize the signature/fingerprint database to detect the LAN discovery and DoS attacks. The tactics and strategies used by the attack tools are analyzed, compared, and updated in the database. Constant updating of the database is required for effectiveness in such a system Specification-based IDS. A specification-based IDS is proposed by Smith et al. [24]. The system constructs a state transition model and configures it on a wireless sensor. Every frame in the network is evaluated against the specifications (constraints) by the sensor. An alert is raised on violation, and it is used to identify the DoS attack (malicious activity). The system has a drawback that the attack, which is caused by the actions that do not violate the state transition model, remains unidentified. Moreover, the violation of specification may be due to legitimate frames Triggering mechanism protection. Zhao et al. [68] proposed a twofold symptom check approach to detect exception-triggered DoS attacks. The first symptom checks for multiple (contradictory) response messages in the same state of the protocol s state machine. The second looks for abnormal protocol termination. The occurrence of these symptoms, many times in a certain time interval, indicates an attack. As an improvement against these attacks, a strategy is adopted where in case of conflicting messages, the one having the consequence of least cost is selected while delaying the other. This strategy is not much effective as the smart attacker may utilize the countermeasure itself for new attacks Protecting management frames The spoofed and unprotected management frames are a major source for causing DoS attacks against the i security mechanism. Protecting the authentication messages and association messages is one of the major and difficult requirements for a secure solution that is resistant against DoS attacks. MAC address filtering and traffic pattern filtering (TPF) are discussed in [20] for protecting against AuthRF and AssRF. The former is based on the AP control table. If the received client MAC address matches with the one in the AP table, the received authentication request is processed; otherwise, the request is dropped. In the latter, if sender of the received association request frame exists, the request is processed; else, the TPF mechanism is used. In TPF, if the number of authentication or association request frames received per second is greater than five, the association requests will be dropped; else, they will be processed. These schemes are validated by Malekzadeh et al. [85]. These are not suitable for a bigenterprise environment, and also the MAC address of every STA is difficult to add, owing to mobility of the STA. We discuss next the solutions that protect not only authentication/association management frames but also deauthentication/disassociation management frames Cryptographic MIC based. The IEEE w [30] standard provides protection against authentication/association requests in existing connection and against deauthentication/disassociation DoS attacks. It includes cryptographic MIC to protect against spoofed requests and spoofed deauthentication/disassociation frames. The cryptographic MIC is calculated using the secret key shared between AP and STA. Only legitimate requests are accepted because of the correct MIC, and spoofed requests are discarded (Figure 10) w has drawbacks [31,32]. First, it can be used only if we are using WPA and WPA2. Second, it does not consider other DoS attacks like EAP spoofing, request flooding, and so on. Third, threats from unmanaged devices like Rogue APs and MAC spoofing of STA and AP are also outside the scope of w. A similar cryptographic MIC-based solution is proposed by Malekzadeh et al. [86] to protect management frames. Because of their similarity, it is not discussed separately. Martinovic et al. [87] also tried to provide the cryptographic protection to management frames. The solution involves early MAC address Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd. 1387

11 On the IEEE i security: a denial-of-service perspective R. Singh and T. P. Sharma Legacy Deauth/Disass. Request MIC Spoofed Deauth/Disass. Request MIC Figure 10. IEEE 80.11w, DoS protection using MIC [30]. binding with the Diffie Hellman key obtained through public key cryptography. The solution has the drawback that an attacker can also evaluate the Diffie Hellman key for crafting a computation DoS attack on AP Authentication before association. Performing 802.1X authentication before association yields the shared key to be used for authentication/ encryption of management frames. He et al. [4] proposed this functionality in their improved i version for overcoming the DoS attacks conducted via management frames. The 802.1X authentication is a complex process, and it involves communication and computation overheads. Performing 802.1X authentication before association will open another avenue of DoS attack as the attacker will intentionally cause failures in 802.1X authentication between STA and AP, leading to unsuccessful associations and hence DoS. Performing it before association will also involve delays in association, which may cause problems in time-critical applications. The proposal of He et al. [4] will be successful when instead of 802.1X authentication, some other lightweight and secure authentication is performed before association. DiscoSec [88] is one such lightweight service pack for patching the WLANs. It provides an authentication mechanism for authenticating the management frames. The AP has a precomputed private key (K AP ) and corresponding public key (PK AP ) pair generated using the elliptic curve (EC) cryptosystem. EC parameters (EC Param ) define an EC over a finite field. AP uses the public key (PK AP ) for its current STA session. AP sends PK AP,EC Param, and association token (AT) to STA in authentication request. AP STA : fpk AP ; EC Param ; ATg STA generates its own key (K STA ) and public key (PK STA ) pair. It then utilizes its key (K STA ) and the extracted public key (PK AP ) of AP for generating the master key (MK) using the EC Diffie Hellman (ECDH) key algorithm. The AT is a random nonce, used along with MK to evaluate the fresh session key SK as MK at the STA ¼ ECDH key generation algorithm fk STA ; PK AP g SK at the STA ¼ SHA 256 fmk; ATg STA now responds to the authentication request by putting PK STA and AT in the response frame for the AP. STA AP : fpk STA ; ATg AP calculates its MK using the ECDH key generation algorithm and SK using MK and selected AT as MK at the AP ¼ ECDH key generation algorithm fpk STA ; K AP g SK at the AP ¼ SHA 256 fmk; ATg To make the scheme resilient against computation and memory DoS attacks, rate limitation of key exchange requests is proposed. AP either broadcasts or sends a pregenerated pool of random numbers (Θ t ) to STA. STA selects one of the numbers (this acts as AT) from the random number set that was received from AP. This AT is then returned back in the response frame to AP. If the number is not used by any other STA, then the key generation proceeds. In this way, the flood of messages causing DoS attacks on AP is restricted. The scheme only reduces the DoS attack effect but does not eliminate it. DiscoSec s association rate control mechanism to counter DoS is not much effective because of lack of authentication. Any STA that is able to generate large fake MAC addresses and that captures a large number of random numbers can block the genuine users. The Detect and Reduce DoS Attack (DRDA) scheme [89] utilizes the DiscoSec concept and provides authentication before association. It is also less complex and less resource consuming compared with the 802.1X authentication. It detects and reduces authentication and association flooding DoS, deauthentication and disassociation flooding DoS, and DoS on AP/AS. It uses AS for DoS protection, and hence, extra message communication between AP and AS under DoS is involved. A cryptographic link layer frame protection using public key cryptography is proposed in [90]. The method provides dummy authentication (one where user authentication is not performed) as a complement to open-system authentication in WLANs. The frames used for dummy authentication can be manipulated and spoofed; even the session keys can be compromised easily. Use of cryptographic operations in the authentication phase and for frame protection involves cost. Lee et al. [91,92] proposed a puzzle-based WLAN authentication solution. Other puzzle-based solutions are also proposed [93,94]. These only help under authentication 1388 Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd.

12 R. Singh and T. P. Sharma On the IEEE i security: a denial-of-service perspective and association floods. Also, these do not provide framelevel authentication and are prone to DoS attacks Random bit authentication of management frames. Random bit authentication methods [95 100] are generally lightweight and hence the most suitable authentication methods against DoS attacks. These provide less security as compared with the existing security of i standard. We categorize these schemes into two categories: 1-bit and 3-bit authentication schemes. The first category of schemes provides 1-bit identity authentication per frame to the authorized communicating party (one with the shared secret key). These schemes enjoy less communication overheads and provide continuous authentication (hence, suitable for mobility scenarios). As only 1 bit is utilized for authentication, the chances of an attacker to guess the authentication bits are quite high (50%). This also makes them vulnerable to DoS attacks. These schemes differ in their authentication bit synchronization methods. The Statistical One bit Lightweight Authentication (SOLA) s synchronization scheme involves incrementing the authentication bit stream of both sender and receiver to the next opposite bit plus 1, in case of nonsynchronization [95,96]. Wang s scheme [97] takes less time to stabilize in case of nonsynchronization as resynchronization is performed only by the sender in its authentication bit stream. This fact may be utilized by the attacker who can modify or replay the receiver s response to confuse the sender. This may lead the sender to resynchronize unnecessarily; in the worst case, the sender may become busy most of the time. The system also does not differentiate between the instances when the system is in nonsynchronization because of packet loss or the attacker utilizing a long authentication stream of 0 s or 1 s. Keeping in view the synchronization issues, Wang et al. [98] later came up with three approaches manipulating the pointer movement in the authentication bit streams. They also found statistically the authenticity of a mobile node. The schemes in [97,98] provide authentication but do not talk about confidentiality (packet encryption), integrity, and key management. The number of synchronization runs in both schemes varies in accordance to the difference of the distance between the communicating parties authentication bit strings. Performance of these schemes decreases with increase in the number of synchronization runs. It is also possible that the authentication bit stream may lose synchronization itself [99]. An enhancement to the Wang scheme is carried out by Ren et al. [99] (second category of schemes). Their scheme decreases the attack probability by utilizing more bits (3 bits) for authentication at the MAC layer. It is compatible with the existing frame structure of WLANs. The scheme only detects the attacks by using a statistical method but does not provide any confidentiality, integrity, and key management. For these issues, it depends upon higher-layer measures (like IPsec at the network layer). Its major drawback is the fact that it does not authenticate the ACK frames. An attacker with false synchronization information (wrong value of counter) in ACK failure can easily fool the sender. The chances that the sender and receiver are nonsynchronized and still the 3-bit authentication (stuffed by the attacker) matches are 8 1 (0.125). Lee et al. [100] also propose a similar random bit authentication. They consider protection only against DoS attacks conducted via management frames. Out of eight spoofed packets, the success rate of an attacker is again 8 1 (0.125). The lightweight random bit authentication schemes discussed raise the issue of authentication bit synchronization, which is important in the WLANs as packets might become lost or tampered frequently. The attacker s chances are also quite high in these schemes as less number of bits are involved in authentication. Most importantly, most of these do not involve encryption or protection of the authentication bit streams or data packets. Thus, none of these schemes provide a secure authentication solution Pseudorandom number authentication. Synchronized pseudorandom number generation [101] is a symmetric key-based authentication protocol that tries to prevent a replay attack and avoids key reuse. Both the sender and the receiver are synchronized and generate their pseudorandom numbers, which are used as authenticator variables. These are also utilized as a unique encryption key for each data frame. The synchronization process is prone to DoS attacks. A sufficient number of authentication errors may result in session termination, reassociation, and re-establishment of the synchronization counters. DoS can even be conducted by changing the counter values such that it becomes different from that of the receiver. Pseudorandom numbers generated in the scheme depends only upon previous pseudorandom numbers. This can compromise the entire sequence generated hence after. A pseudorandom number authentication mechanism proposedbykhanet al. [102] identifies 16 bits in the common 32-bit FCS field of the management and control frames for placing the pseudorandom number for frame authentication. It generates a pseudorandom number by including previous sequence numbers inside the PRF. This ensures that a change in input corresponds to a maximum change in the output value of the pseudorandom number. The scheme is not robust against DoS attacks that are conducted before the PTK generation. It also does not consider DoS attacks within the authentication process itself Central manager approach. The central manager (CM) approach [65,66] uses AS to centrally manage the APs and STAs in order to protect APs from DoS attacks. AP processes the management frames only when instructed by the CM. For this purpose, CM maintains three tables: first, for AP-related information and number of authenticated and unauthenticated clients, second to contain AP s authenticated client s MAC address and log out and login information, and third to contain AP s unauthenticated clients. The DoS attacks Security Comm. Networks 2015; 8: John Wiley & Sons, Ltd. 1389

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Secure Initial Access Authentication in WLAN

Secure Initial Access Authentication in WLAN International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1299-1303 International Research Publications House http://www. irphouse.com Secure Initial

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

WPA-GPG: Wireless authentication using GPG Key

WPA-GPG: Wireless authentication using GPG Key Università degli Studi di Bologna DEIS WPA-GPG: Wireless authentication using GPG Key Gabriele Monti December 9, 2009 DEIS Technical Report no. DEIS-LIA-007-09 LIA Series no. 97 WPA-GPG: Wireless authentication

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer Managing and Securing Computer Networks Guy Leduc Chapter 7: Securing LANs Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2016. (section 8.8) Also

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802. WEP Weakness Csci388 Wireless and Mobile Security Access Control:, EAP, and Xiuzhen Cheng cheng@gwu.edu 1. IV is too short and not protected from reuse 2. The per packet key is constructed from the IV,

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Outline Network Security EECE 412 Link & end-to-end protocols SSL/TLS WPA Copyright 2004 Konstantin Beznosov 2 Networks Link and End-to-End Protocols

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

1 FIVE STAGES OF I.

1 FIVE STAGES OF I. 1 1 FIVE STAGES OF 802.11I. Stage 1. AP and Security Capability Discovery This stage consists of messages numbered (1) to (3). The AP either periodically broadcasts its security capabilities, indicated

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

WPA Passive Dictionary Attack Overview

WPA Passive Dictionary Attack Overview WPA Passive Dictionary Attack Overview TakehiroTakahashi This short paper presents an attack against the Pre-Shared Key version of the WPA encryption platform and argues the need for replacement. What

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

05 - WLAN Encryption and Data Integrity Protocols

05 - WLAN Encryption and Data Integrity Protocols 05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks

More information

IEEE i and wireless security

IEEE i and wireless security Blog IEEE 802.11i and wireless security David Halasz 8/25/2004 10:00 PM EDT 0 comments post a comment Tweet Share 1 2 IEEE's wireless security amendment adds stronger encryption, authentication, and key

More information

Attacks on WLAN Alessandro Redondi

Attacks on WLAN Alessandro Redondi Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Secure Wireless LAN Design and Deployment

Secure Wireless LAN Design and Deployment Secure Wireless LAN Design and Deployment Mark Krischer CTO, Enterprise Networks Asia Pacific, Japan and Greater China Abstract The proliferation of mobile devices and the rise of BYOD has raised the profile

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Physical and Link Layer Attacks

Physical and Link Layer Attacks Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Troubleshooting WLANs (Part 2)

Troubleshooting WLANs (Part 2) SharkFest 17 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 8. November 2017 Breaking News: Including KRACK!!! Rolf Leutert Leutert NetServices Switzerland

More information

Table of Contents 1 WLAN Security Configuration Commands 1-1

Table of Contents 1 WLAN Security Configuration Commands 1-1 Table of Contents 1 WLAN Security Configuration Commands 1-1 authentication-method 1-1 cipher-suite 1-2 gtk-rekey client-offline enable 1-2 gtk-rekey enable 1-3 gtk-rekey method 1-4 ptk-lifetime 1-5 security-ie

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

WLAN Roaming and Fast-Secure Roaming on CUWN

WLAN Roaming and Fast-Secure Roaming on CUWN 802.11 WLAN Roaming and Fast-Secure Roaming on CUWN Contents Introduction Prerequisites Requirements Components Used Background Information Roaming with Higher-Level Security WPA/WPA2-PSK WPA/WPA2-EAP

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview

More information

Wireless KRACK attack client side workaround and detection

Wireless KRACK attack client side workaround and detection Wireless KRACK attack client side workaround and detection Contents Introduction Components used Requirements EAPoL Attack protections Why this works Possible impact How to identify if a client is deleted

More information

Preventing wireless deauthentication attacks over Networks

Preventing wireless deauthentication attacks over Networks Preventing wireless deauthentication attacks over 802.11 Networks Ananay Arora Attribution under NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) ( https://creativecommons.org/licenses/by-nc-sa/4.0/

More information

Denial-of-Service Attacks Against the 4-way Wi-Fi Handshake

Denial-of-Service Attacks Against the 4-way Wi-Fi Handshake Denial-of-Service Attacks Against the 4-way Wi-Fi Handshake ABSTRACT Mathy Vanhoef and Frank Piessens imec-distrinet, KU Leuven firstname.lastname@cs.kuleuven.be Having a secure implementation of the 4-way

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Hooray, w Is Ratified... So, What Does it Mean for Your WLAN?

Hooray, w Is Ratified... So, What Does it Mean for Your WLAN? Global Leader in Wireless Security Hooray, 802.11w Is Ratified... So, What Does it Mean for Your WLAN? A Brief Tutorial on IEEE 802.11w Gopinath K N and Hemant Chaskar AirTight Networks www.airtightnetworks.com

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-2 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-3 EAP over LAN 1-4 EAP over RADIUS 1-5 802.1X Authentication

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Nullcon, 2 March 2018 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that s secure? Seems so! No attacks

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018 KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef @vanhoefm BlueHat IL, 24 January 2018 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned

More information

The security of existing wireless networks

The security of existing wireless networks Security and Cooperation in Wireless Networks Cellular networks o o GSM UMTS WiFi LANs Bluetooth Security in Wireless Networks Wireless networks are more vulnerable to security issues: Broadcast communications

More information

An Integrated Scheme for Intrusion Detection in WLAN +

An Integrated Scheme for Intrusion Detection in WLAN + An Integrated Scheme for Intrusion Detection in WLAN + Dong hil Kim, Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Korea {dpkim, sjkoh, swkim}@cs.knu.ac.kr

More information

Ju-A A Lee and Jae-Hyun Kim

Ju-A A Lee and Jae-Hyun Kim Ju-A A Lee and Jae-Hyun Kim Wireless Information & Network Engineering Research Lab, Korea {gaia, jkim}@ajou.ac.kr Abstract. IEEE 802.11i standard supports a secure access control for wireless LAN and

More information

Wireless Security i. Lars Strand lars (at) unik no June 2004

Wireless Security i. Lars Strand lars (at) unik no June 2004 Wireless Security - 802.11i Lars Strand lars (at) unik no June 2004 802.11 Working Group 11 of IEEE 802 'Task Groups' within the WG enhance portions of the standard: 802.11 1997: The IEEE standard for

More information

Link Security A Tutorial

Link Security A Tutorial Link Security A Tutorial Fortress Technologies, Inc. Slide 1 Five basic security services Data confidentiality Data integrity Access control and access rights Authentication/Roaming Non-repudiation These

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Chaos Communication Congress (CCC), 27 December 2017 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that

More information

Section 4 Cracking Encryption and Authentication

Section 4 Cracking Encryption and Authentication Section 4 Cracking 802.11 Encryption and Authentication In the previous section we showed the vulnerabilities of Open Wireless LANs. In this section we ll show some of the techniques and tools used to

More information

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018 Perry Correll Aerohive, Wi-Fi Alliance member October 2018 1 Value of Wi-F1 The value Wi-Fi provides to the global economy rivals the combined market value of Apple Inc. and Amazon. The fact that Wi-Fi

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Fast and Secure Initial Access Authentication Protocol for Wireless LANs

Fast and Secure Initial Access Authentication Protocol for Wireless LANs American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-03, Issue-08, pp-284-294 www.ajer.org Research Paper Open Access Fast and Secure Initial Access Authentication

More information

A Secure Wireless LAN Access Technique for Home Network

A Secure Wireless LAN Access Technique for Home Network A Secure Wireless LAN Access Technique for Home Network *Ju-A Lee, *Jae-Hyun Kim, **Jun-Hee Park, and **Kyung-Duk Moon *School of Electrical and Computer Engineering Ajou University, Suwon, Korea {gaia,

More information

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) HW/Lab 4: IPSec and Wireless Security CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) This HW/Lab assignment covers Lectures 8 (IPSec) and 10 (Wireless Security). Please review these

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Configuring Management Frame Protection

Configuring Management Frame Protection Information About Management Frame Protection, page 1 Restrictions for Management Frame Protection, page 3 (GUI), page 3 Viewing the Management Frame Protection Settings (GUI), page 3 (CLI), page 4 Viewing

More information

WIDS Technology White Paper

WIDS Technology White Paper Technical white paper WIDS Technology White Paper Table of contents Overview... 2 Background... 2 Functions... 2 Rogue detection implementation... 2 Concepts... 2 Operating mechanism... 2 Operating modes...

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017 Overview 1. Key reinstallation in 4-way handshake 2. Misconceptions and remarks

More information

A Wireless LAN Protocol for Initial Access Authentication

A Wireless LAN Protocol for Initial Access Authentication www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 9 September 2014 Page No. 7992-7999 A Wireless LAN Protocol for Initial Access Authentication Sandhya

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions 4.4 IEEE 802.11 MAC Layer 4.4.1 Introduction 4.4.2 Medium Access Control 4.4.3 MAC Management 4.4.4 Extensions 4.4.3 802.11 - MAC management Synchronization try to find a LAN, try to stay within a LAN

More information

Configuring the Client Adapter through Windows CE.NET

Configuring the Client Adapter through Windows CE.NET APPENDIX E Configuring the Client Adapter through Windows CE.NET This appendix explains how to configure and use the client adapter with Windows CE.NET. The following topics are covered in this appendix:

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #5: Medium Access Control High Throughput, Security Tamer Nadeem Dept. of Computer Science High Throughput Networks (802.11n) Slides adapted from

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Lab Configure Enterprise Security on AP

Lab Configure Enterprise Security on AP Lab 8.5.4.1 Configure Enterprise Security on AP Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will demonstrate an understanding

More information

Table of Contents X Configuration 1-1

Table of Contents X Configuration 1-1 Table of Contents 1 802.1X Configuration 1-1 802.1X Overview 1-1 Architecture of 802.1X 1-1 Authentication Modes of 802.1X 1-2 Basic Concepts of 802.1X 1-2 EAP over LAN 1-3 EAP over RADIUS 1-5 802.1X Authentication

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 802.1x Configuration... 1-1 1.1 802.1x Overview... 1-1 1.1.1 802.1x Standard Overview... 1-1 1.1.2 802.1x System Architecture... 1-1 1.1.3 802.1x Authentication

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

EXAM - PW Certified Wireless Security Professional (CWSP) Buy Full Product.

EXAM - PW Certified Wireless Security Professional (CWSP) Buy Full Product. CWNP EXAM - PW0-204 Certified Wireless Security Professional (CWSP) Buy Full Product http://www.examskey.com/pw0-204.html Examskey CWNP PW0-204 exam demo product is here for you to test the quality of

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake Mathy Vanhoef - @vanhoefm imec-distrinet, KU Leuven Black Hat, 27 July 2017 Introduction More and more Wi-Fi network

More information

Open System - No/Null authentication, anyone is able to join. Performed as a two way handshake.

Open System - No/Null authentication, anyone is able to join. Performed as a two way handshake. Five components of WLAN Security 1. Data Privacy 1. Privacy is important because transmission occurs over the air in freely licensed bands. The Data can be sniffed by anyone within range. 2. Eavesdropping

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018 Improved KRACK Attacks Against WPA2 Implementations Mathy Vanhoef @vanhoefm OPCDE, Dubai, 7 April 2018 Overview Key reinstalls in 4-way handshake New KRACKs Practical impact Lessons learned 2 Overview

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 4.1: Network Security Basics Endadul Hoque Slide Acknowledgment Contents are based on slides from Cristina Nita-Rotaru (Northeastern) 2 Network Security INTRODUCTION 3 What

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information