The Security Mechanism for IEEE Wireless Networks

Similar documents
Interested in learning more about security? SANS Windows Security Training. Copyright SANS Institute Author Retains Full Rights

Understanding and Implementing Microsoft Terminal Services & Citrix MetaFrame

Interested in learning more about security? The OSI Model: An Overview. Copyright SANS Institute Author Retains Full Rights

Implementing a Successful Security Assessment Process

AS/400 & iseries: A Comprehensive Guide to Setting System Values to Common Best Practice Securit

Interested in learning more about security? The Achilles Heal of DNS. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about security? Securing e-commerce Web Sites. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Six Ways to Reduce PCI DSS Audit Scope by Tokenizing Cardholder data

Interested in learning more about cyber security training? SANS Windows Security Training. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Intrusion Detection Systems: An Overview of RealSecure

Implementing a Successful Security Assessment Process

Wireless LAN Security (RM12/2002)

Wireless technology Principles of Security

Easy Steps to Cisco Extended Access List

Wireless Attacks and Countermeasures

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

Interested in learning more about cyber security training? Securing e-commerce Web Sites. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more about cyber security training? The OSI Model: An Overview. Copyright SANS Institute Author Retains Full Rights

Windows XP and Full Raw Sockets: A New Security Concern from Home-based PC's or a Desirable N

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Interested in learning more about cyber security training? Cisco Way. Copyright SANS Institute Author Retains Full Rights

The GSM Standard (An overview of its security)

The GSM Standard (An overview of its security)

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Chapter 5 Local Area Networks. Computer Concepts 2013

5 Tips to Fortify your Wireless Network

Wireless Router at Home

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Interested in learning more about cyber security training? The Achilles Heal of DNS. Copyright SANS Institute Author Retains Full Rights

Application of Neural Networks to Intrusion Detection

Interested in learning more about security? MP3Stego: Hiding Text in MP3 Files. Copyright SANS Institute Author Retains Full Rights

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Interested in learning more about cyber security training? Hisecweb.inf - An Analysis. Copyright SANS Institute Author Retains Full Rights

BS ISO IEC SANS Checklist

Securing Wireless Networks by By Joe Klemencic Mon. Apr

A Division of Cisco Systems, Inc. Wireless-B b. User Guide. USB Network Adapter WIRELESS WUSB11 (UK/EU/LA) Model No.

Wireless Technologies

Wireless# Guide to Wireless Communications. Objectives

How Insecure is Wireless LAN?

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions

Security SSID Selection: Broadcast SSID:

Technical Aspect of Implementing/Upgrading SAP Security 4.6

Easy Steps to Cisco Extended Access List

Wireless-G. User Guide. Portable USB Adapter. GHz g WUSB54GP. A Division of Cisco Systems, Inc. WIRELESS. Model No.

D-Link AirPlus G DI-524

54M Wireless LAN CardBus Card

1. INTRODUCTION. Wi-Fi 1

Wireless Networking Basics. Ed Crowley

COPYRIGHTED MATERIAL. Index

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Wireless LAN, WLAN Security, and VPN

Wireless Network Security

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Digital Entertainment. Networking Made Easy

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Security Security problems in Wireless Networks

AS/400 & iseries: A Comprehensive Guide to Setting System Values to Common Best Practice Securit

Interested in learning more about cyber security training? Network Monitoring with Nagios. Copyright SANS Institute Author Retains Full Rights

Intrusion Detection Systems: An Overview of RealSecure

Appendix E Wireless Networking Basics

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

USB Wireless Network Adapter User s Manual

Easy Steps to Cisco Extended Access List

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

11N Wireless PCI Adapter User Guide -6-

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

BreezeACCESS VL Security

CSCD 433/533 Advanced Networking

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS. Model No.


U S E R M A N U A L b/g PC CARD

Integrate HMAC Capable Token into User Authentication Mechanism and Public Key Infrastructure

KNX Secure. KNX Position Paper on Data Security and Privacy

54M Wireless LAN Module User s Manual

A Division of Cisco Systems, Inc. GHz g a. Dual-Band. Wireless A+G. User Guide. Notebook Adapter WIRELESS WPC55AG. Model No.

Basic Self-assessment: Go Hack Yourself

Clean wireless. High-performance clean wireless solutions

Overview of Security

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1.

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

Chapter 1 Introduction

IP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask

EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009

Transcription:

Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The Security Mechanism for IEEE 802.11 Wireless Networks This paper provides an introduction to Wireless Local Area Networks (WLAN), and the methods employed to secure access using the IEEE 802.11 architecture. The vulnerability of IEEE 802.11 technology is disconcerting, although effective security mechanism can be implemented to secure a wireless network. In the future wireless connections will befall a standard on laptops, PDA's and other wireless devices so we need to secure all client and access points to mitigate threats. Copyright SANS Institute Author Retains Full Rights AD

The Security Mechanism for IEEE 802.11 Wireless Networks Alicia Laing November 24, 2001 Version 1.2f Introduction: This paper explains the introduction to Wireless Local Area Networks (WLAN), and the methods employed to secure access using the IEEE 802.11 architecture. Overview: What is Wireless Local Area Network (WLAN) technology? Wireless Networks is a data communication system that uses shared radio waves or infrared light to transmit and receive data without wired cables. Wireless LAN gives great flexibility and freedom to connect to the network or Internet without being physically connected with a cable or modem. With the added functionality of a wireless network, you can replace or extend a wired infrastructure. Data is transmitted or received via air, walls, ceilings, and even cement structures throughout or between buildings. With the absence of wires, wireless networks reduce the network deployment cost and alleviate some hard-wired problems. Access to the internet and even corporate sites could be made available through public wireless hot spots. [1] Traveling to various places where there is a wireless network can provide the user with access to the Internet by using that location s access point. The Institute of Electrical and Electronics Engineers (IEEE) created the 802.11 standard for wireless LANs to ensure product compatibility and reliability. Wireless LAN s operate at high speeds access, and provide 2.4 GHz band, and data rates up to 11 Mbps. The IEEE 802.11 standard has evolved in the world of Wireless LANs. The 802.11 standard focuses on the bottom two levels of the ISO/OSI model, the physical layer and data link layer. [2] The 802.11b specification affects only the physical layer, adding higher data rates and more robust connectivity. [4] See figure 1, which depicts the level where 802.11, is located. 1

de Figure 1 There are two types of transmission that are included in the IEEE 802.11 standard: Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS). Spread spectrum enables a stronger signal than a narrowband signal, which is harder for the receiver to detect. Spread spectrum s increased reliability, boost throughput and allows many unrelated products to share the spectrum with minimal interference. FHSS transmission signals hops from one frequency to another at a rate known only to the transmitter and receiver. With DSSS, a redundant chipping code is sent with each signal burst and only the transmitter and receiver can decode the chipping sequence. [2] The evolution of the IEEE 802.11b high rate standard, provide for a full Ethernet like data rate of 11 Mbps over DSSS. Because FHSS cannot support such high speeds without violating current FCC regulation, DSSS has become the predominant WLAN standard. WLANS can be configured using two topological ways: Peerto-Peer or Adhoc mode and Client/Server or infrastructure networking. Peer-to-Peer topology consists of two or more PC s equipped with wireless network interface cards but with no connection to a wired network. Wireless devices have no access point connection, and each device communicate with each other directly. See figure 2. 2

Figure 2 Client/Server wireless technology extends an existing wired LAN to wireless devices by adding an access point. The access point is a bridge between a wired LAN and a wireless LAN and is the central controller for the wireless network. Through an Ethernet cable that is connected to a wired backbone, antenna s mounted on the access point allows devices to communicate with each other. Multiple PC s link to the access point that acts as a bridge to the resources that connects to the wired network. All network traffic from the wireless stations on the network goes through an access point to reach it s destination in either a wired or a wireless LAN or WAN. See figure 3. Figure 3 3

Wireless LAN Obstacles As the popularity of wireless LAN increases, security, roaming and configuration has become a great challenge. Data can be subject to eaves dropping via radio frequency if its not encrypted. Similar to a wired network, wireless networks must have reliability and security features when connecting to a wired LAN. Wireless traffic is transmitted in the clear over a shared medium. Since the data is traveling through the air or radio waves, the network is now accessible both inside and, outside of the building. The proper security procedures must be implemented to Key prevent fingerprint potential = AF19 FA27 data 2F94 theft. 998D FDB5 DE3D F8B5 06E4 A169 4E46 The basic methods to secure access to an Access Point that is built on IEEE 802.11 networks are: - Configure IEEE 802.11 access points with a service set identifier (SSID) - Wired Equivalent Privacy (WEP) algorithm - MAC Address filtering - Setup Virtual Private Networking (VPN) across radio frequency LAN Deploying all four of these access control methods provide a more robust solution for the IEEE 802.11 architecture. SSID SSID is an identification value programmed in the access point or group of access points to identify which subnet you exist on. This segmentation of the wireless network in multiple networks is a form of an authentication check. If a wireless station does not know the value, access is denied to the associated access point. When a client computer is connected to the access point, the SSID acts as a simple password thus providing a measure of security. SSID security alone is very weak because the value is known by all network cards and access points, and is easily accessibly through air and radio waves, since no encryption is provided. The access point is configured to broadcast its SSID. When enabled, any client without SSID is able to receive it and have access to the access point. Users are Key also fingerprint able to = AF19 configure FA27 2F94 their 998D FDB5 own DE3D client F8B5 systems 06E4 A169 with 4E46 the appropriate SSID, because they are widely known and easily shared. [3] 4

WEP Algorithm WEP security protocol is intended to protect against eavesdropping and physical security attributes, which is equivalent to security of a wired network. WEP is the encryption standard specified by IEEE802.11 architecture. WEP encrypts a data frame and its content to protect authorized users on a WLAN. WEP uses a 40-bit secret key for authentication and encryption, and other IEEE 802.11 allows 104-bit secret key encryption. The encryption key is concatenated with a 24-bit initialization vector, resulting in a 64- or 128- bit key. [3] When encryption is Key enabled, fingerprint the = AF19 access FA27 point 2F94 998D issues FDB5 DE3D an encrypted F8B5 06E4 A169 challenge 4E46 packet to any client attempting to connect to the access point. Then the client uses it s key to encrypt the correct response in order to authenticate it-self and gain network access. [4] The client computer and the access point use the same key to encrypt and decrypt data. All WEP key on a wireless LAN must be managed manually, because there are no key management protocols specified for distribution. WEP security protocols can only be implemented on a client/server wireless LAN with an access point, it cannot be utilize on a Peer-to-Peer. WEP encryption has weaknesses, which are vulnerable to attacks. WEP keys are static for encryption and authentication, making WEP susceptible to password replay attacks, traffic injection, and statistical attacks. Changing the WEP key regularly will reduce the security risk of unwanted visitors. Hackers would exploit the weakness by intercepting traffic, flipping bits and injecting modified packets into the network. Researchers at the University of California Berkeley; discovered security flaws in WEP. These include misapplication of cryptographic primitives, that it permits eavesdropping and tampering with wireless transmission. There are three main security goals of the WEP protocol: confidentiality, access control and data integrity. There analysis is beyond the scope of this paper; access the link to get more detailed information http://www.isaac.cs.berkeley.edu/isaac/wep-draft.pdf. The researchers argued and proved in a paper that none of these three security goals were achieved. The Advanced encryption standard (AES) might be a replacement encryption for WEP. On a client/server network you need to deploy WEP with SSID for segmentation of the network. 5

MAC Address Filtering Client computers are viewed by a unique MAC address of its IEEE 802.11 network card. To secure an access point using MAC address filtering, each access point must have a list of authorized client MAC address in its access control list. MAC address filtering is time consuming because the list of client MAC address must be manually inputted in each access point. Since the MAC address list must be kept up-to-date it s better suited for a smaller network. In a small network the security solution can be 128-bit WEP in conjunction with MAC address filtering and SSID. VPN High security networks must incorporate a VPN solution with a wireless access. VPN solution is an alternative to the three access control as discussed earlier. VPN provides a secure and dedicated channel over an un-trusted network - in cases of the Internet and wireless solutions. With a VPN solution it consists of a VPN server and a VLAN between the access point and the VPN server. The VPN server, which acts as a gateway to the private network, provides authentication and full encryption over the wireless network. IEEE 802.11 wireless access can be established via a secure VPN connection using various tunneling protocols. VPN is mainly deployed to provide remote users with a secure connection to the network by way of the Internet. VPN is a logical solution for wireless networks because it provides access control where-by no unauthorized routes to the outside Internet exists from the wireless network. This protects the network from unauthorized users using costly Internet bandwidth. Deploying VPN technology on an enterprise network has its advantages of low administration for the client and the access point, and authentication has to be established before traffic to the internal network is acknowledged. Security Trends For WLAN In a wireless network an enterprise need to deploy several layers of defense across the network to prevent threats. A good wireless network design should consist of firewalls, 6

intrusion detection systems and segmentation of the network. My proposed solution is to put the access point in it's own DMZ, insuring that everything goes through the firewall. VPN technology should be incorporated from the client straight to the access point. The client computers should be equipped with a personal firewall or an intrusion detection system. The intrusion detection system should be between the access point and the firewall to deny any unauthorized connection. To reduce the unauthorized access to system and other resources, change the administrative password that is preset on the access point, change the default SSID value and disable SSID broadcasting and enable Key encryption fingerprint = and AF19 avoid FA27 2F94 installing 998D FDB5 access DE3D F8B5 point 06E4 near A169 4E46 external walls or windows where signals might be intercepted. Conclusion The vulnerability of IEEE 802.11 technology is disconcerting, although effective security mechanism can be implemented to secure a wireless network. In the future wireless connections will befall a standard on laptops, PDA's and other wireless devices so we need to secure all client and access point to mitigate threats. References: 1) Fout, Tom. Wireless LAN Technologies and Windows XP. July 2001. URL: http://www.microsoft.com/technet/treeview/default.asp? url=/technet/prodtechnol/winxppro/evaluate/wrlsxp.asp 2) Intel Corporation. IEEE 802.11b High Rate Wireless Local Area Networks. June 2000. URL: http://www.intel.com/network/documents/pdf/wireless_la n.pdf 3) Dell Corporation. 802.11 Wireless Security in Business Networks. September 2001. URL: http://www.dell.com/us/en/biz/topics/vectors_2001- wireless_security.htm 4) 3COM Corporation. What is 802.11 & 802.11B? April 2001. URL: http://www.pulsewan.com/data101/802_11_b_basics.htm 5) Borisov, Nikita, Goldberg, Ian, Wagner, David; Intercepting Mobile Communications: The Insecurity of 802.11. August 2001. URL: http://www.isaac.cs.berkeley.edu/isaac/wep-draft.pdf 7

6) Meredith, Gail. Securing the Wireless LAN. July 2001. URL: http://www.cisco.com/warp/public/784/packet/jul01/p74- cover.html 7) Geier, Jim. Wireless LANs, Second Edition. Indianapolis, Indiana: SAMS, July 2001 8

Last Updated: December 9th, 2017 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS Bangalore 2017 Bangalore, IN Dec 11, 2017 - Dec 16, 2017 Live Event SANS Cyber Defense Initiative 2017 Washington, DCUS Dec 12, 2017 - Dec 19, 2017 Live Event SANS SEC460: Enterprise Threat Beta San Diego, CAUS Jan 08, 2018 - Jan 13, 2018 Live Event SANS Security East 2018 New Orleans, LAUS Jan 08, 2018 - Jan 13, 2018 Live Event Northern VA Winter - Reston 2018 Reston, VAUS Jan 15, 2018 - Jan 20, 2018 Live Event SANS Amsterdam January 2018 Amsterdam, NL Jan 15, 2018 - Jan 20, 2018 Live Event SEC599: Defeat Advanced Adversaries San Francisco, CAUS Jan 15, 2018 - Jan 20, 2018 Live Event SANS Dubai 2018 Dubai, AE Jan 27, 2018 - Feb 01, 2018 Live Event SANS Las Vegas 2018 Las Vegas, NVUS Jan 28, 2018 - Feb 02, 2018 Live Event SANS Miami 2018 Miami, FLUS Jan 29, 2018 - Feb 03, 2018 Live Event Cyber Threat Intelligence Summit & Training 2018 Bethesda, MDUS Jan 29, 2018 - Feb 05, 2018 Live Event SANS Scottsdale 2018 Scottsdale, AZUS Feb 05, 2018 - Feb 10, 2018 Live Event SANS London February 2018 London, GB Feb 05, 2018 - Feb 10, 2018 Live Event SANS Southern California- Anaheim 2018 Anaheim, CAUS Feb 12, 2018 - Feb 17, 2018 Live Event SANS Secure India 2018 Bangalore, IN Feb 12, 2018 - Feb 17, 2018 Live Event SANS Dallas 2018 Dallas, TXUS Feb 19, 2018 - Feb 24, 2018 Live Event Cloud Security Summit & Training 2018 San Diego, CAUS Feb 19, 2018 - Feb 26, 2018 Live Event SANS Brussels February 2018 Brussels, BE Feb 19, 2018 - Feb 24, 2018 Live Event SANS Secure Japan 2018 Tokyo, JP Feb 19, 2018 - Mar 03, 2018 Live Event SANS New York City Winter 2018 New York, NYUS Feb 26, 2018 - Mar 03, 2018 Live Event CyberThreat Summit 2018 London, GB Feb 27, 2018 - Feb 28, 2018 Live Event SANS London March 2018 London, GB Mar 05, 2018 - Mar 10, 2018 Live Event SANS Frankfurt 2017 OnlineDE Dec 11, 2017 - Dec 16, 2017 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced