1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Data security and encryption - Chapter 23: Wireless Network Security

66 34 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 66
Dung lượng 732,32 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The contents of this chapter include all of the following: IEEE 802.11 Wireless LANs, protocol overview and security, Wireless Application Protocol (WAP), protocol overview, Wireless Transport Layer Security (WTLS).

Trang 1

(CSE348)

1

Trang 2

Lecture # 23

Trang 3

 have considered:

 remote user authentication issues

 authentication using symmetric encryption

 the Kerberos trusted key server system

 authentication using asymmetric encryption

3

Trang 4

Chapter 17 – Wireless Network

Security

Trang 6

IEEE 802 Terminology

Access point (AP) Any entity that has station functionality and provides

access to the distribution system via the wireless medium for associated stations

Basic service set

(BSS)

A set of stations controlled by a single coordination function

Coordination function The logical function that determines when a station

operating within a BSS is permitted to transmit and may be able to receive PDUs

unit (MPDU)

The unit of data exchanged between two peer MAC entites using the services of the physical layer MAC service data unit

(MSDU)

Information that is delivered as a unit between MAC users

and physical layer

Trang 7

Wi-Fi Alliance

• 802.11b first broadly accepted standard

• Wireless Ethernet Compatibility Alliance (WECA) industry consortium formed 1999

– to assist interoperability of products

– renamed Wi-Fi (Wireless Fidelity) Alliance

– created a test suite to certify interoperability

– initially for 802.11b, later extended to 802.11g– concerned with a range of WLANs markets, including enterprise, home, and hot spots

7

Trang 8

IEEE 802 Protocol Architecture

Trang 9

Network Components &

Architecture

9

Trang 10

IEEE 802.11 Services

Trang 11

802.11 Wireless LAN Security

• Wireless traffic can be monitored by any radio in range, not physically connected

• Original 802.11 spec had security features

– Wired Equivalent Privacy (WEP) algorithm

– but found this contained major weaknesses

• 802.11i task group developed capabilities to

address WLAN security issues

– Wi-Fi Alliance Wi-Fi Protected Access (WPA)

– final 802.11i Robust Security Network (RSN)

11

Trang 12

802.11i RSN Services and

Protocols

Trang 13

802.11i RSN Cryptographic

Algorithms

13

Trang 14

802.11i Phases of Operation

Trang 15

802.11i Phases of Operation

be broken down into five distinct phases of operation, as shown in Stallings Figure 17.5

server (AS) The five phase are:

• Discovery: An AP uses messages called

Beacons and Probe Responses to advertise its IEEE 802.11i security policy

• The STA uses these to identify an AP for a

WLAN with which it wishes to communicate

15

Trang 16

802.11i Phases of Operation

• The STA associates with the AP, which it

uses to select the cipher suite and

authentication mechanism when the

Beacons and Probe Responses present a

choice

• Authentication: During this phase, the STA

and AS prove their identities to each other

• The AP blocks non-authentication traffic

between the STA and AS until the

authentication transaction is successful

Trang 17

802.11i Phases of Operation

• The AP does not participate in the

authentication transaction other than

forwarding traffic between the STA and AS

• Key generation and distribution: The AP

and the STA perform several operations

that cause cryptographic keys to be

generated and placed on the AP and the

STA

• Frames are exchanged between the AP and

STA only

17

Trang 18

802.11i Phases of Operation

• Protected data transfer: Frames are

exchanged between the STA and the end

station through the AP

• As denoted by the shading and the

encryption module icon, secure data

transfer occurs between the STA and the

AP only; security is not provided end-to-end

• Connection termination: The AP and STA

exchange frames During this phase, the

secure connection is torn down and the

connection is restored to the original state

Trang 20

• We now look in more detail at the RSN

phases of operation, beginning with the

discovery phase

• Which is illustrated in the upper portion of

Stallings Figure 17.6

• The purpose of this phase is for an STA and

an AP to recognize each other, agree on a

set of security capabilities

802.11i Discovery and Authentication Phases

Trang 21

• Establish an association for future

communication using those security

capabilities

• Confidentiality and MPDU integrity protocols

for protecting unicast traffic, Authentication

method, Cryptography key management

approach

• Confidentiality and integrity protocols for

protecting multicast/broadcast traffic are

dictated by the AP

802.11i Discovery and Authentication Phases

21

Trang 22

• Since all STAs in a multicast group must use

the same protocols and ciphers

• The specification of a protocol, along with

the chosen key length (if variable) is know

as a cipher suite

• The options for the confidentiality and

integrity cipher suite are as follows:

802.11i Discovery and Authentication Phases

Trang 23

• WEP, with either a 40-bit or 104-bit key (for

backward compatibility), TKIP, CCMP,

vendor-specific methods

• The options for the authentication and key

management (AKM) suite are: IEEE 802.1X, pre-shared key, vendor-specific methods)

• The discovery phase consists of three

exchanges: Network and security capability

discovery, Open system authentication, and

Association

802.11i Discovery and Authentication Phases

23

Trang 24

• The authentication phase enables mutual

authentication between an STA and an

authentication server (AS) located in the DS

• Authentication is designed to allow only

authorized stations to use the network and

to provide the STA with assurance that it is

communicating with a legitimate network

• The lower part of Figure 17.6 shows the

IEEE 802.11 MPDU exchange for this phase

802.11i Discovery and Authentication Phases

Trang 25

IEEE 802.1X Access Control

Approach

25

Trang 27

802.11i Protected Data Transfer

Phase

• Have two schemes for protecting data

• Temporal Key Integrity Protocol (TKIP)

– s/w changes only to older WEP

– adds 64-bit Michael message integrity code (MIC)

– encrypts MPDU plus MIC value using RC4

• Counter Mode-CBC MAC Protocol (CCMP)

– uses the cipher block chaining message authentication code (CBC-MAC) for integrity

– uses the CRT block cipher mode of operation

27

Trang 28

IEEE 802.11i

Pseudorandom

Function

Trang 29

IEEE 802.11i Pseudorandom

Function

29

• At a number of places in the IEEE 802.11i

scheme, a pseudorandom function (PRF) is used

• For example, it is used to generate nonces, to

expand pairwise keys, and to generate the GTK

• The PRF is built on the use of HMAC-SHA-1 to generate a pseudorandom bit stream

• Recall that HMAC-SHA-1 takes a message

(block of data) and a key of length at least 160 bits and produces a 160-bit hash value

Trang 30

IEEE 802.11i Pseudorandom

Function

30

• SHA-1 has the property that the change of a

single bit of the input produces a new hash value with no apparent connection to the preceding

hash value

• This property is the basis for pseudorandom

number generation

• The IEEE 802.11i PRF takes four parameters

• (a secret key K, an application specific text

string A, some data specific to each case B

and the desired number of pseudorandom

Trang 31

IEEE 802.11i Pseudorandom

• The message input consists of four items

concatenated together: the parameter A, a byte with value 0, the parameter B, and a counter I

Trang 32

IEEE 802.11i Pseudorandom

Function

• The counter is initialized to 0

• The HMAC algorithm is run once, producing a

160-bit hash value

• If more bits are required, HMAC is run again with the same inputs, except that i is incremented

each time, until the necessary number of bits is generated

Trang 33

Wireless Application Protocol

(WAP)

• A universal, open standard developed to provide mobile wireless users access to telephony and information services

• Have significant limitations of devices, networks, displays with wide variations

• WAP specification includes:

– programming model, markup language, small browser, lightweight communications protocol stack,

applications framework

33

Trang 34

WAP Programming Model

Trang 35

WAP Programming Model

35

• The WAP Programming Model is based on

three elements: the client, the gateway, and

the original server, as shown here in Stallings

Figure 17.11

• HTTP is used between the gateway and the

original server to transfer content

• The gateway acts as a proxy server for the

wireless domain

• Its processor(s) provide services that offload

the limited capabilities of the hand-held,

mobile, wireless terminals

Trang 36

WAP Programming Model

36

• For example, the gateway provides DNS services,

converts between WAP protocol stack and the

WWW stack (HTTP and TCP/IP)

• Encodes information from the Web into a more

compact form that minimizes wireless

communication

• And, in the other direction, decodes the

compacted form into standard Web

communication conventions

• Gateway also caches frequently requested

Trang 37

WAP

Infra-structure

37

Trang 38

WAP Infra-structure

38

• Stallings Figure 17.12 illustrates key

components in a WAP environment

• Using WAP, a mobile user can browse Web

content on an ordinary Web server

• The Web server provides content in the form of

HTML-coded pages that are transmitted using the standard Web protocol stack

(HTTP/TCP/IP)

• The HTML content must go through an HTML

filter, which may either be colocated with the

Trang 39

WAP Infra-structure

39

• The filter translates the HTML content into WML

content

• If the filter is separate from the proxy,

HTTP/TCP/IP is used to deliver the WML to the proxy

• The proxy converts the WML to a more

compact form known as binary WML and

delivers it to the mobile user over a wireless

network using the WAP protocol stack

Trang 40

WAP Infra-structure

• If the Web server is capable of directly

generating WML content, then the WML is

delivered using HTTP/TCP/IP to the proxy

• which converts the WML to binary WML and

then delivers it to the mobile node using WAP protocols

Trang 41

Wireless Markup Language

• Describes content and format for data

display on devices with limited bandwidth, screen size, and user input capability

• a card is one or more units of interaction

• a deck is similar to an HTML page 41

Trang 42

WAP Architecture

Trang 43

WAP Architecture

43

• Stallings Figure 17.13 illustrates the overall

stack architecture implemented in a WAP

client

• In essence, this is a five-layer model Each

layer provides a set of functions and/or

services to other services and applications

through a set of well-defined interfaces

• Each of the layers of the architecture is

accessible by the layers above, as well as by other services and applications

Trang 44

WAP Architecture

• Many of the services in the stack may be

provided by more than one protocol

• For example, either HTTP or WSP may

provide the Hypermedia Transfer service

• Common two all five layers are a sets of

services that are accessible by multiple layers

• These common services fall into two

categories: security services and service

discovery

Trang 45

WAP Architecture

45

• The WAP specification includes mechanisms to

provide confidentiality, integrity, authentication, and nonrepudiation

• There is a collection of service discovery

services that enable the WAP client and the

Web server to determine capabilities and

services

• The Wireless Application Environment (WAE)

specifies an application framework for wireless devices such as mobile telephones, pagers, and PDAs

Trang 46

WAP Architecture

• In essence, the WAE consists of tools and

formats that are intended to ease the task of

developing applications and devices supported

by WAP

Trang 47

WAP Protocols

• Wireless Session Protocol (WSP)

– provides applications two session services

– connection-oriented and connectionless

– based on HTTP with optimizations

• Wireless Transaction Protocol (WTP)

– manages transactions of requests / responses between a user agent & an application server– provides an efficient reliable transport service

• Wireless Datagram Protocol (WDP)

– adapts higher-layer WAP protocol to

Trang 48

Wireless Transport Layer

Security (WTLS)

• provides security services between mobile device (client) and WAP gateway

– provides data integrity, privacy,

authentication, denial-of-service protection

• based on TLS

– more efficient with fewer message exchanges– use WTLS between the client and gateway

– use TLS between gateway and target server

• WAP gateway translates WTLS / TLS

Trang 49

– an association between a client and a server

– created by Handshake Protocol

– define set of cryptographic security parameters– shared among multiple connections

49

Trang 50

WTLS Protocol Architecture

Trang 51

WTLS Protocol Architecture

• WTLS is not a single protocol but rather two

layers of protocols, as illustrated in Stallings

Figure 17.15

• The WTLS Record Protocol provides basic

security services to various higher-layer

protocols

• In particular, the Hypertext Transfer Protocol (HTTP)

51

Trang 52

• These WTLS-specific protocols are used in

the management of WTLS exchanges and

are examined next

Trang 53

WTLS Record Protocol

53

Trang 54

WTLS Record Protocol

• The WTLS Record Protocol takes user data

from the next higher layer (WTP, WTLS

handshake protocol, WTLS alert protocol,

WTLS change cipher spec protocol)

• And encapsulates these data in a PDU The

following steps occur (Figure 17.16):

1 The payload is compressed using a

lossless compression algorithm

Trang 55

WTLS Record Protocol

2 A message authentication code (MAC) is

computed over the compressed data, using

HMAC

•One of several hash algorithms can be used

with HMAC, including MD-5 and SHA-1

•The length of the hash code is 0, 5, or 10

bytes

•The MAC is added after the compressed data

55

Trang 56

WTLS Record Protocol

3 The compressed message plus the MAC

code are encrypted using a symmetric

encryption algorithm

•The allowable encryption algorithms are DES, triple DES, RC5, and IDEA

4 The Record Protocol prepends a header to

the encrypted payload

•The Record Protocol header the fields as

shown in Stallings Figure 17.17

Trang 57

WTLS Higher-Layer Protocols

• Change Cipher Spec Protocol

– simplest, to make pending state current

• Alert Protocol

– used to convey WTLS-related alerts to peer

– has severity: warning, critical, or fatal

– and specific alert type

• Handshake Protocol

– allow server & client to mutually authenticate – negotiate encryption & MAC algs & keys

57

Trang 58

Handshake

Protocol

Trang 59

Cryptographic Algorithms

• WTLS authentication

– uses certificates

• X.509v3, X9.68 and WTLS (optimized for size)

– can occur between client and server or client may only authenticates server

• WTLS key exchange

– generates a mutually shared pre-master key– optional use server_key_exchange message

• for DH_anon, ECDH_anon, RSA_anon

• not needed for ECDH_ECDSA or RSA

59

Trang 60

Cryptographic Algorithms cont

• Pseudorandom Function (PRF)

– HMAC based, used for a number of purposes– only one hash alg, agreed during handshake

• Master Key Generation

– of shared master secret

– master_secret = PRF( pre_master_secret, "master secret”,

ClientHello.random || ServerHello.random )

– then derive MAC and encryption keys

• Encryption with RC5, DES, 3DES, IDEA

Trang 61

WAP End-to-End Security

• Have security gap end-to-end

– at gateway between WTLS & TLS domains

61

Trang 62

WAP End-to-End Security

• The basic WAP transmission model, involving

a WAP client, a WAP gateway, and a Web

server, results in a security gap

• As illustrated in Stallings Figure 17.19 The

mobile device establishes a secure WTLS

session with the WAP gateway

• The WAP gateway, in turn, establishes a

secure SSL or TLS session with the Web

server

Trang 63

WAP End-to-End Security

• Within the gateway, data are not encrypted

during the translation process

• The gateway is thus a point at which the data may be compromised

• There are a number of approaches to providing end-to-end security between the mobile client and the Web server

63

Ngày đăng: 20/09/2020, 14:03

TỪ KHÓA LIÊN QUAN