The contents of this chapter include all of the following: IEEE 802.11 Wireless LANs, protocol overview and security, Wireless Application Protocol (WAP), protocol overview, Wireless Transport Layer Security (WTLS).
Trang 1(CSE348)
1
Trang 2Lecture # 23
Trang 3 have considered:
remote user authentication issues
authentication using symmetric encryption
the Kerberos trusted key server system
authentication using asymmetric encryption
3
Trang 4Chapter 17 – Wireless Network
Security
Trang 6IEEE 802 Terminology
Access point (AP) Any entity that has station functionality and provides
access to the distribution system via the wireless medium for associated stations
Basic service set
(BSS)
A set of stations controlled by a single coordination function
Coordination function The logical function that determines when a station
operating within a BSS is permitted to transmit and may be able to receive PDUs
unit (MPDU)
The unit of data exchanged between two peer MAC entites using the services of the physical layer MAC service data unit
(MSDU)
Information that is delivered as a unit between MAC users
and physical layer
Trang 7Wi-Fi Alliance
• 802.11b first broadly accepted standard
• Wireless Ethernet Compatibility Alliance (WECA) industry consortium formed 1999
– to assist interoperability of products
– renamed Wi-Fi (Wireless Fidelity) Alliance
– created a test suite to certify interoperability
– initially for 802.11b, later extended to 802.11g– concerned with a range of WLANs markets, including enterprise, home, and hot spots
7
Trang 8IEEE 802 Protocol Architecture
Trang 9Network Components &
Architecture
9
Trang 10IEEE 802.11 Services
Trang 11802.11 Wireless LAN Security
• Wireless traffic can be monitored by any radio in range, not physically connected
• Original 802.11 spec had security features
– Wired Equivalent Privacy (WEP) algorithm
– but found this contained major weaknesses
• 802.11i task group developed capabilities to
address WLAN security issues
– Wi-Fi Alliance Wi-Fi Protected Access (WPA)
– final 802.11i Robust Security Network (RSN)
11
Trang 12802.11i RSN Services and
Protocols
Trang 13802.11i RSN Cryptographic
Algorithms
13
Trang 14802.11i Phases of Operation
Trang 15802.11i Phases of Operation
be broken down into five distinct phases of operation, as shown in Stallings Figure 17.5
server (AS) The five phase are:
• Discovery: An AP uses messages called
Beacons and Probe Responses to advertise its IEEE 802.11i security policy
• The STA uses these to identify an AP for a
WLAN with which it wishes to communicate
15
Trang 16802.11i Phases of Operation
• The STA associates with the AP, which it
uses to select the cipher suite and
authentication mechanism when the
Beacons and Probe Responses present a
choice
• Authentication: During this phase, the STA
and AS prove their identities to each other
• The AP blocks non-authentication traffic
between the STA and AS until the
authentication transaction is successful
Trang 17802.11i Phases of Operation
• The AP does not participate in the
authentication transaction other than
forwarding traffic between the STA and AS
• Key generation and distribution: The AP
and the STA perform several operations
that cause cryptographic keys to be
generated and placed on the AP and the
STA
• Frames are exchanged between the AP and
STA only
17
Trang 18802.11i Phases of Operation
• Protected data transfer: Frames are
exchanged between the STA and the end
station through the AP
• As denoted by the shading and the
encryption module icon, secure data
transfer occurs between the STA and the
AP only; security is not provided end-to-end
• Connection termination: The AP and STA
exchange frames During this phase, the
secure connection is torn down and the
connection is restored to the original state
Trang 20• We now look in more detail at the RSN
phases of operation, beginning with the
discovery phase
• Which is illustrated in the upper portion of
Stallings Figure 17.6
• The purpose of this phase is for an STA and
an AP to recognize each other, agree on a
set of security capabilities
802.11i Discovery and Authentication Phases
Trang 21• Establish an association for future
communication using those security
capabilities
• Confidentiality and MPDU integrity protocols
for protecting unicast traffic, Authentication
method, Cryptography key management
approach
• Confidentiality and integrity protocols for
protecting multicast/broadcast traffic are
dictated by the AP
802.11i Discovery and Authentication Phases
21
Trang 22• Since all STAs in a multicast group must use
the same protocols and ciphers
• The specification of a protocol, along with
the chosen key length (if variable) is know
as a cipher suite
• The options for the confidentiality and
integrity cipher suite are as follows:
802.11i Discovery and Authentication Phases
Trang 23• WEP, with either a 40-bit or 104-bit key (for
backward compatibility), TKIP, CCMP,
vendor-specific methods
• The options for the authentication and key
management (AKM) suite are: IEEE 802.1X, pre-shared key, vendor-specific methods)
• The discovery phase consists of three
exchanges: Network and security capability
discovery, Open system authentication, and
Association
802.11i Discovery and Authentication Phases
23
Trang 24• The authentication phase enables mutual
authentication between an STA and an
authentication server (AS) located in the DS
• Authentication is designed to allow only
authorized stations to use the network and
to provide the STA with assurance that it is
communicating with a legitimate network
• The lower part of Figure 17.6 shows the
IEEE 802.11 MPDU exchange for this phase
802.11i Discovery and Authentication Phases
Trang 25IEEE 802.1X Access Control
Approach
25
Trang 27802.11i Protected Data Transfer
Phase
• Have two schemes for protecting data
• Temporal Key Integrity Protocol (TKIP)
– s/w changes only to older WEP
– adds 64-bit Michael message integrity code (MIC)
– encrypts MPDU plus MIC value using RC4
• Counter Mode-CBC MAC Protocol (CCMP)
– uses the cipher block chaining message authentication code (CBC-MAC) for integrity
– uses the CRT block cipher mode of operation
27
Trang 28IEEE 802.11i
Pseudorandom
Function
Trang 29IEEE 802.11i Pseudorandom
Function
29
• At a number of places in the IEEE 802.11i
scheme, a pseudorandom function (PRF) is used
• For example, it is used to generate nonces, to
expand pairwise keys, and to generate the GTK
• The PRF is built on the use of HMAC-SHA-1 to generate a pseudorandom bit stream
• Recall that HMAC-SHA-1 takes a message
(block of data) and a key of length at least 160 bits and produces a 160-bit hash value
Trang 30IEEE 802.11i Pseudorandom
Function
30
• SHA-1 has the property that the change of a
single bit of the input produces a new hash value with no apparent connection to the preceding
hash value
• This property is the basis for pseudorandom
number generation
• The IEEE 802.11i PRF takes four parameters
• (a secret key K, an application specific text
string A, some data specific to each case B
and the desired number of pseudorandom
Trang 31IEEE 802.11i Pseudorandom
• The message input consists of four items
concatenated together: the parameter A, a byte with value 0, the parameter B, and a counter I
Trang 32IEEE 802.11i Pseudorandom
Function
• The counter is initialized to 0
• The HMAC algorithm is run once, producing a
160-bit hash value
• If more bits are required, HMAC is run again with the same inputs, except that i is incremented
each time, until the necessary number of bits is generated
Trang 33Wireless Application Protocol
(WAP)
• A universal, open standard developed to provide mobile wireless users access to telephony and information services
• Have significant limitations of devices, networks, displays with wide variations
• WAP specification includes:
– programming model, markup language, small browser, lightweight communications protocol stack,
applications framework
33
Trang 34WAP Programming Model
Trang 35WAP Programming Model
35
• The WAP Programming Model is based on
three elements: the client, the gateway, and
the original server, as shown here in Stallings
Figure 17.11
• HTTP is used between the gateway and the
original server to transfer content
• The gateway acts as a proxy server for the
wireless domain
• Its processor(s) provide services that offload
the limited capabilities of the hand-held,
mobile, wireless terminals
Trang 36WAP Programming Model
36
• For example, the gateway provides DNS services,
converts between WAP protocol stack and the
WWW stack (HTTP and TCP/IP)
• Encodes information from the Web into a more
compact form that minimizes wireless
communication
• And, in the other direction, decodes the
compacted form into standard Web
communication conventions
• Gateway also caches frequently requested
Trang 37WAP
Infra-structure
37
Trang 38WAP Infra-structure
38
• Stallings Figure 17.12 illustrates key
components in a WAP environment
• Using WAP, a mobile user can browse Web
content on an ordinary Web server
• The Web server provides content in the form of
HTML-coded pages that are transmitted using the standard Web protocol stack
(HTTP/TCP/IP)
• The HTML content must go through an HTML
filter, which may either be colocated with the
Trang 39WAP Infra-structure
39
• The filter translates the HTML content into WML
content
• If the filter is separate from the proxy,
HTTP/TCP/IP is used to deliver the WML to the proxy
• The proxy converts the WML to a more
compact form known as binary WML and
delivers it to the mobile user over a wireless
network using the WAP protocol stack
Trang 40WAP Infra-structure
• If the Web server is capable of directly
generating WML content, then the WML is
delivered using HTTP/TCP/IP to the proxy
• which converts the WML to binary WML and
then delivers it to the mobile node using WAP protocols
Trang 41Wireless Markup Language
• Describes content and format for data
display on devices with limited bandwidth, screen size, and user input capability
• a card is one or more units of interaction
• a deck is similar to an HTML page 41
Trang 42WAP Architecture
Trang 43WAP Architecture
43
• Stallings Figure 17.13 illustrates the overall
stack architecture implemented in a WAP
client
• In essence, this is a five-layer model Each
layer provides a set of functions and/or
services to other services and applications
through a set of well-defined interfaces
• Each of the layers of the architecture is
accessible by the layers above, as well as by other services and applications
Trang 44WAP Architecture
• Many of the services in the stack may be
provided by more than one protocol
• For example, either HTTP or WSP may
provide the Hypermedia Transfer service
• Common two all five layers are a sets of
services that are accessible by multiple layers
• These common services fall into two
categories: security services and service
discovery
Trang 45WAP Architecture
45
• The WAP specification includes mechanisms to
provide confidentiality, integrity, authentication, and nonrepudiation
• There is a collection of service discovery
services that enable the WAP client and the
Web server to determine capabilities and
services
• The Wireless Application Environment (WAE)
specifies an application framework for wireless devices such as mobile telephones, pagers, and PDAs
Trang 46WAP Architecture
• In essence, the WAE consists of tools and
formats that are intended to ease the task of
developing applications and devices supported
by WAP
Trang 47WAP Protocols
• Wireless Session Protocol (WSP)
– provides applications two session services
– connection-oriented and connectionless
– based on HTTP with optimizations
• Wireless Transaction Protocol (WTP)
– manages transactions of requests / responses between a user agent & an application server– provides an efficient reliable transport service
• Wireless Datagram Protocol (WDP)
– adapts higher-layer WAP protocol to
Trang 48Wireless Transport Layer
Security (WTLS)
• provides security services between mobile device (client) and WAP gateway
– provides data integrity, privacy,
authentication, denial-of-service protection
• based on TLS
– more efficient with fewer message exchanges– use WTLS between the client and gateway
– use TLS between gateway and target server
• WAP gateway translates WTLS / TLS
Trang 49– an association between a client and a server
– created by Handshake Protocol
– define set of cryptographic security parameters– shared among multiple connections
49
Trang 50WTLS Protocol Architecture
Trang 51WTLS Protocol Architecture
• WTLS is not a single protocol but rather two
layers of protocols, as illustrated in Stallings
Figure 17.15
• The WTLS Record Protocol provides basic
security services to various higher-layer
protocols
• In particular, the Hypertext Transfer Protocol (HTTP)
51
Trang 52• These WTLS-specific protocols are used in
the management of WTLS exchanges and
are examined next
Trang 53WTLS Record Protocol
53
Trang 54WTLS Record Protocol
• The WTLS Record Protocol takes user data
from the next higher layer (WTP, WTLS
handshake protocol, WTLS alert protocol,
WTLS change cipher spec protocol)
• And encapsulates these data in a PDU The
following steps occur (Figure 17.16):
1 The payload is compressed using a
lossless compression algorithm
Trang 55WTLS Record Protocol
2 A message authentication code (MAC) is
computed over the compressed data, using
HMAC
•One of several hash algorithms can be used
with HMAC, including MD-5 and SHA-1
•The length of the hash code is 0, 5, or 10
bytes
•The MAC is added after the compressed data
55
Trang 56WTLS Record Protocol
3 The compressed message plus the MAC
code are encrypted using a symmetric
encryption algorithm
•The allowable encryption algorithms are DES, triple DES, RC5, and IDEA
4 The Record Protocol prepends a header to
the encrypted payload
•The Record Protocol header the fields as
shown in Stallings Figure 17.17
Trang 57WTLS Higher-Layer Protocols
• Change Cipher Spec Protocol
– simplest, to make pending state current
• Alert Protocol
– used to convey WTLS-related alerts to peer
– has severity: warning, critical, or fatal
– and specific alert type
• Handshake Protocol
– allow server & client to mutually authenticate – negotiate encryption & MAC algs & keys
57
Trang 58Handshake
Protocol
Trang 59Cryptographic Algorithms
• WTLS authentication
– uses certificates
• X.509v3, X9.68 and WTLS (optimized for size)
– can occur between client and server or client may only authenticates server
• WTLS key exchange
– generates a mutually shared pre-master key– optional use server_key_exchange message
• for DH_anon, ECDH_anon, RSA_anon
• not needed for ECDH_ECDSA or RSA
59
Trang 60Cryptographic Algorithms cont
• Pseudorandom Function (PRF)
– HMAC based, used for a number of purposes– only one hash alg, agreed during handshake
• Master Key Generation
– of shared master secret
– master_secret = PRF( pre_master_secret, "master secret”,
ClientHello.random || ServerHello.random )
– then derive MAC and encryption keys
• Encryption with RC5, DES, 3DES, IDEA
Trang 61WAP End-to-End Security
• Have security gap end-to-end
– at gateway between WTLS & TLS domains
61
Trang 62WAP End-to-End Security
• The basic WAP transmission model, involving
a WAP client, a WAP gateway, and a Web
server, results in a security gap
• As illustrated in Stallings Figure 17.19 The
mobile device establishes a secure WTLS
session with the WAP gateway
• The WAP gateway, in turn, establishes a
secure SSL or TLS session with the Web
server
Trang 63WAP End-to-End Security
• Within the gateway, data are not encrypted
during the translation process
• The gateway is thus a point at which the data may be compromised
• There are a number of approaches to providing end-to-end security between the mobile client and the Web server
63