NSC Topic 12 Wireless Security
NSC Topic 12 Wireless Security
Topic 12:
Wireless Security
Topic 12 – Lecture 1:
Introduction to Wireless Security & WEP
Learning Outcomes
By the end of this topic students will be able to:
• Explain the vulnerabilities inherent in wireless
networks
• Deploy a secure network architecture for wireless
access
• Configure Access Control Lists
• Encrypt and protect the wireless link
Wireless Networks
• A wireless network typically has a number of
wireless-enabled devices connecting to an access
point
• Each access point connects to a wider network
- In a home wireless network this wider network may
be the Internet
- In a business network this wider network is typically
a LAN
• Wireless networks are less secure than wired
WLAN
10
11
WEP Encryption
• Uses the RC4 stream cipher for confidentiality
• Uses the CRC-32 checksum for integrity
• Secret keys can be 64 or 128 bits long
- Some vendors do supply 256-bit key version
• Can hold up to four shared secret keys
- One key is designated as the default key
• Key size is one of the security limitations in WEP
12
13
14
15
16
WEP Weaknesses
• The 24-bit IV is too short and repeats after some
time
- there is a 50% probability the same IV will repeat
after 5000 packets
17
Topic 12 – Lecture 2:
WPA, WPA2, WPA3 and Wireless
Architecture
18
19
WPA3
• 4 added features for WPA3:
• Privacy on public Wi-Fi network – WPA3 uses individualise data encryption
when user device connect to open Wi-Fi network
• Protection against Brute-Force attack – WPA3 uses new handshake that
have robust password protection
• Easy connectivity to devices without display – WPA3 simplifies the
configuration process to Wi-Fi network for the devices with limited or no
display interface e.g.: Google Home, Amazon Echo, smart outlets and light
bulbs
• Higher security for government, defence and industrial applications –
WPA3 includes a 192-bit security suite which is align to the Commercial
National Security Algorithm (CNSA)
• To date, 60% of the Wi-Fi devices still support WPA2. It will take a
while for WPA3 to fully roll out
20
IEEE 802.11i
• Implemented as WPA2
• Uses Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol, also known
as CCM mode Protocol (CCMP)
- AES based block cipher
- Replacing the RC4 stream cipher of WEP
• Has been mandatory for Wi-Fi certified devices
since 2006
21
CCMP
• More secure than the protocols in WEP & WPA
• Uses a 128-bit key
• Uses a 128-bit block size
• Provides:
- Data Confidentiality - only authorized parties have
access
- Authentication – proves user identity
- Access control - in conjunction with layer
management
22
23
24
Enterprise Mode
• Designed for enterprise networks
25
IEEE 802.1X
• IEEE Standard for Port-based Network Access
Control (PNAC)
• Requires three parties:
- a supplicant – the client device wishing to connect
- an authenticator – the access point
- an authentication server – a host running software
that supports RADIUS and EAP
• Client device only has access through the
authenticator when validated and authorized
26
EAP
• The authentication framework utilised by wireless
networks
• Supplies functions and negotiation of authentication
methods
- Called EAP methods
• Provides a secure authentication mechanism
• Negotiates a secure private key between
authenticator and client
27
28
• Authentication
- If EAP Method is agreed, EAP Requests and Responses
are sent between supplicant and authentication server
until the server responds with EAP-Success message
- Authenticator sets port to the authorised state and traffic
is allowed
29
RADIUS
• Protocol providing a centralised Authentication,
Authorization, and Accounting (AAA) service
• Management for the authorisation of computers
wishing to connect to a network
• Client/server protocol
• Runs in the application layer of the OSI model
• Uses UDP for transport
- assigned UDP ports 1812 for RADIUS
Authentication and 1813 for RADIUS Accounting
30
RADIUS Functions
• A RADIUS Server has three main functions:
- Authenticating users and/or devices and providing
permission for them to access the network
- Authorising users and/or devices for specific
services on the network
- Accounting for usage of network services
31
32
33
34
35
36
37
38
39
References
• Tanenbaum, A.S. (2003). Computer Networks. 4th
Edition. Prentice Hall.
40
Any Questions?
41