AN OVERVIEW OF WIRELESS
SECURITY
 802.11 Security
 WAP Security
IEEE 802.11
   A set of standards for WLAN computer communication
    in 5 GHz and 2.4 GHz.
   Most popular members: 802.11b, 802.11g.
   Originally weak in security, even now.
802.11 SECURITY
 Two subsystems:
  - A data encapsulation technique called WEP(Wired
  Equivalent Privacy)
  - An authentication algorithm called Shared Key
  Authentication
 Severe security weakness in WEP.
 WPA, WPA2, 802.11i
WEP
   Stream cipher RC4 for confidentiality
    -Standard 64-bit WEP:
           40-bit pre-shared key
           24-bit initialization vector(IV)
   CRC-32 checksum for integrity
  WEP’S WEAKPOINTS
                                 Pseudo-
Encryption Key K             random number
                                generator
                    Random byte b
   Plaintext data                                         Ciphertext data
                                     
       byte p                                                 byte c
  When p1 and p2 are encrypted under the same “random” byte b:
          c1 = p1  b                            c2 = p2  b
                c1  c2 = (p1  b)  (p2  b) = p1  p2
WPA, WPA2
 WPA
  -Partly implements of IEEE 802.11i
  -RC4 stream cipher with a 128-bit key and 48-bit IV.
  -Temporal Key Integrity Protocol(TKIP)
  -Michael Algorithm
 WPA2
  -Mandatory implements of 802.11i
  -CCMP: AES-based algorithm
TEMPORAL KEY INTEGRITY
PROTOCOL(TKIP)
& MESSAGE INTEGRITY CODE(MIC)
 TKIP
  -per-packet key mixing
  -message integrity check
  -rekeying mechanism
 MIC also named as MAC
CCMP: AES
 Counter Mode with Cipher Block Chaining Message
  Authentication Code Protocol
 key management and message integrity is handled by a
  single component built around AES
 Advanced Encryption Standard
  -block cipher
  -SubBytes, ShiftRows, MixColumns, AddRoundKey
  -only successful attacks: side channel attacks
WAP PROTOCOLS
 Wireless Application Protocol
 Principal applications: for mobile phone and PDA,
  -Devices with low processing power and small memory
  capacities.
  -Wireless networks with low bandwidth.
 From transport layer to application layer
 Competitor: i-mode
WAP STACKS
 WML: Wireless Markup
  Language
 WSP: Wireless Session Protocol
 WTP: Wireless Transport
  Protocol
 WTLS: Wireless Transport
  Layer Security
 WCMP: Wireless Control
  Management Protocol
 WDP: Wireless Datagram
  Protocol
WIRELESS TRANSPORT LAYER
SECURITY
   Derived from TLS
    -Compressed data structures
    -New certificate format
    -Packet based design
   Algorithm for public-key cryptography
    -RSA
    -ECC(Elliptic Curve Cryptography)
   Security problems
WTLS’S SECURITY PROBLEMS
   Security GAP
    -reason: WTLS session exists only between the WAP
    device and the Gateway.
    -Temporarily in clear text on the Gateway when
    translating WML to HTML until SSL established.
WTLS’S SECURITY PROBLEMS
 Solutions:
  -Place Gateway and the
  back-end system within a
  secure environment.
  -Provide integrity protection
  on information(digital
  signatures).
 Other problems:
  -Client Implementation
I-MODE
 Based on Internet protocols
 HTTP and SSL/TLS are used end-to-end
 Equivalent to security offered in wired networks
FUTURE TOPICS IN WIRELESS
NETWORKS
 The next generation networks
 Ad-hoc networks
 Sensor networks