Wlan Security Protocols PDF
Wlan Security Protocols PDF
Wlan Security Protocols PDF
30
International Journal of Computer Applications (0975 – 8887)
Volume 164 – No 3, April 2017
parties, WEP uses shared secret key of 40 to 140 bits. WEP Fi defines WPA [6] (Wi-Fi Protected Access) standard to
protocol is applied through the following three steps : improve the protection of wireless devices. WPA has
• CRC (Cyclic Redundancy Code) message is calculated contributed to the increased protection of wireless
and added to the original message. communications through the increased level of data protection
and access control of current and future solutions to wireless
• The second step in WEP protocol application is networks. WPA is designed to be the software upgrade to the
encryption (as shown in Figure 1). The message is existing devices and is compatible with the new IEEE 802.11i
encrypted by RC4 algorithm. Encryption is d one in three standard. WPA has several purposes:
phases. First, pseudo-random data sequence of three • To be a strong protective mechanism for wireless
bytes is generated (IV – Initialization Vector) to extend networks,
the key. Encryption ends with the application of
exclusive or function (XOR) between keystream and • To be interoperable,
message thus resulting in encrypted message.
• To replace WEP,
• The last step is to transmit sequence IV and encrypted
message. Once the message has come to its its final • To enable the existing Wi-Fi wireless devices to be
destination, the reverse procedure is applied. Again, the upgraded with the new software solution,
extended key is generated on the basis of transferred IV • To be applicable in small, as well as in large wireless
and shared key; then RC4 algorithm generates networks, and
keystream, XOR function is calculated between
keystream and message that arrived. • To be applicable immediately.
The first improvement offered by WPA is data encryption by
TKIP (Temporal Key Integrity Protocol). This protocol
provides a strong encryption mechanism whose characteristics
are:
• A unique stream for encryption of each of the packets,
• Message integrity check (MIC, Michael),
• IV extension, and
• Repeated key mechanism.
The second improvement is related to the strong security
authentication of the users through 802.1x and
EAP(Extensible Authentication Protocol). In large networks,
Fig 1: WEP protocol execution WPA uses authentication server RADIUS to secure
centralized management and control of the access. In small
Open System Authentication enables mobile stations to access SOHO (Small Office/Home Office) networks, there is no
the access point without confirmation of the station’s identity. centralized authentication server so that WPA is initiated by a
This is a one-way authentication since mobile stations believe special mode. This mode is also called Pre-Shared Key (PSK)
to communicate with the right access point. Open System and it enables users to authenticate by a password or a key.
Authentication is very sensitive to attacks and allows Users have to enter a password (or a key) to the access point,
unauthorized access. Shared-key Authentication is based on otherwise home network reaches each of the workstations
encryption technique and on questions and answers procedure included in the Wi-Fi wireless network. Devices with
between a station and the access point. The authentication appropriate password can be networked and thus protected
process is ended when the access point decrypts the station’s from eavesdropping and other unauthorized users.
answer by shared key and thus enables the access of the
workstation only if decryption result is equal to the question
that has been sent In 802.11 standards the confidentiality is
realized by encryption technique. WEP protocol for the
protection of confidentiality uses RC4 algorithm and
symmetrical key together with pseudo sequence. In general,
every increase in key length brings the increase in protection.
However, recent brute-force attacks on wireless local
networks are jeopardizing privacy. This means that WEP
protocol is sensitive to attacks no matter of the key length.
WEP protocol provides integrity of messages transmitted
between stations and access point by using CRC technique.
Integrity of message received is violated when the checksum
differentiates. In this case, the message received is rejected.
2.2 WPA
IEEE studied all details of WEP security problems and
focused on the design of new safety mechanisms for wireless Fig 2: WPA protocol (WEP safety improvements)
networks. The solutions are offered in 802.11i standard.
However, standard issuance and rectification can take a few
2.3 TKIP
TKIP [7] is a collection of algorithms created to improve and
years and the market makes a pressure on manufacturers so
solve security problems of WEP. Majority of cryptographic
that they are not in a position to wait for standard issuance and
ratification to be finished. In order to solve this problem, Wi-
31
International Journal of Computer Applications (0975 – 8887)
Volume 164 – No 3, April 2017
functions is realized through hardware in wireless networks • In phase 1, hash function is calculated based on the MAC
adapters, thus it is not possible to improve the hardware. address of the sender, temporal
RC4 is an encryption device implemented in hardware of
wireless network adapters and is not replaceable. To solve this session key and high 32 bits of IV. This phase is calculated
problem TKIP uses RC4 device in the way that changes the only if temporal key of the session is changed.
methods of use of the shared key. In WEP, shared key is used • In phase 2, hash function is calculated by the phase 1
directly in encryption, while in TKIP it is used for generation output and low 16 bits of IV. As an output, we have a
of other keys. TKIP algorithms can be applied in the current key stream of 128 bits. In fact, the first 3 bits of phase 2
wireless equipment without significantly ruining the are compatible with IV in WEP, while the remaining 13
performance. TKIP gives WEP four new improvements : bits are compatible with WEP. The purpose of phase 2 is
• Encrypted message integrity code to prevent to make it difficult for the attacker to find correlation
message falsifications, between IV and a key for each of the packets. The
analysis of C code that implements both phases shows
• Strict IV sequences to prevent replay attacks, that some of the cryptographic characteristics of S-box
have been applied .
• Key generation, and
TKIP mechanism has three keys:
• Mechanism to refresh keys in order to prevent • Temporal key,
• attacks related to key repetition. Encrypted message • Encryption key
integrity code (MIC). MIC is an encryption
mechanism based on hash function design to work • Master key.
on existing wireless network adapters in order to
detect false messages. MIC mechanism consists of Temporal keys are 128 bit encryption key and 64 bit key for
three components: encryption of data integrity. TKIP uses separate key sets on
both sides of connection, so that there are four temporal keys
• authentication key (Michael key, both the in total. TKIP identifies these sets of keys by 2 bit
identification device named WEP keyid. When first
• sender and the receiver have the same key), connection is established, the first set of keys is immediately
• tag function, and connected to one of the two sets of WEP keyid. When a new
set of keys is created, a new keyid is distributed to it. After the
• verification. connection between a new pair of temporal keys is established
Tag function generates the tag based on the authentication key TKIP implementation will continue to receive packets on the
and message. Generated tag is an encryption for integrity old keyid and its keys. However, later on, the transfer will be
check and is sent together with a message. Receiver performs conducted only via new keyid and its keys. New temporal
MCI strength is in the number of tag bits (n). This means that keys are created with the first or repeated establishment of
if the attacker wants to send a false message, 2n messages connection. Encryption key protects temporal keys. There are
have to be sent . MIC has a level of protection of n = 20, two of these keys – one is used to encrypt the message to
while the strongest attacks could generate 229 messages. It is introduce temporal keys, while the other serves to protect the
obvious that MIC with the above given level of protection is message from being falsified. Master key is exchanged among
not completely safe. Therefore, TKIP implements workstations and 802.1x authentication servers. This key is
mechanisms for detection of false messages and in case there directly related to authentication and is used for secure
are two false messages in a second, it is considered to be an distribution of key streams. Master key is created after a
attack. In that situation keys must be erased, session must be successful authentication and is related to one session only.
terminated and one minute has to pass before the new session
with the new TKIP and Michael keys is established. Strict IV
sequences. False messages appear when the attacker meets the
2.4 802.1x
message and sends it as his own. Usually, this problem is IEEE 802.1x [8] is standardized way to the network secure
solved by linking IV counter with the MIC key. Each time the access. By using security methods in 802.1x standard it is
MIC key is replaced, IV sequence is reinitialized. This possible to access the network securely, even when products
strategy requires the transmitter to stop its transmission when of different manufacturers are in use. 802.1x is only a part of
the same IV sequence repeats for one MIC key. This happens security technology that disables unauthorized access to the
when communications ceases or MIC key changes. TKIP network and does not control traffic of the authorized users.
affects IV sequence. Transmitter and receiver set IV to zero 802.1x does not require a specific authentication protocol, but
each time TKIP key is changed. Sender increments IV uses EAP for encapsulation of other authentication protocols
sequence for each packet that is sent. TKIP requires receiver (LEAP – Lightweight Authentication Extension Protocol;
to supervise all sequences of the IV sequence that has just EAP-TSL – Transport Layer Security; EAP-TTLS – Tunneled
arrived. If the newly arrived IV sequence is smaller or even TLS; EAP-PEAP – Protected EAP). A successful
the same as the previous IV sequence for the same TKIP key, authentication , both of a client and authenticator, has to be
or if IV sequences arrive in no logical order, then it is a reason completed before any traffic from the client is allowed. Before
to dismiss these messages. In WEP protocol a unique key for authentication 802.1x logical component (PAE – Port Access
each packet is based on concatenation of unchanged key and Entry) prohibits any traffic except for the EAP request that is
IV sequence. As a result of this key generation there is his being forwarded to the authentication server. Based on the
often repetition. For each of the packets a new key is EAP message, authentication server determines whether a
generated by hash function based on TKIP key and IV client has or does not have an access to the network. Then it
sequence. It is called temporal key since its duration is sends a message to the authenticator and, based on the
temporal and it changes when its time elapses. Key message, the port is either in the position to prohibit or
generation in TKIP protocol has two phases approve the traffic. Previously researches have showed that
primary Authentication method (open authentication system
32
International Journal of Computer Applications (0975 – 8887)
Volume 164 – No 3, April 2017
and shared key authentication) and access control based on • The authenticator waits for a certain period of time for a
MAC control lists are not secure mechanisms. In order to client to re-authenticate before the port is locked.
solve the problem, IEEE group designed new security
architecture for wireless local networks – Robust Security • A continuity of authentication procedure is allowed in
Network (RSN). RSN provides a mechanism for connecting case the client was temporarily unable to respond to
to the network only through an authorized 802.1x network authenticator’s request.
port. Network port represents a connection between the • It is allowed for more devices to access the network by a
station and AP. RSN uses three entities define by 802.1x shared mediator (such as hub), and
standard: station, authenticator and authentication server. The
station is an entity that wants to access the network through • Protection is imposed to all users of the access point.
authenticator’s network port (access point). The station is • In addition to the advantages mentioned before, 802.1x
authenticated through authenticator on authentication server authentication has also some deficiencies. These
from which it receives accreditations. deficiencies result from the mistakes in 802.1x and EAP
RSN connection is performed in three phases: protocols that the attackers have used for attacks.
33
International Journal of Computer Applications (0975 – 8887)
Volume 164 – No 3, April 2017
3.1 Method Implementation it is fed in plaintext message, it will produce the encrypted
For the implementation of WEP and WAP2 we have to version . TKIP method of encryption-
discuss and understand 2 algorithms which form the core in
operations of respective protocols. It is important to
understand these two methods before we go further and
implement them on NS2.
RC4 method of encryption-
34
International Journal of Computer Applications (0975 – 8887)
Volume 164 – No 3, April 2017
35
International Journal of Computer Applications (0975 – 8887)
Volume 164 – No 3, April 2017
3)The process that is followed will be standardized to evaluate [8] M. ARUNESH , A. W. ARBAUGH , An Initial Analysis
new modifications made by any individual organizations to of the IEEE 802.1X Standard. Maryland,
check the performance of their network. Establishment of (2002),http://www.cs.umd.edu/∼waa/1x.pdf
such a process scheme will allow independent organization [9]"Network Simulator 2",
carry out research and declare results thus improving WPA http://www.linuxjournal.com/article/5929,December
for everyone to use. 2015.
5. REFERENCES 6. AUTHOR PROFILE
[1] J. WELCH , S. D. LATHROP , A Survey of 802.11a Saurabh Malgaonkar is an assistant professor in the
Wireless Security Threats and Security Mechanisms. computer engineering department of the Thadomal Shahani
United States Military Academy West Point , New York, Engineering college which is affiliated to the Mumbai
( 2003), http://www.itoc.usma.edu/Documents/ ITOC University. His areas of interest are: Networks and Distributed
TR-2003-101 (G6).pdf. Computing.
[2]J. C. CHEN , M. C. JIANG , Y. W. LIU , Wireless LAN Rohan Patil is a software developer in Indus Valley, a IT
security and IEEE 802.11i. IEEE Wireless company, his areas of interest are networking and software
Communications , ( 2005) , vol. 12, no. 1, pp. 27–36. development.
[3] R. PRODANOVIC , D. SIMIC , Holistic Approach to Aishwarya Rai is a software testing engineer in AMDOCS,
WEP Protocol in Securing Wireless Network her areas of interest are software development and testing.
Infrastructure. Com SIS , Vol. 3, No. 2, pp. 97–113, (
2006) Aastha Singh is an associate engineer in Accenture, her areas
of interest are Cloud Computing (SalesForce).
[4]C. HE , J. C. MITCHELL , Security Analysis and
Improvements for IEEE 802.11i. Stanford, USA, (2004),
IJCATM : www.ijcaonline.org 36