326x Filetype PPT File size 0.59 MB Source: www.ecb.torontomu.ca
1.Open System Authentication
Establishing the IEEE 802.11 association with
no authentication
STA AP STA
Probe Request
Probe Response
Open System Authentication Request
(STA Identity)
Open System Authentication Response
Association Request
Association Response
Security in
Wireless LAN
(802.11i) CN8816: Network Security 2
2. Wired Equivalent Privacy (WEP)
WEP uses shared key authentication
STA AP STA
Probe Request & Probe Response
Shared Key Authentication (1)
(STA Identity)
Shared Key Authentication (2)
Challenge
Encrypted(Shared Key Authentication (3)
Challenge)
Shared Key Authentication (4)
(Success/Failure)
Association Request & Response
Security in
Wireless LAN
(802.11i) CN8816: Network Security 3
2. Wired Equivalent Privacy (WEP)
WEP Encryption uses RC4 stream cipher
IV
n
o
IV i Seed Key Stream
t RC4
a
n
e PRNG Cipher
t
WEP KEY a + Text
c
n
o n
C o
i
t
a
Plaintext n
e
t
a Message
c
n
o
CRC-32 C
Integrity Check Value (ICV)
Security in
Wireless LAN
(802.11i) CN8816: Network Security 4
2. Wired Equivalent Privacy (WEP)
Several major problems in WEP security
The IV used to produce the RC4 stream is only 24-bit
long
The short IV field means that the same RC4 stream
will be used to encrypt different texts – IV collision
Statistical attacks can be used to recover the
plaintexts due to IV collision
The CRC-32 checksum can be easily manipulated to
produce a valid integrity check value (ICV) for a false
message
Security in
Wireless LAN
(802.11i) CN8816: Network Security 5
3. Robust Security Network (RSN)
802.11i defines a set of features to establish a
RSN association (RSNA) between stations (STAs)
Enhanced data encapsulation mechanism
CCMP
Optional: TKIP
Key management and establishment
Four-way handshake and group-key handshake
Enhanced authentication mechanism for STAs
Pre-shared key (PSK); IEEE 802.1x/EAP methods
Security in
Wireless LAN
(802.11i) CN8816: Network Security 6
no reviews yet
Please Login to review.