authentication & intrusion prevention for multi-link wireless networks

22
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks

Upload: kirti

Post on 11-Jan-2016

19 views

Category:

Documents


0 download

DESCRIPTION

Authentication & Intrusion Prevention for Multi-Link Wireless Networks. Raphael Frank 20 October 2007. Overview. 1. 2. 3. 4. 5. 6.  Introduction.  Authentication in WMN using exisitng protocols.  Emerging Security Issues.  Authentication protocol based on WMN properties. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

Raphael Frank20 October 2007

Authentication & Intrusion Prevention for Multi-Link Wireless Networks

Page 2: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

2

Overview

11 Introduction Introduction

22 Authentication in WMN using exisitng protocols Authentication in WMN using exisitng protocols

33 Emerging Security Issues Emerging Security Issues

44 Authentication protocol based on WMN properties Authentication protocol based on WMN properties

55 Security Analysis Security Analysis

66 Conclusion Conclusion

Page 3: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

3

IntroductionWhat is Wireless Mesh Network (WMN)?

Mesh Nodes: Devices with at least two radio interfacesMesh nodes form together a wireless network (Ad-Hoc)Second interface (AP) is used by mobile clients to connect to the networkHot Spots (HS): Mesh Nodes equipped with a wired internet connectionTransient Access Points (TAP): Mesh Nodes without wired internet connection

Provide Internet Access to Mobile Clients by using the WMN as a backhaul

Page 4: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

4

Authentication in WMN using existing protocols (1)

Authentication protocols for the State of the Art of Wireless Networks

IEEE 802.11:First WiFi standard released in 1997

Provides Data encryption and authentication

IEEE 802.11i:Most recent security standard released in 2004

Provides a robust data encryption and includes an external authentication framework

Page 5: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

5

Authentication in WMN using existing protocols (2)

IEEE 802.11Encryption Protocol Wired Equivalent Privacy (WEP), based on shared-key (Key length 64 or 128 bit)Authentication based on the knowledge of the shared-keySecurity Goals:

Prevent Eavesdropping PRIVACYPrevent Message Modification INTEGRITYNetwork Access Control AUTHENTICATION

Weaknesses – None of the security goals are met: Key stream reuse PRICACY CRC attacks INTEGRITY Authentication Spoofing AUTHENTICATION

Page 6: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

6

Authentication in WMN using existing protocols (3)

IEEE 802.11iEncryption Protocol WiFi Protected Access 1 & 2 (WPA1 & WPA2)

Provides robust security properties

Authentication performed using the Extensible Authentication Protocol (EAP)

Needs a centralize authentication server

Different authentication possibilities (EAP methods)

Page 7: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

7

Authentication in WMN using existing protocols (4)

Extensible Authentication Protocol (EAP)Used in wireless and fixed networks

Port Based Network Access

Authentication framework

Currently about 40 different EAP methodsCommonly used methods : EAP-TLS, EAP-TTLS

Page 8: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

8

Emerging Security issues (1)

Problems with the standard protocols

Originally developed for the State of the Art of Wireless NetworksSecurity only for the first wireless link no End-To-End features

Privacy: No data encryption after the first hopAuthentication: No Layer 2 authentication after the first hop

Single point of failure: Centralized Authentication ServerMesh nodes cannot be considered as trustworthyNo topology authentication

Page 9: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

9

Emerging Security issues (2)

What are the problems related to the architecture of a WMN?

Mesh nodes cannot be considered as trustworthyThey are often deployed in a hostile environment

An attacker can spoof and/or take over a mesh node

No topology authenticationAn attacker can easily inject a malicious node into the WMN

Gain access to the network

Perform Denial of Service (DoS)

Perform Man in the Middle Attacks (MitM)

Page 10: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

10

Definition of a new authentication protocol (1)

Why a new protocol?No standardized security protocols for WMN

The existing protocols do not meet the requirements

What should the protocol provide?“Real-time/Continuous” Authentication Acceptable performance

Authentication of every participating node of WMN Topology authentication

Authentication of the network traffic

Trustworthy mesh nodes Mesh Node Access Control

Attack Detection/Reaction mechanism

Page 11: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

11

Definition of a new authentication protocol (2)

How does it work?Based on digital signatures to verify integrity and authenticity

Hybrid authentication protocol using symmetric and asymmetric cryptography

Offers the best properties in terms of security and performance

The administrator plays the role of the CAProvides the needed keys to the Nodes

Page 12: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

12

Definition of a new authentication protocol (3)

What are the required keys?Every node is in possession

Personal Public KeyPersonal Private KeyPersonal Secret Key symmetricPublic Key of the AdministratorNodelist Containing the allowed communication neighborsAfter initialization different public/secret keys of neighbor nodes

The procedure can be subdivided in two operations:

I) Initialization of a new node

II) Information transmission

} asymmetric

Page 13: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

13

Definition of a new authentication protocol (4)

Initialization of a new node (asymmetric)

Node A wants register to the WMNNodelist Cert(A) WMNSignature

broadcast

Initialization message

The receiving node BChecks if it is included in the node list (NL)

Checks the signature Using the Public Key of the Admin

B encrypts its secret key and sends it to A

After a successful decryption, A encrypts its secret key and sends it to B

A :

Page 14: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

14

Definition of a new authentication protocol (5)

Initialization of a new node (asymmetric)Node A wants register to the WMN

Node B

(1) Broadcast: NL, Cert(A), SIG{[NL,Cert(A)], PrivK(Admin)}

(2) ENC{[Cert(B),K(B),T1], PubK(A)}

(3) ENC{[K(A),T2], PubK(A)}

Node A

Page 15: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

15

Definition of a new authentication protocol (6)

Information transmission (symmetric)Every node needs to have the secret key of its neighbor nodes Initialization

Symmetric Signature Message Authentication Code (MAC) = Fingerprint encrypted using a secret key Faster

Node A wants to send a message to node C via node B

Data Timestamp CSignature

Message to be transferred

A :Send via node B

Page 16: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

16

Definition of a new authentication protocol (7)

Information transmission (symmetric)Signature verification and newly generated at every hop of the transmission path

A different Timestamp guarantees a different signature

Node A Node B Node C

(1) MSG, T1, SIG{(MSG,T1), K(A)} (2) MSG, T2, SIG{(MSG,T2), K(B)}

(4) MSG, T4, SIG{(MSG,T4), K(B)} (3) MSG, T3, SIG{(MSG,T3), K(C)}

Page 17: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

17

Definition of a new authentication protocol (8)

How to create trustworthy nodes?We need to guarantee that a attacker cannot retrieve the sensitive data (Keys, Nodelist, …) form a mesh node

Mesh Node Access ControlBefore an attacker gains access to a node, the keys are erased a replaced by dummy values

Consequence Neighbor nodes will fail to verify the messages form the attacked node and drop them

Passive attack detection

The node is automatically excluded form the WMN

Page 18: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

18

Definition of a new authentication protocol (9)

Page 19: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

19

Security Analysis (1)

Security & Performance RequirementsAcceptable performance : YES Using symmetric signatures

Topology authentication : YES Every node participating in a communication is authenticated

Authentication of the traffic : YESThe source of every message is known

Trustworthy mesh nodes : YESMesh Node Access Control

Attack Detection and Reaction : YESCorrupt Nodes are detected and excluded form the WMN

Page 20: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

20

Security Analysis (2)

Other Security featuresNo replay attacks using timestamps

No single point of failure No centralized entity

Node Spoofing/Injection not possible Topology authentication

The attacker does not know the needed keys

Man in the Middle Attack can be used to perform DoSIf an attacker modifies a transient message, it will be discarded

Page 21: Authentication & Intrusion Prevention for Multi-Link Wireless Networks

21

ConclusionWhat’s next?

Extend the authentication protocolImplementation of a prototype

Client/User authentication

Add an administration procedure

Remotely reintroduce attacked node into the WMN

Attack reporting

Privacy and Performance on WMN need to be considered as well

Release of a security standard for WMNIEEE 802.11s?