secure handover for ieee 802.1x wireless networks

18
By: Alex Feldman

Upload: paxton

Post on 02-Feb-2016

34 views

Category:

Documents


1 download

DESCRIPTION

By: Alex Feldman. Secure Handover for IEEE 802.1x Wireless Networks. What’s the environment?. A mobile station is connected to the network wirelessly through another device. In case of WiFi (IEEE 802.11) this would be an access point . - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Secure Handover for  IEEE  802.1x  Wireless Networks

By: Alex Feldman

Page 2: Secure Handover for  IEEE  802.1x  Wireless Networks

A mobile station is connected to the network wirelessly through another device.

In case of WiFi (IEEE 802.11) this would be an access point.

In case of WiMax (IEEE 802.16) it is a base station.

Page 3: Secure Handover for  IEEE  802.1x  Wireless Networks

The mobile station may need to change its connection point to the network.

The connection point “Hands Over” the connection to the new point.

It has to be secure It has to be fast It has to be standardized

Page 4: Secure Handover for  IEEE  802.1x  Wireless Networks

Supplicant (Sta)– the station entering the network to be authenticated.

Authenticator (Au) – the access point directly connected to the station, and acting as a proxy to the authentication server.

Authentication Server (AS) – database containing credentials for all users, reachable by the authenticator.

Page 5: Secure Handover for  IEEE  802.1x  Wireless Networks
Page 6: Secure Handover for  IEEE  802.1x  Wireless Networks

Extensible Authentication Protocol -Transport Layer Security

Widely supported but rarely used.8-way handshake. Very secure but

also very time consuming.Doesn’t scale well when clients

handoff often.

Page 7: Secure Handover for  IEEE  802.1x  Wireless Networks

PMK - Pairwise Master KeyPTK – Pairwise Transient KeyEMSK – Extended Master Session Key

RADIUS – Remote Authentication Dial In User Service. Uses a shared secret to cipher and authenticate the communication.

Page 8: Secure Handover for  IEEE  802.1x  Wireless Networks

1. Authentication – PMK and EMSK generated on SA and Station.

2. AS moves PMK to Au by using RADIUS.

3. 4-way handshake – PTK generated by Au and Station

Page 9: Secure Handover for  IEEE  802.1x  Wireless Networks

When a station changes access points, re-authenticating the PMK is slow.

Only the PTK needs to be renewed, and PMK can be left alone.

How do we transmit the PMK from Au1 to Au2????

Page 10: Secure Handover for  IEEE  802.1x  Wireless Networks

Au1 is a bad guy. Pushes false PMK Sta is a bad guy that

gets access to Au2 Sta is a good guy that

gets a denial of service

Au2 is a bad guy.Pulls PMK from Au1.Now it can decipher traffic.

Page 11: Secure Handover for  IEEE  802.1x  Wireless Networks

Don’t use AS for re-authentication! Pull/Push policies to transfer keys. Provides good performance. More complicated.

Use when: Handover speed is crucial & path to the AU

is long Don’t want to be dependant on the AU

server

Page 12: Secure Handover for  IEEE  802.1x  Wireless Networks

Contact the Au on every handover.

Slower performance.Gained security.

Possible danger if the protocol used to move PMK is not strong. Need good reasons to transfer PMKs.

Page 13: Secure Handover for  IEEE  802.1x  Wireless Networks

Goal: reduce the number of packets required for TLS exchange by re-using information generated in the first authentication.

EMSK remained on the Authentication Server, so it can be used to re-authenticate the Station

Page 14: Secure Handover for  IEEE  802.1x  Wireless Networks

Based on contacting the Authentication serverBased on contacting the Authentication server

Au

PTK

Page 15: Secure Handover for  IEEE  802.1x  Wireless Networks

EAP-TLS took 2.34 seconds

on average

Proposed protocol took 0.62 seconds on average

74% improvement over EAP-TLS!

82% improvement when including retransmissions

Page 16: Secure Handover for  IEEE  802.1x  Wireless Networks

Internet Engineering Task Force (IETF) – working on new standard to used the EMSK for re-authentication.

Pull and push methods to transfer keys for nodes within same mobility domains

Page 17: Secure Handover for  IEEE  802.1x  Wireless Networks

EAP-TLS is slow for re-authentication.

Big improvements can be made by following the proposed protocol, which Reduces number of packets required Reduces retransmissions Decreases time

Page 18: Secure Handover for  IEEE  802.1x  Wireless Networks

Original paper written by:

Romano Fantacci, Leonardo Maccari, and Tommaso Pecorella

from: University of Florence

Federico Frosalifrom: Telecom Italia Lab