A Methodology for Evaluating Wireless Network Security Protocols David Rager

advertisement
A Methodology for
Evaluating Wireless
Network Security Protocols
David Rager
Kandaraj Piamrat
Outline
► Introduction
► Explanation
of Terms
► Evaluation Methodology
► Analysis of WEP, WPA, and RSN
► Graphical Results
► Conclusion
Introduction
► Difference
properties of wireless network
comparing to wired network
► Two lines of defense in wireless network
security
 Preventive approach
 Intrusion Detection and Response approach
► WEP
WPA
RSN
Explanation of Terms
► WEP
– Wired Equivalent Protocol
(attempt #1)
► WPA – Wi-Fi Protected Access (attempt #2)
► RSN – Robust Secure Network (attempt #3)
► EAP – Extensible Authentication Protocol
► TKIP – Temporal Key Integrity Protocol
► AES – Advanced Encryption Standard
Explanation of Terms (cont.)
► CCMP
– Counter mode with Cipher block
Chaining Message authentication code
Protocol
► ICV – Integrity Check Value
► MIC – Message Integrity Check
► RADIUS – Remote Authentication Dial in
User Service
► IV – Initialization Vector
Evaluation Methodology
► Authentication
Capability
► Encryption Strength
► Integrity Guarantees
► Prevention of Attacks
► Identity Protection
► Ease and Cost of Implementation
► Power Consumption
► Novel Ideas
Authentication capability
Consideration
Type of
authentication
Number of
authentication
servers
Use of new
authentication
mechanisms
Known MITM
attacks
0(bad)
Key with
challenge
response
1(fair)
Key with
challenge
response and
MAC address
2(good)
Credentials based
One
Three
(# faults
permitted) * 3
+1
None
-
Use of EAP
(802.11X)[tec
h-faq]
One or more
-
None
Encryption Strength
Consideration
0(bad)
1(fair)
2(good)
Key type
Static key
-
Dynamic key
Cipher key type
RC4
-
AES
Cipher key length
40 or 104 bit
encryption
128 bit encryption
128 bit encryption +
64 bit
authentication
Key lifetime
24-bit IV
-
48-bit IV
Time used to crack
Few hours
Few days
Centuries
Encrypted packet
needed to crack
Few millions
-
Few trillions
Can be recovered by
cryptanalysis
Yes
-
No
Key management
used
None
Static
EAP
Integrity Guarantees
Consideration
Integrity of
message header
Integrity of the
data
0(bad)
1(fair)
2(good)
None
Michael
CCM
CRC-32
Michael
CCM
Prevention of Attacks
Consideration
0(bad)
1(fair)
2(good)
Replay attack
prevention
None
-
IV sequence , Perpacket key
mixing
DoS cookie
No
-
Yes
Number of known
attacks prevented
None
Some of them
All of them
Minimizes damage
No
-
Yes
Identity Protection
Consideration
0(bad)
1(fair)
2(good)
Group identity
revealed to
Entire network
All parties
Specific parties
Specific identity
revealed to
Entire network
All parties
Specific parties
Ease and Cost of Implementation
Consideration
0(bad)
1(fair)
2(good)
Computation cost
High
Medium
Low
Incremental installation
No
-
Yes
Number of messages
exchanged
300
30
3
Number of actors
involved
Many actors
-
Few actors
Packet key
Mixing function
Concatenated
No need
Additional server
hardware
Yes
-
No
Additional network
infrastructure
Yes
-
No
Number of gates in
client device
High
-
Low
Lines of Code
High
-
Low
Power Consumption
Consideration
0(bad)
1(fair)
2(good)
Clients use low
power
No
-
Yes
Client can detect
attacks and
enter lowpower mode
No
-
Yes
Novel Ideas
Consideration
0(bad)
1(fair)
2(good)
Determines
physical
location
No
-
Yes
Analysis of WEP
Authentication capability
Consideration
0(bad)
1(fair)
2(good)
Type of
authentication
Key with
challenge
response
Key with
challenge
response and
MAC address
Credentials based
Number of
authentication
servers
One
Three
(# faults
permitted) * 3 + 1
Use of new
authentication
mechanisms
None
-
Use of EAP
(802.11X)[techfaq]
Known MITM
attacks
One or more
-
None
Encryption Strength
Consideration
0(bad)
1(fair)
2(good)
Key type
Static key
-
Dynamic key
Cipher key type
RC4
-
AES
Cipher key length
40 or 104 bit
encryption
128 bit encryption
128 bit encryption +
64 bit authentication
Key lifetime
24-bit IV
-
48-bit IV
Time used to crack
Few hours
Few days
Centuries
Encrypted packet
needed to crack
Few millions
-
Few trillions
Can be recovered by
cryptanalysis
Yes
-
No
Key management
used
None
Static
EAP
Integrity Guarantees
Consideration
0(bad)
1(fair)
2(good)
Integrity of
message header
None
Michael
CCM
Integrity of the
data
CRC-32
Michael
CCM
Prevention of Attacks
Consideration
0(bad)
1(fair)
2(good)
Replay attack
prevention
None
-
IV sequence , Perpacket key mixing
DoS cookie
No
-
Yes
Number of known
attacks prevented
None
Some of them
All of them
Identity Protection
Consideration
0(bad)
1(fair)
2(good)
Group identity
revealed to
Entire network
All parties
Specific parties
Specific identity
revealed to
Entire network
All parties
Specific parties
Ease and Cost of Implementation
Consideration
0(bad)
1(fair)
2(good)
Computation cost
High
Medium
Low
Incremental installation
No
-
Yes
Number of messages
exchanged
300
30
3
Number of actors
involved
Many actors
-
Few actors
Packet key
Mixing function
Concatenated
No need
Additional server
hardware
Yes
-
No
Additional network
infrastructure
Yes
-
No
Number of gates in
client device
High
-
Low
Lines of Code
High
-
Low
Power Consumption
Consideration
0(bad)
1(fair)
2(good)
Clients use low
power
No
-
Yes
Client can detect
attacks and enter
low-power mode
No
-
Yes
Novel Ideas
Consideration
0(bad)
1(fair)
2(good)
Determines
physical location
No
-
Yes
Scores of WEP
► Authentication
Capability (0/8)
► Encryption Strength (0/16)
► Integrity Guarantees (0/4)
► Prevention of Attacks (0/6)
► Identity Protection (4/4)
► Ease and Cost of Implementation (17/18)
► Power Consumption (2/4)
► Novel Ideas (0/2)
Total Score = 2.44/8 = 30.56 %
Analysis of WPA
Authentication capability
Consideration
0(bad)
1(fair)
2(good)
Type of
authentication
Key with
challenge
response
Key with
challenge
response and
MAC address
Credentials based
Number of
authentication
servers
One
Three
(# faults
permitted) * 3 + 1
Use of new
authentication
mechanisms
None
-
Use of EAP
(802.11X)[techfaq]
Known MITM
attacks
One or more
-
None
Encryption Strength
Consideration
0(bad)
1(fair)
2(good)
Key type
Static key
-
Dynamic key
Cipher key type
RC4
-
AES
Cipher key length
40 or 104 bit
encryption
128 bit encryption
128 bit encryption +
64 bit authentication
Key lifetime
24-bit IV
-
48-bit IV
Time used to crack
Few hours
Few days
Centuries
Encrypted packet
needed to crack
Few millions
-
Few trillions
Can be recovered by
cryptanalysis
Yes
-
No
Key management
used
None
Static
EAP
Integrity Guarantees
Consideration
0(bad)
1(fair)
2(good)
Integrity of
message header
None
Michael
CCM
Integrity of the
data
CRC-32
Michael
CCM
Prevention of Attacks
Consideration
0(bad)
1(fair)
2(good)
Replay attack
prevention
None
-
IV sequence , Perpacket key mixing
DoS cookie
No
-
Yes
Number of known
attacks prevented
None
Some of them
All of them
Identity Protection
Consideration
0(bad)
1(fair)
2(good)
Group identity
revealed to
Entire network
All parties
Specific parties
Specific identity
revealed to
Entire network
All parties
Specific parties
Ease and Cost of Implementation
Consideration
0(bad)
1(fair)
2(good)
Computation cost
High
Medium
Low
Incremental installation
No
-
Yes
Number of messages
exchanged
300
30
3
Number of actors
involved
Many actors
-
Few actors
Packet key
Mixing function
Concatenated
No need
Additional server
hardware
Yes
-
No
Additional network
infrastructure
Yes
-
No
Number of gates in
client device
High
-
Low
Lines of Code
High
-
Low
Power Consumption
Consideration
0(bad)
1(fair)
2(good)
Clients use low
power
No
-
Yes
Client can detect
attacks and enter
low-power mode
No
-
Yes
Novel Ideas
Consideration
0(bad)
1(fair)
2(good)
Determines
physical location
No
-
Yes
Scores of WPA
► Authentication
Capability (6/8)
► Encryption Strength (14/16)
► Integrity Guarantees (2/4)
► Prevention of Attacks (4/6)
► Identity Protection (0/4)
► Ease and Cost of Implementation (5/18)
► Power Consumption (1/4)
► Novel Ideas (0/2)
Total Score = 3.32/8 = 41.49 %
Analysis of RSN
Authentication capability
Consideration
Type of
authentication
0(bad)
1(fair)
Key with
Key with
challenge response challenge response
and MAC address
2(good)
Credentials based
Number of
authentication
servers
One
Three
(# faults
permitted) * 3 + 1
Use of new
authentication
mechanisms
None
-
Use of EAP
(802.11X)[techfaq]
Known MITM
attacks
One or more
-
None
Encryption Strength
Consideration
0(bad)
1(fair)
2(good)
Key type
Static key
-
Dynamic key
Cipher key type
RC4
-
AES
Cipher key length
40 or 104 bit
encryption
128 bit encryption
128 bit encryption +
64 bit authentication
Key lifetime
24-bit IV
-
48-bit IV
Time used to crack
Few hours
Few days
Centuries
Encrypted packet
needed to crack
Few millions
-
Few trillions
Can be recovered by
cryptanalysis
Yes
-
No
Key management
used
None
Static
EAP
Integrity Guarantees
Consideration
0(bad)
1(fair)
2(good)
Integrity of
message header
None
Michael
CCM
Integrity of the
data
CRC-32
Michael
CCM
Prevention of Attacks
Consideration
0(bad)
1(fair)
2(good)
Replay attack
prevention
None
-
IV sequence , Perpacket key mixing
DoS cookie
No
-
Yes
Number of known
attacks prevented
None
Some of them
All of them
Identity Protection
Consideration
0(bad)
1(fair)
2(good)
Group identity
revealed to
Entire network
All parties
Specific parties
Specific identity
revealed to
Entire network
All parties
Specific parties
Ease and Cost of Implementation
Consideration
0(bad)
1(fair)
2(good)
Computation cost
High
Medium
Low
Incremental installation
No
-
Yes
Number of messages
exchanged
300
30
3
Number of actors
involved
Many actors
-
Few actors
Packet key
Mixing function
Concatenated
No need
Additional server
hardware
Yes
-
No
Additional network
infrastructure
Yes
-
No
Number of gates in
client device
High
-
Low
Lines of Code
High
-
Low
Power Consumption
Consideration
0(bad)
1(fair)
2(good)
Clients use low
power
No
-
Yes
Client can detect
attacks and enter
low-power mode
No
-
Yes
Novel Ideas
Consideration
0(bad)
1(fair)
2(good)
Determines
physical location
No
-
Yes
Scores of RSN
► Authentication
Capability (6/8)
► Encryption Strength (15/16)
► Integrity Guarantees (4/4)
► Prevention of Attacks (4/6)
► Identity Protection (0/4)
► Ease and Cost of Implementation (4/18)
► Power Consumption (2/4)
► Novel Ideas (0/2)
Total Score = 4.08/8 = 50.95 %
Graphical Results
Comparison of categorical
performance
Comparison of Categorical Performance
% of Points
Performance Category
0%
20%
40%
60%
80%
100%
Authentication Capability
Encryption Strength
Integrity Guarantees
Prevention of Attacks
Identity Protection
Ease and Cost of Implementation
Power Consumption
Novel Ideas
WEP
WPA
RSN
Main contributors to each protocol’s
success
Main Contributors to Each Protocol's Success
Novel Ideas
Power Consumption
% of Points
Ease and Cost of
Implementation
Identity Protection
Prevention of Attacks
Integrity Guarantees
Encryption Strength
WEP
WPA
Protocol
RSN
Authentication Capability
Conclusion
► We
have defined specific metrics for
protocol evaluation.
► We evaluate different wireless security
protocol based on these metrics.
► Questions ?
Download