Security and Privacy in Wireless LAN T.R.Mudgal Deptt. of Physics C.D L State institute , of Engineering & Technology Panniwala Mota, Sirsa (India) Susheel Kumar Indian Institute of Geomagnetism New Panvel, Navi Mumbai (India) susheel@iigs.iigm.res.in Latika Chaudhary Nanotechnology Department B.V.D.U. College of Engineering Katraj,Pune latikac92@gmail.com mudgal_t_r@rediffmail.com ___________________________________________________________________________________________ Abstract—Networks have come a long way since their inception, and wireless networks are the new trend in the IT market. However, every new technology comes with several advantages and disadvantages. This paper addresses some of the key advances and some of the shortcomings of wireless networks security. It reviews various types of security levels currently offered by standard wireless networks, such as the wired equivalent privacy (WEP); the WiFi protected access (WPA); and 802.11 the latter defined as the ultimate security available for wireless networks to date. The paper also lists benefits of wireless networks and examples of cost savings. Corporations have been found to consider wireless installations based on the lower total cost of ownership (TCO) and return on investment (ROI) scenarios. There are few industries that have expanded their boundaries in the wireless arena to financial, educational institutional, healthcare facilities and airports (travel). With security being one of the major concerns irrespective of the industry type, the authors highlight factors that senior and mid level IT management should consider when implementing wireless networks. The success story of General Motors investment in wireless LANs factories presents a best practice for WLANs implementations. In the conclusions, questions still open and opportunities for future research are discussed. Key words: Technology, Corporation. Network, Security, Wireless, Wi-Fi, ___________________________________ I. Introduction Wireless local area networks (WLANs) based on the wireless fidelity (Wi-Fi) standards are one of today’s fastest growing technologies in businesses, schools and homes, for good reasons. They provide mobile access to the internet and to enterprise networks so users can remain connected away from their desks. But having provided these attractive benefits, most existing WLANs have not effectively addressed security-related issues. All computer networks which by definition consist of autonomous computing nodes are potentially subject to security problems. Authentication is the foundation technology for protecting networks, servers, client systems, data, and applications from improper disclosure, tampering, destruction, and other forms of interference. Standardized attempts to manage authentication- and access-control-based dangers are open system authentication, MAC address authentication and shared key authentication II. Threats to WLAN Environments All wireless computer systems face security threats that can compromise its systems and services. Unlike the wired network, the intruder does not need physical access in order to pose the following security threats: Eavesdropping: This involves attacks against the confidentiality of the data that is being transmitted across the network. In the wireless network, eavesdropping is the most significant threat because the attacker can intercept the transmission over the air from a distance away from the premise of the company. 1) Tampering: The attacker can modify the content of the intercepted packets from the wireless network and this results in a loss of data integrity. 2) Unauthorized access and spoofing: The attacker could gain access to privileged data and resources in the network by assuming the identity of a valid user. This kind of attack is known as spoofing. To overcome this attack, proper authentication and access control mechanisms need to be put up in the wireless network. Fig.1 Network Infrastructure Other security threats: The other threats come from the weakness in the network administration and vulnerabilities of the wireless LAN standards, e.g. the vulnerabilities of the Wired Equivalent Privacy (WEP), which is supported in the IEEE 802.11 wireless LAN standard. III. 802.11-1997 (802.11 LEGACY) The original version of the standard IEEE 802.11 was released in 1997 and clarified in 1999, but is today obsolete. It specified two net bit rates of 1 or 2 megabits per second (Mbit/s), plus forward error correction code. It specified three alternative physical layer technologies: diffuse infrared operating at 1 Mbit/s; frequency-hopping spread spectrum operating at 1 Mbit/s or 2 Mbit/s; and directsequence spread spectrum operating at 1 Mbit/s or 2 Mbit/s. The latter two radio technologies used microwave transmission over the Industrial Scientific Medical (ISM) frequency band at 2.4 GHz. Some earlier WLAN technologies used lower frequencies, such as the U.S. 900 MHz ISM band. Legacy 802.11 with direct-sequence spread spectrum was rapidly supplanted and popularized by 802.11b. 1) 802.11a: The 802.11a standard uses the same data link layer protocol and frame format as the original standard, but an OFDM based air interface (physical layer). It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code, which yields realistic net achievable throughput in the mid-20 Mbit/s. 802.11a too suffers from interference, but locally there may be fewer signals to interfere with, resulting in less interference and better throughput. 2) 802.11b: 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same media access method defined in the original standard. 802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the modulation technique defined in the original standard. 3) 802.11g: In June 2003, a third modulation standard was ratified: 802.11g. This works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput. 802.11g hardware is fully backwards compatible with 802.11b hardware and therefore is encumbered with legacy issues that reduce throughput when compared to 802.11a by ~21%. 4) 802.11-2007: In 2003, task group TGma was authorized to "roll up" many of the amendments to the 1999 version of the 802.11 standard. REVma or 802.11ma, as it was called, created a single document that merged 8 amendments (802.11a, b, d, e, g, h, i, j) with the base standard. Upon approval on March 8, 2007, 802.11REVma was renamed to the then-current base standard IEEE 802.11-2007. 5) 802.11n: 802.11n is an amendment which improves upon the previous 802.11 standards by adding multiple-input multipleoutput antennas (MIMO). 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands. The IEEE has approved the amendment and it was published in October 2009. Prior to the final ratification, enterprises were already migrating to 802.11n networks based on the Wi-Fi Alliance's certification of products conforming to a 2007 draft of the 802.11n proposal. 6) 802.11ac: IEEE 802.11ac is a standard under development which will provide high throughput in the 5 GHz band. This specification will enable multi-station WLAN throughput of at least 1 Gigabit per second and a maximum single link throughput of at least 500 megabit per second, by using wider RF bandwidth, more l streams (up to 8), and high-density modulation (up to 256 QAM). 7) 802.11i: In addition to 802.1x standard created by IEEE, one up-and-coming 802.11x specification, which is 802.11i, provides replacement technology for WEP security. 802.11i is still in the development and approval processes. While these elements might change, the information provided will provide insight into some of the changes that 802.11i promises to deliver to enhance the security features provided in a WLAN system. The 802.11i specification consists of three main pieces organized into two layers. On the upper layer is the 802.1x, which has been discussed in the previous section. As used in 802.11i, 802.1x provides a framework for robust user authentication and encryption key distribution. On the lower layer are improved encryption algorithms. The encryption algorithms are in the form of the TKIP (Temporal Key Integrity Protocol) and the CCMP (counter mode with CBC-MAC protocol).[12] IV. Wired Equivalent Privacy (WEP) WEP provides two functions. One is to ensure privacy through encryption and the other function is to offer a form of access control. WEP uses a symmetric encryption scheme where a shared key is used for both encryption and decryption. The encryption method used is the RC4 stream cipher system from RSA. A 40 bit shared secret key forms the heart of the system. This key must exist in both the client and access point in order for it to work. Two other additional features were added to augment the system. An Integrity Check Value (ICV) field, which does a 32-bit CRC check on the data frame. The result from the ICV is added to the end of the frame. It is to prevent a hacker from modifying or changing the contents of the packet during transmission. An Initialization Vector (IV) is also added to the shared secret key in each packet to ensure that each packet has a different RC4 key. The IV is a 24-bit field, which produces a 64-bit field when combined with the 40-bit key. This IV is sent in clear text in a WEP data frame and the 802.11b standard states that changing the IV with each packet is an optional feature. Fig.2 Example of Shared Key Authentication The WEP encryption standard was the original encryption standard for wireless. As its name implies, this standard was intended to make wireless networks as secure as wired networks. Unfortunately, this never happened as flaws were quickly discovered and exploited. There are several open source utilities like aircracking, weplab, WEP crack, or air snort that can be used by crackers to break in by examining packets and looking for patterns in the encryption. WEP comes in different key sizes. The common key lengths are currently 128- and 256-bit. The longer the better as it will increase the difficulty for crackers. However, this type of encryption is now being considered outdated and seriously flawed. In 2005 a group from the FBI held a demonstration where they used publicly available tools to break a WEP encrypted network in three minutes. WEP protection is better than nothing, though generally not as secure as the more sophisticated WPA-PSK encryption. A big problem is that if a cracker can receive packets on a network, it is only a matter of time until the WEP encryption is cracked. Fig3. WEP Encryption V. WPA SHORT PACKET SPOOFING In November 2008 Erik Tews and Martin Beck - researchers at two German technical universities (TU Dresden and TU Darmstadt) - uncovered a WPA weakness which relied on a previously known flaw in WEP that could be exploited only for the TKIP algorithm in WPA. The flaw can only decrypt short packets with mostly known contents, such as ARP messages. The attack requires Quality of Service (as defined in 802.11e) to be enabled, which allows packet prioritization as defined. The flaw does not lead to key recovery, but only a keystream that encrypted a particular packet, and which can be reused as many as seven times to inject arbitrary data of the same packet length to a wireless client. For example, this allows someone to inject faked ARP packets which make the victim send packets to the open Internet. This attack was further optimized by two Japanese computer scientists Toshihiro Ohigashi and Masakatu Morii. Their attack doesn't require quality of service to be enabled. In October 2009, Halvorsen with others made further progress, enabling attackers to inject larger malicious packets (596 bytes, to be more specific) within approximately 18 minutes and 25 seconds. In February 2010, a new attack was found by Martin Beck that allows an attacker to decrypt all traffic towards the client. The authors say that the attack can be defeated by deactivating QoS, or by switching from TKIP to AES-based CCMP. The vulnerabilities of TKIP are significant in that WPA-TKIP was, up until the proofof-concept discovery, held to be an extremely safe combination. WPA-TKIP is still a configuration option upon a wide variety of wireless routing devices provided by many hardware vendors. VII. AAA PROTOCOL AAA stands for Authentication, Authorization, Accounting. These are necessary protocols used for remote network accesing. 1) Authentication: Authentication refers to the process where an entity's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials. Examples of types of credentials are passwords, one-time tokens, digital certificates, and phone numbers (calling/called). 2) Authorization: The authorization function determines whether a particular entity is authorized to perform a given activity, typically inherited from authentication when logging on to an application or service. 3) Accounting: Accounting refers to the tracking of network resource consumption by users for the purpose of capacity and trend analysis, cost allocation, billing. VIII. EAP PROTOCOL The Extensible Authentication Protocol (EAP) is a general authentication protocol defined in IETF (Internet Engineering Task Force) standards. It was originally developed for use with PPP. It is an authentication protocol that provides a generalized framework for several authentication mechanisms. These include Kerberos, public key, smart cards and onetime passwords. With a standardized EAP, interoperability and compatibility across authentication methods become simpler. For example, when user dials a remote access server (RAS) and use EAP as part of the PPP connection, the RAS does not need to know any of the details about the authentication system. Only the user and the authentication server have to be coordinated. By supporting EAP authentication, RAS server does not actively participate in the authentication dialog. Instead, RAS just repackages EAP packets to hand off to a RADIUS server to make the actual authentication decision.[12] IX. SOLUTIONS FOR DENIAL OF SERVICE As with wired networks, tracking down WLAN DoS attacks can be difficult, slow, and inefficient. Radio jamming can be tracked down fairly easily with the handheld or laptop tools used for detecting rogue access points, and some of the permanently placed detection systems will also be useful to track these problems down. Most of the other attacks can only be unmasked by careful monitoring and analysis with a protocol analyser. Some of these vulnerabilities could be mitigated with changes to the standards, but none of them are on a standards track for now. Fig4. Denial of Service Attack X. MOBILE DEVICES With increasing number of mobile devices with 802.1x interfaces, security of such mobile devices becomes a concern. While open standards such as Kismet are targeted towards securing laptops,access points solutions should extend towards covering mobile devices also. Host based solutions for mobile handsets and PDA's with 802.1x interface. Security within mobile devices fall under three categories: 1. Protecting against ad-hoc networks 2. Connecting to rogue access points 3. Mutual authentication schemes such as WPA2 as described above Wireless IPS solutions now offer wireless security for mobile devices. Mobile patient monitoring devices are becoming an integral part of healthcare industry and these devices will eventually become the method of choice for accessing and implementing health checks for patients located in remote areas. For these types of patient monitoring systems, security and reliability are critical. XI. CONCLUSIONS WLANs should only be deployed with full awareness of the potential security breaches they can introduce. In fact, an enterprise’s security policy should define: who is allowed to use WLANs; who is permitted to install and configure WLANs; what standards of authentication, access control, encryption, and integrity assurance must be met in varying types of facilities; what current and future features must be available in wireless products that will be deployed; how unauthorized access points will be discovered and corrected; and numerous other wireless-oriented issues. If there are unprotected WLANs connected to an enterprise network, it’s crucial that these WLANs be located outside the firewall and other perimeter defences. Wherever WLANs are attached to the enterprise network, it’s crucial to install and maintain a secure authentication system that is commensurate with the security risks the enterprise faces. In addition, it’s crucial to find and secure any unauthorized access points. In most cases, enterprises will want to update their existing access point firmware and software, client driver software, and authentication servers to the WPA standards, and only purchase WPAcompliant products going forward. REFERENCES: [1]Akyildiz , W.Su, Y.Sankara subramaniam , and E. Cayirci , "Wireless sensor networks: a survey," in Computer Networks. vol. 38, pp . 393-422 , IEEE 2002. [2] CISCO Packet Magazine, 2nd Quarter 2002. http://www.cisco.com/en/US/about/ac123/ac114/ac173/ac168/about cisco packet issue home.html [3]J Lopez “Analysis of security threats requirements, technologies and standards in wireless sensor networks” Springer, 2009. [4] Janise McNair, ang Zhu, “Vertical Handoffs in Fourth-Generation Multinetwork Environments”, IEEE Wireless Communications, June2004. [5]Meysam Argany, Mir Abolfazl Mostafavi,Farid Karimipour,“Voronoi-based Approaches for Geosensor Networks Coverage Determination and Optimization: A Survey”, International Symposium on Voronoi Diagrams in Science and Engineering 2010. [6] Ms.Mitali R. Ingle, “An Energy Efficient Deployment of Nodes in Wireless Sensor Network using Voronoi Diagram”, IEEE 2011. [7] Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta and Guy Pujolle Multi-Objective WSN Deployment : Quality of Monitoring, Connectivity and Lifetime, Institute Galil ́ee – University of Paris 13,99 Avenue J-B Cl ́ement, 93430 Villetaneuse, France.IEEE proceedings, 2010. [8] Nirav Patel, “VORONOI Diagrams Robust and efficient implementation ”, IEEE MAY 2005 [9] Robert McMillan. "Once thought safe, WPA Wi-Fi encryption is cracked" [10] Toni Janevski, “AAA System for PLMN-WLAN Internetworking”, Journal of Communications and Networks (JCN), pp.192-206, Volume 7,Number 2, June 2005. [11] Tony Bradley, CISSP-ISSAP, “Hack Proofing Your Wireless Network”. [12] Rafidah Abdul Hamid, “Wireless LAN: Security Issues and Solutions”. SANS Institute Reading Room site.