Security+ Guide to Network
Security Fundamentals, Third
Edition
Chapter 6
Wireless Network Security
Objectives
• Describe the basic IEEE 802.11 wireless security
protections
• Define the vulnerabilities of open system
authentication, WEP, and device authentication
• Describe the WPA and WPA2 personal security
models
• Explain how enterprises can implement wireless
security
Security+ Guide to Network Security Fundamentals, Third Edition 2
IEEE 802.11 Wireless Security
Protections
• Institute of Electrical and Electronics Engineers
(IEEE)
– The most widely known and influential organization for
computer networking and wireless communications
• In the early 1980s, the IEEE began work on
developing computer network architecture standards
– This work was called Project 802
• In 1990, the IEEE formed a committee to develop a
standard for WLANs
– That operate at a speed of 1 and 2 million bits per
second (Mbps)
Security+ Guide to Network Security Fundamentals, Third Edition 3
IEEE 802.11 Wireless Security
Protections (continued)
• In 1997, the IEEE approved the IEEE 802.11 WLAN
standard
• Revisions
– IEEE 802.11a
– IEEE 802.11b
– IEEE 802.11g
– IEEE 802.11n
Security+ Guide to Network Security Fundamentals, Third Edition 4
Controlling Access
• Controlling wireless access of devices to the WLAN
– Accomplished by limiting a device’s access to the access
point (AP)
• By restricting access to the AP, only those devices that
are authorized are able to connect to the AP and
become part of the wireless network
• The IEEE 802.11 standard does not specify how to
implement controlling access
• Almost all wireless AP vendors implement access
control through Media Access Control (MAC) address
filtering
Security+ Guide to Network Security Fundamentals, Third Edition 5
Controlling Access (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 6
Controlling Access (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 7
Controlling Access (continued)
• MAC address filtering is usually implemented by
permitting instead of preventing
• Wired Equivalent Privacy (WEP)
– Designed to ensure that only authorized parties can
view transmitted wireless information
– Uses encryption to protect traffic
• The IEEE 802.11 committee designed WEP to meet
the following criteria:
– Efficient, exportable, optional, self-synchronizing, and
reasonably strong
Security+ Guide to Network Security Fundamentals, Third Edition 8
Controlling Access (continued)
• IEEE 802.11 WEP shared secret keys must be a
minimum of 64 bits in length
• The options for creating keys are as follows:
– 64-bit key
– 128-bit key
– Passphrase
• The AP and devices can hold up to four shared
secret keys
– One of which must be designated as the default key
Security+ Guide to Network Security Fundamentals, Third Edition 9
Security+ Guide to Network Security Fundamentals, Third Edition 10
Controlling Access (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 11
Controlling Access (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 12
Controlling Access (continued)
• Device authentication
– Wireless LANs cannot limit access to the wireless
signal by walls or doors
• Sometimes called data emanation
• Types of authentication supported by the 802.11
standard
– Open system authentication
• See Figure 6-6
– Shared key authentication
• See Figure 6-7
Security+ Guide to Network Security Fundamentals, Third Edition 13
Security+ Guide to Network Security Fundamentals, Third Edition 14
Security+ Guide to Network Security Fundamentals, Third Edition 15
Vulnerabilities of IEEE 802.11 Security
• The primary vulnerabilities are in the areas of open
system authentication, MAC address filtering, and
WEP
Security+ Guide to Network Security Fundamentals, Third Edition 16
Open System Authentication
Vulnerabilities
• Open system authentication is considered weak
because authentication is based on only one factor:
– A match of SSID
• The easiest way to discover the SSID is to actually
do nothing
– Exploits the beaconing process
• Once a wireless device receives a beacon frame, it
can attempt to join the network
– By sending an association request frame back to the
AP
Security+ Guide to Network Security Fundamentals, Third Edition 17
Open System Authentication
Vulnerabilities (continued)
• Passive scanning
– The most common type of scanning
– A wireless device simply listens for a beacon frame
for a set period of time
• For a degree of protection, some wireless security
sources encourage users to configure their APs to
prevent the beacon frame from including the SSID
– But instead require the user to enter the SSID
manually on the wireless device
Security+ Guide to Network Security Fundamentals, Third Edition 18
Open System Authentication
Vulnerabilities (continued)
• Problems arise when the SSID is not beaconed
– Can affect roaming
– Can also affect devices running Microsoft Windows XP
• The SSID can be easily discovered even when it is
not contained in beacon frames
– Still is transmitted in other management frames sent
by the AP
• Configuring an access point to not allow the beacon
frame to include the SSID provides virtually no
protection
Security+ Guide to Network Security Fundamentals, Third Edition 19
Security+ Guide to Network Security Fundamentals, Third Edition 20
MAC Address Filtering Weaknesses
• MAC addresses are initially exchanged in an
unencrypted format through the WLAN
– An attacker can easily see the MAC address of an
approved device and use it to join the network
• Managing a large number of MAC addresses can
pose significant challenges
• MAC address filtering does not provide a means to
temporarily allow a guest user to access the network
– Other than manually entering the user’s MAC address
into the access point
Security+ Guide to Network Security Fundamentals, Third Edition 21
WEP
• To encrypt packets WEP can use only a 64-bit or
128-bit number
– Which is made up of a 24-bit initialization vector (IV)
and a 40-bit or 104-bit default key
– The relatively short length of the default key limits its
strength
• WEP implementation violates the cardinal rule of
cryptography:
– Anything that creates a detectable pattern must be
avoided at all costs
– IVs would start repeating in fewer than seven hours
Security+ Guide to Network Security Fundamentals, Third Edition 22
WEP (continued)
• Because of the weaknesses of WEP
– Possible for an attacker to identify two packets
derived from the same IV (called a collision)
• Keystream attack
– A method of determining the keystream by analyzing
two packets that were created from the same IV
Security+ Guide to Network Security Fundamentals 23
WEP (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 24
WEP (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 25
Personal Wireless Security
• The wireless security requirements for personal
wireless security are most often based on two
models promoted by the Wi-Fi Alliance:
– WPA Personal Security
– WPA2 Personal Security
Security+ Guide to Network Security Fundamentals, Third Edition 26
WPA Personal Security
• Wireless Ethernet Compatibility Alliance (WECA)
– A consortium of wireless equipment manufacturers and
software providers formed to promote wireless network
technology
• WECA goals:
– To encourage wireless manufacturers to use the IEEE
802.11 technologies
– To promote and market these technologies
– To test and certify that wireless products adhere to the
IEEE 802.11 standards to ensure product interoperability
Security+ Guide to Network Security Fundamentals, Third Edition 27
WPA Personal Security (continued)
• In 2002, the WECA organization changed its name
to Wi-Fi (Wireless Fidelity) Alliance
• In October 2003 the Wi-Fi Alliance introduced Wi-Fi
Protected Access (WPA)
– WPA had the design goal to protect both present and
future wireless devices, addresses both wireless
authentication and encryption
• PSK addresses authentication and TKIP addresses
encryption
Security+ Guide to Network Security Fundamentals, Third Edition 28
WPA Personal Security (continued)
• Preshared key (PSK) authentication
– Uses a passphrase to generate the encryption key
• When using PSK, a key must be created and
entered into both the access point and all wireless
devices
– Prior to the devices communicating with the AP
• The PSK is not used for encryption
– Instead, it serves as the starting point (seed) for
mathematically generating the encryption keys
Security+ Guide to Network Security Fundamentals, Third Edition 29
WPA Personal Security (continued)
• WPA replaces WEP with an encryption technology called
Temporal Key Integrity Protocol (TKIP)
• TKIP has several advantages over WEP:
– TKIP uses a longer 128-bit key
– TKIP keys are known as per-packet keys
– When coupled with other technologies, TKIP provides an
even greater level of security
• WPA also replaces the (CRC) function in WEP with the
Message Integrity Check (MIC)
– Designed to prevent an attacker from capturing, altering,
and resending data packets
Security+ Guide to Network Security Fundamentals, Third Edition 30
WPA2 Personal Security
• Wi-Fi Protected Access 2 (WPA2)
– Introduced by the Wi-Fi Alliance in September 2004
– The second generation of WPA security
– Still uses PSK authentication but instead of TKIP
encryption it uses enhanced data encryption
• PSK Authentication
– Intended for personal and small office home office users
who do not have advanced server capabilities
– PSK keys are automatically changed and authenticated
between devices after a specified period of time known as
the rekey interval
Security+ Guide to Network Security Fundamentals, Third Edition 31
WPA2 Personal Security (continued)
• PSK key management weaknesses:
– The distribution and sharing of PSK keys is performed
manually without any technology security protections
– PSK only uses a single key
– Changing the PSK key requires reconfiguring the key
on every wireless device and on all access points
– In order to allow a guest user to have access to a
PSK WLAN, the key must be given to that guest
• A second area of PSK vulnerability is the use of
passphrases
Security+ Guide to Network Security Fundamentals, Third Edition 32
WPA2 Personal Security (continued)
• A PSK is a 64-bit hexadecimal number
– The most common way in which this number is
generated is by entering a passphrase
• Consisting of letters, digits, punctuation, etc. that is
between 8 and 63 characters in length
– PSK passphrases of fewer than 20 characters can be
subject to a specific type of attack and broken
• AES-CCMP Encryption
– Encryption under the WPA2 personal security model
is accomplished by AES-CCMP
Security+ Guide to Network Security Fundamentals, Third Edition 33
WPA2 Personal Security (continued)
• CCMP is based upon the Counter Mode with CBC-
MAC (CCM)
– Of the Advanced Encryption Standard (AES)
encryption algorithm
• CCM is the algorithm providing data privacy
– While the Cipher Block Chaining Message
Authentication Code (CBCMAC) component of CCMP
provides data integrity and authentication
Security+ Guide to Network Security Fundamentals, Third Edition 34
WPA2 Personal Security (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 35
Enterprise Wireless Security
• The enterprise wireless security options can be
divided into those that follow the IEEE 802.11i
standard and those that follow the WPA and WPA2
models
Security+ Guide to Network Security Fundamentals, Third Edition 36
IEEE 802.11i
• The IEEE 802.11i wireless security standard
– Addresses the two main weaknesses of wireless
networks: encryption and authentication
• Encryption is accomplished by replacing WEP’s
original PRNG RC4 algorithm
– With a stronger cipher that performs three steps on
every block (128 bits) of plaintext
• IEEE 802.11i authentication and key management is
accomplished by the IEEE 802.1x standard
Security+ Guide to Network Security Fundamentals, Third Edition 37
IEEE 802.11i (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 38
IEEE 802.11i (continued)
• Key-caching
– Stores information from a device on the network so if
a user roams away from a wireless access point and
later returns, he does not need to re-enter all of the
credentials
• Pre-authentication
– Allows a device to become authenticated to an AP
before moving into range of the AP
Security+ Guide to Network Security Fundamentals, Third Edition 39
WPA Enterprise Security
• The WPA Enterprise Security model is designed for
medium to large-size organizations
– Provides improved authentication and encryption over
the personal model on a wireless LAN
• The authentication used is IEEE 802.1x and the
encryption is TKIP
Security+ Guide to Network Security Fundamentals, Third Edition 40
WPA Enterprise Security (continued)
• IEEE 802.1x Authentication
– Provides an authentication framework for all IEEE
802-based LANs
– Uses port-based authentication mechanisms
– Does not perform any encryption
• TKIP Encryption
– An improvement on WEP encryption
– Designed to fit into the existing WEP procedure
Security+ Guide to Network Security Fundamentals, Third Edition 41
WPA Enterprise Security (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 42
WPA2 Enterprise Security
• Provides the highest level of secure authentication
and encryption on a wireless LAN
• Authentication used is IEEE 802.1x and the
encryption is AES-CCMP
• IEEE 802.1x authentication provides the most
robust authentication for a WPA2 enterprise model
WLAN
• Encryption is based on the stronger AES-CCMP
– Only the 128-bit key and 128-bit block are mandatory
for WPA2
Security+ Guide to Network Security Fundamentals, Third Edition 43
WPA2 Enterprise Security (continued)
Security+ Guide to Network Security Fundamentals, Third Edition 44
Enterprise Wireless Security Devices
• Thin Access Point
– An access point without the authentication and
encryption functions
• These features reside on the wireless switch
• Advantages
– The APs can be managed from one central location
– All authentication is performed in the wireless switch
Security+ Guide to Network Security Fundamentals, Third Edition 45
Enterprise Wireless Security Devices
(continued)
Security+ Guide to Network Security Fundamentals, Third Edition 46
Enterprise Wireless Security Devices
(continued)
• Wireless VLANs
– Can be used to segment traffic and increase security
– The flexibility of a wireless VLAN depends on which
device separates the packets and directs them to
different networks
• See Figures 6-14 and 6-15
• For enhanced security many organizations set up
two wireless VLANs
– One for employee access
– One for guest access
Security+ Guide to Network Security Fundamentals, Third Edition 47
Security+ Guide to Network Security Fundamentals, Third Edition 48
Security+ Guide to Network Security Fundamentals, Third Edition 49
Enterprise Wireless Security Devices
(continued)
• Rogue Access Point Discovery Tools
– Wireless protocol analyzer
• Allows auditing the airwaves for rogue access points
– Monitoring the RF frequency requires a special sensor
called a wireless probe
• Types of wireless probes:
– Wireless device probe
– Desktop probe
– Access point probe
– Dedicated probe
Security+ Guide to Network Security Fundamentals, Third Edition 50
Security+ Guide to Network Security Fundamentals, Third Edition 51
Summary
• The initial IEEE 802.11 standard contained security
controls for protecting wireless transmissions from
attackers
• The Wi-Fi Alliance has introduced two levels of personal
security
– Wi-Fi Protected Access (WPA) and Wi-Fi Protected
Access 2 (WPA2)
• Enterprise wireless security requires different security
models from personal wireless security
• Additional wireless security devices can be used to
defend against attackers
Security+ Guide to Network Security Fundamentals, Third Edition 52