Authentication and Security in Wireless LANs
References
Data frames in wireless medium should be protected in order to ensure that data has not been tampered with while transmission in air. Any wireless device or radio capable of receiving and decoding 802.11 frames can have access to the data. So data has to be protected by proper encryption methods.
Data Confidentiality is maintained by encrypting frame body of the data. A Message Integrity check is added as part of data. Receives validate the received data against this MIC to ensure that the data was not altered while in transit.
Authentication is the process in which the client's identity/credential is validated, whether the client device is who/what it claims to be.
In WEP , the WEP algorithms is responsible for both authentication and Data encryption.
802.11 authentication is the first step in network attachment.
Two types of authentication
-
Open System
-
Shared Key
1) Open System Authentication
Steps
1) Authentication request -From Client to AP
2)
Authentication Response – From AP with success or failure message to Client
3) Association Request
4)Association Response
Any client can send its station ID in an attempt to associate with the AP. In effect, no authentication is actually done.
2) Shared Key Authentication
In shared key authentication a static key or a passphrase is set on the client/mobile device and the router/AP
2a) In WEP, a static key is configured on both the client and AP. The authentication process consists of a clear text challenge and response between the Client and the AP. The AP validates the response from the client. If the validation is successful, it means that both the client and the AP have the same key and the authentication is successful.
After this authentication, data is encrypted using the WEP key
2b) WPA/WPA2
In this, a pre-shared key/ passphrase, not encryption key is configured on both the client and server. The passphrase/pre shared key, along with the SSID, is used to generate unique key called PMK (PairWise Master Key) .
The authentication process derives the source key material (PMK) for creating the encryption keys.
This is used in the 4 way handshake to generate the encryption keys called PTK.( Pairwise Transient Key) This PTK is used to encrypt unicast data
In this case, all the clients that connect to the AP, gets the same PMK. So in enterprise network 802.1X authentication is used.
WPA uses TKIP and WPA2 uses AES-CCMP for encryption.
3) 802.1X port based authentication
WPA and WPA2 Enterprise use port based authentication to authenticate the clients 802.X is an authentication protocol for wireless LANs. It is based on IETF's Extensible Authentication Protocol
Here , after 802.1X authentication , a PMK ( pairwise master key) very specific to client and AP is generated.
This PMK is used in the 4 way handshake to generate the encryption keys
Encryption Authentication
WPA-personal TKIP PSK
Wpa2-Personal AES-ccmp PSK
WPA -Enterprise TKIP 802.1X/EAP
WPA2-enterprise AES-ccmp 802.1X/EAP
Comments
Post a Comment