Authentication for Wireless Network



 Project Presentation by:

 Aman Chaurasia
 SJSU ID: 008017516




05/10/12                                         1
Contents:

   Wireless network and possible threat.



   Methods of Security.



   Authentication protocol (EAP-TLS) [1]




05/10/12                                    2
What is Internet?




                  Figure 1: Internet Topology [1]

05/10/12                                            3
Why Authentication?
    Advantages:
   Scalability and Mobility.
   Reduced cost of ownership.
   Installation speed and simplicity.

    Wireless Threats:
   War-driving.
   Unknown Access-Point.
   Denial of service attack (DoS).




05/10/12                                 4
Terminology:
    SSID, Beacon, Probe frame.

 Certificate:
- It is used to authenticate the website.
                                            Figure 2: Wireless Frames[1]
- Issued by Certificate Authority.
  (VeriSign, Entrust)

 RADUIS (Remote Authentication Dial-In User Service):
- AAA and employed by ISPs, web servers, wireless networks and
  AP [1].



    05/10/12                                                               5
Authentication Protocol: EAP-TLS




05/10/12
                 Figure 3: EAP-TLS [2][5][7][8]   6
Other Authentication Protocol:

   EAP – FAST: Flexible Authentication, Secure tunneling.
-   PAC , No Certificates.

   Protected EAP (PEAP): Certificate with Server only.
-   No client authentication.

 Lightweight EAP (LEAP): Username/Password.
- Not recommended anymore.




05/10/12                                                     7
The future – long term:
   IEEE is working on 802.11i.
-   Replacement of WEP (by WPA2).
-   Uses AES.
-   Expected ratifications by 2016 end.




    05/10/12                              8
Reference:
1. CCNA Wireless guide, Todd Lammle- page 157-178.
2. http://www.youtube.com/watch?v=JgJnVuG-OZI (EAP-TLS).


  Bibliography:
3. CCNA Wireless guide by Todd Lammle.
4. Data communication and Networking, 4E, by Behrouz A. Forouzan.
5. Computer Networks by Ross & Kurose.
6. http://en.wikipedia.org/wiki/Authentication#History_and_state-of-the-art
7. http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
8. http://www.youtube.com/watch?v=pPfwemHBblk
9. http://www.intel.com/support/wireless/wlan/sb/CS-025307.htm
10. http://en.wikipedia.org/wiki/IEEE_802.11 (protocol section)


 05/10/12                                                                9
Any Questions?

                Thank You…




05/10/12                     10

Wireless authentication

  • 1.
    Authentication for WirelessNetwork Project Presentation by: Aman Chaurasia SJSU ID: 008017516 05/10/12 1
  • 2.
    Contents:  Wireless network and possible threat.  Methods of Security.  Authentication protocol (EAP-TLS) [1] 05/10/12 2
  • 3.
    What is Internet? Figure 1: Internet Topology [1] 05/10/12 3
  • 4.
    Why Authentication? Advantages:  Scalability and Mobility.  Reduced cost of ownership.  Installation speed and simplicity. Wireless Threats:  War-driving.  Unknown Access-Point.  Denial of service attack (DoS). 05/10/12 4
  • 5.
    Terminology:  SSID, Beacon, Probe frame.  Certificate: - It is used to authenticate the website. Figure 2: Wireless Frames[1] - Issued by Certificate Authority. (VeriSign, Entrust)  RADUIS (Remote Authentication Dial-In User Service): - AAA and employed by ISPs, web servers, wireless networks and AP [1]. 05/10/12 5
  • 6.
    Authentication Protocol: EAP-TLS 05/10/12 Figure 3: EAP-TLS [2][5][7][8] 6
  • 7.
    Other Authentication Protocol:  EAP – FAST: Flexible Authentication, Secure tunneling. - PAC , No Certificates.  Protected EAP (PEAP): Certificate with Server only. - No client authentication.  Lightweight EAP (LEAP): Username/Password. - Not recommended anymore. 05/10/12 7
  • 8.
    The future –long term:  IEEE is working on 802.11i. - Replacement of WEP (by WPA2). - Uses AES. - Expected ratifications by 2016 end. 05/10/12 8
  • 9.
    Reference: 1. CCNA Wirelessguide, Todd Lammle- page 157-178. 2. http://www.youtube.com/watch?v=JgJnVuG-OZI (EAP-TLS). Bibliography: 3. CCNA Wireless guide by Todd Lammle. 4. Data communication and Networking, 4E, by Behrouz A. Forouzan. 5. Computer Networks by Ross & Kurose. 6. http://en.wikipedia.org/wiki/Authentication#History_and_state-of-the-art 7. http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol 8. http://www.youtube.com/watch?v=pPfwemHBblk 9. http://www.intel.com/support/wireless/wlan/sb/CS-025307.htm 10. http://en.wikipedia.org/wiki/IEEE_802.11 (protocol section) 05/10/12 9
  • 10.
    Any Questions? Thank You… 05/10/12 10