WPA2
WPA2
WPA2
Paul Arana
INFS 612 Fall 2006
Abstract
With the increase in use of Wireless Networks, the
initial protocols, Wireless Equivalent Privacy (WEP)
first, then Wi-Fi Protected Access (WPA), used to
secure wireless communications were found
inadequate due to many proven vulnerabilities so a
new protocol was implemented, the Wi-Fi Protected
Access 2 (WPA2) protocol. This paper will first discuss
the benefits of the Wi-Fi Protected Access 2 (WPA2)
protocol used to secure communications in Wireless
Networks over previous protocols and the
vulnerabilities addressed by it, then it will discuss the
available modes to secure a wireless network using the
Wi-Fi Protected Access 2 (WPA2) protocol and finally
explore its vulnerabilities. In conclusion, this paper
will present possible solutions and/or suggestions on
how the Wi-Fi Protected Access 2 (WPA2) protocol
vulnerabilities might be mitigated and/or addressed
through enhancements or new protocols.
1. Introduction
The IEEE 802.11i standard also known as Wi-Fi
Protected Access 2 (WPA2) is an amendment to the
802.11 standard specifying security mechanisms for
wireless networks. The draft standard was ratified on
June 24th, 2004, and replaces the previous security
specifications, Wired Equivalent Privacy (WEP),
which was shown to have severe security weaknesses.
Wi-Fi Protected Access (WPA) had previously been
introduced as an intermediate solution to WEP
insecurities. WPA implemented only a subset of IEEE
802.11i. WPA2 makes use of a specific mode of the
Advanced Encryption Standard (AES) known as the
Counter Mode Cipher Block Chaining-Message
Authentication Code (CBC-MAC) protocol (CCMP).
CCMP provides both data confidentiality (encryption)
and data integrity. The use of the Advanced Encryption
Standard (AES) is a more secure alternative to the RC4
stream cipher used by WEP and WPA.
2. WPA2
The WPA2 standard has two components,
encryption and authentication which are crucial to a
secure wireless LAN. The encryption piece of WPA2
mandates the use of AES (Advanced Encryption
Standard) but TKIP (Temporal Key Integrity Protocol)
is available for backward compatibility with existing
WAP hardware. The authentication piece of WPA2 has
two modes: Personal and Enterprise. The Personal
mode requires the use of a PSK (Pre-Shared Key) and
does not require users to be separately authenticated.
The Enterprise mode, which requires the users to be
separately authenticated based on the IEEE 802.1X
authentication standard, uses the Extended EAP
(Extensible Authentication Protocol) which offers five
EAP standards to choose from: EAP-Transport Layer
Security (EAP-TLS), EAP-Tunneled Transport Layer
Security (EAP-TTLS), Protected EAP vo/EAPMicrosofts Challenge Handshake Authentication
Protocol v2 (PEAPvo/EAP-MSCHAPv2), Protected
EAP v1/EAP-Generic Token Card (PEAPv1/EAPGTC) and EAP-Subscriber Identity Module of the
Global System of Mobile Communications (EAPSIM). The Enterprise mode has the following
hardware/software implementation requirements:
-
o
o
3. Benefits of WPA2
WPA2 (along with WPA) resolved vulnerabilities of
WEP to hacker attacks such as man-in-the-middle,
authentication forging, replay, key collision, weak
keys, packet forging, and bruteforce/dictionary
attacks[4]. By using government grade AES
encryption and 802.1X/EAP authentication WPA2
further enhances the improvements of WPA using
TKIP encryption and 802.1X/EAP authentication over
WEPs imperfect encryption key implementation and
its lack of authentication. AES has no known attacks
and the current analysis indicates that it takes 2120
operations to break an AES key [4].
In addition to the encryption benefits, WPA2 also
adds two enhancements to support fast roaming of
wireless clients moving between wireless APs.
o
4. Vulnerabilities of WPA2
DoS (Denial of Service) attacks like RF jamming,
data flooding, and Layer 2 session hijacking, are all
attacks against availability. None of the Wi-Fi security
standards can prevent attacks on the physical layer
simply because they operate on Layer 2 an above.
Similarly none of the standards can deal with AP
failure.
5. Solutions
Centrally managed thin access points that can
communicate with one another help secure information
related to roaming clients and will improve availability
by dynamically adjusting the RF power level.
Operational security measures such as site surveillance,
as well as planning the Wi-Fi RF coverage area, can
also improve availability by reducing the risk of attacks
like RF jamming.
There is an initiative called IEEE 802.1w Task
Group (TG) that was approved in March 2005. The
main goal of this task group is to improve the security
of wireless networks by protecting management frames.
The solution will be able to identify spoofed
management frames and disregard malicious traffic
6. Conclusion
In conclusion, there are some procedures to mitigate
the RF jamming, and the future specification IEEE
802.11 W will extend the protection to management
frame effecting a reduction in the opportunities to
launch DoS attacks. I hope that the IEEE 802.11 TG
will consider including the control frames in the
specification will then eliminate most the
vulnerabilities of wireless networks using WPA2/IEEE
802.11X.
Finally a solution that will not resolve the
deficiencies of the WPA2 standard but can greatly
improve overall security would be to require all
wireless networks to be upgraded to the IEEE
802.11i/WPA2 standard since the majority of wireless
networks are not WPA2 compliant. The benefits of
having all wireless networks conform to the latest
standard will outweigh the cost and logistics of
upgrading and will ultimately provide a much greater
level of security for users and applications.
week.com/story/showArticle.jhtml?articleID=177105338>
[8] "Extensible Authentication Protocol." Wikipedia, The
Free Encyclopedia. Nov. 26 2006, 15:39 UTC. Wikimedia
Foundation, Inc. Nov 27 2006 <http://en.wikipedia.org/w
/index.php?title=Extensible_Authentication_Protocol&oldid
=90231401>.
[9] Gupta, Ashok and Buthmann, Theresa. The Bell Labs
Security Framework: Making the case for End-to-End Wi-Fi
Security. Lucent Technologies Sep. 11 2006 (15).
<http://www.lucent.com/livelink/09009403800aa8c9_White
_paper.pdf>
[10] Epstein, Joe. 802.11w fills wireless security holes.
Network World Apr. 3 2006 <http://www.networkworld.com
/news/tech/2006/040306-80211w-wireless-security.html>
[11] Wright, Joshua. How 802.11w will improve wireless
security. Network World May 29 2006 <http://www.net
workworldcom/columnists/2006/052906-wireless-security
.html>
10. References
[15] Bellardo, John and Savage, Stefan. 802.11 Denial-ofService Attacks: Real Vulnerabilities and Practical
Solutions USENIX 2003 Nov. 7 2003
<http://www.cse.ucsd.edu/%7Esavage/papers/UsenixSec03.p
df>