Ccm encryption is explained in rfc 3610 63

Info icon This preview shows pages 34–36. Sign up to view the full content.

View Full Document Right Arrow Icon
catenating the MPDU header, CCMP header, cipher text and MIC. CCM encryption is explained in RFC 3610. 6.3. Vulnerabilities in IEEE 802.11i and Security Attacks A number of security vulnerabilities have been identified in the IEEE 802.11i standard. This section details these vulnerabilities, the attacks launched by exploiting the vulnerabilities and the available prevention mechanisms. 6.3.1. IEEE 802.1X Vulnerabilities IEEE 802.1X 6 is used for key distribution and authentication in IEEE 802.11i. The process of authentication involves three entities: Authen- ticator, Authentication Server and the Supplicant. The protocol assumes that the authenticator is always trusted. Therefore, the supplicant does not verify the messages received from the authenticator and unconditionally re- sponds to these messages. This assumption is the security vulnerability that can be exploited by the adversary. The adversary can act as authenticator and launch the session hijacking attack and the man-in-the-middle attack as exposed in Ref. 19. Figure 7 shows how an adversary can launch session hijacking attack by exploiting the explained vulnerability. The adversary waits until the authenticator and the supplicant complete the authentica- tion process and the authenticator sends the EAP success message to the supplicant. Following this, the adversary sends 802.11 disassociate message to the supplicant with the spoofed IP of the authenticator. The suppli- cant assumes its session has been terminated by the authenticator as the message is not verified for integrity. There onwards, the adversary gains the access to the network by spoofing the MAC address of supplicant and proceeds with mutual authentication procedure using four-way handshake. Figure 8 shows man-in-the-middle attack launched by the adversary ex- ploiting the same vulnerability. After the initial exchange of EAP request and response messages between the supplicant and the authenticator, the adversary sends EAP success message to the supplicant using its own MAC address. Since the IEEE 802.1X protocol suggests unconditional transition upon receiving the EAP success message by the supplicant, the supplicant assumes it is authenticated by the authenticator and changes the state. When the authenticator sends the EAP success message, the supplicant Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 34

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
22 A. Naveed and S. Kanhere Authenticator Supplicant Adversary EAP Response EAP Request EAP Success Supplicant Authenticated 802.11 MAC disassociate Network Traffic Connectivity Gains Network Authenticator’s MAC address spoofed Fig. 7. Session hijacking attack on 802.1X authentication mechanism.
Image of page 35
Image of page 36
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern