400 likes | 629 Views
Overview of IEEE 802.16 Security. Advisor: Dr. Kai-Wei Ke Speaker: Yen-Jen Chen Date: 03/26/2007. Outline. Introduction to IEEE 802.16 IEEE 802.16 Security Architecture IEEE 802.16 Security Issues IEEE 802.16 Security Flaws Conclusion References. Introduction to IEEE 802.16.
E N D
Overview of IEEE 802.16 Security Advisor: Dr. Kai-Wei Ke Speaker: Yen-Jen Chen Date: 03/26/2007
Outline • Introduction to IEEE 802.16 • IEEE 802.16 Security Architecture • IEEE 802.16 Security Issues • IEEE 802.16 Security Flaws • Conclusion • References
IEEE 802.16 WiMAX • For the wide area( ranging up to 50 Km) • Last mile connectively • Provide the higher speed connectively for the data, voice and video(32-134Mbps) • Low cast
MAC CS Sub-layer • CS Layer: • Receives data from higher layers • Classifies the packet • Forwards frames to CPS layer
MAC CPS Sub-layer • Performs typical MAC functions such as addressing • Each SS assigned 48-bit MAC address • Connection Identifiers used as primary address after initialization • MAC policy determined by direction of transmission • Uplink is DAMA-TDM • Downlink is TDM • Data encapsulated in a common format facilitating interoperability • Fragment or pack frames as needed • Changes transparent to receiver
MAC Privacy Sub-layer • Provides secure communication • Data encrypted with cipher clock chaining mode of DES • Prevents theft of service • SSs authenticated by BS using key management protocol
WMAN Threat Model • PHY threats • Water torture attack, jammings • No protection under 802.16 • MAC threats • Typical threats of any wireless network • Sniffing, Masquerading, Content modification, Rouge Base Stations, DoS attacks, etc
IEEE 802.16 Security Model • DOCSIS (Data Over Cable Service Interface Specifications) • Assumption : All equipments are controlled by the service provider. • Flaw : May not be suitable for wireless environment. • Connection oriented (e.g. basic CID, SAID) • Connection • Management connection • Transport connection • Identified by connection ID (CID) • Security Association (SA) • Cryptographic suite (i.e. encryption algorithm) • Security info. (i.e. key, IV) • Identified by SAID
Data SA 16-bit SA identifier Cipher to protect data: DES-CBC 2 TEK TEK key identifier (2-bit) TEK lifetime 64-bit IV Authorization SA X.509 certificate SS 160-bit authorization key (AK) 4-bit AK identification tag Lifetime of AK KEK for distribution of TEK = Truncate-128(SHA1(((AK| 044) xor 5364) Downlink HMAC key = SHA1((AK|044) xor 3A64) Uplink HMAC key = SHA1((AK|044) xor 5C64) A list of authorized data SAs Security Association
Security Association • BS use the X.509 certificate from SS to authenticate. • No BS authentication • Negotiate security capabilities between BS and SS • Authentication Key (AK) • exchange AK serves as authorization token • AK is encrypted using public key cryptography • Authentication is done when both SS and BS possess AK
Authentication Key lifetime: 1 to 70 days , usually 7days SS →BS: Cert(Manufacturer(SS)) SS →BS: Cert(SS) | Capabilities | SAID BS →SS: RSA-Encrypt(PubKey(SS), AK) | Lifetime | SeqNo | SAIDList
Data Key Exchange • Data encryption requires data key called Transport Encryption key (TEK). • TEK is generated by BS randomly • TEK is encrypted with • Triple-DES (use 128 bits KEK) • RSA (use SS’s public key) • AES (use 128 bits KEK) • Key Exchange message is authenticated by HMAC-SHA1 – (provides Message Integrity and AK confirmation)
KEK = Truncate-128(SHA1(((AK| 044) xor 5364) Downlink HMAC key = SHA1((AK|044) xor 3A64) Uplink HMAC key = SHA1((AK|044) xor 5C64) Key Derivation
Data Encryption • Encrypt only data message not management message • DES in CBC Mode • 56 bit DES key (TEK) • No Message Integrity Detection • No Replay Protection
IEEE 802.16 Security Flaws • Lack of Explicit Definitions • Authorization SA not explicitly defined • SA instances not distinguished: open to replay attacks • Solution: Need to add nonces from BS and SS to the authorization SA • Data SA treats 2-bit key as circular buffer • Attacker can interject reused TEKs • SAID: 2 bits at least 12 bits (AK lasts 70 days while TEK lasts for 30 minutes) • TEKs need expiration due to DES-CBC mode • Determine the period: 802.16 can safely produce 2^32 64-bit blocks only.
IEEE 802.16 Security Flaws • Lack of the mutual authentication • Authentication is one way • BS authenticates SS • No way for SS to authenticate BS • Rouge BS possible because all information's are public • Possible enhancement : BS certificate • Limited authentication method–SS certification
IEEE 802.16 Security Flaws • Authentication Key (AK) generation • BS generates AK • No contribution from SS • SS must trust BS for the generation of AK
IEEE 802.16 Security Flaws • Data protection errors • 56-bit DES… does not offer strong data confidentiality( Brute force attack) • Uses a PREDICTABLE initialization vector (while DES-CBC requires a random IV) • CBC-IV = [IV Parameter from TEK exchange]XOR [ PHY Synchronization field] • Chosen Plaintext Attack to recover the original plaintext • Generates each per-frame IV randomly and inserts into the payload. • Though increases overhead, no other choice.
IEEE 802.16 Security Flaws • No Message Integrity Detection, No replay protection • Active attack • AES in CCM Mode • 128 bit key (TEK) • Message Integrity Check • Replay Protection using Packet Number
認證資訊(authentication information)X.509 certificate 授權請求(authorization request)X.509 certificate, capability, Basic CID AK exchange 授權答覆(authorization reply)encrypted AK, SAIDs, SQNAK,… 密鑰請求(key request)SAID, HMAC-Digest,… TEK exchange(每一個資料傳輸連線都必須先做此動作) 密鑰答覆(key reply)encrypted TEK, CBC IV, HMAC-Digest,… 資料交換(利用TEK加密) WiMAX PKM Protocol BS SS 1.確認SS身分 2.產生AK, 並用憑證中的public key將之加密 將AK解開 1.利用SHA演算法驗證HMAC-Digest 2.產生TEK 3.由AK產生KEK用以加密TEK 1.利用SHA驗證HMAC-Digest 2.由AK計算出KEK以解開TEK HMAC-Digest:用以驗證資料的完整性
Conclusion • It need the bidirectional authorization • Require more flexible authentication method • EAP Authentication • Improve Key derivation • Include the system identity (i.e., SSID) • Key freshness –include random number from both SS and BS • Prefer AES to DES for data encryption
References • IEEE Std 802.16-2001 standard for the local and metropolitan Area Networks,part 16 “ZAir interface for Fixed BroadBand Wireless Access Systems,” IEEE Press , 2001 • IEEE Std 802.16-2004(Revision of IEEE Std 802.16-2001) • Johnson, David and Walker, Jesse of Intel (2004), “Overview of IEEE 802.16 Security” ,published by the IEEE computer society • http://www.seas.gwu.edu/~cheng/388/LecNotes2006/