Skip to content

Real 802. 11 Security Wi-Fi Protected Access and 802. 11i

Best in textbook rentals since 2012!

ISBN-10: 0321136209

ISBN-13: 9780321136206

Edition: 2004

Authors: Jon Edney, William A. Arbaugh

List price: $64.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

bull; bull;Describes new approach to wireless security based on Wi-Fi Protected Access (WPA) and the 802.11i standard (releasing summer 2003). bull;Wireless equipment based on the 802.11 standard accounts for up to 99% of the wireless networking market. bull;Written by experts on wireless security. Arbaugh brings a hardcore security background and Edney brings industry experience.
Customers also bought

Book details

List price: $64.99
Copyright year: 2004
Publisher: Addison Wesley Professional
Publication date: 7/15/2003
Binding: Paperback
Pages: 480
Size: 7.05" wide x 9.15" long x 1.75" tall
Weight: 1.540
Language: English

Preface
Acknowledgments
What Everyone Should Know
Introduction
Setting the Scene
Roadmap to the Book
Notes on the Book
Security Principles
What Is Security?
Good Security Thinking
Don't Talk to Anyone You Don't Know
Accept Nothing Without a Guarantee
Treat Everyone as an Enemy until Proved Otherwise
Don't Trust Your Friends for Long
Use Well-Tried Solutions
Watch the Ground You Are Standing on for Cracks
Security Terms
Summary
Why Is Wi-Fi Vulnerable to Attack?
Changing the Security Model
What Are the Enemies Like?
Gaming Attackers
Profit or Revenge Attackers
Ego Attackers
Traditional Security Architecture
Put Wireless LAN in the Untrusted Zone
Make Wi-Fi LAN Trusted
Danger of Passive Monitoring
Summary
Different Types of Attack
Classification of Attacks
Attacks Without Keys
Snooping
Man-in-the-Middle Attack (Modification)
Attacks on the Keys
One-Time Passwords
Burying the Keys
Wireless Attacks
Attacking the Keys Through Brute Force
Dictionary Attacks
Algorithmic Attacks
Summary
The Design of Wi-Fi Security
IEEE 802.11 Protocol Primer
Layers
Wireless LAN Organization
Basics of Operation in Infrastructure Mode
Beacons
Probing
Connecting to an AP
Roaming
Sending Data
Protocol Details
General Frame Formats
AC header
Management Frames
Radio Bits
Summary
How IEEE 802.11 WEP Works and Why It Doesn't
Introduction
Authentication
Privacy
Use of RC4 Algorithm
Initialization Vector (IV)
WEP Keys
Mechanics of WEP
Fragmentation
Integrity Check Value (ICV)
Preparing the Frame for Transmission
RC4 Encryption Algorithm
Why WEP Is Not Secure
Authentication
Access Control
Replay Prevention
Message Modification Detection
Message Privacy
RC4 Weak Keys
Direct Key Attacks
Summary
WPA, RSN, and IEEE 802.11i
Relationship Between Wi-Fi and IEEE 802.11
What Is IEEE 802.11i?
What Is WPA?
Differences Between RSN and WPA
Security Context
Keys
Security Layers
How the Layers Are Implemented
Relationship of the Standards
List of Standards
Pictorial Map
Summary
Access Control: IEEE 802.1X, EAP, and RADIUS
Importance of Access Control
Authentication for Dial-in Users
IEEE 802.1X
IEEE 802.1X in a Simple Switched Hub Environment
IEEE 802.1X in Wi-Fi LANs
EAP Principles
EAP Message Formats
EAPOL
EAPOL-Start
EAPOL-Key
EAPOL-Packet
EAPOL-Logoff
Messages Used in IEEE 802.1X
Authentication Sequence
Implementation Considerations
RADIUS--Remote Access Dial-In User Service
RADIUS Mechanics
EAP over RADIUS
Use of RADIUS in WPA and RSN
Summary
Upper-Layer Authentication
Introduction
Who Decides Which Authentication Method to Use?
Use of Keys in Upper-Layer Authentication
Symmetric Keys
Asymmetric Keys
Certificates and Certification Authorities
A Detailed Look at Upper-Level Authentication Methods
Transport Layer Security (TLS)
Functions of TLS
Handshake Exchange
Relationship of TLS Handshake and WPA/RSN
TLS over EAP
Summary of TLS
Kerberos V5V5
Using Tickets
Kerberos Tickets
Obtaining the Ticket-Granting Ticket
Service Tickets
Cross-Domain Access
How Tickets Work
Use of Kerberos in RSN
Cisco Light EAP (LEAP)
Protected EAP Protocol (PEAP)
Phase 1
Phase 2
Status of PEAP
Authentication in the Cellular Phone World: EAP-SIM
Overview of Authentication in a GSM Network
Linking GSM Security to Wi-Fi LAN Security
EAP-SIM
Status of GSM-SIM Authentication
Summary
WPA and RSN Key Hierarchy
Pairwise and Group Keys
Pairwise Key Hierarchy
Creating and Delivering the PMK
Computing the Temporal Keys
Exchanging and Verifying Key Information
Completing the Handshake
Group Key Hierarchy
Summary of the Key Establishment Process
Key Hierarchy Using AES-CCMP
Mixed Environments
Summary of Key Hierarchies
Details of Key Derivation for WPA
Four-Way Handshake
Group Key Handshake
Nonce Selection
Computing the Temporal Keys
Summary
TKIP
What Is TKIP and Why Was It Created?
TKIP Overview
Message Integrity
IV Selection and Use
Per-Packet Key Mixing
TKIP Implementation Details
Message Integrity--Michael
Countermeasures
Computation of the MIC
Per-Packet Key Mixing
Substitution Table or S-Box
Phase 1 Computation
Phase 2 Computation
Summary
AES-CCMP
Introduction
Why AES?
AES Overview
Modes of Operation
Offset Codebook Mode (OCB)
How CCMP Is Used in RSN
Steps in Encrypting a Transmission
CCMP Header
Overview of Implementation
Steps in Encrypting an MPDU
Decrypting MPDUs
Summary
Wi-Fi LAN Coordination: ESS and IBSS
Network Coordination
ESS Versus IBSS
Joining an ESS Network
WPA/RSN Information Element
Validating the Information Elements
Preauthentication Using IEEE 802.1X
IBSS Ad-Hoc Networks
Summary
Wi-Fi Security in the Real World
Public Wireless Hotspots
Development of Hotspots
Public Wireless Access Defined
Barriers to Growth
Security Issues in Public Hotspots
How Hotspots Are Organized
Subscribers
Access Points
Hotspot Controllers
Authentication Server
Different Types of Hotspots
Airports
Hotels
Coffee Shops
Homes
How to Protect Yourself When Using a Hotspot
Personal Firewall Software
Virtual Private Network (VPN)
Summary
Known Attacks: Technical Review
Review of Basic Security Mechanisms
Confidentiality
Integrity
Review of Previous IEEE 802.11 Security Mechanisms
Confidentiality
RC4 and WEP
Integrity and Authentication
Attacks Against the Previous IEEE 802.11 Security Mechanisms
Confidentiality
Access Control
Authentication
Man-in-the-Middle Attacks
Management Frames
ARP Spoofing
Problems Created by Man-in-the-Middle Attacks
802.1x and EAP
PEAP
Denial-of-Service Attacks
Layer 2 Denial-of-Service Attacks Against All Wi-Fi-Based Standards
WPA Cryptographic Denial-of-Service Attack
Summary
Actual Attack Tools
Attacker Goals
Process
Reconnaissance
Example Scenarios
Planning
Collection
Analysis
Execution
Other Tools of Interest
Airsnort
Airjack
Summary
Open Source Implementation Example
General Architecture Design Guidelines
Protecting a Deployed Network
Isolate and Canalize
Upgrade Equipment's Firmware to WPA
What to Do If You Can't Do Anything
Planning to Deploy a WPA Network
Deploying the Infrastructure
Add a RADIUS Server for IEEE 802.1X Support
Use a Public Key Infrastructure for Client Certificates
Install Client IEEE 802.1X Supplicant Software
Practical Example Based on Open Source Projects
Server Infrastucture
Building an Open Source Access Point
Making It All Work
Summary
Acknowledgments
References and More Information
Appendixes
Overview of the AES Block Cipher
Finite Field Arithmetic
Addition
Subtraction
Multiplication
Division
Galois Field GF()
Conclusion
Steps in the AES Encryption Process
Round Keys
Computing the Rounds
Decryption
Summary of AES
Example Message Modification
Verifying the Integrity of Downloaded Files
Checking the MD5 Digest
Checking the GPG Signature
Acronyms
References
Index