Mobile Wireless Network Security

WEP includes a device level authentication mechanism, pictured in Figure 5-4. The station must provide to the AP a proof of ownership of the key they share. Four messages are exchanged. The station makes a request. The AP sends a challenge, i.e., a 128-bit random value. The station sends a response, i.e., the 128-bit random value encrypted with the WEP stream cipher. The AP decrypts the response. If the decrypted response matches the original challenge value, then a positive authenticate response is returned to the station. WEP authentication is one-way, i.e., the AP is not authenticated by the station. After the completion of the authentication phase, subsequent traffic is not authenticated. The protocol is vulnerable to the authentication spoofing attack. An adversary may obtain the key by xor-ing the intercepted challenge value and its response. The key stream may be used by the adversary to create proper responses to new challenges

WPA includes as well an authentication protocol. WPA authentication, defined in the 802.11i standard [11], follows the 802.1x protocol [16]. Three types of participants are defined: supplicant, authenticator, and Authentication Server (AS). The role of the supplicant is played by a station. An AP takes the role of the authenticator. The function of AS may be collocated with the one of the authenticator, i.e., combined within the AP. This is adequate for a home network. It may also be done by a node part of the infrastructure network, e.g., a Remote Authentication Dial-In User Service (RADIUS). This is more adapted to an enterprise network.

Also read : level 3 network

Comments

Popular posts from this blog

Enabling the Computer Browser service for Windows Server

The Advantages of Authentication

Server Work Queues of networking