Keywords

1 Introduction

Wireless network communication is able to address various mobility issues and provides freedom to mobile users to roam around and still remaining connected to the network, without worrying about their location [1,2,3,4,5,6]. The 802.11 architecture is similar to the cellular architecture. The whole system is divided into different cells called basic service set (BSS) where each cell is controlled by its respective stations (access points). Now, in order to support mobility issues, AP of the respective cells are connected by some backbone system, generally a distributed system, which is a wired network [7,8,9,10,11,12]. This whole system of interconnected cells which includes their respective APs and the distribution system is called extended service set (ESS) [13]. Various components of the architecture areFootnote 1:

  • Stations

Any entity that can be connected to a wireless network is termed as stations. These stations are generally battery-driven and include laptops, palmtops and notebooks [14,15,16,17,18]. All of them have a network interface card (NIC) which has a unique MAC address and helps in identifying the system over the network. Stations can be classified into two sub-categories [3]: access points and clients. Access points are normal wireless clients with have higher computational power and other resources. They are connected to a distributed system which in turn is connected to other wired networks and thus enables wireless clients to transmit and receive radio frequencies. Wireless clients include mobile and portable devices like palmtops, notebooks having wireless network interface card.

  • Basic Service Set

It is the atomic unit of IEEE 802.11 WLAN comprising some stations which run the copy of similar MAC protocol and compete with one other for getting access to the wireless medium shared between them. The BSS resembles the cell as present in cellular architecture. Every BSS has its id known as BSSID that serves the wireless clients within that BSS. BSS exists in two modes [19,20,21,22,23]: independent BSS and infrastructure BSS. IBSS is generally like ad hoc networks in which stations communicate with one another in a direct manner and is set up for a very short period or interval; when the communication ends, it gets dissolved while in infrastructure BSSs if two nodes wish to communicate, then they are able to perform this by means of AP, i.e., first they send data to AP which then sends it to other communicating nodes [24,25,26,27,28].

  • Extended Service Set

BSS makes the communication over a small range, i.e., within the coverage range of AP. Therefore, in order to enhance and lengthen or expand the range of the AP, i.e., the coverage area, BSSs are linked to each other by having some backbone network (distributed system) in the back of the network to form a region known as extended service set (ESS) [29]. All the APs within the ESS have the same service SET identifier (SSID).

  • Distributed System

The main role of DS is to connect several BSSs to the wired network to result in an ESS. Several BSSs are connected via their respective APs which are connected to a distributed system which in turn gets connected to different 802.1x wired networks [4]. When a frame is received by the distributed system, it checks the MAC address and relays it to the appropriate AP, which in turn relays the frame to the destination client.

  • Distribution System Services

The major role of these services is to interconnect various BSSs with one another with the help of connecting their respective APs to the distributed system so that services of the wired networks can be extended to WLANs by connecting DS to integrated IEEE802.1x LANs. These services [11,12,13,14,15] can be implemented within the respective APs of the BSSs or can be provided by using some special-purpose devices which are attached to the DS.

  • Station Services

Providing station services is a basic feature of any IEEE 802.11 complying station which also includes access points [16,17,18,19,20]. These services are essential in order to deliver messages to the intended recipients. They provide confidentiality and privacy services in order to protect the messages being communicated between the stations. Also included are the authentication services in order to confirm the identity of the client so that they can avail access to other services.

2 IEEE 802.1X Framework

It provides a port-based access control mechanism to devices connected through various 802 LANs for authorization and authentication services [20]. It also serves the purpose of distributing the secure keys by use of various encryption techniques between different compatible clients, supplicants and access points, thus optimizing the public key authentication.

It has been proved that earlier methods of authentication, namely open system authentication and shared key authentication are not secure, therefore in order to counter the attacks, IEEE802.11i defined RSNA as a mechanism to provide strong mutual authentication and generate fresh temporal keys in order to provide strong confidentiality services. In network discovery, a wireless client always searches the available channels for these Beacon frames and responds with Beacon response frames to the access points depending on the available signal strength. In authentication and association, once the supplicant is authenticated, it sends the association request frame to the AP and indicates its security capabilities. AP replies with the association response frame indicating the association result. After this stage, the client/supplicant is said to be authenticated and associated.

3 A Comparative Study

However, the authentication achieved is not very strong, therefore subsequent phases are followed in order to make it more secure. Here, the RADIUS server and the client execute a mutual authentication protocol, i.e., EAP-TLS between them and AP just acting as a relay to forward messages. At the end of this stage, a shared key called PMK is generated between the two which is used for the derivation of subsequent keys. The authenticator only permits the 802.1X messages to allow it through port (off) before the client is being authenticated. The EAP messages or frames from the client are then relayed to the authentication server by means of an authenticator port access entity (PAE) [20].

3.1 Temporal Key Integrity Protocol

With many inherent weaknesses found in the use of WEP, a new scheme was introduced which can provide far better security. An attacker can easily get the secret key being used in the WEP technique within few minutes and in some situations even can decrypt the packets without having any apprehension about the secret key, thus is prone to very serious attacks. TKIP [18, 22] was used on top of an already used scheme, i.e., WEP in order to make it more secure and hide its weaknesses.

TKIP made many modifications in WEP which can limit many of the earlier attacks on WEP:

  • Use of MIC as a means to protect the integrity of the generated message by making use of a new algorithm called Michael.

  • Involving the use of a per-packet sequence counter in order to protect the entities from replay attacks.

  • Use of per-packet key-mixing technique (function) in order to make it secure against weak-key attacks of the attacker on WEP secret key.

  • Use of some countermeasures to handle attacks against MIC since due to some design constraints it is not deemed to be very secure.

3.2 Vulnerabilities of IEEE802.11i Standard

  • Prone to denial of service (DoS) and DoS flooding attacks like RF jamming, session hijacking.

  • Unprotected management frames lead to pinpoint the location of devices, thus making them vulnerable to DoS attacks and to guess the network topology.

  • Control frames are also unprotected and send in plain text over a network.

  • Possibility of de-authentication and disassociation attacks is very high.

  • Vulnerable to offline guessing attacks.

  • No protection for EAPOL frames.

The temporal key (TK) is generated by means of the EAPOL handshake procedure. The very first step of this technique is to get the per-packet key which is done in two phases. The first phase key mixing procedure takes a temporal key (TK), transmitting station address (TA) and 32 MSBs of TKIP sequence counter (TSC) as its input and outputs TTAK which is of 80 bits. The second phase key mixing procedure takes TK, TTAK and 16 LSBs of TSC as its input which results in the generation of WEP seed represented as 128-bit key (104-bit RC4 secret key and 24-bit IV for WEP).

TKIP also introduces a mechanism for checking the integrity of the message called MIC which is generated by means of the Michael algorithm which takes three inputs. Then the computed MPDU plus generated MIC is fragmented based on network packet size if required which is then send for WEP encapsulation as plain text.

3.3 Flaws in WPA

  • Use of pre-shared keys as an alternate mechanism for providing authentication is a serious drawback.

  • Dictionary or brute-force attacks are still possible.

  • Vulnerable to DoS and DoS flooding attacks.

3.4 Wi-Fi Protected Access (WPA)

In 2002, Wi-Fi Alliance (WFA) presented a new mechanism called WPA [10] as a temporary or provisional solution to counter the attacks which were prevalent in WEP. Some of its benefits over WEP are:

  • Usage of temporal key integrity protocol (TKIP) for providing confidential services.

  • More secure user authentication mechanism.

  • Proper use of the RC4 algorithm makes networks more secure.

  • Use of more complex and secure hash functions.

  • Avoids re-use of the initialization vector.

There exist two modes of WPA, namely enterprise WPA; personal/WPA-PSK (pre-shared key). In enterprise mode, there is a centralized network entity called RADIUS server which provides services related to authentication, authorization and access control, while in personal mode there is no such concept of the RADIUS server and the client needs to know the WPA shared key generated by the AP and SSID of the network to be connected.

3.5 Working of WEP

WEP was the very first technique to provide security in WLAN by use of the RC4 encryption algorithm [1, 2]. Its working at sender and receiver side can be explained as follows:

3.5.1 At Sender Side

As shown in Fig. 1 at the start, both the sender and receiver share a secret key Ks. Assume S to be the supplicant/client which sends M (message) to the receiver at the other side [1, 18]. S then also calculates checksum known as cyclic redundancy check, which is then appended or concatenated with message M. Let this be represented as X = (M, CRC). Then supplicant encrypts this X using the RC4 encryption algorithm that takes two inputs to generate a keystream KS. The two inputs are:

Fig. 1
figure 1

WEP encryption algorithm (sender side)

  1. (1)

    Shared key Ks of length 40 bits.

  2. (2)

    An initial seed, which is called initialization vector IV.

Now this keystream KS is XORed with X which in turn produces the desired ciphertext C. The major drawback is that IV is sent without using any encryption algorithm, i.e., clear text is communicated over the network. To re-produce the original keystream, the generated ciphertext is XORed with the same keystream KS, i.e.

KS ⊕ X = ((X ⊕ KS) ⊕ KS) = X ⊕ (KS ⊕ KS) = X.

But in order for the receiver to reconstruct KS, IV should be known. Therefore, IV is appended to ciphertext before being sent over the network. The major drawback is that IV is sent without using any encryption algorithm, i.e., clear text is communicated over the network.

3.5.2 At the Recipient Side

As shown in Fig. 2, the WEP key and initialization vector is passed through the pseudorandom generator in order to obtain the keystream which is then XORed with the ciphertext to get the IV and the plaintext combination [2]. Now the plaintext is separated from the initialization vector and plaintext is passed through the integrity algorithm to get the new initialization vector IV1, which is then compared with the received IV.

Fig. 2
figure 2

WEP decryption algorithm (recipient side)

3.6 Flaws in WEP

WEP is considered very weak and it has been verified and justified that the WEP secret key can be broken within few minutes by the attacker. The major flaws [2,3,4,5,6,7,8,9,10] in WEP which make it insecure and vulnerable to various attacks are:

  • Use of 24-bit initialization vector which exposes it to diverse attacks since it is of very short length and is appended with ciphertext as it is without using any encryption technique.

  • No mechanism to prevent replay attacks.

  • No support for key management and mutual authentication.

  • Improper use of RC4 algorithm for providing privacy and authentication services since at every stage of RC4 encryption the same keystream is being used for encryption.

  • Use of a 40-bit WEP key for encryption has been proven to be insecure as the key can be broken within few minutes. Therefore, a larger key of 128 bits is suggested.

  • Data source authentication: There is no mechanism for the source of data being authenticated. The use of CRCs permits attackers to frame their fake messages which have the same CRC as of original message and impersonate them as they are being originated and arrived from an authentic or known entity. Using MAC can be a very good measure in order to prevent this type of attack as they are used for data source authentication. Other measures can be to make CRC inaccessible to attackers by encrypting it or applying some kind of technique, but WEP failed to achieve this.

  • Use of only one mechanism to implement all security services which are presently based on data privacy service in case of WEP which is also a major drawback of any security service.

3.7 Enhancements Over WEP

In order to counter the inherent flaws in WEP, a new algorithm was developed which was more secure and is interoperable with wired equivalent privacy (WEP), i.e., no extra hardware required for its implementation.

3.7.1 Enhanced WEP (eWEP)

eWEP [14] is one of the leading accomplishments in securing the wireless network. Its applications are analogous to that of WEP except it tries to probe the mechanisms to protect the initialization vector which is dispatched and relayed in plaintext over the network, thus providing one of the solutions for securing the network from attacks.

3.7.2 Working

To start or begin the process of encryption, sender S and receiver R mutually agree on some initial IV (IV1) [14]. Then a new random IV, i.e., IV2 is generated by S. Now sender S with the help of key Ks and IV1 generates a keystream KS by using RC4 as encryption algorithm. Then CRC is calculated and succeeded or attached to M1 which in turn is equivalent to X1 = (M1, CRC), IV2 is appended to X1. Then this whole message is XORed with previously generated keystream KS1. The process continues this way for all the fragments M1, M2 … Mn as shown in Fig. 3. This whole message is then sent over the network to receiver R.

Fig. 3
figure 3

Encryption process in eWEP

The process is almost similar in comparison to that of WEP. The major difference or change is that here we will encrypt X = (M, CRC) and IV (initialization vector) with RC4 encryption algorithm in turn to hide IV from an attacker. In this sender S encrypts Xi appended to IVi+1 with the help of an IVi from the previous step. Therefore, the receiver needs to know only the initial IV, i.e., IV1 is required to decrypt the first frame, which in turn reveals IV2 used for the decryption of the second frame and the process continues in the same manner. At the receiver end, R first decrypts the message by knowing IV1and then stores the appended IV2 with it, which in turn is then used to decrypt the next frame being received from S and this process continues, which ultimately leads to the decryption of all successive frames being received by receiver R.

4 Conclusions

The major contribution of this paper is to analyze the major issues on security in WLAN. IEEE802.11i is the latest standard being used to provide security in WLANs. It specifies two frameworks for being used in 802.11 WLANs, one being the robust security network (RSN) and the other being the pre-RSN. A network entity is assumed to being RSN-capable if it is able to create the RSN associations between the communicating entities, otherwise, it is assumed as pre-RSN entity. Any network is termed as an RSN security framework if it allows robust security network associations with RSN-capable network equipments. Similarly, any network that is able to allow only pre-RSN association between the network entities is termed as pre-RSN framework for network security. The main point of difference between these two frameworks is that of four-way handshake procedure, depending on whether it is included in the authentication and association process.