16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Wireless</strong> LAN <strong>Security</strong> 409<br />

authenticating the station to join the network 4 if it has been configured to accept OSA as a<br />

valid authentication scheme. In other words, the AP does not do any checks on the identity of<br />

the station and allows any and all stations to join the network. OSA is exactly what its name<br />

suggests: open system authentication. The AP (network) allows any station (that wishes to<br />

join) to join the network. Using OSA therefore means using no authentication at all.<br />

It is important to note here that the AP can enforce the use of authentication. If a station<br />

sends an authentication request requesting to use OSA, the AP may deny the station<br />

access to the network if the AP is configured to enforce SKA on all stations.<br />

18.4.2 Shared Key Authentication<br />

Shared Key Authentication (SKA) is based on the challenge-response system. SKA<br />

divides stations into two groups. Group One consists of stations that are allowed access<br />

to the network and Group Two consists of all other stations. Stations in Group One share<br />

a secret key which stations in Group Two don’t know. By using SKA, we can ensure that<br />

only stations belonging to Group One are allowed to join the network.<br />

Using SKA requires (1) that the station and the AP be capable of using WEP and (2)<br />

that the station and the AP have a preshared key. The second requirement means that a<br />

shared key must be distributed to all stations that are allowed to join the network before<br />

attempting authentication. How this is done is not specified in the 802.11 standard.<br />

Figure 18.3 explains how SKA works in detail.<br />

When a station wants to join a network, it sends an authentication request to the<br />

appropriate AP which contains the authentication algorithm it wishes to use (1 in case<br />

of SKA). On receiving this request, the AP sends an authentication response back to the<br />

station. This authentication response contains a challenge-text. The challenge text is a<br />

128-byte number generated by the pseudorandom-number-generator (also used in WEP)<br />

using the preshared secret key and a random Initialization Vector (IV). When the station<br />

receives this random number (the challenge), it encrypts the random number using WEP 5<br />

and its own IV to generate a response to the challenge. Note that the IV that the station<br />

uses for encrypting the challenge is different from (and independent of) the IV that the<br />

4<br />

The authentication request from the station may be denied by the AP for reasons other than<br />

authentication failure, in which case the status field will be nonzero.<br />

5<br />

WEP is described in Section 18.5.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!