23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Industrial Wireless Communications Security (IWCS)/C42 28-3<br />

Encryption transforms data from a readable form to a nonreadable form for humans. The key<br />

length is an indicator for the strength of the encryption algorithm. Examples of encryption algorithms<br />

include RC4 (Rivest Cypher 4), Data Encryption Standard (DES), Triple-DES, Blowfish, International<br />

Data Encryption Algorithm (IDEA), Software-Optimized Encryption Algorithm (SEAL), RSA (Rivest<br />

Shamir Adelman), and RC4. Encryption prevents eavesdropping of wirelessly transmitted data.<br />

Radio <strong>communication</strong>s are subject to jamming regardless of the form of wireless signal. APs monitor<br />

channel quality and bit rate for other stations, which enables the detection of jamming. However, unless<br />

APs have collaborative software for sharing and analyzing this information, the location of the attacker<br />

cannot be identified.<br />

Wireless signals radiate in free space and are subject to interception. Wireless laptop computers placed<br />

near <strong>industrial</strong> enterprises can intercept WLAN signals, collect sensitive information, and potentially<br />

disrupt the network.<br />

Hijacking a wireless channel is a difficult task because the attacker must ensure that the two parties<br />

cannot communicate with one another [7]. The two users must be out of wireless range or be<br />

Âdesynchronized to set up a man in the middle (MITM) attack. In an MITM attack, the attacker must<br />

eavesdrop on both users and impersonate each user to the other. One MITM attack approach would be<br />

to jam the receiver of one user using a directional antenna while receiving the transmitted traffic from<br />

another user.<br />

28.2.2 Security Mechanisms<br />

Security mechanisms and protocols are necessary to maintain the secrecy of data transmitted through<br />

the air and to ensure that the data is not tampered with. Since the introduction of 802.11 WLAN, new<br />

protocols have been developed as insecurities were found in existing deployed protocols (WEP, WPA,<br />

WPA2, TKIP, CCMP, and WAPI). A survey of these protocols follows.<br />

28.2.2.1 Wireless Encryption Protocol<br />

The first security mechanism for WiFi is the wireless encryption protocol (WEP), which requires little<br />

computational power. WEP is based on the RC4 encryption algorithm and is not as sophisticated as the<br />

cryptographic protocols that follow. Researchers demonstrated the insecurity of WEP within the first<br />

few years of its deployment [8].<br />

WEP uses a symmetric secret key cipher, k, and an initialization vector, IV, to generate a keystream<br />

(a pseudorandom sequence of bits) as shown in Figure 28.2.<br />

The decryption key is identical to the encryption key in symmetric key algorithms. WEP is not scalable<br />

due to a lack of automatic key management. The key is either 64 or 128 bits. An integrity checksum<br />

is computed on the message/data and then the two are concatenated to create a plaintext. The keystream<br />

is mathematically combined (Exclusive OR) with the plaintext to create a ciphertext. The ciphertext and<br />

IV are transmitted between a sender and receiver. The receiver uses the identical secret key to recover<br />

the message from the ciphertext. RC4 was developed in 1987 by Ron Rivest of RSA Security. The process<br />

for the RC4 encryption and decryption is shown in Figure 28.3.<br />

Plaintext<br />

Message<br />

|<br />

CRC<br />

Keystream<br />

RC4 (IV, k)<br />

Plaintext XOR keystream<br />

IV<br />

Ciphertext<br />

FIGURE 28.2<br />

Encrypted WEP frame.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!