23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Industrial Wireless Communications Security (IWCS)/C42 28-5<br />

Base key<br />

Transmit<br />

MAC address<br />

Packet<br />

sequence<br />

4 most<br />

significant bits<br />

2 least<br />

Mixer, Phase 1<br />

significant<br />

bits<br />

Mixer, Phase 2<br />

Intermediate key<br />

Per-packet key<br />

Plaintext<br />

Software<br />

Hardware<br />

RC4<br />

+<br />

Ciphertext<br />

FIGURE 28.4<br />

Temporal key integrity protocol.<br />

28.2.2.3 WiFi Protected Access 2<br />

WiFi protected access 2 (WPA2) is based on the fully ratified version of IEEE 802.11i. WPA2 is WPA<br />

with a new advanced encryption standard (AES) based algorithm known as Counter Model with CBC-<br />

MAC protocol (CCMP). AES supports multiple encryption key sizes: 128, 196, and 256 bits. WPA2 provides<br />

enhanced security over WPA [10].<br />

The temporal key integrity protocol (TKIP) depicted in Figure 28.4 is a link layer encryption protocol initially<br />

called WEP2. TKIP has security features that improve upon WEP and is designed as a software upgrade<br />

to WEP-based solutions; i.e., a wrapper around WEP. Some of the improvements made by TKIP include<br />

1. Using multiple master keys instead of a single key as used in WEP<br />

2. Deriving a unique RC4 key for each frame generated from a master key<br />

3. Numbering of each frame with a sequence number to mitigate against replay attacks<br />

4. Using a new integrity check hashing algorithm called Michael to detect frame forgeries.<br />

28.2.2.4 tKIP, CCMP, WAPI<br />

TKIP adds new keying and message integrity check (MIC) mechanisms to WEP to offer additional<br />

security. These new mechanisms are key hierarchy and automatic key management, per-frame keying,<br />

sequence counter, new MIC, and countermeasures on MIC failures [11].<br />

Key hierarchy and automatic key management: Keys used to encrypt frames are derived from master<br />

keys that are refreshed in a secure manner.<br />

Per-frame keying: A unique RC4 key is derived for each frame from the master key to lessen the likelihood<br />

of key attacks.<br />

Sequence counter: Each frame is numbered with a sequence number to eliminate replay attacks (capturing<br />

traffic and transmitting the traffic at another time).<br />

New MIC: Michael, a cryptographic integrity check hashing algorithm, is used to defeat forgeries.<br />

Countermeasures on MIC failures: Two failed forgeries in a second cause a station to invoke a rekeying<br />

procedure.<br />

TKIP dynamically changes keys as the system is used. A large IV used with TKIP defeats the key recovery<br />

attacks that were possible in WEP. TKIP temporarily solves four problems: forgeries with the MIC, replays<br />

with IV sequence enforcement, weak key attacks with key mixing, and collision attacks with rekeying. CCMP<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!