A Methodology for Evaluating Wireless Network Security Protocols
This paper outlines a comprehensive methodology for evaluating wireless network security protocols, specifically WEP, WPA, and RSN. It begins by introducing critical concepts and differentiating properties of wireless versus wired networks. The evaluation methodology encompasses various metrics, including authentication capability, encryption strength, integrity guarantees, and prevention of attacks. Through graphical analysis and scoring, it assesses the performance of each protocol, ultimately providing conclusions on their effectiveness and areas for improvement. This study is essential for understanding and enhancing wireless network security.
A Methodology for Evaluating Wireless Network Security Protocols
E N D
Presentation Transcript
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat
Outline • Introduction • Explanation of Terms • Evaluation Methodology • Analysis of WEP, WPA, and RSN • Graphical Results • Conclusion
Introduction • Difference properties of wireless network comparing to wired network • Two lines of defense in wireless network security • Preventive approach • Intrusion Detection and Response approach • WEP WPA RSN
Explanation of Terms • WEP – Wired Equivalent Protocol (attempt #1) • WPA – Wi-Fi Protected Access (attempt #2) • RSN – Robust Secure Network (attempt #3) • EAP – Extensible Authentication Protocol • TKIP – Temporal Key Integrity Protocol • AES – Advanced Encryption Standard
Explanation of Terms (cont.) • CCMP – Counter mode with Cipher block Chaining Message authentication code Protocol • ICV – Integrity Check Value • MIC – Message Integrity Check • RADIUS – Remote Authentication Dial in User Service • IV – Initialization Vector
Evaluation Methodology • Authentication Capability • Encryption Strength • Integrity Guarantees • Prevention of Attacks • Identity Protection • Ease and Cost of Implementation • Power Consumption • Novel Ideas
Scores of WEP • Authentication Capability (0/8) • Encryption Strength (0/16) • Integrity Guarantees (0/4) • Prevention of Attacks (0/6) • Identity Protection (4/4) • Ease and Cost of Implementation (17/18) • Power Consumption (2/4) • Novel Ideas (0/2) Total Score = 2.44/8 = 30.56 %
Scores of WPA • Authentication Capability (6/8) • Encryption Strength (14/16) • Integrity Guarantees (2/4) • Prevention of Attacks (4/6) • Identity Protection (0/4) • Ease and Cost of Implementation (5/18) • Power Consumption (1/4) • Novel Ideas (0/2) Total Score = 3.32/8 = 41.49 %
Scores of RSN • Authentication Capability (6/8) • Encryption Strength (15/16) • Integrity Guarantees (4/4) • Prevention of Attacks (4/6) • Identity Protection (0/4) • Ease and Cost of Implementation (4/18) • Power Consumption (2/4) • Novel Ideas (0/2) Total Score = 4.08/8 = 50.95 %
Conclusion • We have defined specific metrics for protocol evaluation. • We evaluate different wireless security protocol based on these metrics. • Questions ?