1 / 40

Session 11

Session 11. Wireless Security. Session 12 – Contents. Types of Wireless Networks Wireless Metropolitan Area Networks (WMAN) - WiMax Wireless Local Area Networks (WLAN) / Wi-Fi Wireless Personal Area Network (WPAN) Bluetooth Low-Rate Wireless Personal Area Network (LR-WPAN) Zigbee.

varden
Télécharger la présentation

Session 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Session 11 Wireless Security

  2. Session 12 – Contents • Types of Wireless Networks • Wireless Metropolitan Area Networks (WMAN) - WiMax • Wireless Local Area Networks (WLAN) / Wi-Fi • Wireless Personal Area Network (WPAN) • Bluetooth • Low-Rate Wireless Personal Area Network (LR-WPAN) • Zigbee

  3. Vehicle Walk Outside Campus Fixed Walk Within Campus Fixed/Desktop The Wireless Landscape • Low-Rate Wireless Personal Area Network (LR-WPAN) • General-purpose, inexpensive, self-organizing mesh network. • Low data rates and low power consumption; a year or two with a single alkaline battery. • Wireless Wide Area Network (WWAN) • Metro/Geographical area • “Always On” Services • Ubiquitous public connectivity with private virtual networks • Wireless Personal Area Network (WPLAN) • Small form factor, low-cost, short range, low power, radio technology. • Developed to link portable devices without cables. • Non-licensed spectrum • Wireless Local Area Nework (WLAN), and Wireless Metropolitan Area Network (WMAN), • Public or Private Site or Campus • Enterprise. • Non-licensed spectrum 4G CDMA20003XRT CDMA2000 1XRT Level of Mobility 802.11n(MIMO) WIMAX(MIMO) Bluetooth Zigbee LAN 0.1 2 54 78 200 1000 Mbps 0.25

  4. Network Standard Range Data Rate WMAN (Wireless Metropolitan Area Network) - WIMAX IEEE 802.16I Approximately 30 miles radius 78 Mbps WLAN (Wireless Local Area Network) – WiFi EEE 802.11 Approximately 300 feet radius 54 Mbps WPAN (Wireless Personnal Area Network) – Bluetooth IEEE 802.15 Approximately 30 feet radius 1, 2, or 3 Mbps LR-WPAN (Low-Rate Wireless Personal Area Networks) – Zigbee IEEE 802.15.4 Approximately 150 feet radius 250 Kbps Wireless Networks

  5. WIMAX • WIMAX is very similar to a Wi-Fi but it operates at higher speeds, over greater distances, and for a greater number of users. • From the point of view of the infrastructure, a WiMAX network is similar to a cellular network. • A based station covers a very large area and can simultaneously operate as a subscriber station and as a base station in a full mesh network using a line-of-sight link. • A subscriber station, which could be a small WIMAX receiver box, or a mobile station. • WIMAX operates in two primary bands, the 10-66 GHz band used where line-of sight is necessary, and the licensed and un-licensed frequencies of 2 – 11 GHz for those physical environments where line-of-sight is not necessary. • WIMAX also supports subscriber stations moving at vehicular speeds. • The spectrum at 2.5 GHz and below (2.5 GHz, 1.5GHz, 700MHz, etc.) is used because it has better characteristics for full mobility deployment. • WIMAX throughput is around 38 Mbit/sec when using orthogonal frequency division multiplexing (OFDM), and 78 Mbit/sec when OFDM is combined with multiple-input multiple-output (MIMO) antenna processing technology. • WiMAX expands the availability of broadband service to residences, businesses and other locations with a high cost of wire deployment. • Low-density rural locations in developed countries • Emerging markets where user connectivity is sporadic.

  6. WIMAX Network Subscriber Station Subscriber Station Line of sight, 10 – 66 GHz band, 38 to 78 Mbit/sec Fiber Optics Base Station 2 Base Station 1 Subscriber Station Subscriber Station Carrier Base Station 1 is acting as client to Base Station 2

  7. WIMAX Security • WIMAX provides subscribers with privacy, authentication, and confidentiality across the broadband wireless network. • WIMAX security has three component protocols as follows: • Secure encapsulation of the data exchanged. • Authentication for the subscriber station (SS) to obtain authorization and traffic keying material from the base station (BS); also supports periodic reauthorization and key refresh. • A privacy key management protocol (PKM) to provide the secure distribution of keying data from the BS to the SS.

  8. WIMAX Key Generation • The Privacy Key Management authentication protocol establishes a shared secret key, called an Authorization Key (AK), between the SS and the BS. • Either RSA or EAP methods are used to generate the AK (Slide 8) • The Authorization Key is then used, by both the BS and the SS, to generate MAC Keys, HMAC Keys and Key Encrypting Keys (KEK). (Slide 9). • The KEK is used to encrypt keys for transport from the BS to the SS. • The BS randomly generates the Traffic Encryption Key (TEK), enciphers it using KEK, and sends it to the SS in the TEK exchange. KEK and TEK have 128-bit lengths. The TEK-128 is encrypted with AES Key Wrap. (Slide 10).

  9. WIMAX Key Generation MSK -512-bit Primary Authorization Key transferred to SS by EAP method during the authentication exchange Pre-PAK – 256-bit Primary Authorization Key transferred from BS to SS using RSA during the authorization process MSK Pre-PAK Dot16KDF (pre-PAK, SS MAC Address|BSID| EIK+PAK, 320) Truncate (MSK, 160) PAK (160 bits) EIK (160 bits) PAK (160 bits) Optional EIK PMK EIK PAK Dot16KDF (PAK, SS MAC Address|BSID| AK, 160) Dot16KDF (PMK, SS MAC Address|BSID| AK, 160) AK AK PAK = Primary Authorization Key EIK = EAP Integrity Key AK = Authorization Key MSK = Master Session Key PMK = Pairwise Master Key AK = Authorization Key

  10. WIMAX Key Hierarchy AK – 160-bit Authentication Key (AK) context MAC Mode CMAC HMAC Dot16KDF (AK, SS MAC Address|BSID| CMAC_KEYS+KEK, 384) Dot16KDF (AK, SS MAC Address|BSID| HMAC_KEYS+KEK, 448) CMAC_KEY_U(128 bits) CMAC_KEY_D(128 bits) KEK(64 or 128 bits) HMAC_KEY_U(160 bits) HMAC_KEY_D(160 bits) KEK(128 bits) CMAC_KEY_U CMAC_KEY_D KEK HMAC_KEY_U HMAC_KEY_D KEK MAC = Message Authentication Code CMAC_KEY_U = Uplink CMAC Key CMAC_KEY_D = Downlink CMAC Key KEK = Key Encrypting Key CMAC = Cipher MAC (MAC based on block cipher) HMAC_KEY_U = Uplink HMAC Key HMAC_KEY_D = Downlink HMAC Key KEK = Key Encrypting Key

  11. WIMAX TEK and Group Keys Derived by the BS KEK Encryption RNG TEK Send to SS KEK Encryption RNG Send to SS GKEK GKEK Encryption RNG Send to SS GTEK RNG = Random Number Generator TEK = Traffic Encrypting Key (64 or 128 bits) GKEK = Group Key Encryption Key GTEK = Group Traffic Encrypting Key

  12. Security Associations • Security associations in WIMAX are used in the same way and have the same meaning as the security associations used in IPSec, as well as the security capabilities used in TLS and SSL. • A Security Association (SA) associates the security parameters with the traffic to be protected. • Once the SA for a specific connection is defined, it is assigned an identifier, the Security Association ID (SAID). • When a connection is established between a BS and an SS, the two need to agree on, among other things, the following: • The encryption and authentication algorithms. • The crypto keys, the key sizes, and key lifetimes. • How to exchange keys, the initialization values, and other related security parameters.

  13. WIMAX Authorization and AK Exchange Base Station Subscriber Station Authentication Information • The authentication information message is strictly informative. It contains the SS X.509 certificate. Authorization Request • SS X.509 certificate. • List of crypto suites (security associations’ IDs) supported by the SS. • SS Connection Identifier (CID). Authorization Replay • A pre-PAK or MSK encrypted with the SS public key. • A 4-bit sequence number used to distinguish successive generations of Pre-PAK or MSK. • A key lifetime. • The SAID used by the SS to obtain keying information. Creating the PAK or PMK and AK) SS and BS create the PAK or PMK, and from the PAK or PMK derive the 160-bit AK. Authentication Key Authentication Key

  14. WIMAX Re-Authentication & TEK Exchange Base Station Subscriber Station Creating CMAC or HMAC and KEK SS and BS create CMAC or HMAC and KEK Re-Authentication • The SS sends re-authentication request signed by HMAC or CMAC. Key Request • SS requests a TEK. Key Replay • The BS generates TEK as a random number and enciphers it using a wrapping algorithm keyed with the KEK. • The BS sends the encrypted TEK to SS. • SS deciphers the encrypted TEK using the wrapping algorithm keyed with KEK. BS and SS are ready to send encrypted information using the data encryption algorithm specified in the cipher suite keyed with TEK. Exchanged ciphertext messages are authenticated using HMAC or CMAC.

  15. Value Data Encryption Data Authentication TEK Exchange 0x000001 No data encryption No data authentication 3-DES, 128 0x010001 CBC-Mode 56-bit DES No data authentication 3-DES, 128 0x000002 No data encryption No data authentication RSA, 1024 0x010002 CBC-Mode 56-bit DES No data authentication RSA, 1024 0x020103 CCM-Mode 128-bit AES CCM-Mode, 128-bit ECB mode AES with 128-bit key 0x020104 CCM-Mode 128bits AES CCM-Mode AES Key Wrap with 128-bit key 0x030003 CBC-Mode 128-bit AES No data authentication ECB mode AES with 128-bit key 0x800003 MBS CTR Mode 128 bits AES No data authentication AES ECB mode with 128-bit key 0x800004 MBS CTR mode 128 bits AES No data authentication AES Key Wrap with 128-bit key All remaining values Reserved WIMAX Cryptographic Suites

  16. + + + + Ö Cn Ö Cn WIMAX AES Residual Termination Block Processing Ö C Pn Cn Pn-1 Cn-1 cn-2 EK DK EK DK b bits a bits cn-2 (b – a) bits C Pn-1 Cn-1 Pn Pn = Last plaintext block Pn-1 = Next to last plaintext block Cn = Last ciphertext block Cn-1 = Next to last ciphertext block EK = Encryption with key K DK = Decryption with key K b = Block size a = Number of bits in Pn Ö = Padded bits C = Ciphertext of Ö

  17. Wireless LAN (WLAN) - WiFi WLAN Security Switch Subnet “B” Subnet “A” WLAN – AP WLAN – AP Roam From One to the other WLAN – AP WLAN – AP PDA Terminal PDA WLAN Mobile Adaptor WLAN Mobile Adaptor Terminal

  18. IEEE 802.11 The original 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and IR standard (1999) IEEE 802.11a 54 Mbit/s, 5 GHz standard (2001) IEEE 802.11b Enhancements to 802.11 to support 5.5 and 11 Mbit/s (1999) IEEE 802.11c Bridge operation procedures; included in the IEEE 802.1D standard (2001) IEEE 802.11d International (country-to-country) roaming extensions (2001) IEEE 802.11e Enhancements: QoS, including packet bursting (2005) IEEE 802.11g 54 Mbit/s, 2.4 GHz standard (backwards compatible with b) (2003) IEEE 802.11h Spectrum Managed 802.11a (5 GHz) for European compatibility (2004) IEEE 802.11i Enhanced security (2004) IEEE 802.11n 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input multiple-output) and orthogonal frequency-division multiplexing (OFDM). MIMO uses multiple transmitter and receiver antennas to allow for increased data throughput. IEEE 802.11p WAVE - Wireless Access for the Vehicular Environment (such as ambulances and passenger cars) IEEE 802.11s ESS Mesh Networking IEEE 802.11 Standards

  19. IEEE 802.11 Security Services • Authentication • Open System • Shared Key • Confidentiality • WEP • Access control in conjunction with layer management. • Secure Roaming

  20. RC4 || + || WEP Encapsulation Secret Key (40, 104, 128) Initialization Vector (IV) 802.11 Frame Keystream Header Payload Encrypted Payload ICV CRC-32 Integrity Check Value(ICV) Header IV Key Number Encrypted Payload ICV WEP Frame

  21. IEEE 802.11i • Several reports were written revealing 802.11 security weaknesses. • In June 2004, the IEEE Standards Association approved the IEEE 802.11i a security enhancement amendment to the original IEEE 802.11 specification. • The IEEE 802.11i amendment added stronger encryption, authentication, and key management strategies for wireless data and system security. • The amendment proposed two new data-confidentiality upgrades: • An interim software upgrade solution that didn’t need hardware upgrades • The Temporal Key Integrity Protocol (TKIP) • A final solution with different hardware and, therefore, not compatible with the previous version of WEP. • CTR [counter mode] with CBC-MAC [cipherblock chaining (CBC) with a message authentication code (MAC)] Protocol (CCMP), and IEEE 802.1X's to control access to the network. • The 802.11i amendment also provided improvement for the following security issues: • Key management • Data origin authenticity • Replay detection

  22. 802.11 Security Framework RADIUS Servers Cisco ACS, Microsoft IAS, FreeRADIUS, Juniper SBR Username/ Password User Credentials Certificates Either Either Either Plus others such as EAP-SIM, EAP-FAST and LEAP EAP Implementations EAP-TLS PEAP EAP-MD5 EAP-TTLS Authentication EAP PSK WI-FI Alliance Modes: Enterprise Personal WPA2 released: 09/2004 802.11i ratified: 06/2004 WPA released: 04/2003 802.11 ratified: 06/1997 WPA2 cipher suite is indicated in the Robust Security Network (RSN) Information Element. Also, supported by WPA but not certified in, as CCMP(AES). Hence some vendors implement WPA with AES. Port Control 802.1X 802.1X 802.1X Integrity Algorithm MIC CCMP Encryption & Integrity Encryption Algorithm WEP TKIP Encryption Cipher RC4 RC4 AES IEEE 802.11 802.11i (RSN) 802.11i (RSN) WI-FI Alliance WPA/WPA2 WPA2

  23. TKIP Encapsulation TA WEP Seed Phase 1 Key Mixing TTAK TK IV Phase 2 Key Mixing TSC RC4 Key Ciphertext MPDU RC4(128 bits) DA + SA + Priority + Plaintext MSDU Data Fragment(s) (if necessary) Michael MIC Key Plaintext MSDU + MIC TA = Transmitter Address TK = Temporary Key TSC = TKIP Sequence Counter MIC = Message Integrity Code DA = Destination Address SA = Source Address

  24. + + + CBC – MAC Authentication Formatting Encoding Function Input Data (N, A, P) Output Data (B0, B1, B2, ……, Br) B1 B0 Br Input Block 1 CIPHK Output Block 1 Input Block 2 CIPHK Output Block 2 Input Block r CIPHK Output Block r Yr = CIPHK(Yr -1 XOR Br) Y0 = CIPHK(B0) Y1 = CIPHK(Y0 XOR B1) T = MSBTlen(Yr) r = The number of blocks in the formatted input data (N, A, P). Yr = The CBC-MAC result MSBs(X) = The bit string consisting of the s left-most bits of the bit string X. T = The MAC that is generated as an internal variable in the CCM processes. Tlen = The bit length of the MAC.

  25. Counter (CTR) Mode Encryption Flag, N, Counter 2 Flag, N, Counter m Flag, N, Counter 1 Ctr0 Ctr1 Ctrm Input Block 1 CIPHK Output Block 1 Input Block 2 CIPHK Output Block 2 Input Block m CIPHK Output Block m Encrypt S0= CIPHK(Ctr0). S1 = CIPHK(Ctr1). Sm = CIPHK(Ctrm). S = S1 || S2 || …….|| Sm || Confidentiality Authentication m = The number of blocks in the formatted payload, equal to Plen/128. Plen = The bit length of the payload. MSBs(X) = The bit string consisting of the s left-most bits of the bit string X. T = The MAC that is generated as an internal variable in the CCM processes. Tlen = The bit length of the MAC.

  26. IEEE 802.1X EAP Authentication Supplicant(Station) Authenticator (Access Point) Authentication Server (Radius) 802.1X EAP Start 802.1X EAP Request 802.1X EAP Response Access Request (EAP Request) EAP Authentication Access Protocol (Exchange PMK) Accept / EAP Success / Key Material (PMK) 802.1X EAP Success At this moment the 802.1X Controlled Port is still blocked to the station

  27. 4-Way Handshake Supplicant(Peer, Client) Authenticator (Access Point) PMK is known-generate SNonce PMK is known-generate ANonce Message 1 EAPOL – Key (ANonce, Unicast) Derive PTK Message 2 EAPOL – Key (SNonce, Unicast, MIC) Derive PTK. If needed, generate GTK. Message 3 EAPOL – Key (Install PTK, Unicast, MIC, Encrypted GTK) Message 4 EAPOL – Key (Unicast, MIC) Install PTK and GTK Install PTK

  28. Pairwise and Group Key Hierarchy Pairwise Master Key (PMK) PRF- X(PMK, Pairwise key expansion, AA, SPA, ANonce, SNonce) Pairwise Transient Key (PTK)TKIP 512 bitsCCM 384 bits EAPOL-Key Key Confirmation Key (KCK) L(PTK 0-127) Temporal Key TKIP L(PTK 256-511) CCMP L(PTK 256-383 EAPOL-Key Key Encryption Key (KEK) L(PTK 128-255) AA = Authenticator AddressSPA = Supplicant AddressANonce = Authenticator’s NonceSNonce = Supplicant’s NonceGNonce = Group’s Nonce

  29. Pairwise and Group Key Hierarchy Group Master Key (GMK) PRF- X(GMK, “Group key expansion”, AA || GNonce) Group Temporal Key (GTK)(X bits) Temporal Key TKIP L(PTK 0-255) CCMP L(PTK 0-127 AA = Authenticator AddressSPA = Supplicant AddressANonce = Authenticator’s NonceSNonce = Supplicant’s NonceGNonce = Group’s Nonce

  30. Securing WLAN • Use Wireless Security Switches • Use Strong Encryption • Turn Off SSID Broadcasting • Change the Default Administrative Password and SSID • Turn Off the System • Use MAC Filtering • Control the Wireless Signal Output • Use VPN • Use WLAN Audits

  31. Bluetooth • Conceived as a low-cost, low-profile, low-power, short-range radio technology, open standard. • Designed to create small wireless networks for interconnecting devices such as wireless headsets, printers, keyboards, and mice. • Used to enhance wireless connectivity by connecting almost any device to any other device. • Works as an ad-hoc network, typically created on a temporary and random basis. • Consists of up to eight Bluetooth devices in a network, called a piconet, working in a master-slave relationship, with one device designated as master and the rest as slaves. • Employs a dynamic topology in which the master controls and reconfigures the changing network topologies. • Creates a chain of piconets, referred to as a scatter-net, in which a slave from one piconet acts as the master of another piconet.

  32. Power Class Max Output Power Min Output Power Range 1 100 mW 1 mW Up to 300 feet 2 2.5 mW 1 mW Up to 30 feet 3 1 mW N/A Less than 30 feet Bluetooth Frequency and Power Operation • Bluetooth operates in the 2.4 GHz industrial, scientific, and medical (ISM) non-license spectrum. • The system uses frequency-hopping, spread spectrum (FHSS) transmission. • Devices in a piconet use a specific hopping pattern of 79 frequencies in the ISM band that changes frequency about 1,600 times per second. • The master device controls and sets up the network’s pseudo-random, frequency-hopping sequence, and the slaves synchronize to the master.

  33. Variable Bit Length Bluetooth device address 48 bits Private user key (Link Key), authentication 128 bits Private user key, encryption configurable length (byte-wise) 8 – 128 bits Random number 128 bits Bluetooth Security • Provides confidentiality and authentication for peer-to-peer communications over short distances. • Four variables are used for security: • Bluetooth device address • Two secret keys • A pseudo-random number that is regenerated for each new transaction.

  34. Bluetooth Key Generation Bluetooth Device 1 Bluetooth Device 2 BD_ADDR, PIN, PIN length, IN_RAND BD_ADDR, PIN, PIN length, IN_RAND Key Generator Function E2 Key Generator Function E2 BD_ADDR, RAND BD_ADDR, RAND Kinit Kinit Key Generator Function E2 + + Key Generator Function E2 KA CA KB CB EN_RAND, COF, Link Key (KAB) EN_RAND, COF, Link Key (KAB) KAB = Link Key KC= Encryption Key Key Generator Function E3 Key Generator Function E3 KC KC

  35. Bluetooth Authentication Bluetooth Device 1(Claimant) Bluetooth Device 2(Verifier) Random Number Generator (RNG) BD_ADDR Address AU_RAND E1 Encryption Algorithm E1 Encryption Algorithm Link Key (Kab) Link Key(Kab) 96 bits 32 bits 32 bits 96 bits SRES ACO ACO SRES No Abort Connection Same? ACO = Authentication Ciphering OffsetLink Key= Link Key (128 bits) AU_RAND = Authentication Random Number (128 bits)BD_ADDR = Bluetooth Device 1 (Claimant) Address (48 bits) Yes Allow Connection

  36. + + Bluetooth Encryption Bluetooth Device A(Master) Bluetooth Device B(Slave) Random Number Generator (RNG) COF COF EN_RANDA Link Key Link Key Key Generator Function (E3) Key Generator Function (E3) BD_ADDRA 111001 ClockA ClockA 111001 KC(128 bits) KC(128 bits) Key Reduction Expansion Function K’C (128 bits) Key Reduction Expansion Function K’C (128 bits) E0 Encryption Algorithm E0 Encryption Algorithm Ciphertext (Packet) Plaintext (Packet) Plaintext (Packet) ClockA = Master Real-Time Clock (26 bits)EN_RAND = Encryption Random Number (128 bits)BD_ADDR = Bluetooth Device A (Master) Address (48 bits)K’C= Encryption Key (128 bits) Constant = 111000 (6 bits)

  37. Bluetooth Encryption Engine Summation Combiner Logic LFSR1 x1t LFSR2 x2t Initial Value LFSR3 x3t XOR Encryption Stream Zt(1 bit) LFSR4 x4t c0t Blend Z-1 1bit 2 bit T1 Ct Z-1 T2 x1t Ct + 1 2 bits x2t XOR 2 bits 2 bits + x3t 2 bits St + 1 3 bits + x4t /2 2 bits 3 bits Yt

  38. + + + 20 12 8 25 + 24 X2t + + + 24 12 16 25 - 31 + 24 X3t + + + 28 4 24 33 + 31 X4t + + + 28 4 36 33 - 39 + 31 X1t Bluetooth Encryption Engine Initialization ADR[2] CL[1] K’C[12] K’C[8] K’C[4] K’C[0] CL24 ADR[3] ADR[0] K’C[13] K’C[9] K’C[5] K’C[1] CL[0]L 001 ADR[4] CL[2] K’C[14] K’C[10] K’C[6] K’C[2] CL25 ADR[5] ADR[1] K’C[15] K’C[11] K’C[7] K’C[3] CL[0]u 111 CL[0]L = CL3 CL2 CL1 CL0 (4 bits) CL[0]u = CL7 CL6 CL5 CL4 (4 bits) ADR[n], CL[n], K’c[n] have 8 bitsCLn has 1 bit

  39. + + + + + + + + + Bluetooth Encryption Engine Run-up 20 Z[12]0 12 8 Z[0] Z[4] Z[8] + 24 X2t + + + 24 12 16 Z[9] Z[12]7- 1 Z[1] Z[5] + 24 X3t 28 4 24 Z[15]0 Z[2] Z[6] Z[10] Z[13] + 31 X4t 28 4 36 Z[3] Z[7] Z[11] Z[14] Z[15] 7 - 1 + 31 X1t

  40. To Probe Further • Bluetooth Special Interest Group (SIG) – 2004, “Specification of the Bluetooth System V2.” Retrieved on December 19, 2005, from https://www.bluetooth.org/spec/ • Dworkin, M (December 2001). Recommendation for Block Cipher Modes of Operation Methods and Techniques. NIST Special Publication 800-38A. Natl. Inst. Stand. Technol. Retrieved December 19, 2005, from http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf • Dworkin, M (May 2005). Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B. Natl. Inst. Stand. Technol. Retrieved December 21, 2005, from http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf • Dworkin, M (May 2004). Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C. Natl. Inst. Stand. Technol. Retrieved December 21, 2005, from http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf • Fluher, S., Mantin, I., and Shamir, A. (2001). Weaknesses in the Key Scheduling Algorithm of RC4. 8th Annual Workshop Selected areas in Cryptography. August 2001. • IEEE Std 802.16e – 2005, “Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems.” • IEEE Std 802.15.1 – 2005, “Part 15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs).” • IEEE Std 802.11i – 2004, “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements.” • Karygiannis, T, Owens L. (2002). Wireless Network Security, 802.11. Bluetooth and Handheld Devices. NIST Special Publication. Downloaded on November 15, 2004, from http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf • Shinder, D. (2005). 10 Ways to Wireless Security. Tech Republic. Retrieved October 10, 2005, from http://insight.zdnet.co.uk • Wi-Fi Security – Addressing Concerns. Hewlett Packer. Downloaded on October 10, 2003 from http://h50012.www5.hp.com/createuse/learning/ITguide_planning.asp

More Related