802.11i Security Analysis: Can we build a secure WLAN?

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=aD4n1JiIRSw



Duration: 1:04:29
974 views
2


Abstract: Security has become a serious concern in wireless local area networks. In order to eliminate the vulnerabilities in previous security mechanisms, IEEE Task Group i has designed 802.11i to provide enhanced MAC security in a WLAN system. In this talk i will discribe our analysis on the security of 802.11i with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.11i could provide satisfactory data confidentiality, integrity and authentication, but there are still some problems left. Since the 802.11i design does not emphasize availability, several DoS attacks are possible. We analyze the vulnerability in the 4-Way Handshake and propose corresponding solutions, which are adopted by the IEEE TGi. Furthermore, we identify the RSN IE Poisoning and Rollback problem, which can be mitigated by some modifications on the standard and careful implementations. I will also review some other vulnerabilities and discuss their practicality. In order to address all these vulnerabilities and make the protocol more robust, we propose an improved variant of 802.11i with a different failure recovery strategy. Moreover, I will talk about two useful methodologies, finite-state verification and protocol logic, which we used to analyze the security of 802.11i.




Other Videos By Microsoft Research


2016-09-05Program Analysis with Binary Decision Diagrams
2016-09-05Making Wireless LANs Faster and Fairer
2016-09-05More Than Human : Embracing the Promise of Biological Enhancement
2016-09-05Using Open Specifications for XML Web Services to Build Maintainable & Secure Health Care Systems
2016-09-05Source Code Evolution with Interactive Transformations
2016-09-05Is Linux Maintainable?
2016-09-05Pastiche: decentralized, low-cost backup using untrusted, Internet storage
2016-09-05Measurement-driven Modeling and Design of Internet-scale Systems [1/2]
2016-09-05Distributed hash tables for large-scale cooperative applications
2016-09-05Talk 1: Convergence research in the UK; Talk 2: Artistic rendering in the convergence area
2016-09-05802.11i Security Analysis: Can we build a secure WLAN?
2016-09-05Gadgets for good: How computer researchers can help save lives in poor countries
2016-09-05Inferring Information Status for Reference Generation in Open Domains [1/12]
2016-09-05Improving the Reliability of Commodity Operating Systems [1/2]
2016-09-05Mentoring: The People Who Lead Us Toward Our Purpose in Life
2016-09-05Data Structure Repair
2016-09-05The neurophysiology of decision making: rate differences and log likelihood ratios
2016-09-05Can Parallel Computing Finally Impact Mainstream Computing?
2016-09-05Making Networks More Robust
2016-09-05Routing Tradeoffs in Dynamic Peer-to-peer Networks
2016-09-05Enhancing Security of Real-World Systems with a Better Understanding of the Threats



Tags:
microsoft research