Confidentiality and access control
Confidentiality and access control services are intertwined. In addition to secrecy of the data in transit, the confidentiality service also proves the integrity of frame contents. Both secrecy and integrity depend on shared cryptographic keying, so the confidentiality service necessarily depends on other services to provide authentication and key management.
Authentication and key management (AKM)
Cryptographic integrity is worthless if it does not prevent unauthorized users from attaching to the network. The confidentiality service depends on the authentication and key management suite to establish user identity and encryption keys. Authentication may be accomplished through an external protocol, such as 802.1X, or with pre-shared keys.
Cryptographic algorithms
Frames may be protected by the traditional WEP algorithm, using 40- or 104-bit secret keys, the Temporal Key Integrity Protocol (TKIP), or the Counter Mode CBC-MAC Protocol (CCMP). All of these algorithms are discussed in detail in Chapters 5 and 7.
Origin authenticity
TKIP and CCMP allow the receiver to validate the sender's MAC address to prevent spoofing attacks. Origin authenticity protection is only available for unicast data.
Replay detection
TKIP and CCMP protect against replay attacks by incorporating a sequence counter that is validated upon receipt. Frames which are "too old" to be valid are discarded.
External protocols and systems
The confidentiality service depends heavily on external protocols to run. Key management is provided by 802.1X, which together with EAP carries authentication data. 802.11 places no constraint on the protocols used, but the most common choices are EAP for authentication, and RADIUS to interface with the authentication server.
In this tutorial:
- 802.11 Networks
- IEEE 802 Network Technology Family Tree
- Nomenclature and Design
- Types of Networks
- Independent networks
- Infrastructure networks
- Extended service areas
- Multi-BSS environments: "virtual APs"
- Robust security networks (RSNs)
- The Distribution System, Revisited
- Interaccess point communication as part of the distribution system
- Wireless bridges and the distribution system
- Network Boundaries
- 802.11 Network Operations
- Network Services
- Station services
- Distribution system services
- Confidentiality and access control
- Spectrum management services
- Mobility Support
- Designing Networks for Mobility