Review Article

WiFi and WiMAX Secure Deployments

Table 1

WiFi and WiMAX security comparison.
(a)

IEEE ProtocolWiFi

WEPWPAWPA2

Authentication MethodOpen System Authentication802.1X authentication802.11X authentication with (RADIUS) server. The EAP method used by IEEE 802.1X will support mutual authentication, as the STA needs assurance that the AP is legitimate
Shared  Key Authentication Shared  Key Authentication

Key Derivation and ManagementKey Management and  short descriptionThe keys from traffic encryption are consisted of the concatenation of the 40 bit shared key and the 24 bit IV for a 64 bit key. Most of the vendors use a 104 bit shared key concatenated with the 24 bit IV to create a 124 bit keyTKIP. The 48-bit IV field is used as MPDU TKIP Sequence Counter (TSC). TKIP uses key mixing consisted of the Temporal Key (TK), the Transmit Address (TA), and the TSC for the WEP seed. The WEP seed produced from the  aforementioned parameters  operates just like the WEP IV. Therefore, assures that every data packet is sent with its own unique encryption keyPairwise key hierarchy for  unicast  traffic protection. The first key is the 256 bit PMK. PMK derivation depends on the authentication method. If 802.1X is used, the PMK derives from server and the first 256 bits AAA key. If pre-shared key is used, the password is used to create the PMK. PMK generates the PTK from PMK. From PTK three keys are derived. (I) The 128 bit EAPOL KCK, for data origin authenticity in the authentication procedure. (II) The 128 bit EAPOL KEK. (III) The 256 bit for TKIP or 128 bit for AES-CCMP Temporal Key (TK) for WPA2 traffic confidentiality. Group key hierarchy for multicast and broadcast traffic protection. The first key created is the GMK. The key GTK. Its length is 256 bit with TKIP, and 128 bit for CCMP. The TK derived from GTK is 256 bit with TKIP, and 128 bit for CCMP and it is used for confidentiality

ConfidentialityTraffic  Key Encryption AlgorithmNoneNoneTK encryption: (I) RC4 with 128-bit KEK. (II) With AES Key Wrap with 128 bit KEK.
Cipher Algorithms for traffic Data and Key size RC4 with 64 bit key (WEP-40).RC4 with 256-bit keyAES-CCM with 128 bit TK
RC4 with 128 bit key (WEP-104)
Encrypted Frames MPDU + ICV MPDU + MIC + ICV MPDU + MIC

IntegrityIntegrity Algorithm32 bit ICV with CRC-32(i) 64 bit Michael MIC.(i) 64 bit CCM MIC for traffic messages
(ii) 32 bit ICV.(ii-a) HMAC-MD5 with KCK,
(ii-b) HMAC-SHA1 with 128 bit KCK for EAPOL 4-way handshake.
Protected FramesMPDU[Michael MIC]: MSDU Sender and Destination Address (SA, DA), the MSDU Priority, and the MSDU payload [MIC]: MPDU+ Additional Authentication Data (AAD). The AAD is comprised of the MPDU header, subfields from MAC frame control, addresses from source and destination fields, Sequence Control (SC), QoS control field.
[ICV]: MPDU[HMAC]: EAPOL 4-way handshake messages.

(b)

IEEE ProtocolWiMAX

802.16802.16e

AuthenticationMethodPrivacy Key Management Protocol (PKM). Only SS authentication with X.509 version 3 and RSA public-key cryptography2 PKM versions. V.1 is the 802.16 PKM, and V.2 is more enhanced with mutual authentication option (BS presents its certificate to SS). Two authentication schemes can be used separately or combined: RSA, EAP, RSA-EAP, EAP after EAP authentication. For RSA, client authentication with X.509 v.3 certificates. EAP uses credentials: X509 certificate for EAP-TLS, or Subscriber Identity Module for EAP-SIM

Key Derivation and ManagementKey Management and  short descriptionAfter Certificate approval, BS sends authorization reply with Authorization Key (AK) encrypted with client’s Public Key, and the Security Association set Identity (SAID). From AK derives KEK, HMAC_KEY_U, HMAC_KEY_D, (U for uplink and D for downlink). The last two keys used for the HMAC digest for management messages. For every SAID, a TEK state machine is responsible for key material usage. TEK sends periodically messages for key content refresh. TEK key material is used for uplink and downlink encryption. BS maintains 2 sets of active AKs and TEKs, old and new for each SAID. There is a 4-bit AK sequence number increased by one for each new AK. Additionally a 32-bit packet number (PN). Both prevent replay attacksAK in PKM v.2 operates as in PKM. In PKM v.2, there two key material primary sources. For RSA, BS’ initial key material is the 256-bit pre-PAK (primary authorization key). Pre-PAK gives 160 bit PAK and 160 bit EIK (EAP Integrity Key). PAK+EIK+SS MAC address + BSID generate AK. For EAP only, the initial key is the 512-bit Master Session Key (MSK) and generates the 160 bit Pairwise Master Key (PMK) and optionally the 160 bit EIK with MSK truncation to 320 bits. From PMK+SS’ MAC address + BSID AK derives. For RSA-EAP, PAK and EIK derive from RSA and PMK from EAP. AK is generated from PAK XOR PMK+ SS’ MAC address + BSID. For EAP after EAP, PMK1 and EIK derive and from 2nd EAP PMK2 derives. PMK1 XOR PMK2+SS’ MAC address and BSID, the AK derives. From AK 3 keys derive: One is the 128-bit KEK and the other two are: (I) The 160 bit HMAC_KEY_U and HMAC_KEY_D, if HMAC is used, and (II) The 128 bit CMAC_KEY_U and CMAC_KEY_D, if CMAC is used. If EAP only is used, the three aforementioned keys will derive from EIK. All key derivations are based on the Dot16KF algorithm

ConfidentialityTraffic  Key Encryption Algorithm(i)112 bit 3-DES with 64 bit KEK, if TEK is 64 bits.(i) 112 bit 3-DES with 64 bit KEK, if TEK is 64 bits.
(ii) AES in ECB mode with 128 bit KEK, if TEK is 128 bits.(ii) AES in ECB mode with 128 bit KEK, if TEK is 128 bits.
(iii) RSA encryption with SS’s public key if TEK is 128 bits. (iii) RSA with SS’s public key if TEK is 128 bits.
(iv) AES Key Wrap with 128-bit KEK for 128-bit TEK encryption.
Cipher Algorithms for traffic Data and Key size (i) DES- CBC with 56 bit TEK and 64 bit block encryption along with 64 bit IV.(i) DES in CBC mode.
(ii) AES in CCM mode with 128 bit TEK. (ii) AES in CCM mode.
(iii) AES in CBC mode with 128 bit TEK.
Encrypted FramesMPDU + ICVMPDU + MAC (Message Authentication Code)

IntegrityIntegrity Algorithm(i) DES-CBC mode for 64 bit ICV.(i) DES-CBC mode for 64 bit MAC.
(ii) AES-CCM mode for 64 bit ICV.(ii)  AES-CCM mode for 64 bit MAC.
(iii) SHA-1 for HMAC.(iii) AES-CBC mode for 64 bit MAC.
(iv) SHA-1 for HMAC Digest.
(v) AES-CMAC value.
Protected Frames [ICV]: MPDU + additional packet information. [MAC]: MPDU = additional packet information.
[HMAC]: Management messages.[HMAC]: Management messages.
[CMAC]: Management messages + additional information.