Sunteți pe pagina 1din 6

Mobile Agent based Authentication for Wireless

Network Security
Olatunde O. Abiona Yu Cheng
Department of Computer Information Systems, Department of Electrical and Computer Engineering,
Indiana University Northwest, Illinois Institute of Technology,
Gary, IN 46408, USA Chicago, IL 60616, USA
o_abiona@yahoo.com cheng@iit.edu

Abstract— The explosive growth witnessed by wireless networks wireless network. The security features for mobile
is largely due to the flexibility offered to both users and service communication system include: confidentiality on the air
provider. However, the open wireless medium makes traditional interface over the channel, anonymity of the user, and most
link-layer attacks readily available to anyone within the range of importantly, authentication of the users in order to prevent
the network. Confidentiality, integrity and authentication pose
fraudulent use of the system [1].
several challenges to wireless network security implementations.
The IEEE 802.11i security framework has some flaws, making Wireless network security is different from wired network
the traditional cryptographic mechanism provide weak security security primarily because wireless gives potential attackers
for the wireless environment. In this paper we explore the easy transport access medium. This access significantly
feasibility of mobile agents to provide secured access control for increases the threat that any security architecture must address.
next generation wireless infrastructure networks. Unfortunately, the early IEEE 802.11standards failed to
account for it [2]. Hence the security schemes in wired
Keywords- Authentication; Mobile agent; Next generation network cannot be used directly in wireless network.
networks; Wireless network security A typical wireless infrastructure network consist of a
wireless device known as a station (STA) communicating with
I. INTRODUCTION a centralized stationary Access Point (AP) over a wireless
Wireless networks has been experiencing an explosive channel. Security threats against the wired network are equally
growth similar to the Internet, this is largely due to the applicable to the wireless networks, but the wireless networks
attractive flexibility of anytime, anywhere network access suffer a number of additional vulnerabilities that make it more
challenging to secure [3].
enjoyed by both users and service provider. While the
emergence new wireless technologies can enable truly • Open wireless medium: The security threats of
ubiquitous Internet access, it also raises issues regarding the message eavesdropping and injection are universal in
dependability of the Internet service delivered to users, which any network; however, they are more severe in
may be impacted by the time-varying channel, limited wireless networks due to open wireless medium.
spectrum, mobility, and particularly the security issues • Limited bandwidth: Wireless networks are
focused on in this paper. particularly vulnerable to denial-of-service (DoS)
Basically Wireless Local Area Network (WLAN) can attacks and in-band signaling.
operate in two modes, the infrastructure based and the Ad hoc
• System Complexity: Wireless networks are far more
networks. Many organizations are deploying the infrastructure complex than the wired networks due to the special
based wireless network to provide connectivity to locations needs for mobility support and efficient channel
with difficult terrain, poor accessibility, or places difficult to utilization.
reach by direct cabling, to compliment the existing wired
networks. A lot of attention has been given to the provision of Mobile Agents (MA) is an effective paradigm for
these wireless networks, but little attention has been given to distributed applications and is particularly attractive in a
the provision of adequate security for the emerging wireless dynamic network environment involving partially connected
networks making the networks prone to traditional link-layer computing elements [4]. MA is defined as a software
attacks readily available due to proximity. component which is either a thread or a code carrying its
Wireless network security is more concentrated and execution state to perform the network function or an
complex than security of wired network because wireless is application [5]. MA can act as a middleware and perform
broadcast in nature, making it possible for anyone within the network and other application related functions based on
range of a wireless device to eavesdrop and intercept the underlying infrastructure: fixed wire network, wireless cellular
packets sent without interrupting the flow of data between the network or mobile ad hoc network [5]. MA paradigm is an
wireless device and the access point over the air. User emerging technology for developing applications in open,
authentication is a reliable wireless security protocol for best distributed and heterogeneous environment like the Internet.
safeguard against the risk of unauthorized access to the

978-1-4244-2202-9/08/$25.00 © 2008 IEEE 1075


Agents have the ability to decide autonomously where to server issues a challenge, the client hashes that challenge with
migrate to after they are dispatched; hence MA technology the password and forwards a response to the server, and the
offers several advantages in many application areas, such as e- server validates that response against the user's password
commerce, mobile computing, network management and retrieved from its database. Legacy password protocols are
information retrieval [5]. MAs are designed to execute locally easily subjected to eavesdropping and man-in-the-middle
on data at their destination, thus reducing network traffic and attacks. An eavesdropping attacker can easily mount a
latency. Furthermore, MA asynchronous interaction can dictionary attack against such password protocols. A man-in-
provide efficient solution in the case of unreliable and low the-middle attacker can pass through the entire authentication,
bandwidth connection, to support mobile users that could and then hijack the connection and act as the user.
disconnect while their agent still roam in the network. The Data Privacy - Another concern is the security of the wireless
proposed MA based authentication architecture will prevent data connection between the client and access point
the transmission of authentication information over the air subsequent to authentication. While client and access point
eliminating the possibility of man-in-the-middle attack with could easily negotiate keys subsequent to authentication, if the
rogue access point and eavesdropping since authentication keys are not cryptographically related to the prior
information are carried by encrypted MAs. Furthermore, authentication the data session would be subject to a man-in-
mobile clients requires authentication at the various access the-middle attack. Therefore it is incumbent upon the
point to maintain their connection to the network, the authentication negotiation to result in keys that may be
proposed MA architecture is effective for moving distributed to both client and access point to allow the
dynamically both code and state during every authentication subsequent data connection to be encrypted.
process since the operation performed are always the same. In Rogue Access Point - A final security challenge results from
this paper we explore the possibilities of using MAs to provide the possibility that someone could install a WLAN access
secure access control for next generation wireless point and network and fool your user into doing work on that
infrastructure networks. network. Rogue access points are those installed by users
The rest of the paper is organized as follows: In Section II without coordinating with the IT unit. Because access points
we discuss the security challenges in wireless networks, and in are inexpensive and easy to install, rogue installations are
section III the security issues with mobile agents and possible becoming more common.
solutions. In section IV we propose the Mobile Agent Limited Bandwidth – The networks that connect handheld
Authentication Architecture (MA3) and in section V we wireless devices such as phones and Personal Digital
describe the proposed mobile agent platform and finally the Assistants (PDAs) suffer from low bandwidth and high
paper concludes in section VI. incidence of network errors. Mobility can also result in the
loss or degradation of wireless connections [6]. Limited
II. SECURITY CHALLENGES IN WIRELESS NETWORKS communication bandwidth may also be a target for malicious
Securing a wireless network poses unique challenges attacks such as DoS attack. To implement such attack, the
compared to a wired network due to the open nature of the malicious node may send vicious queries flooding to target
access medium, in general wireless networks suffer from nodes to consume the bandwidth and occupy the shared
security threats of wired networks and additional wireless media, which make the network service unavailable
vulnerabilities making it more challenging to secure. Wireless to other nodes [4]. Apart from the limitation in bandwidth
network security is different from wired network security constraint, each node in a wireless communication and mobile
primarily because it gives potential attackers easy transport computing has limited transmission range and limited power
medium access. This access significantly increases the threat supply.
that any security architecture must address. Unfortunately, the System Complexity - Wireless networks are far more complex
early IEEE 802.11standards failed to account for it [2]. Hence than the wired networks due to the special needs for mobility
the security schemes in wired network cannot be used directly support and efficient channel utilization. It should be noted that
in wireless network. The fact that data is being broadcast via each complexity in the system, adds additional security
radio waves rather than transmitted over a wire introduces vulnerability to the wireless networks especially in systems
security challenges namely: with large user population and complex infrastructure [3].
• How can you prevent user credentials from being
hijacked during authentication negotiation? III. SECURITY ISSUES WITH MOBILE AGENTS AND
• Once authentication is complete, how can you protect SOLUTIONS
the privacy of the data being transmitted between Threats to security can be classified into three main classes
client and access point? And finally namely: disclosure of information, denial of service and
• How can you make sure the authorized user connects corruption of information. MA security can be considered
to the right network? using a simple model consisting of an agent and the agent
platform. An agent is comprised of the code and the state
The concerns are that of authentication, data privacy and information for carrying out some computation, mobility
rogue access point. enables the agent to move among agent platform and the agent
Authentication - Most password-based protocols in use today platform provides the computational environment for the agent
rely on a hash of the password with a random challenge. The to operate. The platform from which the agent was dispatched

1076
is known as the home platform, this is the most trusted of mobile agents. First we consider technologies protecting the
environment for an agent. An agent system model is shown in executing agent platform from agents, and then we consider
figure 1. One or more hosts may comprise an agent platform, mechanisms addressing various security aspects of the mobile
and an agent platform may support multiple computational agent.
environments or meeting places, where agents can interact. A. Protecting the Agent Platform
MA’s moving around the network is not safe. There are four
A major concern with agent system implementation is to
threat categories identified: The Agent-to-Platform, Agent-to-
ensure that agents are not able to interfere with one another or
Agent, Platform-to-Agent, Other-to-Agent Host attacks are the
with the agent platform. Some techniques used for protecting
kinds of security attacks that are possible in a Mobile Agent agent platforms are described in details in [7,8]. This includes:
System [6].
• Software-based fault isolation (sandboxes)
• Safe code interpretation
• Signed code
• State appraisal
• Path Histories and
• Proof Carrying code
Another technique proposed in [9] replaced the Trusted
Processing Environment (TPE) by a software machine called
SVM (Secure Virtual Machine). The secure virtual machine
SVM is a software layer installed between the operating
system and the agent environments. The platforms to be
visited by the agent must have a certified SVM. On a platform,
Figure 1. Agent System Model SVM receive an agent and creates an instance of SVM to
execute only this agent in an allocated memory space called
Agent-to-Platform attacks represent the set of threats in which closed environment. Finally, before migration, the agent will
agents exploit security weakness of agent platform, Threats be associated with a signed stamp that contains the actual
include: platform time and the next platform time.
• Masquerading
B. Protecting Agents
• Denial of service and
Most of the attempts to counter the threats posed to mobile
• Unauthorized access. agents have addressed a particular part of the problem. While
Agent-to-Agent attacks represent the set of threats in which countermeasures directed towards platform protection
agents exploit security weakness of other agents. Threats emphasizes active preventive measures, countermeasures
include: directed towards agent protection tend towards detection
• Masquerading measures as a deterrent. Once an agent has arrived at a
• Unauthorized access platform, little can be done to stop the platform from treating
the agent in any manner. The problem is usually referred to as
• Denial of service and the malicious platform problem. Some techniques used for
• Repudiation. protecting agents are described in details in [7,8]. This
Platform-to-Agent attacks represent the set of threats in which includes:
platforms compromise the security of agents. Threats include: • Contractual agreements
• Masquerading • Trusted hardware
• Denial of service • Trusted nodes
• Eavesdropping and • Mutual itinerary recording
• Alteration. • Execution Tracing
Other-to-Agent-Platform attacks represent the set of threats in • Environment key generation
which external entities, including agents and agent platforms, • Co-operating agents
threaten the security of an agent platform. Threats include: • Encrypted payload
• Masquerading • Computing with encrypted functions
• Denial of service • Undetachable signatures
• Unauthorized access and • Obfuscated code
• Copy and replay.
Furthermore, there are no known techniques for
We will describe available technologies and research efforts establishing the lower bounds on the complexity for an attacker
addressing the security issues arising from the mobility property to reverse engineer an agent’s code.

1077
IV. PROPOSED MOBILE AGENT AUTHENTICATION authentication. The mobile client will continue to have access
ARCHITECTURE (MAAA OR MA3) to the network as long as the authentication is successful.
The proposed MA3 is based on the traditional network Below are a list of some mobile agents; Aglets, Voyager,
architecture, which is hierarchical. The system architecture for Odyssey, Concordia, ARA, Mole, Agent TCL, TACOMA and
MA3 is shown in figure 2. In MA3 there are two types of SHIP-MAI. The four commonly used application environment
agents namely: for MA has been described in [10]. The proposed modification
• Supplicant Mobile Agent (SMA) to the IEEE 802.1x protocol is the installation of an agent
platform on the supplicant for the SMA and Agent platforms
• Authentication Server Agent (ASA) on the authentication server to enable agents operate in that
The SMA is a mobile agent while the ASA is a static agent. A environment.
static agent is similar to a mobile agent, except that the static A. Security Model For MA3
agent does not have the ability to move.
The proposed security model for MA3 is similar the IEEE
802.1x authentication protocol setup, involving the following
three components [11]:
INTERNET • Supplicant
• Authenticator and
• Authentication server.
LAN The security framework in MA3 comprises of the following:
• Supplicant Platform
• Supplicant Mobile Agent (SMA)
Authenticator Authenticator Authenticator • Supplicant Mobile Agent with Certificate (SMA
Cert)
• Authenticator (Access Point)
Authentication Server • Authentication Server Platform
• Authentication Server Agent with certificate (ASA
Cert)
The proposed mobile agent authentication model is shown
in figure 3. Agent platforms are installed on both the
Supplicant Supplicant Supplicant supplicant and the authentication server to enable MA run
Movement Movement
directly on them. When a supplicant come within the range of
Figure 2. MA3 System Architecture an authenticator, the authenticator sends a request for
identification of the supplicant, the supplicant will then
• SMA is a mobile agent that represents the clients in a dispatch the SMA carrying all the required authentication
wireless network, e.g. Wireless laptop card. information for the supplicant i.e. username, password and
• ASA is a static agent representing the authentication platform details for that particular user to the authentication
server. ASA agent is contacted by the SMA agent in server platform.
order to authenticate a wireless client to an
authenticator i.e. the access point. Supplicant Authenticator

In order to protect the wireless networks from parking lot Supplicant


Platform Access Wired
attackers, strong access control, ideally on per packet basis Point Network
must be enforced. Furthermore, mutual authentication should SMA

also be performed, since access points are untrusted entities Cert SMA
from the supplicant’s point of view. User authentication is best 1
safeguard against the risk of unauthorized access to the
wireless networks. However, one emerging technology could
Cert
be much more adaptive than others in such environment. This 2 ASA
SMA
technology is the mobile agent. In this paper we propose the
3
MA3 as a solution to the security problem inherent in IEEE
Authentication
802.1x authentication and key management for the next Server Platform
generation wireless networks.
Wireless infrastructure networks consist of one or more APs Authentication Server
used by wireless and/or mobile client to gain access into the
network. Inside the wireless card is the SMA; as the mobile Figure 3. The Security Model for MA3
client roams around the network after authentication so does
the SMA move from one AP to another, re-authenticate the
mobile client using certificates acquired from previous

1078
The ASA Cert is a static agent residing on the authentication C. Agent Migration in MA3
server platform; the ASA Cert combines two functions: In MA3, the supplicant agent is the only mobile agent in the
• Certificate Authority- in charge of the issuing and the system; providing better security for the wireless/mobile client
management of certificates during the authentication process in a wireless network.
During the authentication of a wireless client, the client
• Authentication server- for authenticating users, agent, identification and password are sent over free air from the
and platforms. supplicant through the authenticator using the uncontrolled
The SMA will meet with the ASA Cert for the authentication port to the authenticator. The use of mobile agent for
process. A mutual authentication between SMA and ASA Cert authentication will provide a more secure transmission of this
is carried out. If the authentication process is successful, then information since the agents themselves are secured. Rather
the network port on the authenticator opens and the supplicant than sending messages over free air, the SMA, collects all the
will now have access to the network. The SMA will now be authentication information from the supplicant and then
issued a certificate to become SMA Cert before returning to travels to the authentication server platform in order to meet
the supplicant platform. with ASA for the authentication process. The SMA and ASA
will exchange several challenge and response. If the process is
successful, then the authentication server will send EAP
B. MA3 System Operation
success to the authenticator, there by allowing the supplicant
The overall system operation is shown in figure 4. The to connect through controlled port to the LAN and Internet.
wireless client card is the supplicant, the supplicant Whenever the client moves from one authenticator to
authenticates with the authentication server through the mobile another, the SMA is again authenticated at the new
agent platform installed in the authentication server ASA. The authenticator, if the authentication process is successful, the
SMA migrates to the authentication server platform carrying authentication server immediately sends an EAP success
with it the authentication data from the supplicant. On message to the new authenticator and the supplicant will
reaching the authentication server platform, the ASA and the continue to connect to the LAN and Internet. But, if the
SMA exchange a series of challenge and response to authentication process fails, then the authentication server
authenticate the supplicant. If the authentication process is immediately sends an EAP failure to the authenticator, to
successful, the authentication server sends a success extensible disconnect the supplicant from the network. Figure 5 shows
authentication protocol (EAP) message to the authenticator the migration process in MA3. Since the clients are mobile, the
and the supplicant and the authenticator share EAP over LAN certificate issued during the initial authentication if still valid,
(EAPOL) key exchange. If all the exchanges are successful, could help speed up multiple authentications at the various
then the authenticator will allow traffic flow through the APs.
controlled port permitting the client access to the network. On
the other hand if the authentication process fails, the Authenticator
wireless/mobile client is denied access to the network. Supplicant
Platform
Authenticator 4 LA Internet
Supplicant
SMA
Platform
LAN 3
Internet
1 2 EAP
SMA ASA
SMA

5
Platform
EAP messages
(RADIUS)
Authentication server
SMA ASA SMA
7
6
Platform EAP
Platform Authentication Server

Supplicant

3
Figure 4. MA System Operation Authenticator
3 Figure 5. Agent Migration Process
In MA two types of agent are used, one of the agents will
reside in the client network interface card, while the other
resides in the authentication server. Similarly there are agent After a successful authentication, the proposed system also
platform installed on the client card and the authentication conducts re-authentication as part of its security features to
server. However, no modifications will be made to the prevent a client from changing his identity during a session or
authenticator (Access Point) design. while connected and roaming in the network. Re-
authentication is carried out periodically using the following
steps: the authenticator sends a request for authentication; the

1079
supplicant deploys the SMA with the identity of the client to medium or free air. This has made it impossible to use
the authentication server. The SMA and ASA will exchange a physical security controls to restrict access to the network. As
series of challenge and response, again to verify the identity of a result, strong access control and authentication becomes very
the client. If the process is successful, the authentication server important for providing effective security for the next
sends an EAP success to the authenticator and the supplicant generation wireless networks.
remain connected. If however, the process fails, the Unfortunately, the IEEE 802.1x authentication and key
authentication server sends an EAP failure to the management has some flaws in the composition of the
authenticator, disconnecting the suplicant from the network. protocol. In this paper, we explore the feasibility of
Figure 6 shows the authentication and re-authentication introducing MAs to secure authentication for next generation
process in MA3. In this work, we explored the feasibility of wireless infrastructure networks. The inherent secure features
introducing mobile agents to secure authentication for next of MAs provide an attractive means to enhance access control
generation wireless infrastructured networks. The inherent in a wireless environment. To achieve this we propose the
secure features of mobile agents provide an attractive means to MA3 to eliminate eavesdropping and man-in-the-middle attack
enhance access control in a wireless environment resulting in a by hackers within the range of the wireless network.
more secure transmission for the authentication session. However, there are still other security issues to be addressed
in the future. This includes:
Supplicant
Authenticator
• Confidentiality
Platform
4 • Integrity
LAN Internet
• Availability and
• Anonymity
SMA 5
Future research should give consideration to all of the above
in the context of the MA technology. Further, since MAs have
3
EAP messages strengths in a distributed and heterogeneous environment, the
(RADIUS)
1
2
proposed MA architecture may be consider in mobile ad hoc
SMA ASA networks in further work.

Platform Authentication Server REFERENCES


[1] J. Zhu, and J. Ma, "A new authentication scheme with anonymity for
Figure 6. Authentication and Re-authentication Process wireless environments,” IEEE Transactions on Consumer Electronics,
vol. 50, no 1, pp. 231–235, February 2004.
[2] W. A. Arbaugh, "Wireless security is different,” Magazine of IEEE
V. PROPOSED MOBILE AGENT PLATFORM Computer Society, Computer, vol. 36, no 8, pp. 99–101, August 2003.
The Aglets Software Development Kit is an environment [3] H. Yang, F. Ricciato, L. Songwu, and L. Zhang, “Securing a wireless
for programming MA in Java. The aglet is able to execute, halt world”, Proc of IEEE vol. 94, no 2, pp. 442–454, February 2006.
[4] L. Xia, and J. Slay, “Securing wireless ad hoc networks: towards a
its execution on one host, dispatch itself to another host, and mobile agent security architecture,” [online]. Available:
resume execution there. The aglet is capable of moving both http://esm.cis.unisa.edu.au/new_esml/resources/publications/ 2004.
the code as well as the data. The aglet is well suited for the [5] S.P. Alampalayam, and A. Kumar, “An adaptive security model for
internet environment. The proposed mobile agent platform is mobile agents in wireless networks,” in Proc. IEEE Global
Telecommunications Conference, 2003 (GLOBECOM '03), vol. 3. pp.
listed below.
1516–1521, December 2003.
• ASDK free software by IBM [6] L. Vasiu, and Q. H. Mahmoud, “Mobile agents in wireless devices,”
• Latest version is 2.0.2 Magazine of IEEE Computer Society, Computer, vol. 37, no 2, pp. 104–
• Good GUI 105, February 2004.
• Very accessible [7] W. Jansen, T. Karygiannis. NIST Special Publication 800-19 – “Mobile
Agent Security,” [online]. Available
• Good documentation http://csrc.nist.gov/publications/nistpubs/800-19/sp800-19.pdf
• Implemented standards; MASIF, and CORBA [8] N. Borselius, ”Mobile agent security,” Electronics and Communication
• Communication; Message passing between agent, Engineering Journal, vol. 4, no 5, pp. 211–218, October 2002.
socket [9] H. Aouadi, and M. B. Ahamed, “Modile agents security,” in Proc. 2nd
International conference on Mobile Technology, Applications and
• Mobility; Java serialization Systems, pp. 1–6, November 2005.
• Security policy; built in security mechanism [10] Y. Wang, C. Wang, and L. Cheng-Horng, “Mobile agent protection and
verification in the internet environment,” in Proc. 4th International
VI. CONCLUSION AND FUTURE WORK Conference on Computer and Information Technology (CIT’04), pp.
482–487, September 2004.
The explosive growth of wireless network has made the [11] N. Aboudagga, M.T. Refaei, M. Eltoweissy, L.A. Dasilva and J.
provision of adequate and effective security challenging for Quisquater, “Authentication protocols for ad hoc networks: taxonomy
such networks. User Authentication, a reliable wireless and research issues,” in Proc. 1st ACM International Workshop on QoS
security protocol is an effective technique for preventing and Security in Wireless and Mobile Networks, Montreal Quebec,
Canada, pp. 96–104, October 2005.
unauthorized access to such networks. A major weakness in
the security of wireless networks is the use of a shared

1080

S-ar putea să vă placă și