User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
Date Code 20050615 Instruction Manual SEL-3022 Transceiver
Wireless Operator Interface Security
IEEE 802.11 WEP Security
C.5
Cryptographic Manual—Do Not Copy
IEEE 802.11 WEP Security
The IEEE 802.11 designers included provisions for data encryption and authentication
to provide what they considered strong data security and network access control. The
Wired Equivalent Privacy (WEP) procedures outlined in the standard provide both
functions. WEP encryption cryptographically scrambles the data contents of the Media
Access Control (MAC) packet prior to transmission. The MAC packets can be
intercepted, but the data scrambling the encryption process provides will, in theory,
make the data payload and network headers (above the MAC network layer)
incomprehensible. The encryption and decryption operations are a function of the
original message data and a secret encryption key. For symmetric encryption
algorithms, such as the RC-4 algorithm WEP uses, the encryption key and decryption
keys are identical. Several factors, including the following, determine the strength or
security of the encryption process:
➤ The secrecy of the key
➤ The length of the key
➤ How often the key value changes
➤ The cryptographic strength of the encryption algorithm
Because the encryption and decryption keys are identical for symmetric encryption
algorithms, the theft or deduction of the key value by a malicious individual will
remove any protection WEP encryption offers. There are a few common methods for
determining a key value. The would-be attacker can simply steal the key value in some
manner. If that option is not available, the attacker can attempt to guess the key value.
The difficulty of such a guessing, or brute-force attack, grows exponentially with the
length of the key. The encryption process can be strengthened against key-guessing
attacks through periodic changes to the key value. If someone ever guesses the key
value, the attacker can only decrypt the data processed with that key. Changing the key
value on a periodic basis can significantly reduce the data a single key processes.
Finally, the cryptographic strength of the encryption algorithm determines how
difficult it is to compromise portions of the encrypted messages. If the algorithm is
cryptographically sound, it is extremely difficult mathematically to compromise the
key value or message contents from publicly available knowledge. Publicly available
knowledge includes the encrypted message itself, known as ciphertext, and prior
knowledge of the contents of the message This prior knowledge, for example, could
include the statistics of English text or knowledge of the location and value of an
encrypted header field. The IEEE 802.11 standard specifies that if the incoming packet
cannot be decrypted properly, it must be dropped and ignored. All hosts must know the
value of the secret encryption key prior to being granted network access. The network
designer controls the dissemination of the key value and, therefore, controls who has
access to the WEP-protected network.
Preliminary Copy