Wireless Networks - Energy, Security

Slides:



Advertisements
Similar presentations
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
Advertisements

Your Wireless Network has No Clothes CS 395T William A. Arbaugh, Narendar Shankar, Y.C. Justin Wan.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Wireless Security David Wagner University of California, Berkeley.
Wireless Privacy: Analysis of Security Nikita Borisov UC Berkeley
COMP4690, HKBU1 Security of COMP4690: Advanced Topic.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Power saving technique for multi-hop ad hoc wireless networks.
Energy Models David Holmer Energy Model  Captures the effect of the limited energy reserves of mobile devices (i.e. batteries)  Models.
Networks Olga Agnew Bryant Likes Daewon Seo.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Maintaining Performance while Saving Energy on Wireless LANs Ronny Krashinsky Term Project
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Energy Efficient Network Protocols for Wireless Networks Kiran Muthabatulla.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Wireless security Wi–Fi (802.11) Security
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
Network Infrastructure
WEP & WPA Mandy Kershishnik.
CSE 4905 Network Security Overview
Wireless Security Ian Bodley.
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Energy Management System in Ad Hoc Wireless Networks
Wireless Privacy: Analysis of Security
Mobile ad hoc networking: imperatives and challenges
Wireless Network Security
CSE 4905 WiFi Security I WEP (Wired Equivalent Privacy)
basics Richard Dunn CSE July 2, 2003.
Security Of Wireless Sensor Networks
WLAN Security Antti Miettinen.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Antti Miettinen (modified by JJ)
Security of Wireless Sensor Networks
Investigating Mac Power Consumption in Wireless Sensor Network
Security Issues with Wireless Protocols
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

Wireless Networks - Energy, Security Christine E. Price, Krishna M. Sivalingam, Prathima Agarwal and Jyh-Cheng Chen, "A Survey of Energy Efficient Network Protocols for Wireless and Mobile Networks", Accepted for ACM/Baltzer Journal on Wireless Networks, Jan 2001 Nikita Borisov (University of California, Berkeley, USA); Ian Goldberg (Zero Knowledge Systems, Canada); and David Wagner (University of California, Berkeley, USA). "Intercepting Mobile Communications: The Insecurity of 802.11", Mobicom 2001 17-Nov-18 4/598N: Computer Networks

Motivation: Energy consumption for iPAQ Operation Energy (mW) iPAQ (fully powered, no wireless, with serial) 929 Agere WNIC 802.11b (11 Mbps) Sleep 177 Idle 1319 Recv 1425 Send 1675 Note: Overall energy consumed depends on the components, peripherals and their energy states iPAQ battery capacity – 2*950mAh (2*2850mWh @ 3V) Source: Compaq researchers, Sukjae Cho, Paul Havinga, Mark Stemm 17-Nov-18 4/598N: Computer Networks

Energy conservation techniques Physical layer Avoid collisions (wasted energy) Packet delivery at well defined intervals How do new nodes join? What about throughput? Reduce switching between transmit and receiving MAC layer IEEE 802.11 - scheduled rendezvous mechanism 17-Nov-18 4/598N: Computer Networks

IEEE 802.11b power saving mode (PSM) Scheduled rendezvous mechanism using beacons Access point (AP) informs client of pending packets at predefined intervals (beacon interval) Clients transition to lower energy consuming states between scheduled beacons beacon 1 2 2 1 2 1 Access point beacon with data Beacon Interval Wait Interval What’s AP? What’s PS? If someone isn’t totally listening to your words, they shouldn’t have to be totally lost if they can read your slides. So don’t just use abbrev. On your slides. PS poll 1 1 Client 1 sleep PS data 2 2 Client 2 sleep 17-Nov-18 4/598N: Computer Networks

Energy conservation Network layer TCP Balance topology maintenance with energy overhead Broadcast/unicast differences Analysis of ad-hoc routing protocols from an energy perspective TCP TCP probing - not all packet loss is congestion related 17-Nov-18 4/598N: Computer Networks

802.11 networks utilize Wireless Equivalent Privacy protocol (WEP) Security 802.11 networks utilize Wireless Equivalent Privacy protocol (WEP) Confidentiality: Prevent casual eavesdropping Access control: Protect access to wireless infrastructure Data integrity: Prevent unauthorized tampering WEP utilizes a shared secret (WEP key, array of 4 shared keys) Checksumming P = M,c(M) Encryption C=PRC4(v,k) Transmission v,C 17-Nov-18 4/598N: Computer Networks

Risks Keystream reuse: If you know the keystream v, and information about the plain text message, then you can get the cipher text Certain IP packets are predictable Proactively create packets by sending known strings, say via SPAM Buggy implementation - broadcasting encrypted and unencrypted Build a dictionary of known keystream values By IEEE standard, v is only 24 bits wide Dictionary valid irrespective of the encryption key width Keystream can be reused many times Some cards always start with 0 Shared keys are usually same for all clients 17-Nov-18 4/598N: Computer Networks

Message authentication failure WEP checksum is a linear function Crypto experts would never use such a scheme Protocol was developed like a network protocol - liberal Use client association packets IP redirection to have access point do the work for us Use TCP client check summing mechanism End-to-end mechanisms such as VPN/IPSEC helps Treat wireless LANs as untrusted 17-Nov-18 4/598N: Computer Networks