Basic radio frequency communications - 2 Session 1.

Slides:



Advertisements
Similar presentations
Introduction to Public Land Mobile Network (PLMN)
Advertisements

GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
GSM System Architecture
The Wireless Communication System Xihan Lu. Wireless Communication Cellular phone system Cordless telephone system Bluetooth Infrared communication Microwave.
Network Technology CSE3020 Week 12
InVANET(Intelligent Vehicular Ad Hoc Network
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
TEL 355: Communication and Information Systems in Organizations
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
ZAC Technical Institute GSM Foundation Course Prepared by Syed Amir Abbas.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Mobile Technologies Introduction Basics of GSM Value Added Services SMS Short Codes Asterisk * LBS.
GSM,GPRS & CDMA Technology
GSM Training for Professionals. TOPICS Module-1Introduction of Communication and Wireless Concepts  History of Communication  Telecommunication Basics.
Network: Location Management Y. Richard Yang 3/21/2011.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Mobile Communication The Mobile Station (MS) is the user equipment in GSM. The MS is what the user can see of the GSM system, the cellular phone itself.
Chapter 4 Application Level Security in Cellular Networks.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Rev A Mikko Suominen Enhancing System Capacity and Robustness by Optimizing Software Architecture in a Real-time Multiprocessor Environment.
WIRELESS COMMUNICATION GSM NETWORK OVERVIEW LECTURE 4 Tanvir Ahmad Niazi Air University, Islamabad 1.
4.1 Architecture of the GSM system GSM is a PLMN (Public Land Mobile Network) – several providers setup mobile networks following the GSM standard within.
GSM Network Architecture
Ad Hoc Network.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
Wireless Ad Hoc Networks
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
GPRS(General Packet Radio Service)
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
CPET 565 Mobile Computing Systems Lecture 2 Introduction to Wireless Communication and Networking (2) Hongli Luo Indiana University-Purdue University Fort.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
CSE 5345 – Fundamentals of Wireless Networks
Overview of the GSM for Cellular System
Wireless Network PMIT- By-
GSM Training for Professionals
Instructor Materials Chapter 6 Building a Home Network
Third Generation (3G) Cellular Network 3G System
Global System for Mobile Communications
Wireless Ad Hoc Networks
GSM,GPRS & CDMA Technology
CSE 5345 – Fundamentals of Wireless Networks
Global system for Mobile Communications
Wireless Ad Hoc Networks
Dept. of Business Administration
JAIN FOR MAP PROJECT GROUP: Maurizio Bonuccelli Piero Lauri
Security in Wide Area Networks
Presentation transcript:

Basic radio frequency communications - 2 Session 1

Contents Basic security concepts Attacks against wireless networks Wireless technologies Classification according to the range 2/42

Basic security concepts Vulnerability – An inherent weakness in the design, configuration, implementation of a network or system – This can take any form and can be intentional, accidental, or simply an act of nature Threat – Any possible event that can disrupt the operation, functioning, integrity, or availability of a network or system 3/42

Basic security concepts Attack – A specific technique used to exploit a vulnerability Example – A threat could be a denial of service – A vulnerability is in the design of a communication system – An attack could be jamming 4/42

Basic security concepts 5/42 Confidentiality – Providing confidentiality means hiding the information from an unauthorized third party Integrity – Ensuring data integrity means protecting data from being modified without authorization Availability – The wireless network should be always available to be used

Basic security concepts Privacy – Ensuring privacy means hiding the user identity, location or service usage Authentication – Process that ensures that only legitimate users (possessing certain credentials) can access the wireless network 6/42

Basic security concepts Access Control – Process that grants a legitimate user access to certain information that he/she is allowed to access Non-repudiation – Activities that prevent users from denying the use of wireless networks 7/42

Attacks against wireless networks Passive attacks (1) – Channel eavesdropping An attacker can place an antenna to hear the information between the victim transmitter and receiver – Channel overuse The radio spectrum is a shared resource A wireless operator or a user may make an excessive use of the radio spectrum and prevent others from accessing it 8/42

Attacks against wireless networks 9/42 Passive attacks (2) – Traffic analysis An analysis that shows characteristics of the traffic, e.g. how frequently the communication takes place Active attacks (1) – Channel jamming Part of denial of service attacks Performed by transmitting at the same time in the same communication channel as the victim

Attacks against wireless networks 10/42 Active attacks (2) – Identity cheat An attacker impersonates a legitimate user in the wireless networks – Spoofing An attacker retrieves data and sends other data to the victim user – Data alteration An attacker modifies the content of the information

Attacks against wireless networks 11/42

Attacks against wireless networks Specific vulnerabilities of wireless networks regarding mobility, i.e. the fact that a device can roam across different wireless networks and network operators (1) – Privacy of a user is threatened – Mobile device is small Limited storage, computing power and energy Strong protection measures (e.g. strong cryptography) are difficult to implement 12/42

Attacks against wireless networks Specific vulnerabilities of wireless networks regarding mobility, i.e. the fact that a device can roam across different wireless networks and network operators (2) – Mobile device can be easily stolen This may lead to misuse and reverse engineering 13/42

Wireless technologies 14/42 RFID Personal networks – Bluetooth (IEEE ) – ZigBee (IEEE ) Wireless LAN (IEEE ) Cellular networks – GSM – UMTS (3G)

Wireless technologies 15/42 Wireless mesh networks Mobile ad hoc networks Hybrid ad hoc networks Vehicular networks Sensor networks Integrated networks

RFID 16/42 RFID (Radio Frequency Identification) – Serves for automatic and secure reading of an ID- number – There are also RFID devices capable of storing data – wireless memory (e.g. electronic passports) Applications ( – Logistics – Ticketing – Transport (e.g. Autopass), etc.

RFID 17/42 Operation – An RFID tag is mounted on the object to be identified The tag consists of a chip and an antenna Energy needed for operation of the tag is (usually) received from the reader – a radio transmitter – When the tag finds itself in the field of the reader’s radio signal, it transmits an echo – The echo is checked in the reader’s database and thus the object is identified.

Personal networks 18/42 Bluetooth – A short-range communications system intended to replace the cables connecting portable and/or fixed electronic devices. – The system offers services that enable the connection of devices and the exchange of data between these devices.

Personal networks Bluetooth 19/42

Personal networks 20/42 ZigBee – A short-range communication system intended to facilitate communication between various technical devices, tipically home appliances. – Simpler messages than Bluetooth – More scalable than Bluetooth

Wireless LAN 21/42 Wireless LAN enables connectivity of computing devices (PCs, laptop, printers, etc.) by means of a radio link Such a connection is transparent for the users – There is no logical difference between a wired and a wireless connection.

Wireless LAN 22/42

Cellular networks 23/42 Cellular network – A radio network made up of a number of radio cells, each served by a fixed transmitter, known as a base station. – These cells are used to cover different areas in order to provide radio coverage over a wider area than the area of one cell Example – Mobile telephony networks (GSM, UMTS)

Cellular networks 24/42

Cellular networks 25/42 Abbreviations (1) – SIM – Subscriber Identity Module – MS – Mobile Station – USIM – Universal Subscriber Identity Module – ME – Mobile Equipment – TE – Terminal Equipment – UE – User Equipment – BTS – Base Transceiver Station – BSC – Base Station Controller

Cellular networks 26/42 Abbreviations (2) – Node B – Analogue to BTS in UMTS – RNC – Radio Network Controller – BSS – Base Station Subsystem – RNS – Radio Network Subsystem – MSC – Mobile Switching Center – GMSC – Gateway MSC – SGSN – Serving GPRS Support Node – GGSN – Gateway GPRS Support Node

Cellular networks 27/42 Abbreviations (3) – VLR – Visitor Location Register – HLR – Home Location Register – EIR – Equipment Identity Register – AuC – Authentication Center – PSTN – Public Switched Telephone Network – PLMN – Public Land Mobile Network

Wireless mesh networks 28/42 Mesh network – Data communication through fixed nodes – The connectivity allows continued communication even if some of the nodes in the network stop functioning Wireless mesh network – Communication between the nodes is wireless – Similar to mobile ad hoc networks, but the nodes are in general not mobile.

Mobile ad hoc networks (MANETs) 29/42 A self-configuring network of mobile routers (and associated hosts) connected by wireless links Together, they form an arbitrary topology The routers are free to move randomly and organize themselves arbitrarily

Mobile ad hoc networks (MANETs) 30/42 The network's wireless topology may change rapidly and unpredictably Such a network may operate in a standalone fashion, or may be connected to a larger Internet

Mobile ad hoc networks (MANETs) 31/42

Hybrid ad hoc networks 32/42 A structure-based network that is extended using multi-hop communications The existence of a communication link between the mobile station and the base station is not required – A mobile station that has no direct connection with a base station can use other mobile stations as relays.

Hybrid ad hoc networks 33/42

Vehicular networks (VANETs) 34/42 A form of MANET – Intended to provide communication among nearby vehicles and between vehicles and nearby fixed equipment (roadside equipment) The main goal – providing safety and comfort for passengers

Vehicular networks (VANETs) 35/42 A special electronic device is placed inside each vehicle – Provides ad hoc network connectivity for the passengers This network tends to operate without any infrastructure

Vehicular networks (VANETs) 36/42

Wireless sensor networks Spatially distributed autonomous devices – Use sensors to cooperatively monitor physical or environmental conditions (temperature, sound, vibration, pressure, motion, pollutants, etc.) at different locations. In addition to one or more sensors, each node in a sensor network is equipped with a radio transceiver, a small microcontroller, and an energy source, usually a battery. 37/42

Wireless sensor networks 38/42

Integrated networks 39/42 Modern networks often integrate many types of networks, including various types of wireless networks Example – Sensor networks and ad hoc networks are often integrated to make a single network

Integrated networks 40/42

Classification according to range 41/42 According to the range, wireless networks are classified in the following way – Short-range Bluetooth, ZigBee – Medium-range WLAN – Medium long-range Cellular – Long-range Satellite global area networks

Classification according to range 42/42