1 Securing Mobile Networks An Enabling Technology for National and International Security and Beyond.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Secure Mobile IP Communication
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Module 5: Configuring Access for Remote Clients and Networks.
COM555: Mobile Technologies Location-Identifier Separation.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
1 Chapter 8 Local Area Networks - Internetworking.
Virtual Private Network
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Neah Bay Presentation. Introduction Western DataCom has been in business for 20+ years providing data communications security solutions to the US Government,
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Mobile IP Seamless connectivity for mobile computers.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Golden G. Richard III, Ph.D. University of New Orleans (With thanks to Sumi U of F ) Introduction to Mobile IP.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
1 Mobile Networking As Applied to Any Mobile Network Including Aeronautical Internets Airborne Internet Collaboration Group meeting April 17, 2003 Will.
Module 4: Designing Routing and Switching Requirements.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
NEMO Requirements and Mailing List Discussions/Conclusions T.J. Kniveton - Nokia Pascal Thubert - Cisco IETF 54 – July 14, 2002 Yokohama, Japan.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
Practical Considerations for Securely Deploying Mobility Will Ivancic NASA Glenn Research Center (216)
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
1 Mobile Networking Including Application to Aeronautical Internets ICNS Conference May 20, 2003 Will Ivancic –
Universal, Ubiquitous, Unfettered Internet © ui.com Pte Ltd Mobile Internet Protocol under IPv6 Amlan Saha 3UI.COM Global IPv6 Summit,
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
1 Mobile-IP Priority Home Agents for Aerospace and Military Applications Terry Bell, Will Ivancic, Dave Stewart, Dan Shell and Phil Paulsen.
Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Reference :Understanding Computers
1 Securing Mobile and Wireless Networks Is It Possible?
1 Backup Options & Sample WAN Designs. 2 Chapter Topics  WAN Backup Design Options  Sample WAN Designs.
1 Securing Mobile Networks in an Operational Setting Will Ivancic (216)
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 © 1999, Cisco Systems, Inc. Mobile Router Technology Development Dan Shell - Cisco Will Ivancic - NASA Glenn.
1. Mobile Router Networks in Motion (tm) 2. Mobile Router Features Uses Internet standards-bases Mobile-IP technology - RFC 2002 Mobile Router allows.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Glenn Research Center Satellite Networks & Architectures Branch Communications Technology Division IEEE Aerospace Conference March Architecture.
Glenn Research Center Satellite Networks & Architectures Branch Communications Technology Division I-CNS Workshop April/May, Securing Mobile and.
1 Mobile Router Technology Development David Stewart, Will Ivancic, Dan Shell, Kent Leung, Brian Kachmar and Terry Bell.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
COM594: Mobile Technologies Location-Identifier Separation.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
 Mobile IP is the underlying technology for support of various mobile data and wireless networking applications.  It is designed by IETF.
Telematics Protocols and Technologies
Planning and Troubleshooting Routing and Switching
Net 431: ADVANCED COMPUTER NETWORKS
Network Virtualization
Securing Mobile Networks
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Mobile Router Technology Development
Practical Considerations for Securely Deploying Mobility
Chapter 8 – Data switching and routing
Presentation transcript:

1 Securing Mobile Networks An Enabling Technology for National and International Security and Beyond

2 Goals for November 6th Highlight Mobile Networking Technology Emphasizing National and International Security today due to time limitations. Discuss security policy Enabling shared infrastructure (when reasonable) Next Steps (Afternoon Session) Other Items (Afternoon Session)

3 Today’s Audience Big Picture People Policy Makers Media Code Writers Implementers Please, don’t be afraid to ask questions.

Neah Bay / Mobile Router Project Clevelan d Detroit Foreign-Agent Somewhere, USA Foreign-Agent Home-Agent Anywhere, USA Internet Neah Bay Outside of wireless LAN range, connected to FA via Globalstar. Neah Bay Connected to FA via wireless LAN at Cleveland harbor

5 Why NASA/USCG/Industry Real world deployment issues can only be addressed in an operational network. USCG has immediate needs, therefore willingness to work the problem. USCG has military network requirements. USCG is large enough network to force us to investigate full scale deployment issues USCG is small enough to work with. NASA has same network issues regarding mobility, security, network management and scalability.

6 Mobile-Router Advantages Share wireless and network resources with other organizations $$$ savings Set and forget No onsite expertise required However, you still have to engineer the network Continuous Connectivity (May or may not be important to your organization) Robust Secondary Home Agent (Reparenting of HA)

7 Mobile Network Design Goals Secure Scalable Manageable Ability to sharing network infrastructure Robust

8 Public Internet FA MR US Coast Guard Canadian Coast Guard ACME Shipping HA ACME SHIPPING MRMR US Navy Shared Network Infrastructure Encrypting wireless links makes it very difficult to share infrastructure. This is a policy issue.

9 Secondary Home Agent (reparenting the HA) Primary Home Agent Secondary Home Agent Reparenting Home Agent Helps resolve triangular routing Problem over long distances X

10 Emergency Backup (Hub / Spoke Network) If primary control site becomes physically inaccessible but can be electronically connected, a secondary site can be established. If primary control site is physically incapacitated, there is no backup capability.

11 Secondary Home Agent (Fully Meshed Network) If primary control site is physically incapacitated, a second or third or forth site take over automatically.

12 We Are Running with Reverse Tunneling Pros Ensures topologically correct addresses on foreign networks Required as requests from MR LAN hosts must pass through Proxy inside main firewall Greatly simplifies setup and management of security associations in encryptors Greatly simplifies multicast – HA makes for an excellent rendezvous point. Cons Uses additional bandwidth Destroys route optimization

Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA – Cleveland HA Encryption PROXY Encryption b link FIREWALL Public Address MR Tunnel Endpoint (Public Space) HA Tunnel Endpoint (Public Space)

Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption b link FIREWALL Public Address USCG Officer’s Club EAST WEST Dock EAST WEST Dock Open Network Data Transfers

Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption b link FIREWALL Public Address USCG Officer’s Club EAST WEST Dock EAST WEST Dock Encrypted Network Data Transfers

Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption b link FIREWALL Public Address Open Network Monitoring Point Open Network Monitoring Point USCG Officer’s Club EAST WEST Dock EAST WEST Dock Monitoring Points

Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption b link FIREWALL Public Address USCG Officer’s Club EAST WEST Dock EAST WEST Dock Note, We are monitoring The Neah Bay. We are using lots of bandwidth To do this.

Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption b link FIREWALL Public Address USCG Officer’s Club EAST WEST Dock EAST WEST Dock Note, We are monitoring The Neah Bay. We are using lots of bandwidth To do this.

Mobile LAN 10.x.x.x Encryption EAST WEST Dock RF Bandwidth 1.0 Mbps (manually set) 11.0 Mbps (auto-negotiated and shared with Officer’s Club) 7 Kbps to 56 Kbps in 7 Kbps chunks (1 to 2.5 seconds delay)

20 Wireless Only? Wireless can be jammed Particularly unlicensed spectrum such as Satellites is a bit harder Solution is to find interferer and make them stop. You still want land line connections Mobile Routing can be used over land lines.

21 Globalstar/Sea Tel MCM-8 Initial market addresses maritime and pleasure boaters. Client / Server architecture Current implementation requires call to be initiated by client (ship). Multiplexes eight channels to obtain 56 kbps total data throughput. Full bandwidth-on-demand. Requires use of Collocated Care-of-Address

22 Satellite Coverage Globalstar From SaVi INMARSAT

23 Layer 2 Technology Globalstar MCM-8 Hypergain b Flat Panel 8 dBi Dipole L3-Comm 15 dBic Tracking Antenna Sea Tel Tracking Antenna

Backbone Network Topology Detail Network Diagram (Intentionally Blank)

Neah Bay Network Topology Detail Network Diagram (Intentionally Blank)

USCG Officer’s Club Network Topology Detail Network Diagram (Intentionally Blank)

27 Securing Mobile and Wireless Networks Some ways may be “better” than others!

28 Constraints / Tools Policy Architecture Protocols

29 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN IPv4 Utopian Operation Triangular Routing

30 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN IPv4 “Real World” Operation PROXyPROXy Proxy had not originated the request; therefore, the response is squelched. Peer-to-peer networking becomes problematic at best. Glenn Research Center Policy: No UDP, No IPSec, etc… Mobile-IP stopped in its tracks. What’s your policy? Ingress or Egress Filtering stops Transmission due to topologically Incorrect source address. IPv6 Corrects this problem. USCG Requires 3DES encryption. WEP is not acceptable due to known deficiencies.

31 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN Current Solution – Reverse Tunneling PROXyPROXy Anticipate similar problems for IPv6. Adds Overhead and kills route optimization.

32 Public Internet FA MR US Coast Guard Canadian Coast Guard ACME Shipping HA ACME SHIPPING MRMR US Navy Shared Network Infrastructure Encrypting wireless links makes it very difficult to share infrastructure. This is a policy issue.

Security Security  Bandwidth Utilization  Security  Performance  Tunnels Tunnels Tunnels and more Tunnels Performance  Security   User turns OFF Security to make system usable! Thus, we need more bandwidth to ensure security. PAYLOADHEADER ORIGINAL PACKET HEADER VIRTUAL PRIVATE NETWORK HEADER ENCRYPTION AT THE NETWORK LAYER HEADER ENCRYPTION ON THE RF LINK

34 Additional and Future Security Solutions AAA Routers (available today) Wireless bridges and access points (available 2002) IPSec on router interface Encrypted radio links IPSec, type1 or type2, and future improved WEP

35 Conclusions Security Breaks Everything  At least it sometimes feels like that. Need to change policy where appropriate. Need to develop good architectures that consider how the wireless systems and protocols operate. Possible solutions that should be investigated: Dynamic, Protocol aware firewalls and proxies. Possibly incorporated with Authentication and Authorization.

36 Moblile-IP Operation IPv4

Mobile Node Foreign Agent Home Agent “ ” NASA Ames Corresponding Node Internet or Intranet NASA Glenn Home IP Care-Off-Address NASA Goddard Mobile-IP (IPv4)

Mobile Router (Mobile Node) Foreign Agent Home Agent Corresponding Node Internet WAN Tunnel Internet WAN Internet Roaming Interface Virtual LAN Interface Tunnel HA Loopback Virtual Interface FA WAN MR Loopback Virtual Interface COA Mobile-Router (IPv4) Mobile Router

(Mobile Node) Home Agent Corresponding Node Internet WAN Tunnel Internet WAN Roaming Interface Virtual LAN Interface Foreign Agent Tunnel HA Loopback Virtual Interface FA WAN MR Loopback Virtual Interface COA Mobile-Router (IPv4) Collocated Care-Of-Address Internet No Foreign Agent No Second Tunnel

Mobile Router (Mobile Node) Home Agent Corresponding Node Internet WAN Tunnel Internet WAN Internet Roaming Interface Virtual LAN Interface HA Loopback Virtual Interface MR Loopback Virtual Interface COA Mobile-Router (IPv4) Collocated Care-Of-Address

41 What’s Next The End Game

42 Mobile Networks Share Network Infrastructure USCG, Canadian Coast Guard, Commercial Shipping, Pleasure Boaters Open Radio Access / Restricted Network Access Authentication, Authorization and Accounting Architecture Limited, experimental deployment onboard Neah Bay Move RIPv2 routing from Fed. Bldg to Neah Bay Move to full scale deployment Requires full commitment

MR Public Mobile LAN 10.x.x.x INTERNET INTRANET 10.x.x.x FA – Cleveland Public HA Public PIX- 506 – until we install our PIX FW Then we should not need the baby PIX. PROXY PIX b link FA - Detroit

44 HA Outside Main Firewall Firewall between MR interfaces and public Internet as well as the HA and Private Intranet. Reverse tunneling required as requests from MR LAN hosts must pass through Proxy inside main firewall.

45 Areas that need to be addressed Home Agent Placement Inside or Outside the Firewall AAA Issues Open Radio Access / Restricted Network Access Secure Key Management IPv6 Mobile Networking Development Work with industry and IETF Develop radio link technology Enable better connectivity throughout the world for both military and aeronautical communications (voice, video and data).

46 NASA’s Needs Mobile Networks

47 Relevant NASA Aeronautics Programs Advanced Air Transportation Technology (AATT) Weather Information Communication (WINCOMM) Small Aircraft Transportation System (SATS)

48 Aeronautic Networking Issues Move to IPv6 IPv6 Mobile Networking Authentication, Authorization and Accounting Bandwidth, Bandwidth, Bandwidth Media Access Policy Sending of Operations over Entertainment Channels

Earth Observation T1 T2 ? T3

51 Space Flight Implementation Sharing Infrastructure Common Media Access Common Ground Terminal Capabilites Common Network Access AAA Common Modulation and Coding Software Radio

Backup

53 Asymmetrical Pathing Mobile Router MilStar, Globalstar, Others DVB Satellite Internet Home AgentForeign Agent

54 Neah Bay

55 Papers and Presentations or and pick “Papers and Presentations”