Securing Future Wireless Networks: Challenges and Strategies Pandurang Kamat Wade Trappe.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Jason Li Jeremy Fowers. Background Information Wireless sensor network characteristics General sensor network security mechanisms DoS attacks and defenses.
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Security Issues In Sensor Networks By Priya Palanivelu.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
© Rabat Anam Mahmood ITTC 1 Resilience To Jamming Attacks Rabat Anam Mahmood Department of Electrical Engineering & Computer Science
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Introduction (Based on Lecture slides by J. H. Wang)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University Network/Computer Security.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Chapter 4 Application Level Security in Cellular Networks.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Security in Wireless Networks Mike Swift CSE b Summer 2003.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
Security of the Internet of Things: perspectives and challenges
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Cryptography and Network Security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Secure Sockets Layer (SSL)
Network Security: IP Spoofing and Firewall
Wireless LAN Security 4.3 Wireless LAN Security.
DK presents Division of Computer Science, KAIST
Cryptography and Network Security
Presentation transcript:

Securing Future Wireless Networks: Challenges and Strategies Pandurang Kamat Wade Trappe

Talk Overview Security has been one of the great detractors for wireless technologies (and the Internet, too!) We have a chance to consider security as we redesign the network Think about the questions: –Should security be considered separately from the network? –What benefits are there if we integrate security into the network? –Should we reevaluate the definition of security? –How private do we really want our lives? This talk will not focus on classical “Internet Security” but on “Wireless Security”

Through the Looking Glass, the Wireless World Key properties and differentiators that make wireless desirable –Ubiquity –Mobility –Resource adaptability –Portability –Affordability –Platform heterogeneity MPC8260 TMS320C6701 XC2V6000 FPGA 100BaseT Ethernet Megarray Connector- 244 Configurable I/O pins

Reevaluating the Security Paradigm Confidentiality IntegrityAvailability System (CIA) Paradigm Data Confidentiality Data Integrity Authentication Non-repudiation Algorithmic Paradigm These paradigms have been the traditional frameworks for security on conventional networks, but what can we do differently for wireless systems?

Reevaluating the Security Paradigm, pg. 2 Confidentiality AvailabilityIntegrity Non Repudiation Intrusion Detection Privacy Resource Management Location Services We still need traditional security methods. But the wireless world has additional problems and new modalities for solutions! Wireless is easy to sniff. We still need encryption services and key management. Key freshness is an issue. The value of a wireless network is its promise of ubiquitous availability. Wireless networks are easy to break! Wireless resources (e.g. power and spectrum) must be managed. Greedy user behavior will cause resource management to malfunction. Perpetual connectivity can mean constant surveillance! With snooping one can monitor mobility and handoffs between networks. The pervasiveness of the wireless networks should not mean that just anyone can participate! Example: Rogue APs RF energy radiates, and wireless entities within the radio coverage pattern may serve as witnesses for the actions of the transmitter. Wireless hardware/equipment need to be safe from modification. Data/control info should not be modified before or during transit. Location is a new form of information provided by wireless systems that will facilitate new services. Location information needs to be trusted.

Drill Down: Specific Challenges and Some Strategies

Availability Attack: Radio Interference Bob Alice Hello … Hi … … Mr. X Alice and Bob are attacked by malicious Mr. X. A story for the problem of wireless denial of service attack we focus on. –Alice and Bob  two communicating nodes, A and B. –Mr. X  an adversarial interferer X. –Mr. X ’ s insane behavior  the jamming style DoS. –People and nodes in wireless network both communicate via shared medium. Jamming style DoS Attack: –Behavior that prevents other nodes from using the channel to communicate by occupying the channel that they are communicating on

Availability: Jamming Detection/Defense Detection: –Challenge is to discriminate between legitimate causes of poor connectivity and jamming Motivation from “The Art of War” by Sun Tze: –“He who cannot defeat his enemy should retreat.” Defense Strategies: –Spectral Evasion (Channel Surfing) –Spatial Evasion Latency and synchronicity is an issue as you move to many node networks! SDRs will allow more advanced forms of spectral evasion. Jammed Region PDR % PDR VS. SS SS(dBm) Trial Number (Time) Channel Surfing Experiment Packet Delivery Rate Jammer turned on Change channel

Intrusion Detection: Wireless Spoofing Many wireless security threats are possible because it is easy to spoof legitimate devices (ioctl/ipconfig) Example –Attacker armed with a laptop having 2 wireless cards. –One card monitors all TCP traffic on the AP channel –Second card sends back TCP replies to select TCP requests (e.g. all requests for a particular web page). These are sent as if appearing from the server the user was connecting to. –At the MAC layer the attacker spoofs AP by injecting custom x frames with AP’s source MAC address. Results: –The user session is hijacked. –Requested service is DoSed. –Easy to launch flooding DoS attacks at higher-layer buffers Internet MAC: x.y.z.w Late!

Intrusion Detection : Spoofing Defense Spoofing can be addressed through authentication services –Traditional authentication services employ cryptographic solutions (e.g. MACs, signatures) –Light-weight alternatives can reduce the load on buffers into cryptographic functions A lesson learned from : – has several fields controlled by firmware, which are hard for an attacker to bypass –The 12bit sequence # field is increased monotonically by 1 for each packet –Monotonicity provides a rule whose violation is easy to detect The sequence number was not intended to be a security field, but it can be! We may introduce filters that check monotonic conditions (or more generic rules)

Wireless Localization Security Location information will facilitate new computing services –Location-based file access control Problem: Localization methods are not secure! Traditional cryptography and network security can address cryptographic attacks (Is this beacon really from the AP?) Localization algorithms depend on measurements that are susceptible to attack!! Is cryptography alone enough? No!

Attacks on Signal Strength Distance is measured using the relationship between received signal strength and distance Adversary may affect the receive signal power by: –Alter transmit power of nodes –Remove direct path by introducing obstacles –Introduce absorbing or attenuating material –Introduce ambient channel noise Distance Power Received d1d1 r1r1 Absorbing Material r2r2 d2d2

Defenses for Wireless Localization Don’t rely entirely on traditional security! Two-tier approach to defending wireless localization… Add Security and Robustness! SECURITYSECURITY ALGORITHMALGORITHM Attacks ROBUSTALGROBUSTALG Add Authentication, Entity Verification, Etc…

Questions ?