Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.

Slides:



Advertisements
Similar presentations
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Advertisements

Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Overview r Ethernet r Hubs, bridges, and switches r Wireless links and LANs.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Wireless Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
WLAN b a Johan Montelius
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Wireless Security.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
CMPT771 Wireless Media 1 Wireless Basics CMPT 771 Internet Architecture and Protocols.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Getting Connected (Chapter 2 Part 4)
Chapter 5 Link Layer A note on the use of these ppt slides:
Outline What is Wireless LAN Wireless Transmission Types
Wireless Security.
Chapter 5 Link Layer and LANs
Computer Communication Networks
Multiple access.
CS 457 – Lecture 7 Wireless Networks
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
EEC-484/584 Computer Networks
Introduction to Wireless Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
EEC-484/584 Computer Networks
ECSE-4730: Computer Communication Networks (CCN)
Wireless LANs CS 352, Lecture 16
Presentation transcript:

Wireless Security

Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering PSTN Regional Wireline Regional Voice Cell Cable Modem LAN Premises- based WLAN Premises- based Operator- based H.323 Data RAS Analog DSLAM H.323

How can it affect cell phones? r Cabir worm can infect a cell phone m Infect phones running Symbian OS m Started in Philippines at the end of 2004, surfaced in Asia, Latin America, Europe, and recently in US m Posing as a security management utility m Once infected, propagate itself to other phones via Bluetooth wireless connections m Symbian officials said security was a high priority of the latest software, Symbian OS Version 9. r With ubiquitous Internet connections, more severe viruses/worms for mobile devices will happen soon …

Outlines r Basics r Mobile link access: CDMA/CA r Security in b r Example and more attacks r Trend: Wireless MAN

IEEE Wireless LAN r b m GHz unlicensed radio spectrum m up to 11 Mbps m widely deployed, using base stations r a m 5-6 GHz range m up to 54 Mbps r g m GHz range m up to 54 Mbps r All use CSMA/CA for multiple access r All have base-station and ad-hoc network versions

Base station approch r Wireless host communicates with a base station m base station = access point (AP) r Basic Service Set (BSS) (a.k.a. “cell”) contains: m wireless hosts m access point (AP): base station r BSS’s combined to form distribution system (DS)

Ad Hoc Network approach r No AP (i.e., base station) r wireless hosts communicate with each other m to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z r Applications: m “laptop” meeting in conference room, car m interconnection of “personal” devices m battlefield

CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: r If channel sensed idle: transmit entire frame r If channel sensed busy, defer transmission r Human analogy: don’t interrupt others!

CSMA collisions collisions can still occur: propagation delay means two nodes may not hear each other’s transmission collision: entire packet transmission time wasted spatial layout of nodes note: role of distance & propagation delay in determining collision probability

CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA m collisions detected within short time m colliding transmissions aborted, reducing channel wastage r collision detection: m easy in wired LANs: measure signal strengths, compare transmitted, received signals m difficult in wireless LANs: receiver shut off while transmitting r human analogy: the polite conversationalist

CSMA/CD collision detection

IEEE : multiple access r Collision if 2 or more nodes transmit at same time r CSMA makes sense: m get all the bandwidth if you’re the only one transmitting m shouldn’t cause a collision if you sense another transmission r Collision detection doesn’t work: hidden terminal problem

IEEE MAC Protocol: CSMA/CA CSMA: sender - if sense channel idle for DISF sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff CSMA receiver - if received OK return ACK after SIFS (ACK is needed due to hidden terminal problem)

Collision avoidance mechanisms r Problem: m two nodes, hidden from each other, transmit complete frames to base station m wasted bandwidth for long duration ! r Solution: m small reservation packets m nodes track reservation interval with internal “network allocation vector” (NAV)

Collision Avoidance: RTS-CTS exchange r sender transmits short RTS (request to send) packet: indicates duration of transmission r receiver replies with short CTS (clear to send) packet m notifying (possibly hidden) nodes r hidden nodes will not transmit for specified duration: NAV

Collision Avoidance: RTS-CTS exchange r RTS and CTS short: m collisions less likely, of shorter duration m end result similar to collision detection r IEEE allows: m CSMA m CSMA/CA: reservations m polling from AP

Outlines r Basics r Mobile link access: CDMA/CA r Security in b r Example and more attacks r Trend: Wireless MAN

802.11b: Built in Security Features r Service Set Identifier (SSID) r Differentiates one access point from another r SSID is cast in ‘beacon frames’ every few seconds. r Beacon frames are in plain text!

Associating with the AP r Access points have two ways of initiating communication with a client r Shared Key or Open Key authentication r Open key: need to supply the correct SSID m Allow anyone to start a conversation with the AP r Shared Key is supposed to add an extra layer of security by requiring authentication info as soon as one associates

How Shared Key Auth. works r Client begins by sending an association request to the AP r AP responds with a challenge text (unencrypted) r Client, using the proper WEP key, encrypts text and sends it back to the AP r If properly encrypted, AP allows communication with the client

Wired Equivalent Protocol (WEP) r Primary built security for protocol r Uses 40bit RC4 encryption r Intended to make wireless as secure as a wired network r Unfortunately, since ratification of the standard, RC4 has been proven insecure, leaving the protocol wide open for attack

Case study of a non-trivial attack r Target Network: a large, very active university based WLAN r Tools used against network: m Laptop running Red Hat Linux v.7.3, m Orinoco chipset based b NIC card m Patched Orinoco drivers m Netstumbler Netstumbler can not only monitor all active networks in the area, but it also integrates with a GPS to map AP’s m Airsnort Passively listen to the traffic r NIC drivers MUST be patched to allow Monitor mode (listen to raw b packets)

Assessing the Network r Using Netstumbler, the attacker locates a strong signal on the target WLAN r WLAN has no broadcasted SSID r Multiple access points r Many active users r Open authentication method r WLAN is encrypted with 40bit WEP

Cracking the WEP key r Attacker sets NIC drivers to Monitor Mode r Begins capturing packets with Airsnort r Airsnort quickly determines the SSID r Sessions can be saved in Airsnort, and continued at a later date so you don’t have to stay in one place for hours r A few 1.5 hour sessions yield the encryption key r Once the WEP key is cracked and his NIC is configured appropriately, the attacker is assigned an IP, and can access the WLAN

More Attacks in Wireless Networks r Rogue Access Point m Solution: Monitor the air space for unexpected AP r Radio Frequency (RF) Interference r AP Impersonation m Rogue AP spoofs its MAC address to the identity of an authorized AP m Man-in-the-middle attack m Denial of service attack

Outlines r Basics r Mobile link access: CDMA/CA r Security in b r Example and more attacks r Trend: Wireless MAN

IEEE WirelessMAN Standard for Broadband Wireless Metropolitan Area Networks r Broad bandwidth m Up to 134 Mbps in GHz band r Comprehensive and modern security m Packet data encryption DES and AES used m Key management protocol Use RSA to set up a shared secret between subscriber station and base station Use the secret for subsequent exchange of traffic encryption keys (TEK)

Backup Slides

Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division m Random partitioning (dynamic), ALOHA, CSMA, CSMA/CD carrier sensing: easy in some technologies (wire), hard in others (wireless) CSMA/CD used in Ethernet