Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.

Slides:



Advertisements
Similar presentations
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Advertisements

BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security Awareness: Applying Practical Security in Your World
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Computer Networks IGCSE ICT Section 4.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Network and Internet Security
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Windows 2003 and 802.1x Secure Wireless Deployments.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Chapter 4 Application Level Security in Cellular Networks.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless and Mobile Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Wireless security Wi–Fi (802.11) Security
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Introduction to Networking. What is a Network? Discuss in groups.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Security of the Internet of Things: perspectives and challenges
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Network System Security - Task 2. Russell Johnston.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
Lecture 36.
Lecture 36.
Presentation transcript:

Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure Shell WEP2 A stopgap enhancement to WEP, implementable on some (not all) hardware not able to handle WPA or WPA2, based on: Enlarged IV value Enforced 128-bit encryption Remains vulnerable to known WEP attacks — at most it will just slow an attacker down a bit WEPplus A.K.A WEP+. A proprietary enhancement to WEP by Agere Systems that enhances WEP security by avoiding "weak IVs". It is only completely effective when WEPplus is used at both ends of the wireless connection. As this cannot easily be enforced, it remains a serious limitation. It is possible that successful attacks against WEPplus will eventually be found. It also does not necessarily prevent replay attacks.Agere Systemsreplay attacks WPA and WPA2 Either is much more secure than WEP. To add support for WPA or WPA2, some old Wi-Fi access points might need to be replaced or have their firmware upgraded.access points firmware

Mobile Wireless/Personal NW

Roaming personal network: such as PDA, mobile phone, laptop, health monitoring devices, etc. -roaming personal network, as the user might carry this network with him and roam from one public network to another. Home personal network: devices and components that belong to a user and are located at a remote site. -might include home appliances such as TV or washing machine, music directory, VoIP server, server and other services and devices. -could also be the business environment of the user such as data repository and calendar manager. Foreign personal network: devices and services that might complement the users’ devices and services but do not belong to them. -such as a large display screen that might be used by a roaming user as an extension to her personal network. Public network: networking infrastructure that connects the user to the Internet and thereby to her home (personal) network as well as to foreign (personal) networks

Service Discovery& Security Existing service discovery protocols are Jini, Salutation, UPnP, SLP and the Bluetooth Service Discovery Protocol. Two protocols that stand out here are Splendour and Secure Service Discovery Service. –have built in security. The latter also handles mobility. Any PN will involve separate PANs communicating over shared infrastructure – be it a wired Internet, a WLAN or an UMTS cellular network. Internet security schemes like RADIUS and DIAMETER Security features offered by WLANs and UMTS. RADIUS –is a client server protocol between an access server and a central RADIUS server. –Provides hop-by-hop security and a variety of authentication methods. DIAMETER –is based on RADIUS, – but it also provides end-to-end security and a mechanism for congestion control. Security in the IEEE family of protocols –has been bolstered by the introduction of the 802.1x and the i standards UMTS provides mutual authentication between mobile terminal and base station. KASUMI algorithm provides encryption and data integrity in a UMTS network Concept of “sabdbox” to contain download/imported apps.

Security in Roaming Secure device-to-device communication: This involves the case when a certain device wants to join an ad hoc network, for instance, a Bluetooth device requesting to join a piconet. Since there is no infrastructure in ad hoc networks, it will be difficult to make a decision regarding the trust of other parties. The communication between devices also needs to be encrypted in order to preserve confidentiality. Secure network communication: After establishing a personal network consisting of various devices one needs to ensure that the networking aspects such as routing and addressing are handled securely. This involves detecting false routing entries, denial of service attacks on the networking layers and so on. User to device authentication: This involves the secure authentication and authorisation of a user before accessing a device belonging to the personal network. Here the issue of userdevice interaction and authentication methods such as SIM cards, biological prints, etc. must be addressed. Secure application level communication: This involves addressing the security aspects of the inter-application interaction. Here issues such as providing secure messaging or VoIP communication are to be addressed. This is especially important as many applications use centralised control points such as a VoIP server or a naming server. With personal networks providing intelligent and advanced services in an ad hoc manner, such services and the AAA aspects related to them must be distributed.

Credentials Provided to An Identity Provider

RFID Security Types of RFID Tags Types of Attacks