A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno,

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Security. Why is it important? Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Over.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Securing a Wireless Network
Ch. 5 – Access Points. Overview Access Point Connection.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
A History of WEP The Ups and Downs of Wireless Security.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
Wireless Networking & Security Greg Stabler Spencer Smith.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
Instructor Materials Chapter 6 Building a Home Network
Methods of Securing LANs
WEP & WPA Mandy Kershishnik.
Securing A Wireless Network
Wireless Network Security
Security Issues with Wireless Protocols
Presentation transcript:

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Tamara Denning, Cynthia Matuszek, Karl Koscher, Joshua R. Smith and Tadayoshi Kohno.

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Introducing... From left to right: WowWee RoboSapien V2 WowWee Rovio Erector Spykee

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Capabilities Prices correct as of late 2008.

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Visibility Rovio: Visible to local attacker by SSID, MAC address Visible to remote attacker by unique http interface, port 80 query Spykee: Visible to local attacker by SSID, MAC address Visible to remote attacker by keep alive packets, port 9001 control request RoboSapien: Not visible

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Vulnerabilities Rovio Passive adversary can intercept unencoded username and password Audiovisual stream does not require password even when enabled WEP support only, though WPA added in patch. Spykee Co-located mode sends credentials in the clear Video stream unencrypted Remote access more difficult, Diffie-Hellman key exchange vulnerable to MITM WEP and WPA

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Vulnerabilities RoboSapien Vulnerable to off-the-shelf controller and IR repeater Compromised computer with IR port Universal remote control with wireless Other compromised robots with IR transmitters Other remote attacks possible, eg buffer overflow...

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Attacks Privacy Security Vandalism Psychological

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Design Questions What is the intended function of the robot? How mobile is the robot? What sensors does the robot possess? What actuators does the robot possess? What communication protocols does the robot support? Who are the intended users of the robot? What is the robot’s intended operational environment? Besides the intended users of the robot, what other people (and animals) will be in the robot’s environment? What kind of development processes are in place?

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. Design Questions Does the robot create new or amplify existing privacy vulnerabilities? Does the robot create new or amplify existing physical integrity vulnerabilities? Does the robot create new or amplify existing physical safety vulnerabilities? Does the robot create new or amplify existing psychological vulnerabilities? Can the robot be combined with other robots or technologies to facilitate an attack?

A Spotlight on Security and Privacy Risks with Future Household Robots: Attacks and Lessons Denning, T., Matuszek, C., Koscher, K., Smith, J. and Kohno, T Ubicomp'09. What else? What steps need we take to prevent these issues in future?