IWD2243 Wireless & Mobile Security Chapter 4 : Security in Wireless Ad Hoc Network Prepared by : Zuraidy Adnan, FITM UNISEL1.

Slides:



Advertisements
Similar presentations
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
Advertisements

1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Sattam Al-Sahli – Emad Al-Hemyari –
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
Mobile Communications: Wireless LANs Mobile Communications Chapter 7: Wireless LANs ª Parte - Bluetooth.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless & Network Security Lecture 10:
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 6 Wireless Network Security Part II.
A Routing Vector Method (RVM) for Routing Bluetooth Scatternets Pravin Bhagwat IBM.Thomas J. Watson Research Center,Yorktown Heights,NY.
IWD2243 Wireless & Mobile Security Chapter 5 : Wireless Embedded System Security Prepared by : Zuraidy Adnan, FITM UNISEL1.
IWD2243 Wireless & Mobile Security Chapter 3 : Wireless LAN Security Prepared by : Zuraidy Adnan, FITM UNISEL1.
IEEE Wireless LAN Standard
Bluetooth Introduction The Bluetooth Technology
Basic Networking Components
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Chapter 5 outline 5.1 Introduction and services
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
IWD2243 Wireless & Mobile Security Chapter 2 : Security in Traditional Wireless Network Prepared by : Zuraidy Adnan, FITM UNISEL1.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Network Security Security in Wireless Ad Hoc Networks 1 Network Security Chapter 8. Security in Wireless Ad Hoc Networks.
Local Area Networks Chapter 17, Exploring the Digital Domain.
WIRELESS LANs BLUETOOTH.
Bluetooth Background Ericsson, IBM, Intel, Nokia, and Toshiba
KARTIK DABBIRU Roll # EE
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
An Analysis of Bluetooth Security
A Bluetooth Scatternet-Route Structure for Multihop Ad Hoc Networks Yong Liu, Myung J. Lee, and Tarek N. Saadawi 2003 IEEE Journal on Selected Areas in.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
An Introduction to BLUETOOTH TECHNOLOGY
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Chapter 15 Wireless LANs 15.# 1
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Bluetooth.
IEEE Wireless LAN Standard
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Respected Ma’am & Dear friends
SSN College of Engineering
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
Wireless Fidelity 1 1.
A Wireless LAN technologies IEEE
Unit – III Wireless PAN’s
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
“I don’t have to be careful, I’ve got a gun.”
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Chapter 3: Open Systems Interconnection (OSI) Model
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Mobile and Wireless Network Security
Presentation transcript:

IWD2243 Wireless & Mobile Security Chapter 4 : Security in Wireless Ad Hoc Network Prepared by : Zuraidy Adnan, FITM UNISEL1

4.1Introduction Prepared by : Zuraidy Adnan, FITM UNISEL2  Ad Hoc – On the fly, as needed basis.  Ad Hoc Wireless Net – Ad Hoc that use wireless medium for communication.  Mobile Ad Hoc Net (MANET) – nodes that forming ad hoc net are mobile.  See figure 19.1 : Examples of ad hoc network, page 446.  Classification for ad-hoc network :-  Geographical coverage – PAN, LAN, WAN  Capable acting as routers  2 limitation, 1. No dedicated routing devices, 2. Net topology change rapidly and unpredictable.

4.1Introduction Prepared by : Zuraidy Adnan, FITM UNISEL3  2 groups of ad-hoc network – 1. Single hop ad-hoc networks and 2. Multihop ad hoc network.  Single hop – Node do not act as routers and therefore communication is possible only between nodes which are within each other RF range. Example, PAN, Bluetooth.  Multihop – node act as router and route the traffic of other nodes. Example, LAN & WAN.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL4  Wireless ad hoc networking technology  Operates in unlicensed 2.4 GHz freq range  Geographical coverage limited to personal area network (PAN)  Point to point & Point to multipoint links  Supports synchronous and asynchronous traffic  Concentrates on single hop network  Freq hopping spread spectrum (FHSS) with Gaussian freq shift keying (GFSK) modulation at physical layer

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL5  Low power and low cost given important consideration  Adopted as the IEEE standard for physical layer (PHY) and media access control (MAC) layers.  Bluetooth basics  See figure 19.2 : Bluetooth networks, page 449  Each piconet has 1 master and up to 7 slaves  Slave communicate with master, if 2 slave want to communicate each other, master should relay the traffic  Piconet = BSS, Master = AP, Slave = Station (STA)  Bluetooth device may participate in more than 1 piconet simultaneously

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL6  Bluetooth basics (cont.)  See figure 19.3 : Piconets and scatternets in bluetooth  Scatternets theoretically possible, rare in commercial deployment  Security modes  Define layer 1 & 2 of OSI stack to achieve comm in single hop ad hoc net  To ease interoperability problem, Bluetooth SIG defined application profiles.  Profile defines an unambiguous description of the comm interface between 2 bluetooth devices or one particular service or application

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL7  Security modes (cont.)  See figure 19.4 : Profiles in Bluetooth, page 451  Each service / app select appropriate profile depending on its needs – each profiles define different security modes.  Fundamental profile – Generic Access Profile (GAP)  GAP define 3 basic security mode :-  Security mode 1 – unsecured mode in bluetooth.  Security mode 2 – Lies between mode 1 & 2, left the decision to security policy manager.  Security mode 3 – Always on security mode, always initiate authentication procedure.  See Table 19.1 : Security features of Bluetooth connection.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL8  Key Establishment  Most complex part in bluetooth security  Key hierarchy varies depends on whether unicast or broadcast connection  Pass key  See figure 19.5 : Bluetooth key hierarchy, page 454  Basically shared secret between 2 communication devices  Two types :- Variable PKEY, Fixed PKEY  Variable PKEY – PKEY that can be chosen at the time of pairing  “Pairing” – process by which 2 bluetooth devices establish a shared secret that they can used for securing communication.  128 bits  PKEY – shared secret between 2 comm endpoints that ensures the link key is known ONLY to the 2 comm endpoints.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL9  Key Establishment (cont.)  Initialization key  Initialization key (IK or IK init ).  Short lived temporary key that is used (and exist only) during the pairing process when 2 comm devices start comm for the 1 st time.  Derived using E22 algorithm and 3 inputs : PKEY, IN_RAND, Lpkey.  PKEY – Pass key, Lpkey – Length of PKEY in bytes, IN_RAND – 128bit random number generated in devices.  See figure 19.6 : Bluetooth authentication, page 456.  Kinit = E22 (PKEY’,IN_RAND, Lpkey’)

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL10  Key Establishment (cont.)  Link Key  Link key (LK) – shared secret established between 2 comm devices when pairing sequence ends.  Two types :- unit key, combination key.  Unit key – deprecated  Combination key = link key – derived from either existing link key, or Kinit.  The end of pairing process in bluetooth should lead to the establishment of a link key which the 2 devices can use for securing their communication  3 sources :- existing link key, use of existing link key to establish new link key, use of Kinit to generate link key.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL11  Key Establishment (cont.)  Encryption key  Link key is used for generating chipering key (CK, or Kc)  Use E3 algorithm  Kc = E3 (K, EN_RAND, COF)  K – link key, EN_RAND – 128bits random number, COF – 96bits chipering offset.  COF = Anthentication chipering offset (ACO), which derived from authentication process.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL12  Key Establishment (cont.)  Constraint key  Constraint key (Kc’), constraint encryption key.  Export restrictions – hardware which is capable of encrypting above certain key strength is not exportable.  Bluetooth put in key strength constraining mechanism that reduces the 128bit Kc to 128bit Kc’ whose effective key length (strength) can be any value less than 128 bits  Kc’(x) = g 2 l (x) {Kc[mod g 2 l (x)]}

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL13  Key Establishment (cont.)  Payload key  Payload key (Pk) is actual key that is used to encrypt (decrypt) bluetooth packets.  Pk derived from Kc’ using E0 algorithm  Kp = E0 (Kc’,CK_VAL, BD_ADDR, EN_RAND)  BD_ADDR – 48bits bluetooth add for the device, EN_RAND – 128bits random number, CK_VAL – 26 bits of current clock value.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL14  Key Establishment (cont.)  Broadcast key hierarchy  In braodcast key hierarchy, link key is replaced by the use of a master key (Kmaster).  Derived independently by master without involving any of the slaves  Using E22 algorithm  Kmaster = E22 (LK_RAND1, LK_RAND2,16)  Use overlay key to comm the master key to all slaves in piconet  Koverlay = E22 (K, RAND3, 16)

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL15  Key Establishment (cont.)  The Algorithms  Five algorithm used :-E0,E1, E3, E21, and E22.  E0 – stream chiper, and the other 4 use block chiper.  Use same underlying block chiper :- SAFER+

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL16  Authentication  Involve 2 endpoints – the claimant, the verifier  For mutual authentication – both end points take on the role of verifier one at a time.  See figure 19.8 : Bluetooth mutual authentication, page 462.  Confidentiality  See figure 19.9 : Bluetooth encryption, page 464  See figure : Bluetooth packet format, page 464.

4.2 Bluetooth Prepared by : Zuraidy Adnan, FITM UNISEL17  Integrity protection  Relies on CRC for integrity  Using linear noncryptographic integrity check mechanism like CRC leaves a lot to be desired as far as integrity protection is concerned.  By choosing CRC, bluetooth fails to provide any real integrity protection,