Download presentation
Presentation is loading. Please wait.
Published byJulius Wilkerson Modified over 6 years ago
1
CS1: Wireless Communication and Mobile Programming
Security Issues in Mobile Computing Dr. Khaled Mahmud Laurentian University International Global Experience Program Summer 2016
2
Agenda Information Security Security in WLAN
Security Techniques and Algorithm Security Framework for mobile computing environment (c) Khaled Mahmud
3
Reference Chapter 20 [TEL]
Data Communications and Networking- Behrouz A . Forouzan Web references (c) Khaled Mahmud
4
Wireless Security Broadcasting network traffic over the airwaves
Has created an entirely new set of issues for keeping data transmissions secure (c) Khaled Mahmud
5
Risks of Mobile Computing
Mobile computing devices Can store large amounts of data Are highly portable and, Are frequently unprotected Easy to steal or lose Unless precautions are taken, an unauthorized person can gain access to the information stored on them or accessed through them Even if not stolen or lost, intruders can sometimes gain all the access they need If the device is left alone and unprotected If data is "sniffed out of the air" during wireless communications, or If malware is installed (c) Khaled Mahmud
6
Growth of Mobile Computing
Mobile Computing in business Non-fixed/Flexing office space Working from home (or away) Bring Your Own Device (BYOD) Mobile Computing in education ‘Mobile programs’ Simulated labs Mobile Computing in personal life Flexible storage ‘More than eReaders’ in use Online billing/payment (c) Khaled Mahmud
7
Guideline for Corporate Use
Dilemma: Productivity vs. Security For comprehensive mobile program companies can follow these guidelines Data encryption Password enforcement Device management Compliance and configuration management Data access Trust and confidence Enablement and ease of use (c) Khaled Mahmud
8
Security in Converged NW
(c) Khaled Mahmud
9
Identity in Mobile Communication
Authentication Identity management (c) Khaled Mahmud
10
Authentication Credentials
Types of authentication credentials What you have Example: key fob to lock your car What you are Example: facial characteristics recognized by health club attendant What you know Example: combination to health club locker Khaled Mahmud
11
Example Khaled Mahmud
12
Multifactor Security What you have What you know What you are
Physical key Magnetic ID card Hardware token RFID badge What you know Password/passphrase/PIN Personal question/answer Predetermined events What you are Fingerprint Voice recognition Retinal scan Face recognition (c) Khaled Mahmud
13
What You Know: Passwords
User logging in to a system Asked to identify himself User enters username User asked to authenticate User enters password Passwords are most common type of authentication today Passwords provide only weak protection Khaled Mahmud
14
What You Have: Tokens and Cards
Small devices with a window display Synched with an authentication server Code is generated from an algorithm Code changes every 30 to 60 seconds Khaled Mahmud
15
What You Are: Biometrics
Standard biometrics Uses person’s unique physical characteristics for authentication Fingerprint scanners most common type Face, hand, or eye characteristics also used Fingerprint scanner types Static fingerprint scanner Takes picture and compares with image on file Dynamic fingerprint scanner Uses small slit or opening Khaled Mahmud
16
Identity Management Various IDs
Apple ID Windows live ID/Hotmail ID/Skype ID/ Google ID Facebook ID Bank/School/Insurance/Utility Services We can use a single authentication credential shared across multiple networks Called Federated Identity Management (FIM) when networks are owned by different organizations Single Sign-On (SSO) holds promise to reduce burden of usernames and passwords to just one Khaled Mahmud
17
Account Management Managing user account passwords
Can be done by setting password rules Too cumbersome to manage on a user-by-user basis Security risk if one user setting is overlooked Preferred approach: assign privileges by group Microsoft Windows group password settings Password Policy Settings Account Lockout Policy Khaled Mahmud
18
Attacks Against WLANs Some of the most dangerous attacks
Hardware theft Device may contain information that can assist someone in breaking into the network AP impersonation A rogue AP can impersonate a valid device Passive monitoring Data transmissions can be monitored Denial of service (DoS) Flood the network with transmissions and deny others access to the AP (c) Khaled Mahmud
19
Types of Wireless LAN Attacks
Discovering the network Attacks through the RF spectrum Attacks involving Access Points (c) Khaled Mahmud
20
Discovering the Network
One of first steps in attack is to discover presence of a network Beaconing AP sends signal at regular intervals to announce its presence and provide connection information Wireless device scans for beacon frames War driving Process of passive discovery of wireless network locations (c) Khaled Mahmud
21
Attacks Through the RF Spectrum
Using Wireless protocol analyzer Generating interference (c) Khaled Mahmud
22
Wireless Protocol Analyzer
Wireless traffic captured to decode and analyze packet contents Network interface card (NIC) adapter must be in correct mode Six modes of wireless NICs Master (acting as an AP) Managed (client) Repeater Mesh Ad-hoc Monitor (c) Khaled Mahmud
23
Interference Signals from other devices can disrupt wireless transmissions Devices that can cause interference with a WLAN Microwave ovens Bluetooth devices Elevator motors Copy machines Outdoor lighting (certain types) Theft protection devices (c) Khaled Mahmud
24
Attacker Interference
(c) Khaled Mahmud
25
Security Original IEEE committee recognized wireless transmissions could be vulnerable Implemented several wireless security protections in the standard Left others to WLAN vendor’s discretion Protections were vulnerable and led to multiple attacks Initial Approaches MAC Address Filtering SSID Broadcast (hide) Wired Equivalent Privacy (WEP) (c) Khaled Mahmud
26
MAC Address Filtering Method of controlling WLAN access
Limit a device’s access to AP Media Access Control (MAC) address filtering Used by nearly all wireless AP vendors Permits or blocks device based on MAC address Vulnerabilities of MAC address filtering Addresses exchanged in unencrypted format Attacker can see address of approved device and substitute it on his own device Managing large number of addresses is challenging (c) Khaled Mahmud
27
SSID Broadcast Each device must be authenticated prior to connecting to the WLAN Open system authentication Device discovers wireless network and sends association request frame to AP Frame carries Service Set Identifier (SSID) User-supplied network name Can be any alphanumeric string 2-32 characters long AP compares SSID with actual SSID of network If the two match, wireless device is authenticated (c) Khaled Mahmud
28
Wired Equivalent Privacy (WEP)
IEEE security protocol Encrypts plaintext into ciphertext Secret key is shared between wireless client device and AP Key used to encrypt and decrypt packets WEP can only use 64-bit or 128-bit number to encrypt (c) Khaled Mahmud
29
Newer Wireless Security Solutions
Unified approach to WLAN security was needed IEEE and Wi-Fi Alliance began developing security solutions Resulting standards used today IEEE i WPA and WPA2 (c) Khaled Mahmud
30
Wi-Fi Protected Access (WPA)
Introduced in 2003 by the Wi-Fi Alliance A subset of IEEE i Design goal: protect present and future wireless devices Temporal Key Integrity Protocol (TKIP) Encryption Used in WPA Uses longer 128 bit key than WEP Dynamically generated for each new packet (c) Khaled Mahmud
31
Preshared Key (PSK) Authentication
After AP configured, client device must have same key value entered Key is shared prior to communication taking place Uses a passphrase to generate encryption key Must be entered on each AP and wireless device in advance Not used for encryption Serves as starting point for mathematically generating the encryption keys (c) Khaled Mahmud
32
Wi-Fi Protected Access 2 (WPA2)
Second generation of WPA known as WPA2 Introduced in 2004 Based on final IEEE i standard Uses Advanced Encryption Standard (AES) Supports both PSK and IEEE 802.1x authentication (c) Khaled Mahmud
33
IEEE 802.11i Define a Robust Security Network Association (RSNA)
Provide Mutual authentication between client devices and AP Controlled access to the network Establishment of security keys Key management (c) Khaled Mahmud
34
IEEE 802.1x Client device must be authenticated on the network by an external authentication server Remote Authentication Dial In User Service (RADIUS) All communication between the client device and the AP is blocked Until the authentication process is completed 802.1x uses the Extensible Authentication Protocol (EAP) For relaying access requests between a wireless device, the AP, and the RADIUS server (c) Khaled Mahmud
35
IEEE 802.1x Authentication Originally developed for wired networks
Provides greater degree of security by implementing port security Blocks all traffic on a port-by-port basis until client is authenticated (c) Khaled Mahmud
36
AAA Server Authentication, Authorization and Accounting (AAA)
Most popular server RADIUS (Remote Authentication Dial In User Service) Newer protocol Diameter Allows data roaming Mobile computing (c) Khaled Mahmud
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.