Download presentation
Presentation is loading. Please wait.
1
Mobile and Wireless Security INF245 Guest lecture 17.10.2007 by Bjorn Jager Molde University College
2
Overview of lecture Litterature: Wireless and Mobile Security (Ch 6 Mallic) VPN portals http://forskningsnett.uninett.no/wlan/vpn.html http://forskningsnett.uninett.no/wlan/vpn.html Background – for further study: See on-line references for info on 802.11 security: http://www.drizzle.com/~aboba/IEEE/
3
Overview of lecture 1.What are you afraid of? 2.Security is: 3.Security Threats: 4.Security Technologies 5.Products and Standards
4
1. What are you afraid of? Brainstorming session with the students.... Relate to data traffic in wireless and mobile environments, and related to voice using mobile phones Mention some examples: In norwegian: 5.9.07: Mobilen hører alt http://pub.tv2.no/nettavisen/it/article1318955.ece http://pub.tv2.no/nettavisen/it/article1318955.ece http://www.nrk.no/programmer/tv/schrodingers_katt/1.3340261 MMS Flooding (PocketPC can use WAPPush)
5
2. Security is: 1.Confidentiality 2.Integrity 3.Authentication 4.Nonrepudiation
6
3. Security Threats: 1.Exposure: Sniffing, theft Violates Confidentiality 2.Tampering: change or delete Violates Integrity 3.Spoofing, Exposure Violates Authentication 4.Repudiation Violates Non-Repudiation NOTE: Be careful to distinguish between threats on something you are afraid of and the reason for the threat! E.g. You may fear exposure of sensitive information, the reason can be to weak authentication, virus or other malware that cause exposure, etc.
7
4 Security Technologies 1.Cryptology 2.Cryptology 3.Cryptology 4.Cryptology All security issues (Confidentiality, Integrity, Authentication, and Nonrepudiation) are solved using Cryptology!
8
5. Products and Standards 1.PKI 2.IPSec 3.VPN 4.SSL. TLS 5.HTTPS 6.Firewalls 7.WEP WPA 8.Voice Encryption 9.Security Development Tools and Kits
9
Cryptology basics We look at major principles for: –Symmetric encryption schemes –Asymmetric encryption schemes –Hybrid encryption systems
10
Code excerpt for synchronous encryption in Java We looked at code from: –Beginning J2ME at page 363 The remaining parts of the presentation was skipped due to time limits....
11
Layered Architecture
12
Encryption can be done at each layer! Layer 1: Physical Layer 2: Link layer: by link protocol (WPA- protocol, Access list at MAC layer) Layer 3: Network layer: by link protocol (IPsec- protocol, VPN) Layer 4: Transport layer (SSL, TLS, HTTPS) Layer 5-7: Up to Application layer: BY YOU! Develop your own solutions using Java framework or other. (See e.g. http://www.opus1.com/www/whitepapers/8021xbindingproblem.pdf)
13
VPN Threat: evesdropping at hotspots etc. –All through the infrastructure: WLAN, Micro Wave Systems, Internet routers,... By connecting a mobile device with the home office via VPN ALL TRAFFIC to the home office AND all traffic to/and from the public Internet is sent through the encrypted VPN connection. VPN connects to host –VPN Client establish a connection –The mobile user is prompted for proof of identity using a token such as a SecurID password or a digital certificate. –A VPN tunnel is established between the mobile phone and the corporate network and all data traveling to and from the device is encrypted. See: VPN portals http://forskningsnett.uninett.no/wlan/vpn.html
14
SSL: Secure Sockets Layer SSL is part of many standard applications: E.g: –Browsers and WEB servers –E-mail clients and servers –FTP (file transfer protocol) etc. To use SSL you need a Server ID, i.e. a Digital Certificate for a Web-server. Web-clients (browsers use this to authenticate a server and encrypt information). SSL forerunner of TLS used by HTTPS
15
WPA WPA: Wi-Fi Protected Access –Industry standard by Wi-Fi Alliance –WPA is WEP with fast change of keys –WPA consists of: WEP( Wireless Equivalent Privacy) TKIP Checksum that ensures that no single bit is changed (CRC) 802.1x authentification is an option
16
Bluetooth security issues. www.trifinite.org See trifinite.stuff www.trifinite.org BlueSnarf –Read SMS, contacts, calender BlueBug –Complete control of mobile HeloMoto –Connect to headset/handsfree BlueSmack –DoS-attack, buffert overflow BlueStab –Makes the phone crash BlueSnarf++ –Read files, full read and write access, access to memory card
17
Get address book from Sony Ericsson T610 You need –Linux distribution with hcitool and obexftp
18
Do # hcitool scan –Scanning. 00:0A:D9:15:0B:1C T610-phone # obexftp -b 00:0A:D9:15:0B:1C --channel 10 -g telecom/pb.vcf -v –Browsing 00:0A:D9:15:0B:1C... Channel: 7 No custom transport –Connecting...bt: 1 done –Receiving telecom/pb.vcf...\ done –Disconnecting... done Get address book from Sony Ericsson T610
19
This works on: Nokia –6310 –6310i –8910 –8910i Sony Ericsson –T68 –T68i –R520m –T610 –Z600
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.