Download presentation
Presentation is loading. Please wait.
1
Information Security of Embedded Systems 27.1.2010: remote access, wireless networks Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST
2
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20102 Structure 1. Introductory example 2. Embedded systems engineering 1.definitions and terms 2.design principles 3. Foundations of security 1.threats, attacks, measures 2.construction of safe systems 4. Design of secure systems 1.design challenges 2.safety modelling and assessment 3.cryptographic algorithms 5. Communication of embedded systems 1.remote access 2.sensor networks 6. Algorithms and measures 1.digital signatures 2.key management 3.authentication 4.authorization 7. Formal methods for security 1.protocol verification 2.logics and proof methods
3
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20103 Communication of Embedded Systems Various wired and wireless bus systems are being used CAN, LIN, MOST, I2C, … GSM, UMTS, … WiFi, Bluetooth, … Security considerations general rule: newer standards are more secure known problems with nearly all standards
4
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20104 Wireless Data Communication History: replacement of cables First: “make it work” Then: specialization (application-specific) Now: security vs. resource limitations Trend: All IP coalescence of telephone and data communication (“B3G”, “NGN”, “4G”) data- vs. knowledge-communication, semantic net
5
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20105 WLAN (802.11x) 802.11 a,b (1999); 802.11 g,h(2003) Widely used (2003 Intel Centrino) Point-to-point and Access-point networking Local data transfer, internet-connectivity, integration in company or private networks Air frequencies openly accessible (cf. mobile phones) Threats: illegitimate foreign hard disk access, unauthorized use of connectivity, unauthorized data access, masking and fake identities
6
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20106 WLAN Security Measures Frequency hopping ( pseudo-random) SSID cloaked mode ( eavesdropping) MAC address control ( spoofing) VPN and CHAP (Server must know user passwords, Client calculates hash key possible attacks) WEP ( next slide) WPA with EAP and TKIP
7
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20107 WEP “Wired Equivalent Privacy”, Authentication & secured communication via symmetric encryption and checksums Authentication by challenge-response; client proves knowledge of the common key up to 4 keys are possible; choice by client; 40 bit weak all user (and all access points) need to know the key(s); key exchange difficult access point does not authentify itself to the client! - sending of challenges, analysing responses - denial-of-service, logoff of clients Checksums (CRC) instead of secure hashing modification and generation of messages even without key! redirection of communication (IP-address-faking)
8
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20108 WEP-Attack 1 CRC-property: CRC(M M’)=CRC(M) CRC(M’) RC-4-property: M Key Key = M (M|CRC(M)) Key (M|CRC(M)) Key (D|CRC(D)) (M|CRC(M)) Key (D|CRC(D)) Key = (M+D)|CRC(M+D)
9
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 20109 WEP-Attack 2 2. (M|CRC(M)) Key 3. (M|CRC(M)) Key (M|CRC(M)) (M’|CRC(M’)) 1. M M’|CRC(M’)
10
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201010 WPA WiFi Protected Access 128 bit, AES/TKIP (temporal key integrity protocol) message integrity code (MIC) sequence numbering against replay-attacks key management, key mixing, quasi asymmetric encryption master key, session keys, key renewal EAP (extensible authentication protocol) password-based, certificate-based, SIM-based forwarding of requests to a designated server still no authentication of server! ( PEAP)
11
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201011 Sensor Networks Network of small, cheap, low-power nodes e.g. earthquake early warning system e.g. ambient assisted living e.g. wireless controller network e.g. logistics routing Construction of threat scenarios? Self-organization new nodes must integrate into the network the network must be able to build “trust” Several emerging radio technologies
12
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201012 Bluetooth Security Replacement of IrDA Bluetooth profiles (> 30) headset, AV remote control, telephony, obj exchange, ftp, serial, lan, pan, health devices… Security mechanisms visibility restrictions (“non-discoverable”) pairing via passkey or PIN unit keys encrypted communication frequency hopping
13
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201013 Bluetooth Security http://grouper.ieee.org/groups/1451/5/Comparison%20of%20PHY/Bluetooth_24Security_Paper.pdf
14
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201014 Vulnerabilities and Attacks Passkey for headsets: 1234 or 0000 Default discoverability Pairing in public areas mobile phone always accepts a basic L2CAP connection request without acceptance of the user Scanning for bluetooth addresses MAC address ranges of devices are known Eavesdropping air frequencies Pseudo-random frequency hopping scheme Reading passkeys from compromised devices Unauthorized access to information on devices http://www.securityfocus.com/infocus/1830
15
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201015 Public “Blue Kiosk” vulnerability: display of device by name only Stack overflow attacks vCard file names in File Transfer or Object Push Activating the microphone Tracking and positioning attacks triangulation antenna extensions
16
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201016 ZigBee http://www.zigbee.org/imwp/idms/popups/pop_download.asp?contentID=9436
17
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201017
18
27.1.2010Embedded Security © Prof. Dr. H. Schlingloff 201018 Infrastructure security network access; keys installed in a trusted environment integrity of packet routing Application data security message integrity authentication data encryption Configurability of security memory and computational constraints
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.