Download presentation
Presentation is loading. Please wait.
Published byGabriel Bailey Modified over 9 years ago
1
Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson Co-Coach : Fredrik Lilieblad Mehdi GhasemiXiaodong HuYvonne Grunnevall
2
Communication System Design 2002, KTH2 Goals What is Wireless Security? Threats in wireless LAN Security implementations in HiperLAN/2, IEEE 802.11a, b and Bluetooth IP-Roaming (WVPN) OS security Conclusion Presentation disposition Security And Availability For Wireless Communication
3
Communication System Design 2002, KTH3 Classifying security threats in WLAN Security implementation in HiperLAN/2, 802.11 and Bluettoth Comparing HiperLAN, 802.11 and Bluetooth with each other Seamless IP-Roaming Security solutions Inventory of terminals on the market Goals Security And Availability For Wireless Communication
4
Communication System Design 2002, KTH4 What is WLAN Security? Security And Availability For Wireless Communication
5
Communication System Design 2002, KTH5 Threats in Wireless Communication 1.Passive attacks 2.Active attacks Security And Availability For Wireless Communication
6
Communication System Design 2002, KTH6 Threats in Wireless Communication Passive attacks Eavesdropping (sniffering) Very easy in the radio environment. If the wireless LAN is inside a building, the eavesdropping could actually occur from an external point Security And Availability For Wireless Communication
7
Communication System Design 2002, KTH7 Threats in Wireless Communication Active attacks 1.Social Engineering 2.Impersonation 3.Exploits 4.Data Driven 5.Transitive Trust 6.Infrastructure 7.Denial of Service Security And Availability For Wireless Communication Similar in Wired & Wireless Communication
8
Communication System Design 2002, KTH8 Threats in Wireless Communication Social Engineering Fooling the victim for fun and profit Example 1.Please change your password to ”fooble” 2.Attacker then logs in as user from our network 3. System bugs exploited to gain complete run of system Security And Availability For Wireless Communication
9
Communication System Design 2002, KTH9 Threats in Wireless Communication Impersonation Stealing access rights of authorized users Example 1.Attacker with network sniffer (tcpdump,nitsniff, etc) at trade show or network captures complete login session 2.Attacker later logs into system with user-id and stolen password Security And Availability For Wireless Communication
10
Communication System Design 2002, KTH10 Threats in Wireless Communication Exploits Exploiting a hole in software or operatingsystems Example 1.Attacker sends a message to invalid recipient that appears to have come from a program invocation Security And Availability For Wireless Communication
11
Communication System Design 2002, KTH11 Threats in Wireless Communication Data Driven Trojans, trapdoors, viruses Example 1.Attacker logs into user's account Security And Availability For Wireless Communication
12
Communication System Design 2002, KTH12 Threats in Wireless Communication Transitive Trust Attacker fools the mobile host into trusting a base station controlled by the attacker Wireless LANs offer an interface to an attacker requiring no physical arrangements Security And Availability For Wireless Communication
13
Communication System Design 2002, KTH13 Threats in Wireless Communication Infrastructure Taking advantage of protocol or infrastructure features or bugs Infrastructure attacks are based on weaknesses in the system; software bugs, configuration mistakes, hardware failures, etc. Similar to problems in wired LANS. Protection against this type of attacks is nearly impossible. Efforts should be made to minimize potential damage. Security And Availability For Wireless Communication
14
Communication System Design 2002, KTH14 Threats in Wireless Communication Denial of Service Preventing system from being used As result of the nature of radio transmissions, wireless LANs are very vulnerable to DOS attacks With a powerful enough transceiver, an attacker can easily generate enough interference to jam communications Security And Availability For Wireless Communication
15
Communication System Design 2002, KTH15 Security Implementation in IEEE 802.11 HiperLAN Bluetooth Security And Availability For Wireless Communication
16
Communication System Design 2002, KTH16 Security And Availability For Wireless Communication 802.11: Wired Equivalent Privacy (WEP) Designed to be computationally efficient, self-synchronizing and exportable All users of a given access point share the same encryption key Shared key authentication Vulnerable to attack Data headers remain unencrypted so anyone can see the source and destination of the data stream
17
Communication System Design 2002, KTH17 Security And Availability For Wireless Communication 802.11: Service Set ID (SSID) SSID is the network name for a wireless network Can be required to specifically request the access point by name (lets SSID act as a password) The more people that know the SSID, the higher risks for misuse Changing the SSID requires communicating the change to all users of the network
18
Communication System Design 2002, KTH18 Security And Availability For Wireless Communication 802.11: MAC Address Can control access by allowing only defined MAC addresses to connect to the network Must compile, maintain, and distribute a list of valid MAC addresses to each access point This address can be spoofed Not a valid solution for public applications
19
Communication System Design 2002, KTH19 Bluetooth Security And Availability For Wireless Communication Three security modes 1. Non-secure 2. Link level security, four entities 3. Service levle security, three security levels
20
Communication System Design 2002, KTH20 HiperLAN/2 Security And Availability For Wireless Communication Authentication Pre-shared key Public key Encryption
21
Communication System Design 2002, KTH21 Security And Availability For Wireless Communication Feature802.11a802.11bHiperLAN/2 Access CSMA/CA Centralized TDMA Connection Connectionless Connection oriented Network support Support for 802.2 based network Support for multiple core network Encryption 40-bit RC4 DES, 3DES Security Authentication, encryption and WEP (and OFDM ) Authentication encryption and WEP Defines two IDs of communicating nodes uniquely identifying any stations to accomplish security Comparison between the standards
22
Communication System Design 2002, KTH22 Security And Availability For Wireless Communication 802.11a and 802.11b work on different frequencies, so Can coexist in one network Interference between 802.11b and Bluetooth (near each other) HiperLAN/2 is not interoperable with 802.11a or 802.11b Interoperability
23
Communication System Design 2002, KTH23 Security And Availability For Wireless Communication Security and seamless IP-Roaming IP Mobility Session Mobility Wireless VPN
24
Communication System Design 2002, KTH24 IP Mobility Security And Availability For Wireless Communication
25
Communication System Design 2002, KTH25 Security And Availability For Wireless Communication Session Mobility
26
Communication System Design 2002, KTH26 Security And Availability For Wireless Communication OS Security
27
Communication System Design 2002, KTH27 Security And Availability For Wireless Communication Windows Security
28
Communication System Design 2002, KTH28 Security And Availability For Wireless Communication Unix security
29
Communication System Design 2002, KTH29 Security And Availability For Wireless Communication Wireless LANs very useful and convenient, but current security state not ideal for sensitive environments. Growing use and popularity require increased focus on security Cannot forget client security Strong end user security policies and configurations The nature of the radio communication makes it practically impossible to prevent some attacks, like denial of service using radio interference Firewalls Wireless VPN Conclusion
30
Communication System Design 2002, KTH30 Questions? Security And Availability For Wireless Communication
31
Communication System Design 2002, KTH31 What is WLAN (Wireless Local Area Network) ? Security And Availability For Wireless Communication
32
Communication System Design 2002, KTH32 HiperLAN/2,IEEE 802.11 and Bluetooh Security And Availability For Wireless Communication
33
Communication System Design 2002, KTH33 IP-Roaming Security And Availability For Wireless Communication
34
Communication System Design 2002, KTH34 Security And Availability For Wireless Communication 802.11 2.4GHz operating frequency 1 to 2 Mbps throughput Can choose between frequency hopping or direct sequence spread modulation
35
Communication System Design 2002, KTH35 Security And Availability For Wireless Communication Operates in 5GHz band (less RF interference than 2.4GHz range) Users Orthogonal Frequency Division Multiplexing (OFDM) Supports data rates up to 54 Mbps Currently no products available, expected in fourth quarter 802.11a
36
Communication System Design 2002, KTH36 Security And Availability For Wireless Communication Operates in 2.4GHz band Data rates can be as high as 11 Mbps Only direct sequence modulation is specified Most widely deployed today 802.11b
37
Communication System Design 2002, KTH37 Security And Availability For Wireless Communication Development led by the European Telecommunications Standards Institute (ETSI) Operates in the 5 GHz range, uses OFDM technology, and support data rates over 50Mbps like 802.11a QoS HiperLAN/2
38
Communication System Design 2002, KTH38 Security And Availability For Wireless Communication Provides a scaleable authentication and encryption solution Does require end user configuration and a strong knowledge of VPN technology Users must re-authenticate if roaming between VPN servers VPN (Virtual Private Network)
39
Communication System Design 2002, KTH39 Security And Availability For Wireless Communication WEP Encapsulation Summary: Encryption Algorithm = RC4 Per-packet encryption key = 24-bit IV concatenated to a pre-shared key WEP allows IV to be reused with any frame Data integrity provided by CRC-32 of the plaintext data (the “ICV”) Data and ICV are encrypted under the per-packet encryption key 802.11 HdrData 802.11 HdrDataIVICV EncapsulateDecapsulate WEP Encapsulation
40
Communication System Design 2002, KTH40 Difference between HiperLAN/2 and 802.11 Security And Availability For Wireless Communication Higher efficiency with regard to throughput Main difference is at MAC-layer Can be used in a vriouse core network envoironment
41
Communication System Design 2002, KTH41 Security And Availability For Wireless Communication Vulnerability
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.