Download presentation
Presentation is loading. Please wait.
Published byJosephine Matthews Modified over 9 years ago
1
Security Enhancement for Wireless Communication Bassam Almogahed
2
Almogahed B 2 Agenda Introduction Introduction Materials and Methods Materials and Methods Results Results Conclusions Conclusions Recommendation Recommendation
3
Almogahed B 3 Introduction Legitimate users communicating via wireless networks Third party interrupting the communication between the two communicators Alice Bob Trudy
4
Almogahed B 4 Station in a network Wireless Routers Location A Location C Location B Physical Wireless Settings Materials and Methods
5
Almogahed B 5 Materials and Methods cont’d. Send through wireless network Location A Protocol (location A) Protocols and Methods Location C How Strong is the protocol? Location B Apply Protocol or Method Interrupt communication Test: How efficient is the protocol? Test Experiment Process
6
Almogahed B 6 Attacks: Attacks: Man-in-the-Middle AttackMan-in-the-Middle Attack Replay AttackReplay Attack Known Plaintext AttackKnown Plaintext Attack Exhaustive Search AttackExhaustive Search Attack Chosen Plaintext AttackChosen Plaintext Attack Materials and Methods cont’d.
7
Almogahed B 7 Materials and Methods cont’d
8
Almogahed B 8 Materials and Methods cont’d.
9
Almogahed B 9 Materials and Methods cont’d.
10
Almogahed B 10 Materials and Methods cont’d. Recorded Data Recorded Data What is the name of the protocol being tested?What is the name of the protocol being tested? What is the level of complexity?What is the level of complexity? Are the legitimate communicators able to communicate with each other?Are the legitimate communicators able to communicate with each other? How fast is the transition?How fast is the transition? Is the communication interrupted?Is the communication interrupted? Can the protocol be broken using any of the attack techniques? If so, which one(s)?Can the protocol be broken using any of the attack techniques? If so, which one(s)? What is the level of security?What is the level of security? What is the level reliability?What is the level reliability?
11
Almogahed B 11 Materials and Methods cont’d Ratings Standards HighMedium High Medium Low Secure2 61 - 2 80 key space 2 41 - 2 60 key space 2 21 - 2 40 key space 2 0 - 2 20 key space Efficient1Mbps200kbps54kbps11kbps ComplexO(n) 2 O(nlogn)O(n)O(log n) Reliable%0.3<%0.9 <%2 <%10 > Test components and classifications
12
Almogahed B 12Results Medium Low Low High Medium High Authentication Protocols Experiment Results Standards Protocols SecurityEfficiencyComplexityReliability Public/Private Key Symmetric Key Hash Function Session Key
13
Almogahed B 13 Medium Low Low High Medium High Standards Methods SecurityEfficiencyComplexity Reliability CRC Check Symmetric Key Hash Algorithm Message Authentication Code (MAC) Integrity Experiment Results Results cont’d.
14
Almogahed B 14 Medium Low Low High Medium High Confidentiality Experiment Results Standards Methods SecurityEfficiencyComplexityReliability Symmetric Key Public/Private Key Hash Algorithm Stream Ciphers Results cont’d.
15
Almogahed B 15 Authentication Authentication The public key authentication protocol that Genentech currently uses is the only one to rank highly secure, but this security comes at the price of complexity and inefficiency.The public key authentication protocol that Genentech currently uses is the only one to rank highly secure, but this security comes at the price of complexity and inefficiency. The symmetric key protocol shows high efficiency, but is also very unreliable.The symmetric key protocol shows high efficiency, but is also very unreliable. The session key protocol offers very high efficiency and reliability, but lacks security.The session key protocol offers very high efficiency and reliability, but lacks security. The hash function protocol has by far the worst overall rating across the board with just mediocre levels of security, reliability and efficiency.The hash function protocol has by far the worst overall rating across the board with just mediocre levels of security, reliability and efficiency. Conclusions
16
Almogahed B 16 Conclusions Integrity Integrity The current Genentech integrity method, CRC, has very low security features although it is very efficient.The current Genentech integrity method, CRC, has very low security features although it is very efficient. MAC shows highest security with highest reliability rate among all methods tested.MAC shows highest security with highest reliability rate among all methods tested. Confidentiality Confidentiality All confidentiality methods tested are mostly secure.All confidentiality methods tested are mostly secure. The current method, symmetric key, is very efficient, but the least reliable compared to the other three methods.The current method, symmetric key, is very efficient, but the least reliable compared to the other three methods. Public key shows the highest security methods.Public key shows the highest security methods. stream ciphers shows the best overall combined results.stream ciphers shows the best overall combined results.
17
Almogahed B 17 Recommendation Combine public key and session key protocols for the authentication process. Use the public key protocol to deliver the session key used for the rest of the authentication process Combine public key and session key protocols for the authentication process. Use the public key protocol to deliver the session key used for the rest of the authentication process Use the public key system to encrypt and compute the message authentication code (MAC), which will in turn yield increased confidentiality and integrity together in one method. Use the public key system to encrypt and compute the message authentication code (MAC), which will in turn yield increased confidentiality and integrity together in one method.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.