Download presentation
Presentation is loading. Please wait.
Published byRafe Carson Modified over 9 years ago
1
1 Securing Mobile Networks in an Operational Setting Will Ivancic wivancic@grc.nasa.gov (216) 433-3494
2
2 Outline Security Considerations Neah Bay Project Cost of Connectivity NASA’s Mobile Network Needs
3
3 Security Considerations
4
4 Securing Networks Constraints/Tools Policy Security Policy Education Enforcement Architecture Protocols Must be done up front to be done well
5
5 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN IPv4 Utopian Operation Triangular Routing
6
6 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN IPv4 “Real World” Operation PROXyPROXy Proxy had not originated the request; therefore, the response is squelched. Peer-to-peer networking becomes problematic at best. Glenn Research Center Policy: No UDP, No IPSec, etc… Mobile-IP stopped in its tracks. What’s your policy? Ingress or Egress Filtering stops Transmission due to topologically Incorrect source address. IPv6 Corrects this problem. USCG Requires 3DES encryption. WEP is not acceptable due to known deficiencies.
7
7 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN Current Solution – Reverse Tunneling PROXyPROXy Anticipate similar problems for IPv6. Adds Overhead and kills route optimization.
8
Security Security Bandwidth Utilization Security Performance Tunnels Tunnels Tunnels and more Tunnels Performance Security User turns OFF Security to make system usable! Thus, we need more bandwidth to ensure security. PAYLOADHEADER ORIGINAL PACKET HEADER VIRTUAL PRIVATE NETWORK HEADER ENCRYPTION AT THE NETWORK LAYER HEADER ENCRYPTION ON THE RF LINK
9
9 Conclusions Regarding Security Security Breaks Everything At least it sometimes feels like that. “The Ultimate Denial of Service Attack” – D.S. Need to change policy where appropriate. Need to develop good architectures that consider how the wireless systems and protocols operate. Possible solutions that should be investigated: Dynamic, protocol-aware firewalls and proxies. Possibly incorporated with Authentication and Authorization.
10
10 Neah Bay / Mobile Router Project
11
Cleveland Detroit Foreign-Agent Globalstar G/T Smiths Falls, Canada Foreign-Agent Home-Agent Anywhere, USA Internet Neah Bay Outside of wireless LAN range, connected via Globalstar using Collocated Care-of-Address. Neah Bay Connected to FA via wireless LAN at Cleveland harbor
12
12 Why NASA/USCG/Industry Real world deployment issues can only be addressed in an operational network. USCG has immediate needs, therefore willingness to work the problem. USCG has military network requirements. USCG is large enough network to force us to investigate full scale deployment issues USCG is small enough to work with. NASA has same network issues regarding mobility, security, network management and scalability.
13
13 Mobile-Router Advantages Share wireless and network resources with other organizations $$$ savings Set and forget No onsite expertise required However, you still have to engineer the network Continuous Connectivity (May or may not be important to your organization) Robust Secondary Home Agent (Dynamic HA)
14
14 Mobile Network Design Goals Secure Scalable Manageable Ability to sharing network infrastructure Robust
15
15 Public Internet FA MR US Coast Guard Canadian Coast Guard ACME Shipping HA ACME SHIPPING MRMR US Navy Shared Network Infrastructure Encrypting wireless links makes it very difficult to share infrastructure. This is a policy issue.
16
16 Secondary Home Agent (Dynamic HA) Primary Home Agent Secondary Home Agent Reparenting Home Agent Helps resolve triangular routing Problem over long distances X
17
17 Emergency Backup (Hub / Spoke Network) If primary control site becomes physically inaccessible but can be electronically connected, a secondary site can be established. If primary control site is physically incapacitated, there is no backup capability.
18
18 Secondary Home Agent (Fully Meshed Network) 1 2 3 4 5 If primary control site is physically incapacitated, a second or third or forth site take over automatically.
19
19 We Are Running with Reverse Tunneling Pros Ensures topologically correct addresses on foreign networks Required as requests from MR LAN hosts must pass through Proxy inside main firewall Greatly simplifies setup and management of security associations in encryptors Greatly simplifies multicast – HA makes for an excellent rendezvous point. Mobile Router does NOT have to be in public address space so long as the Collocated Care-of-Address is. Cons Uses additional bandwidth Destroys route optimization
20
Internet WB Globalstar link uses Collocated COA FA - CLEVELAND HA FA - DETROIT Open Internet to HA Satellite Antenna System VOIP Encr USCG Intranet Ameritech DSL / with Subnet GlobalStar Network (NATing from Public to Private) HA (Loopback has Public Address) Public Address MR (Loopback has Public Address) Neah Bay (Protected LAN) APKnet DSL / with Subnet MR does not have to be in public address space when using reverse tunneling, However, the FA or CCoA does In order to transition the Internet
21
Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption 802.11b link FIREWALL Public Address USCG Officer’s Club EAST WEST Dock EAST WEST Dock Encrypted Network Data Transfers
22
22 Use and Deployments 1 st Demonstrated August 23 & November 6, 2002 Used in operational setting July – Sept 2003 New York and Boston Harbor NY had no land line Boston land line was poor – switched to satellite Used Oct – Nov 2003 at shipyard during maintenance 802.11b at 11 Mbps
23
MR Public Mobile LAN 10.x.x.x INTERNET INTRANET 10.x.x.x FA – Cleveland Private HA Public PROXY PIX-506 802.11b link FA - Detroit Operational System Home Agent is incorporated with the firewall and proxy With Acceptable Encryption
24
Goal – Have mobile utilize both Public and Private infrastructure.
25
HA Encryptor Internet Private Leased Line USCG Intranet Encryptor Fed Bldg Router MR Neah Bay LAN Dockside Router Umbilical Cord (Connected When Docked) RIPv2 Maintaining Two Networks (Routing over Layer-3 Encryptors) ENCRYPTOR Mobile Router Foreign Agent ICMP Router Discovery Decrementing TTL in Layer-3 encryptors disables routing protocols.
26
26 Globalstar/Sea Tel MCM-8 Initial market addresses maritime and pleasure boaters. Client / Server architecture – a common architecture Current implementation requires call to be initiated by client (ship). Multiplexes eight channels to obtain 56 kbps total data throughput. Full bandwidth-on-demand. Requires use of Collocated Care-of-Address
27
27 Satellite Coverage Globalstar From SaVi INMARSAT
28
28 Link Performance Considerations 11Mbps 128 kbps 11Mbps
29
29 Cost of Connectivity (Examples)
30
30 Deployment issues (mobile) Equipment Costs Service Cost Network Peculiarities Network Address Translators Performance Enhancing Proxies Security Mechanisms Packet Filtering Connection Mechanisms Smart Card Authentication MAC and/or Static Key (manual login is unacceptable)
31
31 NASA’s Mobile Network Needs Space-based systems Aeronautics (in partnership with FAA) Weather Dissemination Air Traffic Management Free Flight Terrestrial (surface) Systems Rovers Astronauts
32
Earth Observation T1 T2 ? T3
33
Sensor Web
34
34 Pick “Papers and Presentations” at http://roland.grc.nasa.gov/~ivancic/ Neah Bay
35
35 Backup Slides
36
36 Networks in Motion (NEMO) Experiments IPv4 & IPv6
39
Public Internet Private Intranet PROXY ENCRYPTOR Secure Mobile LAN Mobile Router Corresponding Public Node Corresponding Private Node Home Agent
40
Public Internet Private Intranet PROXY ENCRYPTOR Secure Mobile LAN Mobile Router Corresponding Public Node Corresponding Private Node Home Agent
41
Public Internet Private Intranet PROXY ENCRYPTOR Secure Mobile LAN Mobile Router Corresponding Public Node Corresponding Private Node Home Agent
42
Public Internet Private Intranet PROXY ENCRYPTOR Secure Mobile LAN Mobile Router Corresponding Public Node Corresponding Private Node Home Agent x Proxy blocks Communication Initiated outside the Firewall
43
Public Internet Private Intranet PROXY ENCRYPTOR Secure Mobile LAN Mobile Router Corresponding Public Node Corresponding Private Node Home Agent
44
44 ENCRYPTOR Mobile Router Foreign Agent Ouch!
45
45
46
46
47
47 Layer 2 Technology Globalstar MCM-8 Hypergain 802.11b Flat Panel 8 dBi Dipole L3-Comm 15 dBic Tracking Antenna Sea Tel Tracking Antenna
48
Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA – Cleveland HA Encryption PROXY Encryption 802.11b link FIREWALL Public Address MR Tunnel Endpoint (Public Space) HA Tunnel Endpoint (Public Space) MR does not have to be in public address space when using reverse tunneling, However, the FA or CCoA do.
49
Mobile LAN 10.x.x.x INTERNET USCG INTRANET 10.x.x.x FA - Detroit FA Cleveland HA Encryption PROXY Encryption 802.11b link FIREWALL Public Address USCG Officer’s Club EAST WEST Dock EAST WEST Dock Open Network Data Transfers
50
Mobile LAN 10.x.x.x Encryption EAST WEST Dock RF Bandwidth 1.0 Mbps (manually set) 11.0 Mbps (auto-negotiated and shared with Officer’s Club) 7 Kbps to 56 Kbps in 7 Kbps chunks (1 to 2.5 seconds delay)
51
51 Wireless Only? Wireless can be jammed (intentionally or unintentionally) Particularly unlicensed spectrum such as 802.11 Satellites is a bit harder Solution is to find interferer and make them stop. You may still want land line connections Mobile Routing can be used over land lines.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.