Wireless and Mobile Network Investigation

Size: px
Start display at page:

Download "Wireless and Mobile Network Investigation"

Transcription

1 Wireless and Mobile Network Investigation Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos

2 Summary } WiFi network investigations } Cellular network investigations 2

3 Remember were we are } Our journey in this course: } Part I: Foundations of digital forensics } Part II: Techniques and tools } A. Computer forensics } B. Network forensics Current focus } C. Forensic data analysis 3

4 Previously: Obtaining evidence from networks } Traffic analysis techniques } Packet and flow analysis } Intrusion detection systems } NetFlow devices } ISPs DPI devices 4

5 Today: Focus on wireless and mobile networks } # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! } # wireless Internet-connected devices equals # wired Internetconnected devices } laptops, Internet-enabled phones promise anytime untethered Internet access } Two important (but different) challenges } } Wireless: communication over wireless link Mobility: handle mobile user who changes point of attachment to network 5

6 Many wireless network technologies out there } AM/FM radios } Wireless doorbells } Cordless phones } Cell phones } Bluetooth headsets } Infrared devices, such as TV remotes } Zigbee devices, such as HVAC, thermostat, lighting, and electrical controls } Wi-Fi (802.11) LAN networking over RF } WiMAX (802.16) lastmile broadband 6

7 Trend is for wireless-connected devices to grow } Landscape of wireless devices connected to the Internet 7

8 Wireless devices (will) play crucial role in crime } Mobile devices create new opportunities for criminals } While providing valuable sources of evidence 8

9 Why investigate wireless networks? } Recover stolen laptop by tracking it on a wireless network } Identify rogue wireless APs that have been installed by insiders for convenience or to bypass enterprise security } Investigate malicious or inappropriate activity that occurred via a wireless network } Investigate attacks on the wireless network itself, including DoS, encryption cracking, authentication bypass attacks 9

10 Our focus today is on investigating 1. WiFi networks 2. Cellular networks 10

11 WiFi network investigations 11

12 WiFi networks defined and justified } The term Wi-Fi refers to wireless networks as defined by the IEEE standards } We focus on Wi-Fi networks because: } They are ubiquitous } Can use many of our previously discussed forensic techniques 12

13 LAN architecture in infrastructure mode AP 1 Internet hub, switch or router AP 2 } Wireless host communicates with base station Base Station = Access Point (AP) Acts as wireless hub } Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: wireless hosts access point (AP): base station } Often, networks have multiple APs with same SSID 13

14 Wireless traffic capture: What info can be obtained? } Investigators can obtain a great deal of info: } Broadcast SSIDs } Wireless AP MAC addresses } Supported encryption/authentication algorithms } Associated client MAC addresses } In many cases, the full Layer 3+ packet contents } Encrypted Wi-Fi traffic can decrypted offline } As long as we obtain the encryption keys 14

15 It may be challenging to spot wireless traffic 15

16 16

17 Spectrum analysis } For Wi-Fi traffic, the IEEE utilizes 3 frequency ranges: } 2.4 GHz (802.11b/g/n)9 } 3.6 GHz (802.11y) } 5 GHz (802.11a/h/j/n) } Frequency ranges is divided into distinct channels } E.g., the IEEE has specified 14 channels in the 2.4 GHz range } Spectrum analyzers can monitor RF frequencies } E.g., Wi-Spy ($100-$1000) 17

18 Wireless passive evidence acquisition } Need an wireless card in monitor mode } Enable capture all packets, not just those destined for the host } NB: Some restrictions are imposed by the wireless cards; they are not fundamental! } RF waves travel through the air, which is a shared medium } As a result, WLAN traffic cannot be physically segmented } Therefore, all WLAN transmissions may be observed and intercepted by all stations within range 18

19 Tools to collect and analyze traffic } Essentially, we can use the same techniques and tools as we use for wired networks 19

20 Handling common attacks to wireless networks } Often, investigators suspect that a wireless network has been or is currently under attack } Common attacks on wireless networks include: 1. Sniffing } An attacker eavesdrops on the network 2. Rogue wireless APs } Unauthorized wireless devices that extend the local network 3. WEP cracking } Attempts to recover the WEP encryption key and access the network 4. The evil twin attack } An attacker sets up a WAP with the same SSID as a legitimate WLAN 20

21 Representation of an evil twin attack } Possibly detected by a wireless intrusion detection system 21

22 Investigation of wireless access points } A wireless access point (WAP) is a Layer 2 device that aggregates endpoint stations into a LAN } APs may be involved in forensic investigation because } may contain locally stored logs of connection attempts, auth successes and failures, and other local WAP activity } can help track the physical movements of a wireless client throughout a building or campus } their configuration may provide insight regarding how an attacker gained access to the network } their configuration may have been modified by an unauthorized party as part of an attack } they can be compromised 22

23 Locating wireless devices } Can be difficult to physically locate a device of interest } E.g., compromised laptop, a rogue wireless AP } Some strategies for locating wireless devices: 1. Gather station descriptions, such as MAC addresses } Every network card is assigned a unique OUI by the manufacturer 2. For clients, identify the AP that the station is associated with } Using AP logs or traffic monitoring 3. Pool the device s signal strength and triangulate } Use specialized tools such as NetStumbler or Kismet 4. Leverage commercial enterprise wireless mapping software 23

24 Screenshot of Cisco s Wireless Location Appliance } Displays devices located on an enterprise floor map } Allows system administrators to search and sort } Lists stations detected, SSID, signal strength, and more } Known devices are marked with a box, while rogue devices are labeled with a skull 24

25 Cellular network investigations 25

26 cell v covers geographical region v base station (BST) analogous to AP v mobile users attach to network through BST v air-interface: physical and link layer protocol between mobile and BST Components of cellular network architecture MSC v connects cells to wired tel. net. v manages call setup v handles mobility Mobile Switching Center Mobile Switching Center Public telephone network wired network 26

27 Two techniques for sharing mobile-to-bs radio spectrum Cellular networks: The first hop } combined FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots time slots frequency bands } CDMA: code division multiple access 27

28 2G (voice) network architecture Base station system (BSS) BTS BSC MSC G Gateway MSC Public telephone network Legend Base transceiver station (BTS) Base station controller (BSC) Mobile Switching Center (MSC) Mobile subscribers 28

29 Main components } Mobile devices connect to a base station (BTS) } Each BTS has at least one radio transceiver that provides radio coverage for a specific geographic region (cell) } GSM uses BSC to control communication between base stations, e.g., coordinates transfer from BTS to another } MSC delivers call and SMSes to mobile devices in its jurisdiction, and coordinates handovers of ongoing communications as devices move between areas 29

30 2.5G (voice+data) network architecture BSC MSC G Gateway MSC Public telephone network Key insight: new cellular data network operates in parallel (except at edge) with existing cellular voice network q voice network unchanged in core q data network operates in parallel SGSN G GGSN Public Internet Serving GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) 30

31 All components can be important for investigation } MSCs generate a wealth of useful information } Usage logs and charging detail records } List of mobile devices currently being handled by an MSC } Operation centers maintain and monitor NSPs systems } Info about subscribers, billing details, & services they can use } SMSes to be processed (are retained for limited time) } Voic } Blacklist of devices reported stolen or flagged as bad } Signaling information for call establishment } Devices IMEI numbers 31

32 IMEI are quite valuable for investigators } The International Mobile Equipment Identifier (IMEI) is a unique number associated with a particular device } IMEI can be used to obtain stored data from NSPs } To monitor traffic associated with a particular device } To keep track of a mobile device across NSPs 32

33 Device leaves traces the moment it s turned on } When powered on, the device announces itself to the network, starting the authentication process } The authentication process is based on the IMSI } Identity Mobile Subscriber Identity (IMSI) is a unique # stored on the SIM card and associated with a particular subscriber } IMSI is not directly sent over the network, but replaced with a Temporary Mobile Subscriber Identity (TMSI), which is logged } Investigators can ask NSPs to query their systems for all activities relating to a particular subscriber account 33

34 Investigations of mobile systems } Investigations are supported by dedicated software } Investigator enters all the data available on a subject } The server performs a thorough analysis and outputs info about mobile devices involved, calls made and received } NSP may provide additional historical info or other } E.g., other mobile devices at BTS on a given date and time 34

35 Types of evidence } Localization parameters } Usage logs / billing records } Text / multimedia messages } Voice and data 35

36 Determining the location of mobile devices } Can be important for investigating events in the past } Assessing alibies of suspects } Determining the whereabouts of victims } Can also provide clues for ongoing location tracking in certain cases } E.g., abduction, missing persons, etc. 36

37 Location parameters } Location parameters: info that can be combined to localize an active mobile device and its related user } Determine device s position: There s a timeframe where mobile devices announce themselves to the network } } Turning on a device and leaving it in an idle state generates data on the network that can help determine its location As a device is moved, it updates the network 37

38 Position tracking methods: Cell identification } The mobile device can be reached by looking at the cell to which it is currently connected } There is a range of accuracy } Starts from a few hundred meters in urban areas, up to 32 km in suburban } Accuracy depends on the known range of the particular base station 38

39 Position tracking methods: TDOA } Time difference of arrival (TDOA) aka multilateration } Measures the time it takes for a signal to travel from a device to multiple base stations to estimate the device location } Commonly used in civil and military surveillance applications 39

40 Location tracking supported by adequate tools } Investigators are assisted by specialized tools that collect and analyze location data from the NSP 40

41 Signal jamming } Organized criminal groups often protect their privacy by jamming signals in the area around their meeting place } A mobile device jamming system emits a signal to prevent the use of mobile phones within a certain radius } Prevents mobile devices from linking to the BTS and thus connecting to the network } } This prevents investigators from getting an idea of the geographical location of the meeting Side effect: temporarily interrupts the operation of mobile phones in the area 41

42 Cell phone jammers easily available online 42

43 But jammers may be crucial for the police too } Mobile devices can be remotely activated in any part of the work (e.g., to detonate a bomb) } E.g., by sending a ring or an SMS containing a code } Upon suspicion by the police, mobile devices can be preventively isolated from the network by deploying jamming systems in the vicinity of the devices 43

44 Types of evidence } Localization parameters } Usage logs / billing records } Text / multimedia messages } Voice and data 44

45 Usage logs & billing records } Logs maintained by an NSP can help investigators determine past usage of the phone, as well as communications between individuals } Logs are generated from Call Detail Records (CDRs) maintained for billing purposes: } Telephone number of user } Numbers called } IMEI number of mobile device } Information about the cell } SMS sent (excluding the text) } Date, time, and duration of the calls 45

46 Text & multimedia messages } Advantages of SMS include the ability of transmitting messages even in areas of very low signal coverage } SMS intercepted using same systems for intercepting voice calls } SMS and MMS can be important to an investigation, but they are maintained on core network for limited time } Therefore tend to be captured in transit during an investigation } The structure of intercepted SMS / MMS is straightforward } Sender, receiver, time, date, and content 46

47 Types of evidence } Localization parameters } Usage logs / billing records } Text / multimedia messages } Voice and data 47

48 Interception of evidence on mobile networks } In general, the freedom and privacy of personal communications are inviolable rights that can be compromised only if authorized by judicial authorities } For privacy protection, legal systems dictate limitations to admissibility of interceptions: } Interceptions are allowable only in certain specific crimes } Interceptions must be authorized } Typically, interceptions done in collaboration with NSPs 48

49 How telephone (or data) interception works } The NSP duplicates a suspect s communication line and deviating it to a Monitoring Center (MC) as specified in a warrant by the Judicial Authorities } In principle, the NSP never gains knowledge of the contents of the tapped telephone calls Ongoing call Mobile Switching Center Monitoring Center 49

50 Monitoring systems } Powerful systems with database backends that allow investigators to: } } } } } } } 50 Eavesdrop conversations directly Watch video calls Review and print faxes Display location details Monitor telematic info like and Internet Be notified of call intercept of certain target Search through previously recorded traffic ADACS intelligence collection systems

51 Monitoring systems offer powerful interfaces } Sample screenshot of the ADACS system } ADACS provides law enforcement and intelligence agencies with the ability to collection, monitor, record and analyze switch-based voice, video, and data transmissions 51

52 Advanced features in interception systems } Voice recognition } Central database for storage of recognized voices complete with sample recordings and personal notes } Analysis of target behavior } Predictive target behavior analysis and graphic analysis for interaction among targets 52

53 Alternative approach to interception: IMSI-catcher } IMSI-catcher subjects the phones in its vicinity to a MITM attack, acting to them as a fake base station } Exploits GSM security hole where the network doesn t need to authenticate Normal communication path Intercepted communication path } The FBI adopts this technique using the Stingray IMSI-catcher 53

54 } To prevent eavesdropping and electronic surveillance, use crypto phones Crypto phones } Crypto phones use algorithms to encrypt the voice signals end-to-end } Implement automatic variation of session key } Cryptographic chip handles crypto operations } This represents a limit for investigations, unless encryption can be broken GSMK Cryptophone

55 Conclusions } Wireless and mobile communications represent an increasingly growing amount of network traffic } In particular, WiFi and cellular networks are amongst the most popular technologies used today } Therefore, it is important for digital investigators to be able to collect and analyze evidence from such networks 55

56 References } Primary bibliography } Casey, Handbook of Digital Forensics and Investigations, 2010 [Ch. 10] 56

57 Next class } File carving } Or } Invited talk 57

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

GSM Open-source intelligence

GSM Open-source intelligence GSM Open-source intelligence Kenneth van Rijsbergen 1 1 MSc System and Network Engineering Faculty of Science University of Amsterdam 30 June 2016 Kenneth van Rijsbergen University of Amsterdam GSM OSINT

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Chapter 3 GSM and Similar Architectures

Chapter 3 GSM and Similar Architectures CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

GSM Interception IMSI Catcher and Voice Interception

GSM Interception IMSI Catcher and Voice Interception GSM Interception IMSI Catcher and Voice Interception Part of the product line Product overview go2intercept passive: GSM interception Passive, massive, of the air. (page 3-4) go2intercept active basic:

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Wireless Detective Extreme System

Wireless Detective Extreme System Wireless Detective Extreme System Advanced Technology of Distributed Wireless Network Interception from Decision Group Product Marketing Division, Decision Group March 2011 Advanced technology of Distributed

More information

CSCI-1680 Wireless Chen Avin

CSCI-1680 Wireless Chen Avin CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)

Beyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) Beyond 3G Wireless K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) 3G Deployments today Rev C? 3G -1X EVDO CDMA2000 Rev A 3G -1XRTT CDMA2000

More information

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and

More information

Communication Systems for the Mobile Information Society

Communication Systems for the Mobile Information Society Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix

More information

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Home Area Networks. Outline

Home Area Networks. Outline Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed. Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

WIRELESS EVIL TWIN ATTACK

WIRELESS EVIL TWIN ATTACK WIRELESS EVIL TWIN ATTACK Prof. Pragati Goel Associate Professor, NCRD s Sterling Institute of Management Studies, Navi Mumbai Mr. Chetan Singh NCRD s Sterling Institute Of Management Studie, Navi Mumbai

More information

Wireless Network Introduction

Wireless Network Introduction Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

Attack & Defense in Wireless Networks

Attack & Defense in Wireless Networks Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications Jorge Olenewa jolenewa@georgebrown.ca Office: E425 ext. 6809 Objectives Explain how the major wireless technologies

More information

Introduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and

Introduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and Introduction to Wireless Networks Chapter 7: Introduction to Heterogeneous Networks and ALL-IP Networks Prof. Yuh-Shyan Chen Department t of CSIE National Taipei University Outline Trend on Wireless/Cellular

More information

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts 1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number

More information

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

This tutorial has been designed to help beginners understand the basic concepts of WiMAX. About the Tutorial WiMAX is one of the hottest broadband wireless technologies around today. It is based on IEEE 802.16 specification and it is expected to deliver high quality broadband services. This

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1 1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network. Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks

More information

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell

More information

Module 6: Wireless Mobile Networks

Module 6: Wireless Mobile Networks Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links

More information

Understand iwag Solution for 3G Mobile Data

Understand iwag Solution for 3G Mobile Data Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless

More information

1 Wireless Network Architecture

1 Wireless Network Architecture CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects

More information

Security of Cellular Networks: Man-in-the Middle Attacks

Security of Cellular Networks: Man-in-the Middle Attacks Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

The Case for Secure Communications

The Case for Secure Communications Whitepaper The Case for Secure Communications The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications,

More information

Short Message Service (SMS)

Short Message Service (SMS) TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice

10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice Adam Zion Director of Information Technology Office of the Kings County District Attorney The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment

More information

(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania

(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania (Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,

More information

Fixed Mobile Convergence

Fixed Mobile Convergence Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 ITU-BDT Regional Seminar on Fixed Mobile Convergence and new network architecture for Arab Region Tunis, Tunisia, 21-24 November

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

Wireless networks: from cellular to ad hoc

Wireless networks: from cellular to ad hoc Wireless networks: from cellular to ad hoc The three wireless waves Wave #1: cellular telephony Still, biggest profit maker Wave #2 : wireless Internet access Most Internet access on US campuses is wireless

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements First quiz on Friday, 01.16. Covers material up to and including 01.14. Closed books, notes, etc. Winter 2004 Lecture 5 1 2 Data Transmission

More information

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected

More information