Wireless and Mobile Network Investigation
|
|
- Gabriel Lynch
- 6 years ago
- Views:
Transcription
1 Wireless and Mobile Network Investigation Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos
2 Summary } WiFi network investigations } Cellular network investigations 2
3 Remember were we are } Our journey in this course: } Part I: Foundations of digital forensics } Part II: Techniques and tools } A. Computer forensics } B. Network forensics Current focus } C. Forensic data analysis 3
4 Previously: Obtaining evidence from networks } Traffic analysis techniques } Packet and flow analysis } Intrusion detection systems } NetFlow devices } ISPs DPI devices 4
5 Today: Focus on wireless and mobile networks } # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! } # wireless Internet-connected devices equals # wired Internetconnected devices } laptops, Internet-enabled phones promise anytime untethered Internet access } Two important (but different) challenges } } Wireless: communication over wireless link Mobility: handle mobile user who changes point of attachment to network 5
6 Many wireless network technologies out there } AM/FM radios } Wireless doorbells } Cordless phones } Cell phones } Bluetooth headsets } Infrared devices, such as TV remotes } Zigbee devices, such as HVAC, thermostat, lighting, and electrical controls } Wi-Fi (802.11) LAN networking over RF } WiMAX (802.16) lastmile broadband 6
7 Trend is for wireless-connected devices to grow } Landscape of wireless devices connected to the Internet 7
8 Wireless devices (will) play crucial role in crime } Mobile devices create new opportunities for criminals } While providing valuable sources of evidence 8
9 Why investigate wireless networks? } Recover stolen laptop by tracking it on a wireless network } Identify rogue wireless APs that have been installed by insiders for convenience or to bypass enterprise security } Investigate malicious or inappropriate activity that occurred via a wireless network } Investigate attacks on the wireless network itself, including DoS, encryption cracking, authentication bypass attacks 9
10 Our focus today is on investigating 1. WiFi networks 2. Cellular networks 10
11 WiFi network investigations 11
12 WiFi networks defined and justified } The term Wi-Fi refers to wireless networks as defined by the IEEE standards } We focus on Wi-Fi networks because: } They are ubiquitous } Can use many of our previously discussed forensic techniques 12
13 LAN architecture in infrastructure mode AP 1 Internet hub, switch or router AP 2 } Wireless host communicates with base station Base Station = Access Point (AP) Acts as wireless hub } Basic Service Set (BSS) (aka cell ) in infrastructure mode contains: wireless hosts access point (AP): base station } Often, networks have multiple APs with same SSID 13
14 Wireless traffic capture: What info can be obtained? } Investigators can obtain a great deal of info: } Broadcast SSIDs } Wireless AP MAC addresses } Supported encryption/authentication algorithms } Associated client MAC addresses } In many cases, the full Layer 3+ packet contents } Encrypted Wi-Fi traffic can decrypted offline } As long as we obtain the encryption keys 14
15 It may be challenging to spot wireless traffic 15
16 16
17 Spectrum analysis } For Wi-Fi traffic, the IEEE utilizes 3 frequency ranges: } 2.4 GHz (802.11b/g/n)9 } 3.6 GHz (802.11y) } 5 GHz (802.11a/h/j/n) } Frequency ranges is divided into distinct channels } E.g., the IEEE has specified 14 channels in the 2.4 GHz range } Spectrum analyzers can monitor RF frequencies } E.g., Wi-Spy ($100-$1000) 17
18 Wireless passive evidence acquisition } Need an wireless card in monitor mode } Enable capture all packets, not just those destined for the host } NB: Some restrictions are imposed by the wireless cards; they are not fundamental! } RF waves travel through the air, which is a shared medium } As a result, WLAN traffic cannot be physically segmented } Therefore, all WLAN transmissions may be observed and intercepted by all stations within range 18
19 Tools to collect and analyze traffic } Essentially, we can use the same techniques and tools as we use for wired networks 19
20 Handling common attacks to wireless networks } Often, investigators suspect that a wireless network has been or is currently under attack } Common attacks on wireless networks include: 1. Sniffing } An attacker eavesdrops on the network 2. Rogue wireless APs } Unauthorized wireless devices that extend the local network 3. WEP cracking } Attempts to recover the WEP encryption key and access the network 4. The evil twin attack } An attacker sets up a WAP with the same SSID as a legitimate WLAN 20
21 Representation of an evil twin attack } Possibly detected by a wireless intrusion detection system 21
22 Investigation of wireless access points } A wireless access point (WAP) is a Layer 2 device that aggregates endpoint stations into a LAN } APs may be involved in forensic investigation because } may contain locally stored logs of connection attempts, auth successes and failures, and other local WAP activity } can help track the physical movements of a wireless client throughout a building or campus } their configuration may provide insight regarding how an attacker gained access to the network } their configuration may have been modified by an unauthorized party as part of an attack } they can be compromised 22
23 Locating wireless devices } Can be difficult to physically locate a device of interest } E.g., compromised laptop, a rogue wireless AP } Some strategies for locating wireless devices: 1. Gather station descriptions, such as MAC addresses } Every network card is assigned a unique OUI by the manufacturer 2. For clients, identify the AP that the station is associated with } Using AP logs or traffic monitoring 3. Pool the device s signal strength and triangulate } Use specialized tools such as NetStumbler or Kismet 4. Leverage commercial enterprise wireless mapping software 23
24 Screenshot of Cisco s Wireless Location Appliance } Displays devices located on an enterprise floor map } Allows system administrators to search and sort } Lists stations detected, SSID, signal strength, and more } Known devices are marked with a box, while rogue devices are labeled with a skull 24
25 Cellular network investigations 25
26 cell v covers geographical region v base station (BST) analogous to AP v mobile users attach to network through BST v air-interface: physical and link layer protocol between mobile and BST Components of cellular network architecture MSC v connects cells to wired tel. net. v manages call setup v handles mobility Mobile Switching Center Mobile Switching Center Public telephone network wired network 26
27 Two techniques for sharing mobile-to-bs radio spectrum Cellular networks: The first hop } combined FDMA/TDMA: divide spectrum in frequency channels, divide each channel into time slots time slots frequency bands } CDMA: code division multiple access 27
28 2G (voice) network architecture Base station system (BSS) BTS BSC MSC G Gateway MSC Public telephone network Legend Base transceiver station (BTS) Base station controller (BSC) Mobile Switching Center (MSC) Mobile subscribers 28
29 Main components } Mobile devices connect to a base station (BTS) } Each BTS has at least one radio transceiver that provides radio coverage for a specific geographic region (cell) } GSM uses BSC to control communication between base stations, e.g., coordinates transfer from BTS to another } MSC delivers call and SMSes to mobile devices in its jurisdiction, and coordinates handovers of ongoing communications as devices move between areas 29
30 2.5G (voice+data) network architecture BSC MSC G Gateway MSC Public telephone network Key insight: new cellular data network operates in parallel (except at edge) with existing cellular voice network q voice network unchanged in core q data network operates in parallel SGSN G GGSN Public Internet Serving GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) 30
31 All components can be important for investigation } MSCs generate a wealth of useful information } Usage logs and charging detail records } List of mobile devices currently being handled by an MSC } Operation centers maintain and monitor NSPs systems } Info about subscribers, billing details, & services they can use } SMSes to be processed (are retained for limited time) } Voic } Blacklist of devices reported stolen or flagged as bad } Signaling information for call establishment } Devices IMEI numbers 31
32 IMEI are quite valuable for investigators } The International Mobile Equipment Identifier (IMEI) is a unique number associated with a particular device } IMEI can be used to obtain stored data from NSPs } To monitor traffic associated with a particular device } To keep track of a mobile device across NSPs 32
33 Device leaves traces the moment it s turned on } When powered on, the device announces itself to the network, starting the authentication process } The authentication process is based on the IMSI } Identity Mobile Subscriber Identity (IMSI) is a unique # stored on the SIM card and associated with a particular subscriber } IMSI is not directly sent over the network, but replaced with a Temporary Mobile Subscriber Identity (TMSI), which is logged } Investigators can ask NSPs to query their systems for all activities relating to a particular subscriber account 33
34 Investigations of mobile systems } Investigations are supported by dedicated software } Investigator enters all the data available on a subject } The server performs a thorough analysis and outputs info about mobile devices involved, calls made and received } NSP may provide additional historical info or other } E.g., other mobile devices at BTS on a given date and time 34
35 Types of evidence } Localization parameters } Usage logs / billing records } Text / multimedia messages } Voice and data 35
36 Determining the location of mobile devices } Can be important for investigating events in the past } Assessing alibies of suspects } Determining the whereabouts of victims } Can also provide clues for ongoing location tracking in certain cases } E.g., abduction, missing persons, etc. 36
37 Location parameters } Location parameters: info that can be combined to localize an active mobile device and its related user } Determine device s position: There s a timeframe where mobile devices announce themselves to the network } } Turning on a device and leaving it in an idle state generates data on the network that can help determine its location As a device is moved, it updates the network 37
38 Position tracking methods: Cell identification } The mobile device can be reached by looking at the cell to which it is currently connected } There is a range of accuracy } Starts from a few hundred meters in urban areas, up to 32 km in suburban } Accuracy depends on the known range of the particular base station 38
39 Position tracking methods: TDOA } Time difference of arrival (TDOA) aka multilateration } Measures the time it takes for a signal to travel from a device to multiple base stations to estimate the device location } Commonly used in civil and military surveillance applications 39
40 Location tracking supported by adequate tools } Investigators are assisted by specialized tools that collect and analyze location data from the NSP 40
41 Signal jamming } Organized criminal groups often protect their privacy by jamming signals in the area around their meeting place } A mobile device jamming system emits a signal to prevent the use of mobile phones within a certain radius } Prevents mobile devices from linking to the BTS and thus connecting to the network } } This prevents investigators from getting an idea of the geographical location of the meeting Side effect: temporarily interrupts the operation of mobile phones in the area 41
42 Cell phone jammers easily available online 42
43 But jammers may be crucial for the police too } Mobile devices can be remotely activated in any part of the work (e.g., to detonate a bomb) } E.g., by sending a ring or an SMS containing a code } Upon suspicion by the police, mobile devices can be preventively isolated from the network by deploying jamming systems in the vicinity of the devices 43
44 Types of evidence } Localization parameters } Usage logs / billing records } Text / multimedia messages } Voice and data 44
45 Usage logs & billing records } Logs maintained by an NSP can help investigators determine past usage of the phone, as well as communications between individuals } Logs are generated from Call Detail Records (CDRs) maintained for billing purposes: } Telephone number of user } Numbers called } IMEI number of mobile device } Information about the cell } SMS sent (excluding the text) } Date, time, and duration of the calls 45
46 Text & multimedia messages } Advantages of SMS include the ability of transmitting messages even in areas of very low signal coverage } SMS intercepted using same systems for intercepting voice calls } SMS and MMS can be important to an investigation, but they are maintained on core network for limited time } Therefore tend to be captured in transit during an investigation } The structure of intercepted SMS / MMS is straightforward } Sender, receiver, time, date, and content 46
47 Types of evidence } Localization parameters } Usage logs / billing records } Text / multimedia messages } Voice and data 47
48 Interception of evidence on mobile networks } In general, the freedom and privacy of personal communications are inviolable rights that can be compromised only if authorized by judicial authorities } For privacy protection, legal systems dictate limitations to admissibility of interceptions: } Interceptions are allowable only in certain specific crimes } Interceptions must be authorized } Typically, interceptions done in collaboration with NSPs 48
49 How telephone (or data) interception works } The NSP duplicates a suspect s communication line and deviating it to a Monitoring Center (MC) as specified in a warrant by the Judicial Authorities } In principle, the NSP never gains knowledge of the contents of the tapped telephone calls Ongoing call Mobile Switching Center Monitoring Center 49
50 Monitoring systems } Powerful systems with database backends that allow investigators to: } } } } } } } 50 Eavesdrop conversations directly Watch video calls Review and print faxes Display location details Monitor telematic info like and Internet Be notified of call intercept of certain target Search through previously recorded traffic ADACS intelligence collection systems
51 Monitoring systems offer powerful interfaces } Sample screenshot of the ADACS system } ADACS provides law enforcement and intelligence agencies with the ability to collection, monitor, record and analyze switch-based voice, video, and data transmissions 51
52 Advanced features in interception systems } Voice recognition } Central database for storage of recognized voices complete with sample recordings and personal notes } Analysis of target behavior } Predictive target behavior analysis and graphic analysis for interaction among targets 52
53 Alternative approach to interception: IMSI-catcher } IMSI-catcher subjects the phones in its vicinity to a MITM attack, acting to them as a fake base station } Exploits GSM security hole where the network doesn t need to authenticate Normal communication path Intercepted communication path } The FBI adopts this technique using the Stingray IMSI-catcher 53
54 } To prevent eavesdropping and electronic surveillance, use crypto phones Crypto phones } Crypto phones use algorithms to encrypt the voice signals end-to-end } Implement automatic variation of session key } Cryptographic chip handles crypto operations } This represents a limit for investigations, unless encryption can be broken GSMK Cryptophone
55 Conclusions } Wireless and mobile communications represent an increasingly growing amount of network traffic } In particular, WiFi and cellular networks are amongst the most popular technologies used today } Therefore, it is important for digital investigators to be able to collect and analyze evidence from such networks 55
56 References } Primary bibliography } Casey, Handbook of Digital Forensics and Investigations, 2010 [Ch. 10] 56
57 Next class } File carving } Or } Invited talk 57
CSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationCOMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Reading Guide: Chapter 6: 6.1 6.4 1 Ch. 6: Wireless and Mobile Networks Background: v # wireless (mobile) phone subscribers now exceeds # wired
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationThe Cellular Interceptor CC2800 Series
The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationTalk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationGLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationGSM Open-source intelligence
GSM Open-source intelligence Kenneth van Rijsbergen 1 1 MSc System and Network Engineering Faculty of Science University of Amsterdam 30 June 2016 Kenneth van Rijsbergen University of Amsterdam GSM OSINT
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationChapter 3 GSM and Similar Architectures
CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationSemi-Active GSM Monitoring System SCL-5020SE
Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationGSM Interception IMSI Catcher and Voice Interception
GSM Interception IMSI Catcher and Voice Interception Part of the product line Product overview go2intercept passive: GSM interception Passive, massive, of the air. (page 3-4) go2intercept active basic:
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationWireless Detective Extreme System
Wireless Detective Extreme System Advanced Technology of Distributed Wireless Network Interception from Decision Group Product Marketing Division, Decision Group March 2011 Advanced technology of Distributed
More informationCSCI-1680 Wireless Chen Avin
CSCI-1680 Wireless Chen Avin Based on slides from Computer Networking: A Top Down Approach - 6th edition Administrivia TCP is due on Friday Final Project is out (fun, two weeks) Wireless and Mobile Networks
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationBeyond 3G Wireless. K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA)
Beyond 3G Wireless K.Raghunandan (RAGHU) Construction Administrator (Wireless) Communication Engineering New York City Transit (MTA) 3G Deployments today Rev C? 3G -1X EVDO CDMA2000 Rev A 3G -1XRTT CDMA2000
More informationWorldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System
Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and
More informationCommunication Systems for the Mobile Information Society
Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix
More informationCOMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2
COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationHome Area Networks. Outline
Home Area Networks CS 687 University of Kentucky Fall 2015 Acknowledgment: Some slides are adapted from the slides distributed with the book Computer Networking: A Top Down Approach, 5th edition. Jim Kurose,
More informationCellular Mobile Systems and Services (TCOM1010) GSM Architecture
GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationWIRELESS EVIL TWIN ATTACK
WIRELESS EVIL TWIN ATTACK Prof. Pragati Goel Associate Professor, NCRD s Sterling Institute of Management Studies, Navi Mumbai Mr. Chetan Singh NCRD s Sterling Institute Of Management Studie, Navi Mumbai
More informationWireless Network Introduction
Wireless Network Introduction Module W.bas.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Wireless network introduction W.bas.1-2
More informationUNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase
UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM
More informationAttack & Defense in Wireless Networks
Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications Jorge Olenewa jolenewa@georgebrown.ca Office: E425 ext. 6809 Objectives Explain how the major wireless technologies
More informationIntroduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and
Introduction to Wireless Networks Chapter 7: Introduction to Heterogeneous Networks and ALL-IP Networks Prof. Yuh-Shyan Chen Department t of CSIE National Taipei University Outline Trend on Wireless/Cellular
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationThis tutorial has been designed to help beginners understand the basic concepts of WiMAX.
About the Tutorial WiMAX is one of the hottest broadband wireless technologies around today. It is based on IEEE 802.16 specification and it is expected to deliver high quality broadband services. This
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.
Chapter 6 Wireless and obile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. Chapter 6: Wireless and obile Networks
More informationCell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking
The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationUnderstand iwag Solution for 3G Mobile Data
Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More information1 Wireless Network Architecture
CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects
More informationSecurity of Cellular Networks: Man-in-the Middle Attacks
Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More informationChapter 7. Basic Wireless Concepts and Configuration. Part I
Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationThe Case for Secure Communications
Whitepaper The Case for Secure Communications The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications,
More informationShort Message Service (SMS)
TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More information10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice
Adam Zion Director of Information Technology Office of the Kings County District Attorney The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment
More information(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania
(Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,
More informationFixed Mobile Convergence
Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction
More informationNexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper
Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationMobile Networks Evolution: Economic Aspects of Evolution towards IMT2000
Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 ITU-BDT Regional Seminar on Fixed Mobile Convergence and new network architecture for Arab Region Tunis, Tunisia, 21-24 November
More informationIMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)
IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the
More informationWireless networks: from cellular to ad hoc
Wireless networks: from cellular to ad hoc The three wireless waves Wave #1: cellular telephony Still, biggest profit maker Wave #2 : wireless Internet access Most Internet access on US campuses is wireless
More informationWednesday, May 16, 2018
Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements First quiz on Friday, 01.16. Covers material up to and including 01.14. Closed books, notes, etc. Winter 2004 Lecture 5 1 2 Data Transmission
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationWireless and Mobile Networks
Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals # wireline Internet-connected
More information