Security in Ad-hoc Networks
|
|
- Oliver Tyler
- 6 years ago
- Views:
Transcription
1 1(12) Security in Ad-hoc Networks Anne Vanhala University of Helsinki Department of Computing Science Research seminar on Security in Distributed Systems Abstract A short-range wireless channel has security problems that differ from those of more conventional networks. This paper presents first the general features of ad-hoc networks. Characteristic security issues in ad-hoc networks will be enlightened next. Finally, an example of a short-range wireless network will be presented. The Bluetooth standard is described shortly as well as the found weaknesses in its security. 1. Introduction Cell phones as a means of managing the life of people will increase their popularity. These phones promise to extend the possibilities of commerce that in connections with cell phones is called mobile commerce, or shortly m-commerce. Mobile commerce will make commerce platforms more important, because in that way electronic and mobile commerce transactions will be open for wide markets. An important step towards the development and penetration on m-commerce is the employment of short-range wireless local area networks, such as Bluetooth. Also the consumer electronics has a tendency of having an embedded microprocessor in every device. This embedded networking is also suitable for Smart Information Services like alarms, electronic business cards etc. Shortly, networking will become more and more general. The principles of Wireless Local Area Network (WLAN) were defined in standard IEEE that was concluded in the end of 1997 [12]. It defines two different topologies: adhoc network and infrastructure network. An infrastructure network is an enlargement of a fixed network, where mobile devices can be connected to fixed network. An ad-hoc network is independent and it can consist of mobile devices supplied with cordless
2 2(12) adapters to network. These mobile devices form a point-to-point connection to every single device in this particular network Therefore an ad-hoc network is able to use only created wireless connection instead of fixed infrastructure. Wireless Local Area Network (WLAN) is sometimes called also as ad hoc network. Using radio frequency in WLAN brings us a problem of receiving signals inside the WLAN and weak signals in its near surrounding. This can be limited by using Frequency Hopping Spread Spectrum (FHSS), where frequencies vary randomly. WLAN based on microwave techniques have similar problems. Only WLAN based on infrared technique is secure in this sense, because the radiation cannot pass through walls. Generally, WLAN has more tendency to eavesdropping than fixed LAN. This paper can be divided into three main chapters in addition to introduction and conclusion. The first main chapter gives an overview of ad-hoc networks. Some ad-hoc networks are mentioned, and in third main chapter the security issues of an ad-hoc network named Bluetooth will be presented. The second main chapter enlightens the general security issues of an ad-hoc network. 2. Overview of Ad-hoc Networks Ad-hoc networks have characteristics that differ from those of more conventional networks. These networks have a short range of wireless channel. Some of the common features for such networks are that there is only little or no support infrastructure. This lack of infrastructure introduces problems in routing, name resolution, service discovery and security [1] [2]. The trust in the prior context of security can be transferred and transformed when providing security services. There is also absence of an online server that has its influence on security. In addition to all these the battery operated personal devices have constraints such as a peanut CPU, battery power and high latency. This may cause trade-off between security and constraints mentioned above. Several groups have built up their networks emphasizing different aspects such as Piconet [3], HomeRF [4], IrDA [5], Bluetooth [6,7,8] and IEEE 802 [12]. IrDA is based on infrared technology and the others use radio frequency. The comparison of wireless radio is presented in table 1. Piconet is a general purpose, low-powered, ad-hoc network, where security issues have not yet been of significant interest in designing and implementation. Piconet is a project at Olivetti and Oracle Research Laboratory (ORL). Its goal was to understand the provision of wireless connectivity. A Piconet node has been developed to provide a connection to this embedded network. It allows two devices near each other to interoperate. These devices can be either mobile or fixed. The range is said to be reasonably short.
3 3(12) Table 1: Wireless radio comparison. The HomeRF Shared Wireless Access Protocol (SWAP) system is designed to carry both voice and data traffic and to inter-operate with the Public Switched Telephone Network (PSTN) and the Internet. The SWAP system can operate either as an ad-hoc network or as a managed network under the control of Connection Point. Connection Point is required to coordinate the system. In an ad-hoc network that supports only data communication all stations are equal and control of network is distributed between the stations. The range covers typical home and yard. Therefore especially different consumer electronic devices use SWAP. Infrared Data Assosiation s IrDA is based on technology similar to the remote control devices such as TV and entertainment used in most home today. IrDA Data is recommended for high-speed short range, point-to-point cordless data transfer. IrDA Control is recommended in-room cordless peripherals to host-pc. The range of physical IrDA Data signaling for continuous operations is from contact to at least 1 meter, but also 2 meters can normally be reached. The range of physical IrDA Control signaling is minimum 5 meter between infrared remote control units. Infrared has advantage over radio because of the maturity of infrared technology and standardization activities. The line-of-sight requirement of infrared restricts its flexibility and is clearly disadvantage. Bluetooth is a recently proposed standard for local wireless communication of devices. It promises a variety of improvements over current functionality (hands-free communication and effortless synchronization). It allows communication between portable and fixed devices by using short-range wireless methods. These wireless local
4 4(12) area networks can be of permanent or temporary nature. Bluetooth can be used in mobile devices like mobile computers, mobile phones, network access points printers and virtually any other device that can have Bluetooth radios integrated into them. More detailed information in the context of security is given in chapter Security issues in ad-hoc Network Ad-hoc networks have same security issues as infrastructure networks. The emphases on these issues just differ from those of more conventional systems. These issues are denial of service, the goals of authentication and the problem of naming. The denial of service is a part of the availability of a service. The goals of authentication have to be set differently. This includes also naming. These issues are handled in chapter 3.2. In this chapter the master device, later only master, is the one that have a control over other devices called slaves. There can mostly be seven slaves to be controlled by one master. And a master can be a slave of another master [1]. 3.1 Availability Availability means that the service is offered to the user when it is requested. The nondelivery of a service has a great meaning to user. The denial of a service can be caused by such legitimate ways as a radio jamming or battery exhaustion. An attacker can cause a radio jamming by jamming a wider frequency band and in that way using more power. The latter can be of real threat, because once a battery runs out the attacker can walk away and leave the victim disabled. This kind of technique is called as the sleep deprivation torture attack [1]. 3.2 Authenticity From the security point of view the ad-hoc network has a fundamental problem: there are no online servers [1] [2]. A centralized administrator takes usually care of authorization mechanism. The interaction with the administrator can be expensive and time-consuming. The mechanism can anyway be implemented by access control lists or capabilities like signed certificates. The length of valid period concerning access control lists and capabilities has influence on convenience. Some trade-off between them has to be made. Stajano and Anderson [1] have presented The resurrecting duckling security policy, in which they emphasize uniqueness of a master. In this paper a slave has two exclusive states: imprinted and imprintable. The master controls his slave and they are bound to
5 5(12) together with a shared secret that is originally transferred from master to slave over a nonwireless, confidential and integrated, channel. The slave is imprinted and made imprintable by his master. The slave becomes imprintable as a consequence of conclusion of a transaction or by an order of his master. An example of this policy is the usage of a thermometer. The thermometer is calibrated once in six months. A doctor picks up any valid thermometer and wants it to communicate with e.g. her palmtop in order to receive the measured result. After this action the thermometer is free to be used by any other doctor. The original The resurrecting duckling security policy was extended to cover also a peer-to-peer interaction [9]. In the extension a master can also be a human in addition to devices. In case of human master he can imprint the slave device by typing a PIN. A master can also be a millimeter-sized dust mote of which a system is consist of. There are a lot of dust motes in monitored area and each of them has battery, solar cell, sensors and some digital computing equipment. It may also have an active transmitter and receiver. These can be used in military purpose. Another feature of this extension is that the master does not have to be unique. The slave can be imprinted also by another master that has a credential valid to that slave at the moment. The slave has a principle master, but it can receive some kind of orders also from other masters. In extension of the resurrecting duckling model the master can upload a new policy in slave, too. The key agreement is of significant importance when a secure transient association is to be guaranteed [2]. This will happen best when the key management is done locally. In case of ad-hoc network the location is more relevant as the name space. In order to implement location-based key agreement successfully a set of labels to map the location as well as identity-based mechanism for key agreement is needed. Yet there are problems that have to be solved. First, there might be multilevel certificate hierarchy and second, the sent certificate can be cancelled. In order to tackle these problems a physically secure channel or a trusted 3 rd party can be used if only it is available. A generic protocol for password authenticated key exchange is presented in figure 1 [2]. The two parties M and S share a weak secret P. The goal of this protocol is to agree a strong session key K in spite of weak P. In first step a master sends his identifier and an encrypted weak secret to slave. In second step the slave extracts E M and generates R randomly. R is encrypted with E M and returned back to master. In third step the R is extracted and challenge M and S M are generated. They are encrypted by R and sent back to slave. In forth step slave extracts challenge M and computes h(challenge M). Slaves own random strings challenge S and S S are generated and encrypted with h(challenge M) using R as a key. These will be sent back to master that in fifth step verifies the given h(challenge M) to be what it is claimed to be. The master can be convinced that slave can extract challenge M. This is possible only if the slave knows the used weak secret. The protocol can be extended to multi-party protocol. In that case S functions are also used to generate strong session key K. Other parties knowledge of K have to be confirmed.
6 6(12) Figure 1: Protocol for password authenticated key exchange. 3.3 Integrity Integrity is close to authenticity. By the integrity is meant that no node has been maliciously changed [1]. In case of integrity there are similarities between that of ad-hoc network and that of more conventional systems. Integrity has to be preserved. As certificate and identities are not secret, it is possible to clone a device. By securing the public key and letting only the device to know his private key it is possible to use the certificate in sensible way. The device has to be tamper-proof, so that his private key cannot be read out and used in a fake device. To best way to avoid attacks is to try to make the node tamper-proof, which is not simple at all. Anderson [11] has in his paper Tamper Resistance a Cautionary Note stated the importance and necessity of design security systems more carefully. The systems have to be tested also against hostile attackers. The physical tamper-evidence mechanisms are often more suitable. The tampering itself can be more than changing a code or key. It can also be a direct attack to a device. The software has to be able to be uploaded into nodes. This has to be possible also after deployment. If a part of the core code of the node is tamper-proof uploading an infiltrating of malicious code can be done.
7 7(12) 3.4 Confidentiality It is essential that the right master will be ensured as a first action. If this is left undone, there is no point to secure the communication with an arbitrary master. So when the authenticity is done properly the confidentiality is taken care by encrypting. 3.5 Privacy Ad-hoc networks have a higher tendency to eavesdropping than more conventional ones. Specially, if the key agreement is not done with a suitable protocol, anyone can listen it and determine the information needed for authentication. 4. An example of an ad-hoc network: Bluetooth The Bluetooth technology provides peer-to-peer communications for both mobile and fixed devices that use short-range wireless networks [6] [7] [8]. These transmissions can take place in a business and home environment. Bluetooth can form both permanent and temporary wireless local area networks. The signal interference is avoided by frequency hopping spread spectrum. The Bluetooth system is also a cost-effective solution, because it operates in the 2.4 Ghz ISM (Industrial, Scientific and Medical) radio frequency band that is license free in almost every country. It doesn t consume much power and there can be several access points in the same area. The basic objectives for security were to provide means for a secure link layer. From the authentication of entities point of view this means that the devices have to be identified and access control has to be solved. From the link s point of view enabling privacy in multi-access channel was an objective, but not an easy one, because eavesdropping is easy. What the Bluetooth does not do is securing end-to-end links. As Bluetooth specification 1.0 B was published just year ago, it consists of some shortcomings in security. These weaknesses concern attacks to determine the key exchange of two victim devices and attacks on location some to mention. In the following subchapters security weaknesses of Bluetooth are being presented. 4.1 Architectural overview The architectural overview of Bluetooth is presented in figure 2. In order to guarantee the confidentiality the system has to provide security measures both at the application layer and the link layer. This means that the authentication and the encryption routines have to
8 8(12) be implemented in same way in each Bluetooth device. There are four different entities used for maintaining the security at the link layer. First one of them is a Bluetooth device address which is unique for each user, but it is not a secured identity. Its size is 48 bits. The second one of them is a private user key, which is used for authentication. Its size is 128 bits. The third one of them is a private user key that is used for encryption. Its size varies from 8 to 128 bits. The authentication key is different from encryption key although the latter is created from the former one. The fourth entity is a random number, which can be derived from random or pseudo-random process in the Bluetooth device. This number will change frequently. Figure 2: Architectural overview. 4.2 Key types The link key is a 128-bit random number that is shared between two or more parties [6]. It is used in the authentication routine. It is one of the parameters when the encryption key is derived. The hierarchy of key types is presented in figure 3. The link key is either temporary or semi-permanent. The lifetime of a temporary key is same as the lifetime of a session. In a point-to-multi-point configuration, where the same information is to be distributed to several recipients, a common encryption key is useful. A special link key, here master key, can temporarily replace the current link keys. With master s random number and master key the slaves can generate a new encryption key.
9 9(12) Figure 3: Key types. When the link key is semi-permanent, it may be used several times. The combination key and the unit key are functionally indistinguishable for the device. They are just generated differently. The unit key is generated in a single device. It is done only once at the installation of the device and therefore changes rarely. The combination key is derived from information of two devices and is always dependent of those two communicating devices. It is derived for each new combination of two devices. When higher security level is wanted it is preferable to use combination key. In case device has only little memory to store keys or the device must be accessible to a large group of users it is better to use unit key [6]. The initialization key is used as a link key, when there is not yet unit key or combination key defined. It is derived from random number, a PIN code and the unique address of the claimed device. This key is used only during the initialization [6]. The encryption key is derived from the current link key. It is changed automatically whenever the encryption is activated. The other two parameter for generating a encryption key are 96-bit Ciphering Offset number (COF) and a 128-bit random number. COF is derived master s device address [6]. 4.3 Determination of key exchange The first time connection and pairing is presented in figure 4. The corresponding non-first time connection is presented in figure 5. According to the specification of Bluetooth there are two different ways of establishing the key exchange. The first protocol is used, when
10 10(12) there is not enough memory recourses in either of devices to run the second protocol. The second protocol is run unless either of devices requests for the first protocol. When using the first protocol there is only limited number of keys stored by the device. The unit key of device is used instead as a link key that is a temporary symmetric key lasting from one to several sessions. Figure 4: Link setup at first time connection. In the second protocol the link key is selected from the unit keys. Two devices select their own initialization keys and these are to functions as an address of either one. In addition to that a PIN and a random number for each device are needed. The link key will be computed as a function of those two random numbers. Figure 5: Link setup for non-first time connections. By listening the channel attacker, who is able to eavesdrop, can determine the initialization key and compute the link key. Link keys are the basis of encryption keys, so this enables attacker to impersonate devices, read s etc. These situations can be avoided by lengthening the PIN and protecting the unit keys by choosing large enough set
11 11(12) of keys. One should also defend itself against middle-person attacks both in application layer and deploying policies against them. 4.4 Location attack According to assumption the attacker has Bluetooth-enabled devices over a city. The attacker tries to initiate the communication with all reachable devices. Once a device responds the identity of that device will be recorded by an attacker. The identity of the device can also be obtained, if they respond to the communication requests of strange devices (that means attackers). In a well-chosen location e.g. airport gates a users identity can be found out by connecting obtained side information to transactions, e.g. mobile paying and subscriber. The means to avoid a location attack is to use pseudonyms at the time of the first key exchange or right after the communication is initialized. 5. Conclusion The ad-hoc networks have no or only little support infrastructure and therefore they are of a special nature. This makes different aspects of security more important than in more conventional systems. The goals of authentication and the problems of naming and location are important issues in ad-hoc networks. The resurrecting duckling security policy with the key agreement in ad-hoc networks is a good solution for ad-hoc networks in general [1][2][9]. The problem is, how to establish a connection at the first time, when there is no shared secret known by other devices. An interesting standard of Bluetooth has its shortcomings in the area of security. It does not guarantee end-to-end security, but the security at the link layer is given. Using the first protocol is not preferable at all. Also the high probability of location attack makes it wonder if this technology is mature enough to be used. Especially, when money transactions are made and transactions concerning somebody s life is depending on it, the usage of this technology is not the best one. The usage of unlicensed spectrum of ISM does not speak for itself although it has a great and advantages influence in price. To the Bluetooth is set ambitious target to win a gold medal in Europe. Time will show if this target will be achieved and when will it happen.
12 12(12) 6. References [1] Frank Stajano, Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7 th International Workshop on Security Protocols, Lecture Notes in Computer Science. Springler-Verlag, Berlin, Germany, April Available from [2] N. Asokan, Philip Ginzboorg. Key agreement in ad hoc networks. Computer Communications 23 (2000) [3] Frazer Bennett, David Clarke, Joseph B. Evans, Andy Hopper, Alan Jones, David Leask. Piconet: Embedded Mobile Networking. IEEE Personal Communications, 4(5):8-15, October [4] HomeRF Working Group. [5] Infrared Data Association. [6] Specification of the Bluetooth System, specification Volume 1, v.1.0 B, December 1, See [8]. [7] Specification of the Bluetooth System, specification Volume 2, v.1.0 B, December 1, See [8]. [8] Bluetooth SIG. [9] Frank Stajano. The resurrecting duckling What next?. In Proceedings of the 8 th International Workshop on Security Protocols, Lecture Notes in Computer Science. Springler-Verlag, Berlin, Germany, April Available from [10] Markus Jakobsson, Susanne Wetzel. Personal communication. [11] Ross Anderson and Markus Kuhn. \Tamper Resistance - A Cautionary Note". In Proc. 2nd USENIX Workshop on Electronic Commerce", ISBN [12] The Wireless LAN Alliance: The IEEE Wireless LAN Standard.
Bluetooth. March 28, 2005 Patrick Lui
Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized
More informationBluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002
Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),
More informationWIRELESS SENSOR NETWORK
1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationSE 4C03 Winter 2005 Bluetooth Wireless Network Technology
SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that
More informationResearch on Modern Bluetooth Technology
Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica
ON SECURITY OF BLUETOOTH WIRELESS SYSTEM Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica Brno University of Technology Faculty of Electrical Engineering and Communication Department of Control
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationThe 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013
The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional
More informationSecurity Overview of Bluetooth
Security Overview of Bluetooth Dave Singelée, Bart Preneel COSIC Internal Report June, 2004 Abstract In this paper, we give a short overview of the security architecture of Bluetooth. We will especially
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationWireless Security Security problems in Wireless Networks
Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security
More informationWIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS
3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of
More informationBluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the
Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationIntroduction to Wireless Networking ECE 401WN Spring 2009
I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range
More informationSecuring A Bluetooth Device
Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics
More informationMOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWhite Paper. Defining the Future of Multi-Gigabit Wireless Communications. July 2010
White Paper Defining the Future of Multi-Gigabit Wireless Communications July 2010 2 Introduction The widespread availability and use of digital multimedia content has created a need for faster wireless
More informationALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL
BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group
More informationSecurity of Wireless Networks in Intelligent Vehicle Systems
Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationLearning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.
Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards
More informationJeffrey Price Dr. Konak IST 220 Bluetooth Technology
Jeffrey Price Dr. Konak IST 220 Bluetooth Technology 1 TABLE OF CONTENTS 1. INTRODUCTION 2. COMPONENTS 3. BLUETOOTH ADVANTAGES/DISADVANTAGES 4. USES OF BLUETOOTH 5. THE FUTURE 7. DOCUMENTATION 2 1. INTRODUCTION
More information[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols
More informationChapter 7. Basic Wireless Concepts and Configuration. Part I
Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications Jorge Olenewa jolenewa@georgebrown.ca Office: E425 ext. 6809 Objectives Explain how the major wireless technologies
More informationFeature. What exactly is WLAN? More reading:
The WLAN Roadmap Wireless Local Area Networking (WLAN) is a simple concept, but one that entails a wide, sometimes confusing, variety of standards, implementations, and future plans for development. This
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationSecure Initial Configuration of Resource Constrained Wireless Smart Objects
1 Secure Initial Configuration of Resource Constrained Wireless Smart Objects Colin P. O Flynn IEEE Member. coflynn@ieee.org Abstract A lack of universal initial configuration (or bootstrapping) of low-cost
More informationWireless LAN. Access Point. Provides network connectivity over wireless media
LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless
More informationA Study Wireless Communication Domain
A Study Wireless Communication Domain Sangram Routray 1, Sanjib k. Nayak 2 Lalit M. Satapathy 1 1 Department of Electronics and Communication Engg. KIST,Bhubaneswar 2 Department of Computer science and
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More informationWZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018
White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com
More informationModels of Authentications in Ad Hoc Networks and Their Related Network Properties
Models of Authentications in Ad Hoc Networks and Their Related Network Properties Katrin Hoeper and Guang Gong {khoeper, ggong}@calliope.uwaterloo.ca Department of Electrical and Computer Engineering University
More informationAmarjeet Singh. February 7, 2012
Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website
More informationCase study of Wireless Technologies in Industrial Applications
International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information
More informationSecurity. Nelli Gordon and Sean Vakili May 10 th 2011
Security Nelli Gordon and Sean Vakili May 10 th 2011 What is Bluetooth? Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish
More informationOverview of IEEE b Security
Overview of IEEE 802.11b Security Sultan Weatherspoon, Network Communications Group, Intel Corporation Index words: 802.11b, wireless, WLAN, encryption, security ABSTRACT There is much regulatory and standards
More informationComputer networks for the home
Technical paper Computer networks for the home Computer networks for the home An overview This paper gives information about current and emerging technologies for networking computers in the home. It is
More informationCelestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network
Introduction to Wireless Local Area Network white paper Introduction A wireless local area network (WLAN) is a flexible data communications system that can use either infrared or radio frequency (RF) technology
More informationThe telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.
Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM
More informationLecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)
Lecture Objectives Wireless Networks and Mobile Systems Lecture 1 Wireless Environment and Wireless LANs Discuss the impact of the wireless environment on networks Explain the concept of spread spectrum,
More informationWIRELESS TECHNOLOGIES
WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee
More informationDigital Entertainment. Networking Made Easy
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
More informationNETWORK SECURITY. Ch. 3: Network Attacks
NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards
More informationWireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationSensor Application for Museum Guidance
Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power
More informationWireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.
Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July
More informationBluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016
3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationSecurity in Ad Hoc Networks Attacks
Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationComputer Networks II Advanced Features (T )
Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,
More informationBluetooth: Short-range Wireless Communication
Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More information1 Wireless Network Architecture
CHAPTER 1 Wireless Network Architecture INTRODUCTION Wireless networks come in all shapes and sizes. While many aspects of these diverse networks have common foundations, there are several other aspects
More informationAttack & Defense in Wireless Networks
Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationAd Hoc & Sensor Networks
Ad Hoc & Sensor Networks Advanced Topics in Computer Networks Introduction Ad Hoc & Sensor Networks Ad Hoc Networks Sensor Networks Security Concerns 1 Introduction Introduction Definitions (ad hoc?) Ad
More informationDemonstration of Remote Wireless Access to a Database for Communicating Water Quality Data
Demonstration of Remote Wireless Access to a Database for Communicating Water Quality Data Theodore G. Cleveland, Ph.D.,P.E. Matthew T. Smith Civil and Environmental Engineering University of Houston September
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationKey establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationA Seminar Report On Bluetooth Technology
A Seminar Report On Bluetooth Technology Submitted By Sanjay Dudani Roll No. - 419 Under The Guidance of Prof. P.B. Dehenkar Seminar On Bluetooth Technology (Professional Practices IV) Page 1 Bluetooth
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationWireless Sensor Networks CS742
Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture
More information3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter
DATA SHEET 3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter Key Benefits Simplicity Bluetooth Connection Manager provides automatic discovery and point-and-click management of devices,
More informationBikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology
Bikash Sadhukhan. M.Tech(CSE) Lecturer. Dept of CSE/IT Techno India College of Technology Mobile Communication Entails transmission of data to and from handheld devices Two or more communicating devices
More information54M Wireless LAN CardBus Card
54M Wireless LAN CardBus Card User s Manual Ver.2.0 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device,
More informationENRNG3076 : Oral presentation BEng Computer and Communications Engineering
Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationWireless standards--home automation, energy, care and security
Wireless standards--home automation, energy, care and security Rene Kohlmann - October 30, 2013 Exceptional changes are underway in the home networking market and a wide range of home systems. Everything
More informationPM0257. BlueNRG-1, BlueNRG-2 BLE stack v2.x programming guidelines. Programming manual. Introduction
Programming manual BlueNRG-1, BlueNRG-2 BLE stack v2.x programming guidelines Introduction The main purpose of this document is to provide a developer with some reference programming guidelines about how
More informationNetworks and Telecommunication
Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationTroubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office
Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationManaging Rogue Devices
Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional
More information101seminartopics.com. Bluetooth Based Smart Sensor Networks
Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected
More informationA Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets
A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationUSB Wireless Network Adapter User s Manual
USB Wireless Network Adapter User s Manual Rev 0.9 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationAccess Connections 5.1 for Windows Vista: User Guide
Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Note Before using this information and the product it supports, read the general information in
More informationWIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application:
WIMAX WiMAX (Worldwide Interoperability for Microwave Access) is a technology that focuses on providing data over long distances in a wireless mode, very similar to the cellular mobile concept. WiMAX is
More informationSIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels
Network Security - ISA 656 Voice Over IP (VoIP) Security Simple SIP ing Alice s Bob Session Initiation Protocol Control channel for Voice over IP (Other control channel protocols exist, notably H.323 and
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationSecuring Wireless LANs with Certificate Services
1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the
More information802 Wireless Access Techniques Overview
802 Wireless Access Techniques Overview Markku Renfors Institute of Communications Engineering Tampere University of Technology TLT-6556 15.2.2007/MR 1 Wireless Access Techniques WLAN,, Wireless Local
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informatione-pg Pathshala Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked
More information