XV International PhD Workshop OWD 2013, October Applications of control in intelligent house via ZigBee technology

Size: px
Start display at page:

Download "XV International PhD Workshop OWD 2013, October Applications of control in intelligent house via ZigBee technology"

Transcription

1 XV International PhD Workshop OWD 2013, October 2013 Applications of control in intelligent house via ZigBee technology Ján Ďurech, Mária Franeková, University of Žilina Abstract In the paper the authors attend to design a wireless networks used in intelligent houses via ZigBee technology with regard to security mechanisms. The realization part is focused on network design and description of the hardware and software necessary to control the devices. The network is created from modules of the company Texas Instrument. 1. Introduction The modern buildings contain large number of device, which provide ventilation, cooling, heating, security, etc. By implementing intelligence into buildings we can effectively interconnect these systems for purpose of obtain more comfort, safety and energetic efficiency. The main advantage of intelligent buildings is centralized management, control and therefore also easier connecting to other systems. The last two decades is in progress intensive research into intelligent houses, which is focused on new technologies in the field of sensor systems, methods of control, energy management in order to improve people s comfort. The big advantage of wireless networks is their easy reorganization and the possibility of additional connection of many devices. From large group of wireless networks, the market pushed ZigBee technology, which is used for efficient data exchange between sensors and control actuators. The ZigBee technology was conceived to minimize the power consumption of nodes to achieve longer lifetime of devices, when battery source is used. 2. ZigBee technology and its development The ZigBee standard which is developed by the ZigBee Alliance [1], is communications technology based on the standard IEEE ZigBee and IEEE are standards that provides network interface required for sensor networks. As is shown in fig.1, IEEE standard defines the physical and MAC layer, ZigBee defines network and application layer. The ZigBee Alliance was formed in 2002 as a nonprofit organization. In 2003 was released standard IEEE (later modified in 2006), which has adopted by ZigBee Alliance and in 14. December released firs ZigBee 1.0 specification [2]. Fig.1. Reference model of ZigBee network. 2.1 Types of devices used in ZigBee network ZigBee defines three different device types: ZigBee Coordinator - is primary device of each ZigBee network. Coordinator is responsible for route packets, network control, stores information about the network, can act as the Trust center. It also creates a bridge to other networks. In each network is only one coordinator. Requires continuous power. ZigBee Router - used to expand the network. Router is responsible for routing packets between coordinator and end devices. It can also serve as end device. A router is network subscriber and for end devices appears as a local coordinator. It also requires continuous power. ZigBee End Device (ZED) requires the least amount of memory and computing demands. ZED can just communicate to Coordinator or a Router. It cannot relay data from other devices. Mostly is powered by batteries. 2.2 Security services of ZigBee network In a wireless network we need deal with two challenges. The first challenge is error-free transmission of data and the integrity check, the second challenge is to secure data against their capture. For error-free data transmission ZigBee technology uses FCS (Frame Check Sequence), what 409

2 is creating checksum of framework. For the integrity check is used Message Integrity Code MIC. For data confidentiality is used encryption standard AES (Advanced Encryption Standard). ZigBee standard supports use of the following security mechanisms: Data encryption. Data verification and devices verification. Protection against duplicate frames Frame Check Sequence FCS Based on IEEE generating FSP checksum and its check runs according to the following steps: On the transmitter site is created polynomial M(x) from the information part which is determined from the MAC packet header and payload. Polynomial M(x) is multiplied by the highest power of generating irreducible polynomial g(x), which is defined: g(x)= x 16 + x 12 + x Thus obtained polynomial is divided by g(x), thereby creating remainder of dividing r(x) is added to the information part. Receiving side start again dividing received polynomial, corresponding receives data, agreed by generating polynomial g(x). If the division is without remainder in the incoming packet error was not detected, when division is with remainder packet was corrupted while transmitting. According to knowledge of coding theory [3] this method of securing - generating polynomial 16th order, should be able to detect in the packet simple error and also a cluster of errors corresponding generating polynomial degree. Described CRC (Cyclic Redundancy Check) code is used to detect errors in received packet to the link layer. To verification of data, which integrity could be disturbed willfully, ZigBee standard uses message authentication code MIC (Message Integrity Code) Data confidentiality The IEEE standard supports the use of Advanced Encryption Standard (AES) to encrypt their outgoing messages. The AES algorithm is 128- bit block cipher which supports three key lengths (128, 256, 512 bits) announced by NIST (National Institute of Standards and Technology) [4], which is also used by the ZigBee standard with key length of 128-bits. One of the main constraints in implementing security features in a ZigBee wireless network is limited resources. The nodes are mainly battery powered and have limited computational power and memory size. ZigBee is targeted for low-cost applications and the hardware in the nodes might not be tamper resistant. If an intruder acquires a node from an operating network that has no tamper resistance, the actual key could be obtained simply from the device memory [5]. Fig.2 shows the basic concept of encryption in ZigBee network based on symmetric encryption scheme with private key Fig.2. Encryption scheme in ZigBee network Data authentication Data integrity is achieved based authentication code messages MIC. Message authentication code is a function that by a secret key produces an output fixed-length value that serves as the authenticator. The cryptographic checksum MIC is a block of bits of constant length, which is attached to the original message. If MIC provided by the transmitter is equal with MIC calculated by the receiver, the data will be considered as authentic. The level of data authenticity is increased by increasing the number of bits in the MIC. The ZigBee and IEEE standards support 32-bit, 64-bit, and 128-bit MIC options. Note: The MIC is also referred to as Message Authentication Code (MAC*), but the ZigBee and IEEE standard documents use MIC instead of MAC to avoid confusion with the Message Authentication Code (MAC*) and the Medium Access Control (MAC). The MIC in ZigBee is generated using the enhanced Counter with Cipher Block Chaining Message Authentication Code (CCM*) protocol. The CCM* is defined to be used in conjunction with 128- bit AES and shares the same security key with AES. The responsibility of the AES-CCM* is to encrypt the data and generate an associated MIC, which is sent to the receiver along with the frame. On the transmitter side, the plaintext in the form of 128-bit blocks of data enters the AES-CCM*. The receiver uses the AES-CCM* to decrypt the data and generate its own MIC from the received frame to be compared with the received MIC. The CCM* is referred to as a generic mode of operation that combines the encryption and data authentication. 3. Design of ZigBee wireless network for controlling smart houses We realized practical application with development kit CC2530ZDK [6] from Texas Instruments. Application development consisted in 410

3 the designed appropriate hardware accessories, programming of applications for each device, compiled it and upload it to these devices. Our application is focused for control lighting, heating and other external devices (coffee maker, computer) communicating as it is illustrated in Fig.3. Fig.3. Concept of realized ZigBee network. For controlling we used board SmartRF05EB. Software realization of all devices was made in program IAR Embedded Workbench. It was necessary to determine the basic parameters of the network, while network was designing: communication channel (we have chosen 25), Network identifier PAN ID (we have chosen 2013) and address of each devices (Tab.1). Device Coordinator Control unit Lights Heater Temperature sensor Coffee maker Computer Addresses of devices Address of device 0x2520 0x1111 0xBEE1 0x2222 0xBEE7 0xBEE6 0xBEE5 Tab.1. Description of devices: Coordinator main unit of ZigBee network. Coordinator takes care about all communication and we have implemented inside security mechanism. As coordinator we are using board SmartRF05BB. End devices - light, computer, coffee maker and heater role of these devices are perform action variables or manage attached external devices. As end devices we are using boards SmartRF05BB. Sensor purpose of this device is periodically sending information about required value. In our case sensor is sending information s about temperature. As temperature sensor we are using board CC2430DB. Control unit purpose of this unit is to provide information about status of other devices, allowing control device via coordinator, it have role of human interface. As control unit we are using board CC2530EB. 3.1 SW realization of applications For each device in the network we made individual code. While we were creating the ZigBee network we were using part of codes delivered with kit. These codes were used to initialize the devices and control peripherals. Boards were programmed using SmartRF Flash Programmer. Program for control unit is composed from menus that serve user to control the devices. We made program in C language, because partial programs for control the periphery is already written in this language. At the beginning of programming we were defined addresses of all devices according to tab.1 In the program we used shortened addressing, which is preferably in network with smaller number of devices. The ZigBee coordinator receives data from the sensor and end devices, where the program compares data with the data received from the control unit. Control unit sends a data to ZigBee coordinator for turn on, turn off the devices or information s about setting temperature. ZigBee coordinator then takes care about achievement of requirements way of sending data to end devices. Sending data to all devices working according to the flow subprogram shown in fig. 4 Fig.4. Subprogram for sending data. The more detail in the paper we mentions only one application - control the coffee maker through ZigBee network. Other applications are described in detail in [7]. 3.2 Example of application control of coffee maker Principle of controlling coffee maker consists in turning on the power of coffee maker for the time needed for making a given quantity of coffee. After an initial analysis of time variables for different amounts of coffee we determined that for 38 second 411

4 coffee maker makes 100 ml of coffee. In the control unit was created menu to set the desired amount of coffee, see fig.5. On display in the menu you can set two entries: size of cup and number of portions. After selecting enters in the control unit, is first multiplied the number of portions with the size of the cup, so we get the desired amount of coffee we need to make. In the program we are using conditions for not to exceed the maximum capacity of the coffee maker. In the next step we were solved transfer method. ZigBee standard supports a maximum 8 bit payload. Therefore we final data in control unit divided ten and then multiplied with corresponding constant and then sent to the coordinator, which it sends to the coffee maker. The program for control the coffee maker is shown by the flowchart in fig. 6 Fig.5. Display in control unit of coffee maker. Fig.6. Calculation the amount of coffee in control unit. After transferring data from the control unit, coffee maker calculates the time required for making required amount of coffee (Fig. 7). Since we cannot directly insert value of delay, the delay in the program is realized through the cycle "for" in second interval. 4. Results of realizations attacks to ZigBee network If intruder is able to capture packet in unsecure network, he can get access to entire network. For intruder is enough to know source address, destination address and he can start sending captured packet, or he can generate own packet. For capture and resend packet we are using program SmartRF Studio 7. Capturing is making via special USB key, which can be used after connecting to computer for purpose of capturing packet, connecting external devices or for communication computer with ZigBee network. Sending captured unencrypted packet is shown in fig. 8. We have captured the packet between control unit and coordinator. While packet was sending, we were also changing sequence number and then we were able to control light. If we captured more packets, or start generate own packets it is very probable we could take control of entire network. Fig.7. Flow graph of coffeemaker control. 412

5 Fig.8. Sending unencrypted data. 4.1 Physical attack To secure ZigBee network development kit CC2530ZDK use AES encryption with 64 bit MIC for data authentication. Advantage of this type of security is that encryption the same plaintext two times will result in two different cipher texts because the sequence number in NONCE is used in encryption. This is known as semantic security. Breaking so secure network is almost impossible. Disadvantage of ZigBee network is that all passwords are stored unencrypted in storage. If intruder get to the device, he can copy device memory to computer, in which can he find the key. We did this physical attack with one device which had USB enter. Then we had copy all device memory to the computer, in which we had found the unencrypted key: c0c1c2c3c4c5c6c7c8c9cacbcccdcecf (see fig. 9). Fig.9. Key kept from memory of equipment. 4.2 Same-NONCE attack Encrypting the same two plaintext two times will always result in two different cipher texts, because in encryption is also used sequence number of frame. If for any reason device sent two consecutive messages m1 and m2 with same sequence number (NONCE) eavesdropper will have two different encrypted data c1 a c2 encrypted with same key and using XOR operation (1), listening device will be able to recover partial information about the original text using the formula: c1 c2 = [ m1 E( key, nonce)] [ m2 E( key, nonce)] = (1) m m 1 2 This attack is known as the same-nonce attack. One of the occasions on which a same-nonce attack can happen is after a power failure that results in a clear of accumulator. If the last nonce states are unknown after the power failure, the system might reset the nonce states to a default value. This reset action increases the chance of reusing the same nonce with a key that has been used before the power failure [5]. We did this attack while we controlled lights, when every time after sending one message we reset device taking out the battery. The result of XOR original transmitted data was: 66h 67h=01. We used XOR operation also for captured encrypted data: C515E5F9DF5193C C485107A5FBADA5151 = f58380eb where you can see in the result the original data 01 after XOR operation. If intruder known more dates, he can easily calculate missing dates. Storing the nonce states in a nonvolatile memory and recovering them after each power failure is one way of protecting the system from same-nonce attacks due to power failure. 4.3 Denial of Service (DoS) attack DoS attack causes a node to reject all received messages [5]. Attack is an attempt to prevent legitimate users use the network. The most common method consists overwhelmed the system with requirements, which causes fall of system. Basic types of attacks are: bandwidth overload or overload the processor. In the test application we use attack for overload the processor. We was realized this attack using program SmartRF Studio 7. At first we captured a packet. This packet we was resending at speed 30 packet for second. Because the transmission mode works with confirmation of framework, i.e. the coordinator must send an acknowledgment packet to every frame, even if spurious packet is discarded when received, because it is a duplicate frame, after 250s of attack and 7442 sended packets coordinator stop reacting. Prevention against the attack would be change of channel after received hundred duplicate packets. 4.4 Replay attack Simple networks which are not using trust center and all time are using same key are vulnerable against resended old captured packet. For intruder is enough to capture data and after the time send it again. We was realized this attack also by using program SmartRF Studio 7. We did captured encrypted packet for control of light. After the time and resend this packet we were able to turn on light. Prevention against the attack would be controlling sequence number at the application layer. We have defined in the program that each received packet sequence number must be greater than sequence number of previous packet, or sequence number can be zero, in case of device reset. 413

6 5. Conclusion The aim of this paper was analysis of technological possibilities of ZigBee networks realization for using in intelligent house with orientation to description of advantages and disadvantages several ZigBee standards. ZigBee technology offers large solution for monitoring, control of different devices. Big advantage is that is compatible for several devices and supports energy economy communications with sufficient assuring. It offers chances of creating own applications together. The own HW and SW applications were realized in 2,4 GHz band which are examples of end-devices control used within intelligent house. In the paper safety mechanism of ZigBee network based on ciphering and verification techniques and assuring of data integrity were described. In the laboratory conditions were realized four cryptography attacks to networks and were described the recommendations how prevent them. Authors: Ďurech Ján, Ing. University of Žilina ul. Univerzitná 8215/ Žilina tel Franeková Mária, prof. Ing, PhD. University of Žilina ul. Univerzitná 8215/ Žilina tel Acknowledgement This work has been supported by the Educational Grant Agency of the Slovak Republic (KEGA) Number: 024ŽU-4/2012: Modernization of technology and education methods orientated to area of cryptography for safety critical applications. Bibliography [1] ZigBee Alliance: [online]. In: [2] IEEE : Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE Computer Society, ISBN [3] MUZIKÁŘOVÁ, Ľ.- FRANEKOVÁ, M: Teória informácie a signálov, Žilina: EDIS. ISBN [4] Federal Information Processing Standards Publication 197: Announcing the ADVANCED ENCRYPTION STANDARD (AES), In:< 197/fips-197.pdf>. [5] FARAHANI, S.: ZigBee Wireless Networks and Transceivers, Oxford: Newnes, Elsevier Inc, s. ISBN: [6] Texas Instruments: CC2530 ZigBee Development Kit User s Guide, In: < 9b.pdf>. [7] Ďurech, J.: Použitie siete ZigBee v inteligentnej budove, diploma thesis, Žilina: Žilinská univerzita v Žiline,

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some 3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some popular block ciphers Triple DES Advanced Encryption

More information

05 - WLAN Encryption and Data Integrity Protocols

05 - WLAN Encryption and Data Integrity Protocols 05 - WLAN Encryption and Data Integrity Protocols Introduction 802.11i adds new encryption and data integrity methods. includes encryption algorithms to protect the data, cryptographic integrity checks

More information

By Nick Giannaris. ZigBee

By Nick Giannaris. ZigBee By Nick Giannaris ZigBee Personal Area Network (PAN) A computer network used for communication among devices in a close proximity. Wireless Personal Area Network (WPAN) A wireless personal area network

More information

Emad Ebeid Ph.D. CS depart University of Verona, Italy

Emad Ebeid Ph.D. CS depart University of Verona, Italy Emad Ebeid Ph.D. student @ CS depart University of Verona, Italy EmadSamuelMalki.Ebeid@univr.it Davide Quaglia Assistant Professor @ CS depart University of Verona, Italy Davide.Quaglia@univr.it 2 1 ZigBee

More information

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS ZIGBEE Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS OUTLINE ZIGBEE AND APPLICATIONS IEEE 802.15.4 PROTOCOL ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER ZIGBEE

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA Journal of Computer Science Original Research Paper CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA 1 Velayutham, R. and 2 D. Manimegalai

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

SSL/TLS. How to send your credit card number securely over the internet

SSL/TLS. How to send your credit card number securely over the internet SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying

More information

HAI Network Communication Protocol Description

HAI Network Communication Protocol Description Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the

More information

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED Part V ECHONET Lite System Design Guidelines i 2011 (2012) ALL RIGHTS RESERVED The specifications published by the ECHONET Consortium are established without regard to industrial property rights (e.g.,

More information

Secure Messaging for Wireless Sensor Networks

Secure Messaging for Wireless Sensor Networks Beat Gebistorf Secure Messaging for Wireless Sensor Networks Semester Thesis, SA-2009-03 February 2009 until June 2009 Professor: Prof. Dr. Roger Wattenhofer Advisor: Philipp Sommer & Roland Flury II Abstract

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

ZigBee Security Specification Overview

ZigBee Security Specification Overview Wireless Control That Simply Works ZigBee Security Specification Overview Copyright 2005 ZigBee TM Alliance. All Rights Reserved. Agenda ZigBee Security Overview Residential Applications Guidelines Typical

More information

Sensor-to-cloud connectivity using Sub-1 GHz and

Sensor-to-cloud connectivity using Sub-1 GHz and Sensor-to-cloud connectivity using Sub-1 GHz and 802.15.4 Nick Lethaby, IoT, Ecosystem Manager, Texas Instruments Agenda Key design considerations for a connected IoT sensor Overview of the Sub-1 GHz band

More information

Error characteristics and their prediction in ZigBee transmission at coexistence conditions

Error characteristics and their prediction in ZigBee transmission at coexistence conditions Error characteristics and their prediction in ZigBee transmission at coexistence conditions BOHUSLAVEK ZDENEK and MASIK ILJA Department of Electrical Engineering and Automation, Faculty of Engineering

More information

NIST Cryptographic Toolkit

NIST Cryptographic Toolkit Cryptographic Toolkit Elaine Barker ebarker@nist.gov National InformationSystem Security Conference October 16, 2000 Toolkit Purpose The Cryptographic Toolkit will provide Federal agencies, and others

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 18: Cryptographic hash functions, Message authentication codes Functions Definition Given two sets, X and Y, a function f : X Y (from set X to set Y), is

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS

ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS 78 INFORMATION AND COMMUNICATION TECHNOLOGIES AND SERVICES, VOL. 8, NO. 3, SEPTEMBER 2010 ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS Tomáš ONDRAŠINA.1, Mária FRANEKOVÁ

More information

Securing a Wireless LAN

Securing a Wireless LAN Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

Content of this part

Content of this part UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this

More information

ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS

ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS Tomas ONDRASINA 1, Maria FRANEKOVA 1 1 Department of Control and Information Systems, Faculty of Electrical Engineering, University

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

Sensor Networks. Xueying Zhang, Howard M. Heys, and Cheng Li. Electrical and Computer Engineering. Faculty of Engineering and Applied Science

Sensor Networks. Xueying Zhang, Howard M. Heys, and Cheng Li. Electrical and Computer Engineering. Faculty of Engineering and Applied Science Energy Efficiency of Encryption Schemes Applied to Wireless Sensor Networks Xueying Zhang, Howard M. Heys, and Cheng Li Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial

More information

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES

First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2013/14 (Model Solution) INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS

More information

Zigbee protocol stack overview

Zigbee protocol stack overview Zigbee protocol stack overview 2018 ASSUMPTIONS FOR USING THIS TEACHING MATERIAL DSR and OTSL takes no responsibility about the problem which occurs as a result of applying the technical information written

More information

CIS 4360 Secure Computer Systems Symmetric Cryptography

CIS 4360 Secure Computer Systems Symmetric Cryptography CIS 4360 Secure Computer Systems Symmetric Cryptography Professor Qiang Zeng Spring 2017 Previous Class Classical Cryptography Frequency analysis Never use home-made cryptography Goals of Cryptography

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Chaos Communication Congress (CCC), 27 December 2017 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that

More information

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018 KRACKing WPA2 by Forcing Nonce Reuse Mathy Vanhoef @vanhoefm Nullcon, 2 March 2018 Introduction PhD Defense, July 2016: You recommend WPA2 with AES, but are you sure that s secure? Seems so! No attacks

More information

Implementation and Verification of a Pollingbased MAC Layer Protocol for PLC

Implementation and Verification of a Pollingbased MAC Layer Protocol for PLC Implementation and Verification of a Pollingbased Layer Protocol for PLC Project Work by Luis Lax Cortina at the Institute of the Industrial Information Technology Zeitraum: 11.12.2009 12.06.2010 Hauptreferent:

More information

ECE 646 Lecture 8. Modes of operation of block ciphers

ECE 646 Lecture 8. Modes of operation of block ciphers ECE 646 Lecture 8 Modes of operation of block ciphers Required Reading: I. W. Stallings, "Cryptography and Network-Security," 5 th and 6 th Edition, Chapter 6 Block Cipher Operation II. A. Menezes, P.

More information

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli Wireless Sensor Networks BLUETOOTH LOW ENERGY Flavia Martelli flavia.martelli@unibo.it Outline Introduction Applications Architecture Topology Controller specifications: Physical Layer Link Layer Host

More information

S. Erfani, ECE Dept., University of Windsor Network Security

S. Erfani, ECE Dept., University of Windsor Network Security 4.11 Data Integrity and Authentication It was mentioned earlier in this chapter that integrity and protection security services are needed to protect against active attacks, such as falsification of data

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018 Improved KRACK Attacks Against WPA2 Implementations Mathy Vanhoef @vanhoefm OPCDE, Dubai, 7 April 2018 Overview Key reinstalls in 4-way handshake New KRACKs Practical impact Lessons learned 2 Overview

More information

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Bulletin of the Transilvania University of Braşov Vol. 7 (56) No. 2-2014 Series I: Engineering Sciences INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Mihai MACHEDON-PISU

More information

Increase Throughput of CCM Security Mode Using MKP

Increase Throughput of CCM Security Mode Using MKP Applied Mathematics, 2014, 5, 581-592 Published Online March 2014 in SciRes. http://www.scirp.org/journal/am http://dx.doi.org/10.4236/am.2014.54055 Increase Throughput of CCM Security Mode Using MKP Zuriati

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

BS801E-BSCS. Cryptography

BS801E-BSCS. Cryptography Jay-Ar Baliguat BS801E-BSCS Ms.Myrlen Maria Antoni Cryptography Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network.

More information

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks. Welcome to my presentation: Message Denial and Alteration on IEEE 802.15.4 Low- Power Radio Networks. This presentation discusses the susceptibility of IEEE 802.15.4 radio networks to several different

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy CCS 2017, 1 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview

More information

KALASALINGAM UNIVERSITY

KALASALINGAM UNIVERSITY KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE

More information

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018 Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.

More information

CIS 6930/4930 Computer and Network Security. Project requirements

CIS 6930/4930 Computer and Network Security. Project requirements CIS 6930/4930 Computer and Network Security Project requirements Project Requirement Form a team of 3 people to complete the course project. The project has 100pts + 20pts (extra credit) Report requirement:

More information

Scanned by CamScanner

Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Scanned by CamScanner Symmetric-Key Cryptography CS 161: Computer Security

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

BT2540 Bluetooth 4.0 BLE (CC2540) Module Users Manual

BT2540 Bluetooth 4.0 BLE (CC2540) Module Users Manual BT2540 Bluetooth 4.0 BLE (CC2540) Module Users Manual Revision 1.0 Online download: This manual: /images/manual/bluetooth/bt2540manual.pdf Software: http:///images/manual/bluetooth/cdrom-bt2540.rar 2012.08.31.

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 24 Wenbing Zhao wenbingz@gmail.com http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB

More information

Case study of Wireless Technologies in Industrial Applications

Case study of Wireless Technologies in Industrial Applications International Journal of Scientific and Research Publications, Volume 7, Issue 1, January 2017 257 Case study of Wireless Technologies in Industrial Applications Rahul Hanumanth Rao Computer Information

More information

CSC 8560 Computer Networks: Network Security

CSC 8560 Computer Networks: Network Security CSC 8560 Computer Networks: Network Security Professor Henry Carter Fall 2017 Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that

More information

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec CIS 6930/4930 Computer and Network Security Topic 8.1 IPsec 1 IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP spoofing Payload could be changed without detection. IP V4 has no confidentiality

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018 KRACKing WPA2 in Practice Using Key Reinstallation Attacks Mathy Vanhoef @vanhoefm BlueHat IL, 24 January 2018 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

ZIGBEE EXPLOITED. The good, the bad and the ugly. Tobias Zillner August 6th Cognosec 2015 Castellezgasse 16/ Vienna, Austria

ZIGBEE EXPLOITED. The good, the bad and the ugly. Tobias Zillner August 6th Cognosec 2015 Castellezgasse 16/ Vienna, Austria ZIGBEE EXPLOITED The good, the bad and the ugly Tobias Zillner August 6th 2015 Cognosec 2015 Castellezgasse 16/2 1020 Vienna, Austria TABLE OF CONTENTS ABSTRACT... 1 INTRODUCTION... 1 THE ZIGBEE STANDARD...

More information

Key Encryption as per T10/06-103

Key Encryption as per T10/06-103 1 T10/06-144r0 Key Encryption as per T10/06-103 David L. Black (author) Jack Harwood (presenter) 2 Problem and Design Goals 05-446 only specifies encryption key transfer in clear Keys can be entirely too

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

CS 161 Computer Security

CS 161 Computer Security Raluca Popa Spring 2018 CS 161 Computer Security Homework 2 Due: Wednesday, February 14, at 11:59pm Instructions. This homework is due Wednesday, February 14, at 11:59pm. No late homeworks will be accepted.

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017 Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017 Overview 1. Key reinstallation in 4-way handshake 2. Misconceptions and remarks

More information

Lecture 1 Applied Cryptography (Part 1)

Lecture 1 Applied Cryptography (Part 1) Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

Viability of Cryptography FINAL PROJECT

Viability of Cryptography FINAL PROJECT Viability of Cryptography FINAL PROJECT Name: Student Number: 0151677 Course Name: SFWR ENG 4C03 Date: April 5, 2005 Submitted To: Kartik Krishnan Overview: The simplest definition of cryptography is The

More information

Introduction to Modern Symmetric-Key Ciphers

Introduction to Modern Symmetric-Key Ciphers Introduction to Modern Symmetric-Key Ciphers 1 Objectives Review a short history of DES. Define the basic structure of DES. List DES alternatives. Introduce the basic structure of AES. 2 Data Encryption

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

Security in Voip Network Using Neural Network and Encryption Techniques

Security in Voip Network Using Neural Network and Encryption Techniques 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Security in Voip Network Using Neural Network and Encryption Techniques Ashwini Galande

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Han Sang Kim, Jin Wook Lee*, Sandeep K. S. Gupta and Yann-Hang Lee Department of Computer Science and Engineering Arizona

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

ISA100.11a. Pengfei Ren.

ISA100.11a. Pengfei Ren. ISA100.11a Pengfei Ren pengfei@wayne.edu Outline Introduction System Overview Communication Protocol Security Coexistence Implementations and Equipment Conclusion Outline Introduction System Overview Communication

More information

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal

Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Vulnerability issues on research in WLAN encryption algorithms WEP WPA/WPA2 Personal Lazaridis Ioannis, Pouros Sotirios, Veloudis Simeon DEI College, Thessaloniki, Greece Abstract: This paper presents

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

WLAN Security Overview

WLAN Security Overview WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless

More information

KNX Secure. KNX Position Paper on Data Security and Privacy

KNX Secure. KNX Position Paper on Data Security and Privacy KNX Secure KNX Position Paper on Data Security and Privacy KNX Secure Position Paper This paper is intended as a guide for both installers as well as KNX manufacturers to learn about the current measures

More information

ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica

ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica ON SECURITY OF BLUETOOTH WIRELESS SYSTEM Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica Brno University of Technology Faculty of Electrical Engineering and Communication Department of Control

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

Design and Implementation of Smart Gateway Based on Wireless Communication Technique

Design and Implementation of Smart Gateway Based on Wireless Communication Technique International Conference on Education, Management and Computer Science (ICEMC 2016) Design and Implementation of Smart Gateway Based on Wireless Communication Technique Zhongxiang Xiao1, a, Tengxue Rong1,

More information

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems

More information

David Wetherall, with some slides from Radia Perlman s security lectures.

David Wetherall, with some slides from Radia Perlman s security lectures. David Wetherall, with some slides from Radia Perlman s security lectures. djw@cs.washington.edu Networks are shared: Want to secure communication between legitimate participants from others with (passive

More information

Experimental Testing of Wireless Sensors Network Functionality

Experimental Testing of Wireless Sensors Network Functionality Journal of Automation and Control, 2015, Vol. 3, No. 3, 53-57 Available online at http://pubs.sciepub.com/automation/3/3/2 Science and Education Publishing DOI:10.12691/automation-3-3-2 Experimental Testing

More information

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER 1 UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER CN encryption devices are purpose built hardware appliances that have been designed and developed in Australia by Senetas Corporation since 1997.

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information