The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert

Size: px
Start display at page:

Download "The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert"

Transcription

1 Automation Instrumentation Summit The dark side of IOT Francesco Zucca Wireless Expert 1

2 Agenda Introduction IIOT How to work WSN Typical hacker attack in WSN Issue with Drones Security Countermeasures 2

3 IOT Cyber Security 3

4 IoT scheme 4

5 Device subject to cyber attack IOT 5

6 Networking device and sensors became a target Measure Variables Pressure Temperature Safety measures violation Utilities interruption Distance 100 m, 5 km, 60 km Inappropria te product quality Plant shutdown Applications Monitoring, Control, Safety. Production circle shutdown Equipment damage 6

7 How can Wireless Transmitters works? 7

8 Typical protocol stack 8

9 Device Join Network 9

10 Examples of attack in WSN 10

11 Low level attack Default configutation Default password are public in service manual or availalble online Default keys E F555B53524F535B. Default Password : User 11

12 Low level attack connection to Gateway Gateway support Iiot app. web app. Gateway port are used for connect WI-FI Rooter Operator used to check the instruments and control the network Wireless Rooter is protected only with WPA or WEP Hacker crack the encryption in WPA /WEP Field Control Station Field Wireless Management Station Operator with Tablet 12

13 Medium level attack - Provisioning Sniffing Join process is done by «OTA method». Main Problem :The keys are send in plaintex than hacker is able to steal the keys 13

14 Medium level attack - analyze the firmware Some sensors available in the market have same keys for all devices. 1. Buy New Device 2. Remove Plug & Play Module 3. Connect Usb JTAG or SWD reader 4. Read and write RAM, or re-flash on-chip memory 5. API Application programming interface 6. Extract factory-installed key 14

15 Attacks at the Physical Layer Jamming it s a typical denial-of-service (DoS) attack. Jamming: transmission of a radio signal to interfere with WSN radio frequencies Constant jamming: No message are able to be sent or received. Intermittent jamming: Nodes are able to exchange messages periodically Sender Jammer Device Riceiver 15

16 WSN attack tools Multiband 780/868/915/2400 MH IEEE Channel Hopping Sniffing mode Energy Detection scanner Injection mode Continuous wave & packet generator Network scan mode Jamming Frequency range 900 MHz 2.4 GHz Jamming Range Radius up to 50M Sniffing Software Scanning software Network Analyzer Packet injection software 16

17 Issue about Drones 17

18 Attack/Distrurb by drone Drone for industrial application Iot App Maintenance - thermographic Verification Control surveillance, facility security Mapping Specification for industial drone/commercial drone minute flying time Target capability Fine movementg Handle Objects 18

19 Drones disrupters to Industrial Wireless Antennas? And It was pretty EASY Hobby Drones are able to hover and do Fine Control movements in moderate wind conditions! 19

20 Could be drone a problem in the plant? Modern hobby drones utilize the 2.4 Ghz spectrum as does WiFi, etc. So any disruption needs to be away from the drone and controller due to possible loss of control. Drone have handle obbject (Jammer) to disturb the network. If Drone permanent fly in Fresnel Zones will be a problem for WSN. A Fresnel zone (fray-nel), is a series of concentric ellipsoidal regions indicating wave strength between two antennas. 20

21 Countermeasures integrated in WSN Protocol 21

22 Countermeasures for provissioning 1. Open Fieldmate software with password manager 2. Connect IR cable interface and extract the information from Device 3. Connect the RJ45 cable to Gateway 4. Open with Network manager password gateway configurator 5. Upload Join Key and network id

23 security design ISA100.11a Link Layer - Hop-to-hop authentication (MIC) and encryption of packets at Layer 2 Transport Layer End-to-end authentication and encryption of Protocol Data Units at Layer 4. Secure sessions established between originating and device and destination device 23

24 Security Keys in ISA100.11a Join Key Created at the conclusion of symmetric key provisioning Used to join the network, receive the Master Key. Master Key Created at the conclusion of the key agreement scheme. Communication with Security Manager and devices. Needs to be periodically updated. DL Key Used to compute the Message Integrity Code (MIC) at the link layer Expires and needs to be periodically updated. Session Key (Optional) Used to encrypt and/or authenticate PDUs at the transport layer Expires and needs to be periodically updated 24

25 Security Police ISA100.11a Authentication and encryption: It s used in both level Link and Transport layers and can be varied. All security police are distributed with cryptographic material Security Manager Controls policies for cryptographic materials it generates Manages and distributes keys (Asymmetric keys,master keys, session Keys ) Transport layer security time stamp for protection against replay attacks (important for industrial applications) all Devices are continuously synchronized using TAI (atomic international time) Packets older than N seconds (configurable) will be discarded by recipient 25

26 Countermeasures integrated in phycal layer ISA100.11a incorporates time hopping mechanisms to ensure communications Frequency diversity ( 16 channels) Automatic Repeat-reQuest (ARQ) Channel blacklisting Adaptive hopping

27 Countermeasures integrated in the technology All information are encrypted with EAS128 at level 2 and 4 (Prevent Sniffing, Spoofing) Every packets send have MIC (Message Integrity Check) wtih DL key this (prevert the tampering and reply attack) End-to-End communication protection each different session has a different session key. The networks will be syncronized with TAI and protected with Time-Stamp No windows base technology - not susceptible to windows virus. Event register every action in the network is registers Different users with different security autorizzation Adaptive-hopping spread spectrum is needed for Robustness and strength of network ( Resistance to jamming attack) Full rendudance network 27

28 Countermeasures that will be integrated WSN 28

29 Countermeasures the must be integrated in WSN Operator must be trained for IT part and WSN Cyber Security Life Cycle Management must be integrated also WSN Spectrum surveys should be incorporated into plant security procedures. Use of Field Wireless Repeaters needs to be considered from high vantage points ( Rendundat Fresnel zone ) Rendudant loop is needed for control application (Gateway,Access points, instruments) If WSN is connected with VPN or WI-FI must be protected with Firewall and encryption protocol (SSL, Ipsec) Password for user must be complicated with number letters and special charactes /)*_@+., 29

30 WSN Countermeasures in spectrum Graphic - The GHz Spectrum is VERY crowded. It is used by WiFi/WLAN (Industrial Wireless ISA100, WirelessHART, ZigBee) Since WiFi is the major wireless target jammers will leave GAPS in EMI between WiFi channels 1,6,11 Therefore users should channelize to Channels 15, 25,26,14, 20 30

31 Thank you for you attention 31

What do we expect from Wireless in the Factory?

What do we expect from Wireless in the Factory? What do we expect from Wireless in the Factory? And what are we doing about it? ETSI Wireless Factory Workshop, 15 December 2008 Tim Whittaker System Architect, Wireless Division 11 December 2008 S4989-P-188

More information

ISA100.11a. Pengfei Ren.

ISA100.11a. Pengfei Ren. ISA100.11a Pengfei Ren pengfei@wayne.edu Outline Introduction System Overview Communication Protocol Security Coexistence Implementations and Equipment Conclusion Outline Introduction System Overview Communication

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Sensor-to-cloud connectivity using Sub-1 GHz and

Sensor-to-cloud connectivity using Sub-1 GHz and Sensor-to-cloud connectivity using Sub-1 GHz and 802.15.4 Nick Lethaby, IoT, Ecosystem Manager, Texas Instruments Agenda Key design considerations for a connected IoT sensor Overview of the Sub-1 GHz band

More information

Securing Internet of things Infrastructure Standard and Techniques

Securing Internet of things Infrastructure Standard and Techniques Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe

WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe Introduction Wireless devices are everywhere! We use wireless devices in everyday life.

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting

More information

Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions

Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions Infopeople Webcast: Technology Tuesday Series Library Computing Without Wires Tuesday, March 1, 2005 12:00 noon to 1:00 p.m Thomas Edelblute Public Access Systems Coordinator Anaheim Public Library TEdelblute@anaheim.net

More information

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies

More information

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards. Radiocommunications in industry : the key features of ISA 100 solutions Standards Certification Education & Training Publishing Conferences & Exhibits Jean-Pierre Hauet KB Intelligence ISA District 12

More information

Feature Notes LCOS 9.20 RC2.

Feature Notes LCOS 9.20 RC2. Feature Notes LCOS 9.20 RC2 www.lancom-systems.com LCOS 9.20 Best Wi-Fi & maximum security for your network! The new LCOS version 9.20 is a massive package that offers secure networking and top-quality

More information

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created Drone - 2 04/12/2018 Threat Model Description Threats Threat Source Risk Status Date Created Mobile Phone: Sensitive Data Leakage Smart Devices Mobile Phone: Session Hijacking Smart Devices Mobile Phone:

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

BAHX Core performance monitoring using ISA a compliant wireless Temperature Transmitters

BAHX Core performance monitoring using ISA a compliant wireless Temperature Transmitters BAHX Core performance monitoring using ISA 100.11a compliant wireless Temperature Transmitters Presenter : C. B. Chakradhaar Ras Gas Date : 14 th Feb 2013 RasGas Company Limited 2013 1 BAHX core performance

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification https://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

KNX Secure. KNX Position Paper on Data Security and Privacy

KNX Secure. KNX Position Paper on Data Security and Privacy KNX Secure KNX Position Paper on Data Security and Privacy KNX Secure Position Paper This paper is intended as a guide for both installers as well as KNX manufacturers to learn about the current measures

More information

Product Description. HUAWEI E5180s-610 LTE cube V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date

Product Description. HUAWEI E5180s-610 LTE cube V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date HUAWEI E5180s-610 LTE cube V200R001 Issue 01 Date 2014-11-10 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel

More information

Wireless g AP. User s Manual

Wireless g AP. User s Manual Wireless 802.11g AP User s Manual Version 1.8 User s Guide 0 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Planning Site Surveys for 6LoWPAN deployments

Planning Site Surveys for 6LoWPAN deployments Planning Site Surveys for 6LoWPAN deployments From: Patrick Grossetete th Last updated: September 24P P, 2008 With the increased market adoption and deployments of 6LoWPAN Wireless Sensor Networks, (WSN)

More information

802.11ac Wireless Access Point Model WAC104

802.11ac Wireless Access Point Model WAC104 Point Model WAC104 User Manual October 2016 202-11698-01 350 E. Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control

WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control Jianping Song, Song Han, Al Mok University of Texas at Austin Deji Chen, Mike Lucas, Mark Nixon Emerson Process Management

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Using Mobile Computers Lesson 12

Using Mobile Computers Lesson 12 Using Mobile Computers Lesson 12 Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections

More information

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and

More information

B EBA WI-FI GATEWAY D _

B EBA WI-FI GATEWAY D _ OPTIAL BOARD INSTALLATI MANUAL WI-FI GATEWAY D812878 00100_01 22-03-17 Caution! Read Warnings inside carefully! www.bftgateopeners.com (800) 878-7829 sales@bftgateopeners.com SCRAPPING Materials must be

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

Family Structural Overview

Family Structural Overview Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless

More information

It WISN't me, attacking industrial wireless mesh networks

It WISN't me, attacking industrial wireless mesh networks It WISN't me, attacking industrial wireless mesh networks Introduction Erwin Paternotte Lead security consultant @stokedsecurity Mattijs van Ommeren Principal security consultant @alcyonsecurity 2 Industrial

More information

Designing AirPort Extreme n Networks

Designing AirPort Extreme n Networks Designing AirPort Extreme 802.11n Networks 1 Contents Chapter 1 3 Getting Started 5 Configuring the AirPort Extreme Base Station for Internet Access Using AirPort Utility 6 Extending the Range of Your

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Wireless networking with three times the speed and five times the flexibility.

Wireless networking with three times the speed and five times the flexibility. Wireless 150N Outdoor Range Extender / Access Point Multiple SSIDs, Wireless client isolation, Bridge, Repeater, WDS, Passive PoE, Built-in 12dBi Antenna Part No.: 525497 Wireless networking with three

More information

Introductions: Who are we? What do we need to cover here?

Introductions: Who are we? What do we need to cover here? MacLab Session LT Running Your Wireless Network Safely & Reliably - Tips on Best Tools Wednesday, January 7, 2009 1:00 PM - 3:00 PM Room North 111 Dr. Bill Wiecking wiecking@mac.com Introductions: Who

More information

Introduction to Information Security Dr. Rick Jerz

Introduction to Information Security Dr. Rick Jerz Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions

More information

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs IEEE 2012 Transactions on Dependable and Secure Computing, Volume: 9, Issue: 2 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Abstract The multi-hop routing in wireless sensor

More information

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.

Welcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks. Welcome to my presentation: Message Denial and Alteration on IEEE 802.15.4 Low- Power Radio Networks. This presentation discusses the susceptibility of IEEE 802.15.4 radio networks to several different

More information

What can a small device do in modern industrial World.

What can a small device do in modern industrial World. What can a small device do in modern industrial World Alexey.Polyakov@kaspersky.com Konstantin.Sapronov@kaspersky.com Agenda Smart badge Sub 1Ghz RF Demo with RFCat Smart Grids Inside Smart Meters Threats

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide DL-200 Cellular Data logger V1.2_201610 TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 4 1.1 CONTENTS LIST... 5 1.2 HARDWARE INSTALLATION... 6 1.2.1 WARNING... 6 1.2.2 SYSTEM REQUIREMENTS...

More information

Product Description. HUAWEI E5186s-22a LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date

Product Description. HUAWEI E5186s-22a LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date HUAWEI E5186s-22a LTE CPE V200R001 Issue 05 Date 2015-07-09 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel

More information

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012 NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE

More information

1. Press "Speed Test" to find out your actual uplink and downlink speed.

1. Press Speed Test to find out your actual uplink and downlink speed. ASRock G10 Gaming Router 6.4 QoS Settings QoS Add Gaming Boost web page. Gaming Boost: Enable or disable the Gaming Boost. Bandwidth The router supports Gaming Boost natively, which identifies and intelligently

More information

Real-Time and Low-Power Wireless Communication with Sensors and Actuators

Real-Time and Low-Power Wireless Communication with Sensors and Actuators THE KNOWLEDGE FOUNDATION S SENSORS GLOBAL SUMMIT 2015 November 10-11, 2015 San Diego Marriott La Jolla La Jolla, CA Real-Time and Low-Power Wireless Communication with Sensors and Actuators Behnam Dezfouli

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No.

Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No. Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless 802.11n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No.: 524780 The INTELLINET NETWORK SOLUTIONS Wireless 300N ADSL2+ Modem

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

Product Description. HUAWEI B593s-931 LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Product Description. HUAWEI B593s-931 LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date HUAWEI B593s-931 LTE CPE V200R001 Issue 01 Date 2013-12-19 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free

More information

FinIntrusion Kit / Release Notes. FINFISHER: FinIntrusion Kit 4.0 Release Notes

FinIntrusion Kit / Release Notes. FINFISHER: FinIntrusion Kit 4.0 Release Notes 1 FINFISHER: FinIntrusion Kit 4.0 Release Notes 2 Copyright 2013 by Gamma Group International, UK Date 2013-07-12 Release information Version Date Author Remarks 1.0 2010-06-29 ht Initial version 2.0 2011-05-26

More information

Vanguard: 2015 Refresh

Vanguard: 2015 Refresh January, 2015 CalAmp Product Refresh Vanguard 3000 Vanguard 5530 Vanguard 3000 Vanguard: 2015 Refresh Vanguard refresh will extend the current Vanguard for years to come and offer a new LTE version.. Electronics

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information

Contents Introduction to the Product Configuration CPE built-in Web Server Access CPE Setup on the web page Trouble Shooting Operating Information

Contents Introduction to the Product Configuration CPE built-in Web Server Access CPE Setup on the web page Trouble Shooting Operating Information Contents Introduction to the Product Functional Features LED Information Rear Side Information Configuration Network Configuration Package Configuration PC Configuration(Windows XP) How to check your IP

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Wireless 11n Smart Repeater AP (1T1R)

Wireless 11n Smart Repeater AP (1T1R) (1T1R) 2014 Table of Contents 1. Introduction...3 1.1 Package contents... 3 1.2 Product Features... 3 1.3 Front Panel Description... 4 1.4 Rear Panel Description... 5 2. Installation...6 2.1 Hardware Installation...

More information

Touchstone WR2100 Wireless Repeater

Touchstone WR2100 Wireless Repeater Touchstone WR2100 Wireless Repeater Quick Installation Guide i Package Contents The following items should be included: If any of these items are damaged or missing, please contact your service provider

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process

More information

Wireless Embedded Modules

Wireless Embedded Modules Wireless Embedded Modules North American Sales Meeting July 2003 Product Overview Product Summary Embedded 802.11b wireless modules Ultra-compact, single component solutions Pin-compatible and interchangeable

More information

Overview. Back view. Package contents. Linksys WAP300N. Overview

Overview. Back view. Package contents. Linksys WAP300N. Overview Overview Overview Back view Antennas Wireless activity indicator Wi-Fi Protected Setup button and indicator Power port and indicator Ethernet port and activity indicator Package contents In addition to

More information

Mediant MSBR. Wireless Access Configuration. Configuration Guide. Version 6.8. Multi-Service Business Routers Product Series

Mediant MSBR. Wireless Access Configuration. Configuration Guide. Version 6.8. Multi-Service Business Routers Product Series Multi-Service Business Routers Product Series Mediant MSBR Wireless Access Configuration Version 6.8 March 2014 Document #: LTRT-40365 Contents Table of Contents 1 Introduction... 7 2 Topologies... 9

More information

Cryptanalysis. Ed Crowley

Cryptanalysis. Ed Crowley Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,

More information

ICP DAS WF-2571 FAQ. FAQ Version 1.1. ICP DAS Co., Ltd

ICP DAS WF-2571 FAQ. FAQ Version 1.1. ICP DAS Co., Ltd ICP DAS WF-2571 FAQ FAQ Version 1.1 ICP DAS Co., Ltd. 2015-12-17 Table of Contents Q1: WF-2571 doesn t work at Ad-Hoc mode. What should I do?... 3 Q2: WF-2571 doesn t work at AP mode. What should I do?...

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

Comprehensive Networking Solutions

Comprehensive Networking Solutions Comprehensive Networking Solutions End to End Networking Solutions in the Water and Wastewater Sectors Standards Certification Education & Training Publishing Conferences & Exhibits Aug 5-7, 2014 Orlando,

More information

Advanced WiFi Attacks Using Commodity Hardware

Advanced WiFi Attacks Using Commodity Hardware Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous

More information

Sustain.Ability. Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration

Sustain.Ability. Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration Sustain.Ability. 2012 Honeywell Users Group Americas Soroush Amidi and Andrew Nolan Advantages of a Plant-wide Wireless Network with Experion Integration 1 Agenda Today s Challenges Why Choose a Plant-wide

More information

XT200 Intelligent Network Router

XT200 Intelligent Network Router XT200 Intelligent Network Router Installation Manual V0103 SYRIS Technology Corporation 12F, NO.12 Sec. 1, Taijunggang Rd. Taichung city, Taiwan(403) TEL: 04-2207-8888 FAX: 04-2207-9999 Email:service@syris.com

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

CYBERSECURITY AND SERVICE STATIONS

CYBERSECURITY AND SERVICE STATIONS CYBERSECURITY AND SERVICE STATIONS Hocine AMEUR and Simon Elrharbi hocine.ameur@coessi.fr simon.elrharbi@coessi.fr 1 AGENDA 1. WHO WE ARE 2. IoT and Security 3. Connected service stations security 4. How

More information

Preventing wireless deauthentication attacks over Networks

Preventing wireless deauthentication attacks over Networks Preventing wireless deauthentication attacks over 802.11 Networks Ananay Arora Attribution under NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) ( https://creativecommons.org/licenses/by-nc-sa/4.0/

More information

Wireless 450N Dual-Band Gigabit Router 450 Mbps Wireless a/b/g/n, GHz, 3T3R MIMO, QoS, 4-Port Gigabit LAN Switch Part No.

Wireless 450N Dual-Band Gigabit Router 450 Mbps Wireless a/b/g/n, GHz, 3T3R MIMO, QoS, 4-Port Gigabit LAN Switch Part No. Wireless 450N Dual-Band Gigabit Router 450 Mbps Wireless 802.11a/b/g/n, 2.4 + 5 GHz, 3T3R MIMO, QoS, 4-Port Gigabit LAN Switch Part No.: 524988 Wireless 450N Dual-Band Router - The Ultimate in Wireless

More information

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ... Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde

More information

AT Ground Surveillance System (GSS)

AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Security Sensors The AT Ground Surveillance System (GSS) is integrated network of sensors, cameras and mesh radio network

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation

Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation Discovering the Unknown Rising demand for monitoring of process values by Increasing efficiency, reducing waste (raw materials,

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

QK-W016 WiFi Remote Controller WiFi temperature data logger & remote controller

QK-W016 WiFi Remote Controller WiFi temperature data logger & remote controller Features QK-W016 WiFi Remote Controller WiFi temperature data logger & remote controller Control and store heating/cooling settings for three individual zones via WiFi Turn electronic devices ON/OFF from

More information

END NODE DIGITAL The compact ModBus WiFi End Node to network easily industrial machine.

END NODE DIGITAL The compact ModBus WiFi End Node to network easily industrial machine. END NODE DIGITAL The compact ModBus WiFi End Node to network easily industrial machine www.wi-next.com End Node Digital Network easily digital industrial machines and improve the efficiency with Industrial

More information

Cryptography ThreeB. Ed Crowley. Fall 08

Cryptography ThreeB. Ed Crowley. Fall 08 Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,

More information

HSPA+ WiFi Router with Voice

HSPA+ WiFi Router with Voice NETCOMM LIBERTY SERIES HSPA+ WiFi Router with Voice 3G22WV Quick Start Guide This router has been designed to be placed on a desktop. All of the cables exit from the rear for better organization. The LED

More information

Yanzi IoT for Smart Buildings From Sensor to Cloud. Marie Lassborn, VP Cloud Operations Jfokus 2018

Yanzi IoT for Smart Buildings From Sensor to Cloud. Marie Lassborn, VP Cloud Operations Jfokus 2018 Yanzi IoT for Smart Buildings From Sensor to Cloud Marie Lassborn, VP Cloud Operations Jfokus 2018 1 WHAT IS YANZI? Analytics Conversions Storage Cloud Visualizations An IoT Solution for Smart Office Headquarter

More information

Children s Health System. Remote User Policy

Children s Health System. Remote User Policy Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards

More information