Wireless Network Security Spring 2011

Similar documents
Wireless Network Security Spring 2011

Wireless Network Security Spring 2011

Wireless Network Security Spring 2014

Mobile Security Fall 2013

Mobile Security Fall 2012

Wireless Network Security Spring 2013

Wireless Network Security Spring 2015

Mobile Security / /

Mobile Security Fall 2013

Mobile Security Fall 2011

Wireless Network Security Spring 2012

Wireless Network Security Spring 2013

Wireless Network Security Spring 2016

Wireless Network Security Spring 2013

Wireless Network Security Spring 2015

Wireless Network Security Spring 2011

Wireless Network Security Spring 2015

Wireless Network Security Spring 2014

Mobile Security Fall 2015

Wireless Network Security Spring 2011

How Insecure is Wireless LAN?

BackTrack 5 Wireless Penetration Testing

CANA Security Architecture

Overview of Security

Wireless Network Security

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Subject: Adhoc Networks

Wireless LAN Security (RM12/2002)

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Security of Mobile Ad Hoc and Wireless Sensor Networks

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Mobile Security Fall 2014

What is Eavedropping?

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

Wireless Network Security Spring 2014

Wireless Network Security Spring 2016

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Wireless Network Security Spring 2013

Wireless technology Principles of Security

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Wireless Security Security problems in Wireless Networks

WIDS Technology White Paper

Wireless Network Security Spring 2011

Wireless Attacks and Countermeasures

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

WIRELESS SYSTEM AND NETWORKING

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

CSE 461: Wireless Networks

Mobile Security Fall 2012

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Wireless and Mobile Network Investigation

Wireless# Guide to Wireless Communications. Objectives

Network Encryption 3 4/20/17

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Man-In-The-Browser Attacks. Daniel Tomescu

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Mobile Security Fall 2013

Wi-Fi Scanner. Glossary. LizardSystems

NETWORK SECURITY. Ch. 3: Network Attacks

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

PRODUCT GUIDE Wireless Intrusion Prevention Systems

CE Advanced Network Security Wireless Security

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Appendix E Wireless Networking Basics

Chapter 11: It s a Network. Introduction to Networking

GSM System Overview. Ph.D. Phone Lin.

Wireless KRACK attack client side workaround and detection

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

Detecting & Eliminating Rogue Access Point in IEEE WLAN

The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert

Mobile Security Fall 2014

Physical and Link Layer Attacks

Wireless Network Security Spring 2015

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Multiple Access Links and Protocols

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Securing Wireless LANs with Certificate Services

Home Computer and Internet User Security

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Cisco 1: Networking Fundamentals

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Multiple Access in Cellular and Systems

Chapter 24 Wireless Network Security

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Advanced WiFi Attacks Using Commodity Hardware

5 Tips to Fortify your Wireless Network

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015

Transcription:

Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security

Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course project, please tell me: 1.How many do you need? Why? 2.Do you need any particular OS version? Why? 3.Do you need root access? Why? 4.Do you need 3G voice/data plans or just WiFi? Why?

Agenda Link/MAC layer security Functionality/duties of wireless link/mac Basic services provided Vulnerabilities and threats

Link/MAC Layer The wireless link layer is responsible for interacting with neighboring nodes, managing point-to-point links, interacting with the network and PHY layers In cellular, interaction between mobile and BTS In WLAN, interaction between terminal and AP In MANET/WSN, interaction between nodes Link layer has to manage: Channel / link formation and management Medium access ( MAC sublayer ) Access control (in some WLAN and cellular networks)

Link Layer Services Neighbor discovery Address resolution Network access control Channel setup / access Including sender-receiver synchronization Medium access control Queueing and scheduling Close interaction with PHY collision avoidance, carrier sensing, error correction, signaling, etc. Interaction with NET for forwarding/switching

Threats Essentially, every service has corresponding threats: Malicious/selfish neighbors (e.g. Sybil attackers) can affect any outcome relying on neighbor discovery Spoofing/masquerading attacks or rogue BS/APs can affect network access control Various misbehaviors affect medium access Also, channel establishment and access

Neighbor Discovery Threats In neighbor discovery, every node learns many aspects of its local neighborhood Also, reveals info to nearby nodes and eavesdroppers Any misbehavior will alter the outcome Ex: if a node only records N nearest neighbors, a 'Sybil-like' attacker can account for several of them, subverting voting / reputation and controlling many higher-layer decision processes (e.g. routing) More on this type of attack when we talk about reputation systems and higher-layer services

Network Access Threats Threats to network access control include: Unauthorized access Access granted to a device that doesn't provide credentials Unauthorized service class upgrade Higher-class service granted when only lower-class service has been authorized Attacker spoofs or hijacks session of authorized user Eavesdropping, packet modification or dropping Session stealing in hand-off Attacks based on weak crypto (e.g. WEP) Possibly more on this in Thursday's Survey

More Access Threats Rogue WiFi/WLAN AP A malicious WiFi AP can copy MAC address, SSID, and other identifying traits from a target AP If the target AP is open, traffic from nearby clients will pass through the attackers able hands If the target AP is security-enabled with WEP, the attacker can recover the credentials pretty quickly, making this about the same as an open AP If the target uses stronger security, there's less that can be done, but still something...

Even More Access Threats Rogue cellular BTS Rogue BTS have recently been demonstrated, first costing ~$100k, then ~$15k, now <$1k Rogue station can attract nearby mobiles with higherstrength signal, but 3G devices will only connect with valid BTS-authentication, i.e. BTS needs credentials of service provider hard! Rogue 2G station can jam 3G signals or attract devices in an uncovered area, then no authentication is required easy! In this case, rogue BTS can act as MiTM with access to all link layer frames (need higher-layer protection, e.g. VPN)

MAC Misbehavior Greedy or malicious nodes can break the rules of the MAC protocol for various reasons We already talked about some of these The attacks are a direct consequence of the protocol structure intended to support cooperation 2/15 Survey: MAC-layer misbehavior

Channel Establishment Before a link is formed between two nodes, they have to agree on a number of channel parameters Which time slots, frequency channels, codes to use? How do the two nodes find each other in order to make the initial agreement?

Cellular Channels Cellular networks use a slew of dedicated control channels to set up voice/data/sms/etc. BTS Paging (PCH) Reply (RACH) Random access channel Ch. Assign (AGCH) Access grant channel SMS delivery (SDCCH) Standalone dedicated control channel All channel establishment decisions are made in the provider's network, not by the mobile device BTS Paging (PCH) Reply (RACH) Random access channel Ch. Assign (AGCH) Access grant channel TCH Setup (SDCCH) Standalone dedicated control channel Voice/data traffic (TCH) Traffic channel

WiFi Channels In WiFi (and WiFi-like) systems, all channel establishment decisions are made at the AP (or at in the back-end if extended service) Channel management is done on the same channels as other data transmission No additional control channels used Framing, control msgs

Ad Hoc Network Channels In a MANET / WSN environment, where are channel establishment / management decisions made? By who? One of the fundamental vulnerabilities in ad hoc networks Channel establishment (much like trust or key establishment) in MANETs is relatively easy to subvert, either through MiTM or masquerading attacks Still many open problems to work on

Cognitive Radio Channels Cognitive radio (CR) networks present some additional challenges in channel establishment Since there's no dedicated spectrum that's always available to CR nodes, where do they talk in order to do channel establishment? How to set up control channels? How to set up control channels that aren't in an attackers' hands? Really big open problem in CR networks...

Next time... Feb 10: Survey on wireless link security Feb 15: Survey on MAC misbehavior Network layer security