Wireless Network Security Spring 2013

Similar documents
Mobile Security Fall 2011

Wireless Network Security Spring 2011

Introduction. Computer Networks Term B10

Internet of Things: Latest Technology Development and Applications

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Mobile Security Fall 2012

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Zigbee protocol stack overview

DSRC - WAVE. VITMMA10 Okos város MSc mellékspecializáció. Simon Csaba

SCALABLE VEHICULAR AD-HOC NETWORKS DISTRIBUTED SOFTWARE-DEFINED NETWORKING

System Architecture Challenges in the Home M2M Network

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Network Security Spring 2013

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

IEEE s ESS Mesh Networking

Wireless Network Security Spring 2011

Wireless Ad-Hoc Networks

HomePlug Powerline Alliance. Overview for

Introduction to WiFi Networking. Training materials for wireless trainers

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

ZigBee: The New Frontier for Energy Efficiency

Wireless Network Security Spring 2014

An Architecture. What the MEC? for 5G

Wireless networks. Wireless Network Taxonomy

Mesh Networking Principles

Smart Grid Communications and Networking

Mobile Security Fall 2011

Progressing AMI in Asia Pacific Mike Wetselaar Director Sales South East ASia

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

The Internet of Things

Electrification of Mobility

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Wireless Networking Technologies for ICOM By: Dr. Kejie Lu Assistant Professor Department of Electrical and Computer Engineering

Part I. Wireless Communication

Chapter 3.1 Acknowledgment:

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

WIMAX. WIMAX (Worldwide Interoperability for Microwave Access ): Field of application:

Multi-hop Wireless Network and Its Applications

Mobile Security Fall 2013

CEN 538 Wireless LAN & MAN Networks

23 Must-Have WiFi Features

Smart Grid Communications Architecture: A Survey and Challenges

Guide to Wireless Communications, 3 rd Edition. Objectives

Introduction to Networked Embedded Systems and Course Description. Song Han Office: ITEB 355

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Ubiquitous services and applications: needs of mobile users

Smart Homes and Cities

Fig Data flow diagram and architecture when using the TCUP Cloud Server for PaaS for the Developers and large

Introduction to Mobile Ad hoc Networks (MANETs)

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Proposed Node and Network Models for M2M Internet

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Wireless Network Security Spring 2015

ISSN (PRINT): , (ONLINE): , VOLUME-6, ISSUE-1,

Standards for V2X Communication and Implications for OEMs and ITS

Mobile and Sensor Systems

Bob Warden. IP Metering and the Smart Grid WAN Revolution October 27, 2008

Inovatian Mesh Technology. InoMesh Specifications & System Performance Sheet

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless Network Security Spring 2012

1 Wireless Network Architecture

This tutorial has been designed to help beginners understand the basic concepts of WiMAX.

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley

International Journal of Computer & Organization Trends Volume 5 Issue 1 Jan to Feb 2015

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WeVe: When Smart Wearables Meet Intelligent Vehicles

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Communications Options for Wireless Sensor Networks. Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

Vehicular Networking

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

ENSC 427, Spring 2012

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

Wireless Network Security Spring 2015

L2 - Internet of Things

Wireless networks: from cellular to ad hoc

Embedded Software: Its Growing Influence on the Hardware world

IEEE PROJECTS ON EMBEDDED SYSTEMS

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

Modulation. Propagation. Typical frequency bands

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

Please view notes for further information on later slides

Wireless Networking: An Introduction. Hongwei Zhang

Internet Technology. 15. Things we didn t get to talk about. Paul Krzyzanowski. Rutgers University. Spring Paul Krzyzanowski

IoT CoAP Plugtests & Workshop Nov 27, 2012 Sophia Antipolis

They avoid the cost, installation, and maintenance of network infrastructure.

Overview (Advantages and Routing Protocols) of MANET

Mobile Edge Network for Wireless 5G. Fang-Chu Chen / ITRI March Copyright 2016 ITRI 工業技術研究院

V2V and V2I Communication. 건국대학교 MBC Lab

Multi Purpose Infrastructure for Greater Connectivity. Nathaniel Papay, P.Eng.,PMP EPCOR Technologies ITS Canada ACGM 2014

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Transcription:

Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II

Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss project topics, topics must be approved prior to proposal

Agenda Overview of systems of interest Brief highlights of standards, protocols, etc. Discussion of challenges, issues, constraints Discussion of potential security concerns

MANET

Ad Hoc Networks Ad hoc networks typically manage local or off-line traffic, i.e. no Internet connection Device-to-device, no APs Peer-to-peer data exchange In-network services only Sometimes involve humans, but sometimes don't No central server No authority No backhaul

Security in MANETs What aspects of information, network, and system security are harder in MANETs? Addressing/naming/identity management issues Device/user authentication Routing/discovery Accountability Access / entry to network Intrusion detection/prevention system Trusted information management

Lack of Infrastructure Implies that security mechanisms are decentralized / distributed Who do you trust? What if you don't trust anyone? What services are no longer secure?

Network is fluid Mobility Security associations are dynamic or short-lived Members can join and leave network or groups Observing behaviors over a long period (e.g., for monitoring or intrusion detection) is not possible Dynamic connectivity and reachability

Opportunities for Misbehavior With no authority, controller, or coordinator, attackers can misbehave arbitrarily! Layered attackers Targeted misbehavior at the PHY, MAC, NET, TRANS, or APP layers Cross-Layer attackers Can incorporate information from multiple network layers for various attack gains

MANET Realities Recently claimed that true MANETs have very few good applications Most practical systems end up being tethered to the cloud for one reason or another Adding base stations to a MANET provides shared cloud access Multihop networking among Internet devices allows local communication without cloud services

WMN

Wireless Mesh Networks Pure ad hoc network No infrastructure, completely flat architecture Mesh network Adding dedicated nodes which connect ad-hoc network to a wireless backbone Hierarchical architecture However, there s no strict boundary between the ad hoc network and the mesh network.

Wireless Mesh Networks Mesh networks provide multi-hop wireless connections to a backhaul Mesh routers can be fixed or mobile, serve as multi-hop connectivity for Internet traffic to/from users End users/hosts are typically mobile, hand-off to numerous mesh routers Alternatively, a mobile mesh has hosts/routers only and a few fixed APs

Standards for Mesh Network Type of mesh networks WMAN mesh (WiMAX) Corresponding standards IEEE 802.16a (mesh option), IEEE 802.16j (multihop relay) WLAN mesh (Wi-Fi) IEEE 802.11s WPAN mesh (ZigBee) IEEE 802.15.5

WMAN Mesh (a) point-to-multipoint mode (b) mesh mode [Lee et. al, 06]

WLAN Mesh [Lee et. al, 06]

Where's the boundary between MANETs and WMNs? Can protocols, standards, designs, etc. for one be applied to the other?

Tethering to the Cloud Extension of the ad hoc vision Leveraging occasional connections to the Internet through mesh or DTN may have advantages and disadvantages Sensor networks are connected through base stations to relay sensed information, but typically operate independent of the cloud What are the opportunities for leveraging that possible connection?

Detaching from the Cloud Convergence of the WLAN/cell/MANET domains can also move the other way Cell services don't always require the cloud, so why not take those services off? Save bandwidth, reduces risk of information leakage, etc. e.g. home energy management systems Why is all my private home and energy use/management information stored on the cloud when I access it from my couch? Billing issues?

WS[A]N

Sensor Networks Mostly use 802.15.4 / ZigBee, but architecture and topology are different Sensor networks are typically closer to a mesh architecture: multi-hop to one/many APs Intermittent low-rate traffic, mostly sensor readings from nodes back to APs Heavily resource-constrained Designed for life-time

Sensing vs. Computing Primary difference between sensor/actuator networks and typical computer networks is control vs. data Sensors create date used to generate control signals given as input to actuators So? Control systems have much tighter time constraints than data/computing systems What happens if your video stream is delayed? Fire alarm? Control information can be operation/safety critical Authentic control signal vs. correct control signal

Unattended Operation Unlike many of the systems we've talked about so far, sensing/actuation devices aren't associated with people Completely autonomous operation No user interface All debugging, reporting, re-programming, data dissemination, control, etc. has to happen over a wireless interface (in any practical setting)

Context Sensor data usually requires some additional contextual meta-data to describe the data Location of the sensor device Types of sensors on the device Granularity of each data field Time-stamp of measurements Context information relates to various types of network services (e.g., synchronization, localization, db, etc.)

Home Networking

Home Networks In-home networked systems (Smart Home) Entertainment/media Appliances, etc. Home energy networks The home side of the smart grid, between the smart meter and user Mostly wireless (802.15.4, etc.)

Heterogeneity Home networks comprise many different wireless technologies, including: WiFi PAN Mesh networking Sensors and actuators Interoperability adds new dimensions to the challenges and security concerns

Interoperability Issues In a home network, security properties should be provided across protocol domains Not only do protocols need to interoperate, but security mechanisms need to be composable across interoperating domains Ex: how to guarantee data deliver across a network using ad hoc WiFi, ZigBee mesh, Interoperability highlights the difference between network security and system security

Usable Security One thing we definitely know about home network security is that we shouldn't assume that users will understand it How many people understand WiFi security on their home WiFi AP/router? Adding a new laptop to a home WiFi network is hard enough imagine adding new appliances, sensors to every outlet, heating duct, and so on How to automate security to the point that people can use it in various scenarios?

VANET

VANETs VANET = Vehicular ad hoc network Cars talk amongst each other and with roadside infrastructure Applications of interest: Automated driver safety management Passive road quality / condition monitoring In-car entertainment Navigation services Context-aware rec's: This alternate route would be faster, and it would go past your favorite Primanti Bros.

Subsystems / Subnetworks VANETs include different subsystems These subsystems need to interoperate, either directly or through APIs Different components are developed by different vendors, not always with standards As with home networks, interoperability has major implications, but now the different devices are highly dynamic / mobile

Example Components User devices interact with the vehicle using WiFi, Bluetooth, NFC, visual comms, etc. On-board sensors communicate with a controller using ZigBee, e.g., TPMS Telematics unit (e.g., 4G) for car-to-cloud Safety messaging systems between vehicles

802.11p and DSRC 802.11p extends the 802.11 standard to include vehicular communications in the 5.9 GHz band Allows dynamic comms without setting up a BSS (i.e., no SSID) for fast decentralized operation No association, no authentication, no access control Also includes mechanisms for channel management and synchronization Dedicated Short Range Communication One- and two-way communication based on the 802.11p standard Builds on the older ASTM E2213-03 standard

WAVE Wireless Access in Vehicular Environments Wireless stack for vehicle-to-vehicle and vehicle-toinfrastructure communications Based on IEEE 1609 standard family Built on top of the 802.11p / DSRC foundation Think of it as: 802.11p + DSRC = PHY/MAC WAVE / 1609 = layers 3+ Envisioned for 100s-1000s of applications Safety messaging, autonomous driving, assisted braking, etc. Sensing road conditions, traffic, etc. Payment systems (tolls, parking, etc.)

Smart Grid

The Smart Grid incorporates hybrid wired/wireless communications into the energy grid Smart Grid Applications of interest: Dynamic pricing Improved efficiency Home energy mgmt. Disaster/outage recovery

Issues Very large, very dynamic control system, sort of like a giant sensor/actuator network Failure outage Better data and controls more $$$ Misbehavior: DoS, where service = {power, billing, sensing, communication, } Selfish service manipulation Price manipulation, mis-charging, fraud?

Some General Questions Smart Grid is very new, so there aren't any firm standards yet...but many standards bodies are in progress What aspects of the Smart Grid should be wireless? This is a pretty hot topic of debate. Some people say none, some people say as much as possible. What value can be provided by wireless? What risks does wireless introduce?

Wireless link security Next Time General wireless link layer issues WiFi link security