Title: Editor, ACM Transactions on Information and System Security
1????????
- ???
- ??????????????
- ?????????????
- Editor, ACM Transactions on Information and
System Security
2????
- ??? Introduction to Wireless Network Security
- ??? Information Security Management
- ??? Authentication and Watermarking
- ??? Applied Cryptography-- Encryption Algorithm
and Digital Signature - ??? Intrusion Detection System, Malicious
code--Worms, Viruses, and Trojans - ??? VPN amd Management/Application of PKI
3Wireless Security
- ???
- ??????????????
- ?????????????
- Editor, ACM Transactions on Information and
System Security
4Outline
- Introduction
- GSM
- GPRS
- 3G
- IEEE 802.1x
- Bluetooth
- Mobile IP
- WEP
- RFID
- Wireless Sensor
5Introduction to Wireless
- Wireless
- Convenient
- Mobility
- Usually limited computation power
- However
- Air media
- Easy to listen
6Wireless Characteristics Open system
Associate request
Client
Access Point (AP)
Associate response
- allows anyone to begin a conversation with the
access point, and provides no security whatsoever
to the client who can talk to the AP
7Introduction to Security Issues of Wireless
Networks
- Security is major issue
- Different architecture has different security
vulnerabilities - We will introduce architecture and security
vulnerabilities separately
8GSM
9Overview
- GSMGlobal System for Mobile Communications
- A digital wireless network standard
- Circuit-switched technology
- FDMA TDMA
- 890-915 MHz for the link
FDMA Frequent Division Multiple Access TDMA
Time Division Multiple Access
10GSM Network Architecture
MS Mobile Station BTS Base Transceiver
Station BSC Base Station Controller MSC Mobile
Switching Center OMS Operation and Maintenance
System VLR Visited Location Register HLR Home
Location Register AUC Authentication Center EIR
Equipment Identify Register
11Security Architecture
12Problems with GSM Security(1/3)
- Active Attacks
- Impersonating network elements such as false BTS
is possible . - Key Transmission
- Cipher keys and authentication values are
transmitted in clear within and between networks. - Limited Encryption Scope
- Encryption terminated too soon at edge of network
to BTS - Communications and signaling in the fixed network
portion arent protected - Designed to be only as secure as the fixed
networks. - Channel Hijack
- Protection against radio channel hijack relies on
encryption. - However, encryption is not used in some networks.
13Problems with GSM Security (2/3)
- Implicit Data Integrity
- No integrity algorithm provided
- Unilateral Authentication
- Only user authentication to the network is
provided. - No means to identify the network to the user.
- Weak Encryption Algorithms
- Key lengths are too short
- Unsecured Terminal
- IMEI is an unsecured identity Integrity
mechanisms
14Problems with GSM Security(3/3)
- Lawful Interception Fraud
- Considered as afterthoughts
- Lack of Visibility
- No indication to the user that encryption is on
- Inflexibility
- Inadequate flexibility to upgrade and improve
security functionality over time
153G
163G Network Architecture
CircuitNetwork
Circuit/ Signaling Gateway
Mobility Manager
Feature Server(s)
Circuit Switch
IN Services
RNC
Call Agent
Data Packet Voice
Voice
IP Core Network
Radio Access Control
Packet Network (Internet)
Packet Gateway
3G
2G/2.5G
2G
RAN Radio Access Network RNC Radio Network
Controller
17Problems with 3G Security
- IMSI (International Mobile Subscriber Identify)
is sent in cleartext when allocating TMSI
(Temporary Mobile Subscriber Identify) to the
user - The transmission of IMEI (International Mobile
Equipment Number) is not protected - A user can be enticed to camp on a false BS (Base
Station). - Hijacking outgoing/incoming calls in networks
with disabled encryption is possible. - Man-in-the-middle and drops the user once the
call is set-up
183G Security Principles
- Build on GSM security
- Correct problems with GSM security
- Add new security features
19IEEE 802.1x
20IEEE 802.1X
- A framework for authenticating and controlling
user traffic to a protected network - Uses Extensible Authentication Protocol (EAP)
- Provides key management
21EAP Architecture
- EAP is an envelope that supports many different
kinds of authentication
Method Layer
TLS
AKA/SIM
PEAP/EAP TTLS
LEAP
EAP APIs
EAP Layer
Driver APIs
Media Layer
PPP
802.3
802.5
802.11
22EAP Related Methods
- Cisco LEAP
- PEAP
- EAP-TLS
- EAP-TTLS
23Cisco's Lightweight EAP (LEAP)
- Mutual password authentication between the
station and AP per session WEP - Because LEAP's challenge/response isn't
encrypted, it's vulnerable to offline dictionary
attacks
24LEAP authentication process
25Protected extensible authentication protocol
(PEAP)
- Authentication process
- Establish TLS connection between authentication
server and user - Authenticate authentication server
- Authenticate user
- Generate session keys
- There exists risks of man-in-the-middle attack in
PEAP
26802.1x vulnerabilities
- Absence of mutual authentication
- One way authentication of supplicant.
- Adversary acting as access point leads to
Man-in-the-middle attack -
- Session hijacking
- Attacker spoofs MAC (Medic Access Control) of AP
and disassociates client - Next, it spoofs MAC of client and gains
connection
27Bluetooth Security
28Introduction
- Developed by Bluetooth Special Interest
Group(SIG) - The Bluetooth protocol uses a combination of
circuit and packet switching. - Form ad hoc networks of several(up to eight)
devices, called piconets - Use the radio range of 2.45 GHz, max bandwidth is
1Mb/s - Support either asynchronous data channel and up
to three synchronous speech channels - provides a point-to-point connection (only two
Bluetooth units involved), or a
point-to-multipoint connection,
29Security Scheme of Bluetooth
30Generation of Unit Key
(Bluetooth device address)
31Security VulnerabilityUnit Key Stealing
32Mobile IP
33The Need for Mobile IP
- A home link is the link on which a specific node
should be located that is the link, which has
been assigned the same network-prefix as the
nodes IP address - A foreign link is any link other than a nodes
home link that is, any link whose
network-prefix differs from that of the nodes IP
address - Mobility is the ability of a node to change its
point of attachment from one link to another
while maintaining all existing communications and
using the same IP address at its new link
34Mobile IP Entities and Relationships
Mobile Node at home
foreign Link
tunnel
Home Link
Foreign Agent
Home Agent
Mobile Node visiting a foreign link
353 functional entities
- Mobile Node (MN) a node which can change its
point-of-attachment to the Internet from one link
to another while maintaining any ongoing
communications and using its (permanent) IP home
address - Home Agent (HA) router with an interface on the
mobile nodes home link, which - Is informed by the mobile node about its current
location, represented by its care-of-address - Intercepts packets destined to the mobile nodes
home address and tunnels them to the mobile
nodes current location, i.e. to the
care-of-address
363 functional entities (cont.)
- Foreign Agent (FA) a router on a mobile nodes
foreign link which - Assists the mobile node in informing its home
agent of its current care-of address - In some cases, provides a care-of address and
de-tunnels packets for the mobile node that have
been tunneled by its home agent - Serves as default router for packets generated by
the mobile node while connected to this foreign
link
37Security Issues
- Insider Attack
- Mobile Node Denial-of-Service
- Replay Attacks
- Theft of Information Passive Eavesdropping
- Theft of Information Session-Stealing (Takeover)
Attack
38Wired Equivalent Privacy (WEP)
39WEP
- WEP Wired Equivalent Privacy
- Protection between AP and MNs (Mobile Nodes)
- Based on RC4 algorithm plus a 24-bit IV (Initial
Vector) - IV is included in each packet to ensure data
integrity - Stream Cipher
- optional for 802.11
40How WEP Works
41Problems with WEP
- Key Generation
- ICV Generation
- WEP Attacks
42Key generation problems
- The main problem of WEP is Key Generation.
- Key distribution is done manually.
- Secret Key is too small, only 40 Bits.
- Very susceptible to brute force attacks.
- IV is too small.
- Only 16 Million different possibilities for every
packet. - Secret Keys are accessible to user, therefore not
secret.
43ICV generation problems
- The ICV is generated from a cyclic redundancy
check (CRC-32) - Only a simple arithmetic computation. Can be done
easily by anyone. - Not cryptographically secure.
44Attacks
- Replay
- Statistical gathering of certain ciphertext that
once sent to server will cause wanted reaction. - IP redirection
- The access point will decrypt the packet, and
send the packet off to its (new) destination. - Denial of Service Attacks
- Flooding the 2.4Ghz frequency with noise.
45Security Flaws
- The risks of keystream reuse
- If C1 P1?RC4(IV,k)
- and C2 P2?RC4(IV,k)
- then
- C1 ? C2 ( P1?RC4(IV,k)) ?(
P2?RC4(IV,k)) - P1 ? P2
- The WEP standard recommends(but does not require)
that the IV be changed after every packet.
46Reuse Initialization Vector
- The IV field used bye WEP is only 24 bits wide,
nearly guaranteeing that the same IV will be
reused for multiple messages. - packet size 2000-byte
- at average 5Mbps bandwidth
- ( ( (2000 ?8)/(5 ?106)) ? 224)/360014
hours - PCMCIA cards that they tested reset the IV to 0
each time its re-initialized, and the IV is
incremented by one for each packet.
47Decryption Dictionaries
- Some access points transmit broadcast messages in
plaintext and encrypted form when access control
is disabled. - The attacker can build a table of the keystream
corresponding to each IV. - It does not matter if 40 bits or 104 bits shared
secret key use as the attack centers on the IV
collision.
48Message Modification
- The WEP checksum is a linear function of the
message. - ? may be chosen arbitrarily bye the attacker
- A?(B) ltIV, Cgt
- (A)?B ltIV, Cgt
- C C ? lt ?,c(?)gt
- RC4(IV,k) ? ltM, c(M)gt ? lt ?,c(?)gt
- RC4(IV,k) ? ltM ? ?, c(M) ? c(?)gt
- RC4(IV,k) ? ltM ? ?, c(M ? ?)gt
- RC4(IV,k) ? ltM, c(M)gt
- MM ? ?
49Message Injection
- It is possible to reuse old IV values without
triggering any alarms at the receiver. - That is, if attacker ever learns the complete
plaintext P of any given ciphertext packet C, he
can recover keystream used to encrypt the packet. - P ? C P ? (P?RC4(IV,k)) RC4(IV,k)
- (A)?B ltIV,Cgt
- where C ltM, c(M) gt ?
RC4(IV,k)
50Authentication Spoofing
- The message injection attack can be used to
defeat the shared-key authentication mechanism
used by WEP. - The attacker learns both the plaintext challenge
sent by the access point and the encrypted
version sent by the mobile station.
51RFID Radio Frequent Identification
52The technologies - RFID
- Provides a means of retrieving information stored
on a tag using radio frequencies - Function
- Identify
- Provide information
- Instruct downstream
- operations
- Benefit
- Doesnt require line of sight
- High speed multiple read capability
- Accurate
- Can be read in harsh environments
- Difficult to counterfeit
- Can carry large amounts of data
- Can be read and written
- price prohibitive for most consumer packs
- primarily used for returnable systems
53Components of RFID
- A basic RFID system consist of three components
- An antenna or coil
- A transceiver (with decoder)
- A transponder (RF tag) electronically programmed
with unique information
54Some samples
55RFID example warehouse management
- Standard barcode label printer fitted with RFID
option - Special labels with RFID tag embedded
- In one single operation
- Printing of label
- Writing of Data to tag
56Wireless sensor network
57Wireless sensor network
- Wireless sensor network is an emerging technique
that can be used for various application areas. - New challenges come from the environment of
sensor network, such as security, power
management.
58Sensor networks communication architecture
59Design factors
- Fault tolerance
- Scalability
- Production costs
- Hardware constraints
- Sensor network topology
- Environment
- Transmission media
- Power consumption
60Sensor nodes example
- SmartDust node (Berkeley)
- Systronix JStamp Processor (Utah)
61Sensor node
- Compact, small and low power device.
- Limited processing, storage, bandwidth and energy.
62Characteristics of prototype SmartDust Nodes
63Differ from wireless ad hoc networks
- Densely deployed.
- Prone to failures.
- Share one broadcast communication paradigm
- Limited in power, computational capacities, and
memory. - No global ID because of the large amount of
overhead and large number of sensors.
64Security requirements for sensor networks
- Data confidentiality
- Design more efficient encryption methods
- Low cost encryption methods, like RC5, RC6, AES.
- Data authentication
- Two party
- Broadcast
- Data integrity
- Data freshness
65Security issues
- More efficient encryption and authentication
protocols - Secure data aggregation
- Secure routing
- Key management
66Applications
- Military applications
- Habitat monitoring applications
- Environment observation and forecasting system
(EOFS) - Health applications
- Structure health monitoring (SHM) system
- Home applications, office applications