SlideShare a Scribd company logo
1 of 38
Download to read offline
©2015 Patrick Tague 1
Wireless Network Security
Spring 2015
Patrick Tague
Class #2 – Wireless Security Basics
& Threat Models
©2015 Patrick Tague 2
Class #2
• Brief review of wireless networks
• Wireless security basics, threat models
©2015 Patrick Tague 3
Welcome to the Party
Wireless networking is much like trying to
have a conversation at a party
©2015 Patrick Tague 4
Open Invitation
• Anyone can “talk”, anyone nearby can “listen”
– We can control connectivity in wired networks, but not in
wireless
©2015 Patrick Tague 5
A Dynamic Occasion
• Everyone is free to move around as they please
– Physical mobility - that's why we lost the wires, right?
– Logical mobility – connecting with different peers at
different times
• Conversation quantity/load/demand varies
– Nobody really talks constantly all the time...
• Air conditions at the party change over time
– Noise, humidity/temperature, obstacles, reflections
• Others: services, roles, energy, …
©2015 Patrick Tague 6
Limited Engagement
• Each attendee has a limited amount of energy
– Wireless devices are ideally battery-powered, otherwise
why go wireless?
• Not all attendees have the same capabilities:
– Some are less capable of processing what others say (e.g.,
less computation capability, 8-bit processors)
– Some have limited memory (e.g., less storage)
– Some have a limited vocabulary or speak a different
language (e.g., different communication standards)
– Some are quieter than others (e.g., shorter range of
communication)
©2015 Patrick Tague 7
MC or No MC?
• Larger social gatherings probably don't have a single
MC in charge of controlling conversations
– This type of control is usually more distributed, if existent
at all
– In wireless, APs and gateways act as local controllers,
providing access to the cloud, but not controlled by it
• Competition among (in)dependent sub-groups
– Think of how many WiFi APs you've seen at once...
©2015 Patrick Tague 8
How do we deal with these
challenges?
©2015 Patrick Tague 9
“Simplify, Simplify, Simplify”
- Thoreau
• Instead of trying to solve all of the
possible problems of cocktail party
conversation, we decompose the
problem into manageable steps
– Communicating efficiently and
effectively to a neighbor
– Correcting mistakes, repeating, or re-
stating
– Relaying messages to a distant person
– Making sure messages reach the intended
recipient quickly, correctly, efficiently,
etc. without annoying the messenger
©2015 Patrick Tague 10
Layering
• Layering simplifies network design
• Layered model:
Layer 3
Layer 2
Layer 1
Lower layer provides a
service to higher layer
Higher layer doesn’t care (or
even know, sometimes) how
service is implemented:
lack of transparency
©2015 Patrick Tague 11
Layering Standards
• Standard layered model
– Typically we talk about
network layering using
the 7-layer ISO Open
Standards
Interconnection (OSI)
Model
– Other models exist, but
everyone seems to like
ISO OSI
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Link Layer
Physical Layer
Session Layer
©2015 Patrick Tague 12
Layer Functionality
• Application Layer – support
network applications
– Presentation Layer –
Compression, encryption,
data conversion
– Session Layer – Establish &
terminate sessions
• Transport Layer – Reliable
end-to-end data transfer
– Multiplexing, error control,
flow and congestion control
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Link Layer
Physical Layer
Session Layer
©2015 Patrick Tague 13
Layer Functionality
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Link Layer
Physical Layer
Session Layer
• Network Layer – Addressing
and routing
• Link Layer – Reliable single-
hop data transfer
– Framing, error detection,
medium access control (MAC)
sub-layer
• Physical Layer – Moves bits
– Bit synchronization,
modulation & demodulation,
physical connections
©2015 Patrick Tague 14
Internet Layering
• Layered protocols have
been the basis of
network design for
decades
• Layers work great in
some scenarios
©2015 Patrick Tague 15
Layering in Wireless
Application
Transport
Network
Link
Physical
Wireless
Whatever
• Below a certain point,
things can be designed
for wireless
communication
• Above that point, the
medium doesn't
matter…
– Or does it?
– Or should it?
©2015 Patrick Tague 16
What types of wireless networks
are we going to talk about?
©2015 Patrick Tague 17
Wireless Internet
Wireless Networks
Telecommunications
Enterprise Wireless
Ad Hoc / Mesh
Vehicular Networks
Sensing / Control
Systems
And more...
©2015 Patrick Tague 18
Access
Network
WLAN Systems
• Almost every WLAN system in existence uses the
IEEE 802.11 “WiFi” standard
– 802.11 defines lower-layer services (physical, link, MAC
layer) for WLAN connectivity, access, and services
Internet
Enterprise
Intranet
©2015 Patrick Tague 19
Telecom/Mobile Networks
• Mobile networks have evolved
from providing voice connectivity
to the PSTN to providing all forms
of connectivity to the Internet
– AMPS first introduced in 1978
– GSM developed through the 1990s-
2000s
– 3G/4G standards emerged with full
data support, looking more like a
WLAN/WMAN
©2015 Patrick Tague 20
Personal Area Networks
• Local “device-to-device” networking using the
802.15 family of standards
• Typically short range, few devices, low power
• Commonly used for home, personal, office
©2015 Patrick Tague 21
Mobile Ad Hoc Networks
• Mobile ad hoc networks (MANETs) typically connect
local/offline devices with no Internet connection
– Device-to-device, no APs
– Peer-to-peer data exchange
– In-network services only
– Sometimes involve humans,
but sometimes don't
– No central server
– No authority
– No backhaul
©2015 Patrick Tague 22
Wireless Mesh Networks
• Mesh networks
provide multi-hop
wireless connections
to a backhaul
– Mesh routers can be
fixed or mobile, serve
as multi-hop Internet
connectivity
– Hosts are typically
mobile, hand-off to
mesh routers
©2015 Patrick Tague 23
Sensor Networks
• Mostly use ZigBee (based on 802.15.4) or WiFi
depending on requirements
– Sensor networks are typically closer to a mesh
architecture: multi-hop to one/many APs
– Intermittent low-rate traffic, mostly sensor readings from
nodes back to APs
– Heavily resource-constrained
– Designed for life-time
©2015 Patrick Tague 24
Home Networks
• In-home networked
systems (Smart Home)
– Entertainment/media
– Appliances, etc.
• Home energy networks
– The home side of the
smart grid, between the
smart meter and user
– Mostly wireless (802.15.4,
etc.)
©2015 Patrick Tague 25
VANETs
• VANET = Vehicular ad
hoc network
– Cars talk amongst
each other and with
roadside infrastructure
• Applications of
interest:
– Automated driver safety
management
– Passive road quality /
condition monitoring
– In-car entertainment
– Navigation services
– Context-aware rec's:
• “This alternate route
would be faster, and it
would go past your
favorite Primanti Bros.”
©2015 Patrick Tague 26
Smart Grid
• The Smart Grid
incorporates hybrid
wired/wireless
communications into the
energy grid
• Applications of interest:
– Dynamic pricing
– Improved efficiency
– Home energy mgmt.
– Disaster/outage recovery
©2015 Patrick Tague 27
What is Wireless
Network Security?
Authenticity
Secrecy ?
A probabilistic guarantee that a wireless
network does its job as expected, even when
faced with a variety of threats
©2015 Patrick Tague 28
• Many different types of threats faced in wireless
• Including (but not limited to) threats to:
– Information content, source, etc.
– Availability of wireless connectivity
– Performance of network protocols
– Proper use of scarce resources (energy, bandwidth, …)
– Proper use of command/control messages
– Correct representation of devices
– …
• All of these are composed of certain primitives
Threats of Interest
©2015 Patrick Tague 29
Eavesdropping
©2015 Patrick Tague 30
Interference
©2015 Patrick Tague 31
Msg/Pkt/Signal Injection/Replay
What do you
think of …?
Terrible!
Can you
speak up?
Can you
speak up?
Can you
speak up?
Can you
speak up?
©2015 Patrick Tague 32
Spoofing
Trust me,
I'm a doctor.
©2015 Patrick Tague 33
Man-in-the-Middle Attack
Can you
bring a Coke
to Table 3?
Can you bring a
Diet Coke to
Table 3?
Diet Coke, Table
3, sure thing!
Coke to Table
3, sure thing!
©2015 Patrick Tague 34
Resource Depletion / Wastage
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
Please check
on Table 3.
©2015 Patrick Tague 35
Byzantine Threats
This is boring...
time for sabotage!
• Byzantine threat
is sort of like
insider threat
• Basically, an
authenticated /
valid / trusted
group member
stops following
the rules
©2015 Patrick Tague 36
And Many More...
• Denial/Degradation of Service
• Exploiting Composition Issues
• Context Manipulation
• …
©2015 Patrick Tague 37
Our plan.
Authenticity
Secrecy ?
We'll study how these various threats manifest
at different layers and in different types of
wireless systems.
©2015 Patrick Tague 38
January 20:
Project Discussion; OMNET++ Tutorial I

More Related Content

Similar to [hoctap.suctremmt.com]14814s15_02.pdf

Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
API Days Paris - When RESTful may be considered harmful
API Days Paris - When RESTful may be considered harmfulAPI Days Paris - When RESTful may be considered harmful
API Days Paris - When RESTful may be considered harmfulRoss Garrett
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
MuleSoft x Nyansa Webinar Slides
MuleSoft x Nyansa Webinar SlidesMuleSoft x Nyansa Webinar Slides
MuleSoft x Nyansa Webinar SlidesNyansa
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfZoyaAli844417
 
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)Marius Zaharia
 
MQTT - standards-based plumbing for the Internet of Things
MQTT - standards-based plumbing for the Internet of ThingsMQTT - standards-based plumbing for the Internet of Things
MQTT - standards-based plumbing for the Internet of ThingsAndy Piper
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopInfluxData
 
iot.pptx related to technology which exist
iot.pptx related to technology which existiot.pptx related to technology which exist
iot.pptx related to technology which existVINODN33
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 

Similar to [hoctap.suctremmt.com]14814s15_02.pdf (20)

Internet
InternetInternet
Internet
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
API Days Paris - When RESTful may be considered harmful
API Days Paris - When RESTful may be considered harmfulAPI Days Paris - When RESTful may be considered harmful
API Days Paris - When RESTful may be considered harmful
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
Firewall
FirewallFirewall
Firewall
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
MuleSoft x Nyansa Webinar Slides
MuleSoft x Nyansa Webinar SlidesMuleSoft x Nyansa Webinar Slides
MuleSoft x Nyansa Webinar Slides
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)
Onboarding a Historical Company on the Cloud Journey (IT Camp 2018)
 
MQTT - standards-based plumbing for the Internet of Things
MQTT - standards-based plumbing for the Internet of ThingsMQTT - standards-based plumbing for the Internet of Things
MQTT - standards-based plumbing for the Internet of Things
 
Basics of IoT
Basics of IoTBasics of IoT
Basics of IoT
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
 
iot.pptx related to technology which exist
iot.pptx related to technology which existiot.pptx related to technology which exist
iot.pptx related to technology which exist
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 

Recently uploaded

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 

[hoctap.suctremmt.com]14814s15_02.pdf

  • 1. ©2015 Patrick Tague 1 Wireless Network Security Spring 2015 Patrick Tague Class #2 – Wireless Security Basics & Threat Models
  • 2. ©2015 Patrick Tague 2 Class #2 • Brief review of wireless networks • Wireless security basics, threat models
  • 3. ©2015 Patrick Tague 3 Welcome to the Party Wireless networking is much like trying to have a conversation at a party
  • 4. ©2015 Patrick Tague 4 Open Invitation • Anyone can “talk”, anyone nearby can “listen” – We can control connectivity in wired networks, but not in wireless
  • 5. ©2015 Patrick Tague 5 A Dynamic Occasion • Everyone is free to move around as they please – Physical mobility - that's why we lost the wires, right? – Logical mobility – connecting with different peers at different times • Conversation quantity/load/demand varies – Nobody really talks constantly all the time... • Air conditions at the party change over time – Noise, humidity/temperature, obstacles, reflections • Others: services, roles, energy, …
  • 6. ©2015 Patrick Tague 6 Limited Engagement • Each attendee has a limited amount of energy – Wireless devices are ideally battery-powered, otherwise why go wireless? • Not all attendees have the same capabilities: – Some are less capable of processing what others say (e.g., less computation capability, 8-bit processors) – Some have limited memory (e.g., less storage) – Some have a limited vocabulary or speak a different language (e.g., different communication standards) – Some are quieter than others (e.g., shorter range of communication)
  • 7. ©2015 Patrick Tague 7 MC or No MC? • Larger social gatherings probably don't have a single MC in charge of controlling conversations – This type of control is usually more distributed, if existent at all – In wireless, APs and gateways act as local controllers, providing access to the cloud, but not controlled by it • Competition among (in)dependent sub-groups – Think of how many WiFi APs you've seen at once...
  • 8. ©2015 Patrick Tague 8 How do we deal with these challenges?
  • 9. ©2015 Patrick Tague 9 “Simplify, Simplify, Simplify” - Thoreau • Instead of trying to solve all of the possible problems of cocktail party conversation, we decompose the problem into manageable steps – Communicating efficiently and effectively to a neighbor – Correcting mistakes, repeating, or re- stating – Relaying messages to a distant person – Making sure messages reach the intended recipient quickly, correctly, efficiently, etc. without annoying the messenger
  • 10. ©2015 Patrick Tague 10 Layering • Layering simplifies network design • Layered model: Layer 3 Layer 2 Layer 1 Lower layer provides a service to higher layer Higher layer doesn’t care (or even know, sometimes) how service is implemented: lack of transparency
  • 11. ©2015 Patrick Tague 11 Layering Standards • Standard layered model – Typically we talk about network layering using the 7-layer ISO Open Standards Interconnection (OSI) Model – Other models exist, but everyone seems to like ISO OSI Application Layer Presentation Layer Session Layer Transport Layer Network Layer Link Layer Physical Layer Session Layer
  • 12. ©2015 Patrick Tague 12 Layer Functionality • Application Layer – support network applications – Presentation Layer – Compression, encryption, data conversion – Session Layer – Establish & terminate sessions • Transport Layer – Reliable end-to-end data transfer – Multiplexing, error control, flow and congestion control Application Layer Presentation Layer Session Layer Transport Layer Network Layer Link Layer Physical Layer Session Layer
  • 13. ©2015 Patrick Tague 13 Layer Functionality Application Layer Presentation Layer Session Layer Transport Layer Network Layer Link Layer Physical Layer Session Layer • Network Layer – Addressing and routing • Link Layer – Reliable single- hop data transfer – Framing, error detection, medium access control (MAC) sub-layer • Physical Layer – Moves bits – Bit synchronization, modulation & demodulation, physical connections
  • 14. ©2015 Patrick Tague 14 Internet Layering • Layered protocols have been the basis of network design for decades • Layers work great in some scenarios
  • 15. ©2015 Patrick Tague 15 Layering in Wireless Application Transport Network Link Physical Wireless Whatever • Below a certain point, things can be designed for wireless communication • Above that point, the medium doesn't matter… – Or does it? – Or should it?
  • 16. ©2015 Patrick Tague 16 What types of wireless networks are we going to talk about?
  • 17. ©2015 Patrick Tague 17 Wireless Internet Wireless Networks Telecommunications Enterprise Wireless Ad Hoc / Mesh Vehicular Networks Sensing / Control Systems And more...
  • 18. ©2015 Patrick Tague 18 Access Network WLAN Systems • Almost every WLAN system in existence uses the IEEE 802.11 “WiFi” standard – 802.11 defines lower-layer services (physical, link, MAC layer) for WLAN connectivity, access, and services Internet Enterprise Intranet
  • 19. ©2015 Patrick Tague 19 Telecom/Mobile Networks • Mobile networks have evolved from providing voice connectivity to the PSTN to providing all forms of connectivity to the Internet – AMPS first introduced in 1978 – GSM developed through the 1990s- 2000s – 3G/4G standards emerged with full data support, looking more like a WLAN/WMAN
  • 20. ©2015 Patrick Tague 20 Personal Area Networks • Local “device-to-device” networking using the 802.15 family of standards • Typically short range, few devices, low power • Commonly used for home, personal, office
  • 21. ©2015 Patrick Tague 21 Mobile Ad Hoc Networks • Mobile ad hoc networks (MANETs) typically connect local/offline devices with no Internet connection – Device-to-device, no APs – Peer-to-peer data exchange – In-network services only – Sometimes involve humans, but sometimes don't – No central server – No authority – No backhaul
  • 22. ©2015 Patrick Tague 22 Wireless Mesh Networks • Mesh networks provide multi-hop wireless connections to a backhaul – Mesh routers can be fixed or mobile, serve as multi-hop Internet connectivity – Hosts are typically mobile, hand-off to mesh routers
  • 23. ©2015 Patrick Tague 23 Sensor Networks • Mostly use ZigBee (based on 802.15.4) or WiFi depending on requirements – Sensor networks are typically closer to a mesh architecture: multi-hop to one/many APs – Intermittent low-rate traffic, mostly sensor readings from nodes back to APs – Heavily resource-constrained – Designed for life-time
  • 24. ©2015 Patrick Tague 24 Home Networks • In-home networked systems (Smart Home) – Entertainment/media – Appliances, etc. • Home energy networks – The home side of the smart grid, between the smart meter and user – Mostly wireless (802.15.4, etc.)
  • 25. ©2015 Patrick Tague 25 VANETs • VANET = Vehicular ad hoc network – Cars talk amongst each other and with roadside infrastructure • Applications of interest: – Automated driver safety management – Passive road quality / condition monitoring – In-car entertainment – Navigation services – Context-aware rec's: • “This alternate route would be faster, and it would go past your favorite Primanti Bros.”
  • 26. ©2015 Patrick Tague 26 Smart Grid • The Smart Grid incorporates hybrid wired/wireless communications into the energy grid • Applications of interest: – Dynamic pricing – Improved efficiency – Home energy mgmt. – Disaster/outage recovery
  • 27. ©2015 Patrick Tague 27 What is Wireless Network Security? Authenticity Secrecy ? A probabilistic guarantee that a wireless network does its job as expected, even when faced with a variety of threats
  • 28. ©2015 Patrick Tague 28 • Many different types of threats faced in wireless • Including (but not limited to) threats to: – Information content, source, etc. – Availability of wireless connectivity – Performance of network protocols – Proper use of scarce resources (energy, bandwidth, …) – Proper use of command/control messages – Correct representation of devices – … • All of these are composed of certain primitives Threats of Interest
  • 29. ©2015 Patrick Tague 29 Eavesdropping
  • 30. ©2015 Patrick Tague 30 Interference
  • 31. ©2015 Patrick Tague 31 Msg/Pkt/Signal Injection/Replay What do you think of …? Terrible! Can you speak up? Can you speak up? Can you speak up? Can you speak up?
  • 32. ©2015 Patrick Tague 32 Spoofing Trust me, I'm a doctor.
  • 33. ©2015 Patrick Tague 33 Man-in-the-Middle Attack Can you bring a Coke to Table 3? Can you bring a Diet Coke to Table 3? Diet Coke, Table 3, sure thing! Coke to Table 3, sure thing!
  • 34. ©2015 Patrick Tague 34 Resource Depletion / Wastage Please check on Table 3. Please check on Table 3. Please check on Table 3. Please check on Table 3. Please check on Table 3. Please check on Table 3. Please check on Table 3. Please check on Table 3. Please check on Table 3.
  • 35. ©2015 Patrick Tague 35 Byzantine Threats This is boring... time for sabotage! • Byzantine threat is sort of like insider threat • Basically, an authenticated / valid / trusted group member stops following the rules
  • 36. ©2015 Patrick Tague 36 And Many More... • Denial/Degradation of Service • Exploiting Composition Issues • Context Manipulation • …
  • 37. ©2015 Patrick Tague 37 Our plan. Authenticity Secrecy ? We'll study how these various threats manifest at different layers and in different types of wireless systems.
  • 38. ©2015 Patrick Tague 38 January 20: Project Discussion; OMNET++ Tutorial I