1 / 1

Sponsor:

Sponsor:. MN. HA. AT. CN. Start Return Routability. H. o. T. I. C. o. T. I. H. o. T. I. T. o. C. T. o. H. T. o. H. Bind Update (Sniffed by AT along the way). Bind Ack Spoofed by AT. Restart Return Routability. Bind Ack. Silently Discard Bind Ack.

Download Presentation

Sponsor:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sponsor: MN HA AT CN Start Return Routability H o T I C o T I H o T I T o C T o H T o H Bind Update (Sniffed by AT along the way) Bind Ack Spoofed by AT Restart Return Routability Bind Ack Silently Discard Bind Ack Northwestern Lab for Internet and Security Technology (LIST)Prasad Narayana, Sagar Vemuri, Yanmei Zhang, Yao Zhao, Nikos Liveris, Yan Chen, Hai Zhou, Judy Fu{p-narayana, s-vemuri, yanmei-zhang, jingo, n-liveris2, ychen, haizhou}@northwestern.edu, judy.fu@motorola.comhttp://list.cs.northwestern.edu/ Vulnerability Analysis of WiMAX Network Protocols 1. 2. Motivation Related Work • IEEE 802.16 technology, popularly called as WiMAX, with enormous backing from the industry is set to lead the broadband wireless space • Security, as always, is key for it’s functioning and growth • Security Analysis of Mobile IP and IEEE 802.16 protocols largely confined to manual analysis • Fast evolution of the 802.16 standard resulted in many incomplete (and sometimes even incorrect!) analysis 3. Our Approach Manual Analysis TLA Modeling Logic-based Analysis 4. Model of the adversary used in our analysis Work Done • Completed the outsider threat analysis of IEEE 802.16e and Mobile IP protocols • Found a vulnerability in the Return Routability of Mobile IPv6 • Powerful attack to cause a service disruption for a large number of machines in foreign networks at a small cost • No need to change the MAC layer • Implemented and tested in our lab testbed • “Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols through TLA+”, in Proc. of the Second Workshop on Secure Network Protocols (NPSec), 2006. 5. Work in Progress • Analyze the EAP protocols thoroughly, especially EAP-SIM for GSM networks and EAP-AKA for 3G, CDMA2000. • Focus on insider attacks to check protocol vulnerabilities after the authentication step To Summarize our work, manual analysis has yielded insightful scenarios whereas TLA modeling has proved very useful due to the exhaustive nature of its search method MIPv6 Return Routability Attack in action

More Related