620 likes | 639 Views
CS 535 – Wireless Network Security Introduction , Wireless Networks, Security Threats and Services. Albert Levi Sabancı University. Wireless Network Security. Needs introduction to Wireless Communication and Wireless Networks Security Threats and Services Cryptography.
E N D
CS 535 – Wireless Network SecurityIntroduction, Wireless Networks, Security Threats and Services Albert Levi Sabancı University
Wireless Network Security • Needs introduction to • Wireless Communication and Wireless Networks • Security Threats and Services • Cryptography
Wireless Communication Basics • No Link • Electromagnetic (Radio) waves • Sinusoidal current through an antenna (transmitter) • Fields induce current in the receiving antenna • Travelling speed is the speed of the light • 3x108 m/s • Unidirectional vs. Onmidirectional • Now: Some Wireless Comm. Details from Rappaport
Radio Propagation • Ideal world • "free space" radio wave propagation • No obstacles, in all directions or point to point • Real World • There are obstacles and related problems • Reflection, diffraction and scattering • Cause signal distortions, signal fades
Wave propagation in real world through obstacles • Reflection occurs when the wave hits a very large object (big buildings, surface of earth) • The wave gets reflected • Diffraction occurs when a wave hits an impenetrable object, making it to bend at the edges and propagate in different directions (even behind the obstacle) • Scattering occurs when a wave travels through a medium containing small and high amount of objects ( example trees).
Multipath • Multipath occurs when there are multiple signal propagation paths • the actual received signal level is vector sum of all the signals received from any direction or angle of arrival • Reflection, Diffraction and Scattering cause multipath • Cause fading if several signals cancel out
Path Loss or Attenuation • Power of wireless transmission reduces because of • terrain contours (rough surfaces are bad) • Environmental setting (urban areas, vegetation and foliage) • Moist air and rain • Distance between transmitter and receiver • Depends also on the wavelength: • Long wavelength waves (low frequency) have less loss • Short wavelength waves (high frequency) have more loss
Fading and Interference • Fast fading • rapid fluctuations in amplitude and phase due to multi-path propagation resulting in interference of multiple copies of the same transmitted signal arriving at the receiver • Slow fading • may last for several seconds or minutes • mainly due to absorption of the energy by objects hit • Interference • Different signals may get into each other • Kind of a noise
Thermal Noise • Johnson–Nyquist noise (thermal noise, Johnson noise, or Nyquist noise) is the electronic noise generated by the thermal agitation of the charge carriers (usually the electrons) inside an electrical conductor at equilibrium, which happens regardless of any applied voltage. • From wikipedia • Do not get frustrated if you did not understand anything • Just see that this noise is natural and inevitably exists • However, if you increase the power, it becomes less effective • The amplitude of the signal is almost Gaussian probability density function.
Frequency Spectrum Allocation • Different frequency bands are used for different applications and carriers (companies) • Very limited and valuable resource • Allocation is done by auctioning to the highest bidder • Some frequencies are not allocated at all • for example ISM (industrial, scientific and medical)
Wireless Communication Characteristics - Summary • Wireless communication is achieved through electromagnetic waves in the air • So anybody with an antenna can receive the signal • Wireless communication interacts with the environment • path loss, attenuation, interference, blockage • Physical Limitations • Quality of communication affected by noise • Bottomline: Error rate is higher as compared wired communication
Wireless Networking Architecture • Layered structure (remember OSI and TCP/IP) • Not a fixed reference model but we have similar problems and layers as in wired networks • But the nature of the problems depends on the wireless network type • The main and common layer is the MAC (Medium Access Control) layer • How multiple stations share the same communication medium
Transmission medium is broadcast Can be accessed by anyone If everybody sends at the same time, then communication becomes full of collisions Access to the channel must be controlled in such a way to: maximize throughput minimize waiting time Multiple Access Techniques Methods that determine how the medium is accessed such that the channel is shared between multiple participants
Multiple Access Techniques • We need to separate the users • 3 domains • Frequency • Time • Space • Several methods are proposed
FDMA – Frequency Division Multiple Access • Users are separated in frequency domain • Each station has its own frequency band, separated by guard bands to eliminate interchannel interference • Receivers tune to the right frequency • Number of frequencies is limited • Main drawback is under-utilization of the frequency spectrum
TDMA – Time Division Multiple Access • Users transmit data on same frequency, but at different times • Channel is divided into time slots • Users may use the full channel or may be given different amounts of bandwidth • Requires time synchronization among the users in the networks • which is not so preferred due to overhead • Multipath interference may cause problems if some signals arrive late using another user’s time slot • If the users do not use the channel for the entire slot, under-utilization occurs
CDMA – Code Division Multiple Access • Was the rival of GSM in the USA • Users are separated by both frequency and time • Actually much more complex than that • Data are converted into some codes during transmission • Receiver decodes by the inverse process • No need for all stations to synchronize • Some people says secure • But I think “security by obscurity” has no value
FHSS – Frequency Hopping Spread Spectrum • Basic idea behind spread spectrum • Transmitter uses several frequencies to transmit a signal in a synchronized way with the receiver • FHSS • Transmitter hops between available frequencies according to a predefined order • Fixed intervals • Transmitter operates in synchronization and pre-agreement with the receiver • i.e. receiver, hopping between frequencies in synchronization with transmitter, picks up message
FHSS - Bonus • Any security implications of spread spectrum? • Hint: Did you watch the movie “Catch me if you can”?
SDMA – Space Division Multiple Access • Users are separated in space domain (geographical) • Several users use the same frequency and time slot • They differ in the spatial area in which the signals are transmitted and received • via the use of smart directional antennas • or by selecting the power levels and positions of the antennas to serve only in a particular area • In this way different areas can be served using the same frequency • but one should expect increase in co-channel interference from adjacent co-channel cells
Different Types of Wireless Networks • Cellular Networks • Wireless LANs (IEEE 802.11 series) • MANETs (Mobile Ad hoc NETworks) • Sensor Networks • Wireless Mesh Networks • Bluetooth • VANETs (Vehicular Ad hoc NETworks)
Cellular Networks • Main idea • Frequency is limited so that we have to reuse it in several places • Key concept: frequency reused by dividing the area covered by a cellular network in cells
Features of Cellular Networks • Wide coverage • Reuse frequencies as much as needed • Although number of users per cell is limited by the channels in the cell, the entire network can serve very large number of users • Intelligent cell formations are needed. • Any ideas for TEM and İstiklal street? • Deployment is costly • One base station per cell • Wired communication among the base stations and connectivity to PSTN (Public Switched Telephone Network) • But still not as costly as a PSTN with the same coverage
Cellular Networks – Handoff (Handover) • Definition: Transition of a mobile user from one base station to another as it travels from one cell to another • May cause call drops if the new cell is unavailable • Was very hot research topic in late 90’s and early 00’s
terminal association request association response beacon • MAC header • timestamp • beacon interval • capability info • SSID (network name) • supported data rates • radio parameters • power slave flags Introduction to WLANs scanning on each channel “connected” AP
Introduction to WLANs Internet AP
WLAN - Two Modes of Operation • Infrastructure mode • Fixed access point connected to the wired infrastructure • Mobile stations communicating with the access point • Ad hoc mode • Mobile stations communicate with each other through the access point
WLAN Standards • IEEE 802.11 • family of standards for wireless local area network computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) • 5 GHz and 2.4 GHz public spectrum bands (mostly).
MANETs (Mobile Ad Hoc Networks) • Network is self-configuring • No fixed infrastructure • Network topology may change rapidly and unpredictably • Multi-hop communication among the users • Cooperation needed • Several RFCs on MANETs
Sensor Networks • Sensor nodes • low cost small devices, able to sense the environment (temperature, light, humidity, etc.), report sensed data using wireless communication • Nodes are tiny • Limited memory, computational power, energy • Reports obtained by a base station (a.k.a. sink) • Sensor networks • A large number of sensors (static or mobile), distributed in an ad hoc manner over an area • Nodes cooperate: communicate via multi-hop wireless communication, some nodes aggregate data • No fixed infrastructure (kind of an ad hoc network) • Applications • battlefield surveillance, medical monitoring, biological detection, habitat monitoring, home security, disaster recovery
sink A Sample Sensor Network
Wireless Mesh Networks (WMNs) • Recent research area • Consist of: • a set of fixed wireless routers • a wireless backbone • a set of wireless clients. • Can be integrated with other types of networks via gateways • such as wired (Internet), cellular or sensors networks
Transit Access Point ( TAP ) Mesh Networks
WMN Applications • Community and neighborhood networking • Broadband home networking • Surveillance systems
Bluetooth • Industrial specification for wireless personal area networks (PANs) • Standardized by IEEE (IEEE 802.15.1) • What does Bluetooth provide? Why do we need a PAN? • exchange information between devices like mobile phones, tablets, laptops, PCs, printers, digital cameras, etc. • Cable-free computing environment • Main communication infrastructure for IoT devices • Replacement for infrared (remotes) • Replacement for any type serial communication interface (medical equipment, test devices, etc.) • Range: 1 -100 meters • Data Rate • Version 1.2: 1 Mbit/s • Version 2.0, 2.1: 3 Mbit/s • Version 3.0, 4.0, 4.1 (uses 802.11 technologies), 4.2 • Version 5 (2016): range*4, speed*2 (tradeoff scheme)
VANETs (Vehicular Ad Hoc Networks) • As name implies • An ad hoc network in which the nodes are vehicles • May also have some roadside nodes
Vehicular networks: why? • Combat the awful side-effects of road traffic • In the EU, around 40,000 people die yearly on the roads; more than 1.5 millions are injured • Traffic jams generate a tremendous waste of time and of fuel • Most of these problems can be solved by providing appropriate information to the driver or to the vehicle
VANETs • Goals • Promote safety and efficiency • Cars will have onboard equipment equipped with GPS • tied in in-car sensors and safety systems to get safety related information • Cars can communicate with the roadside infrastructure • to conduct electronic payments • monitor traffic, • send updates • Applications • congestion detection, collision alert, deceleration warning, road hazard warning, toll collection
Mostly important for information and network security What security is about in general? • Security is about protection of assets • D. Gollmann, Computer Security, Wiley • Prevention • take measures that prevent your assets from being damaged (or stolen) • Detection • take measures so that you can detect when, how, and by whom an asset has been damaged • Reaction • take measures so that you can recover your assets
Services, Mechanisms, Attacks • 3 aspects of information security: • security attacks (and threats) • actions that compromise security • security services • services against these attacks and threats • security mechanisms • used by services • e.g. secrecy is a service, encryption (a.k.a. encipherment) is a mechanism
Attacks • Attacks on computing systems • break-in to destroy information • break-in to steal information • blocking to operate properly • malicious software • wide spectrum of problems
Attacks • Network Security • Active attacks • Passive attacks • Passive attacks • interception of the messages • What can the attacker do? • use information internally • hard to understand • release the content • can be understood • traffic analysis • hard to avoid
Attacks • Active attacks • Attacker actively manipulates the communication • Masquerade • pretend as someone else • In order to get more privileges • Fabrication • create a bogus message • Replay • passively capture data and send later • Denial-of-service • Blocking the normal operation of servers, end users, or network