Wireless Security - Lingnan University

Download Report

Transcript Wireless Security - Lingnan University

Wireless Security
Traditional method
A computer with network card
 a cable connecting network card and
the network

User’s computer
ISP’s computer
Remote web server
1) Login to ISP
2) Assign a unique IP address
3) Send an URL
4) Convey the URL
5) Get the web page and send
it to ISP
6) Convey the Web page to user
URL
URL
ISP’s computer
URL
User’s computer
Web page
Web page
Web page
Internet
Remote web server
URL
Web
page
Web pages
User’s computer 1
URL
URL
URL
URL
Internet
Wireless router
Web page
IPS’s
computer 1
User’s computer 2
Web page
Web
pages
Web page
Web page
Remote
web server
User’s computer
Wireless router
ISP’s computer
Remote web server
1) Login to ISP
2) Assign a unique IP address
3) Assign a dummy IP address
4) Send an URL
5) Convey the URL
6) Convey the URL
7) Get the web page and send
it to ISP
8) Convey the web page
9) Distribute the web page to user
Wireless technology at
home
Infrared (IR) or Radio transmission
 e.g. remote control, cordless
computer keyboards and mouse,
stereo headsets
 Short distance, simple signals

Wireless connection
Access point with cable connection to
the network
 IEEE802.11 wireless LAN card

User’s
notebook computer
Other user’s
notebook computer
Internet
Other user’s PDA
User’s PDA
Access Point
User’s
Smart Phone
Access Point
Other users
with
wired Environment
Figure 1: Mobile Devices
other user’s
Smart Phone
IEEE802.11x standards
Developed by IEEE (Institute of
Electronic and Electrical Engineers)
 Have many standards (e.g.
IEEE802.11a,
IEEE802.11b,IEEE802.11g, etc)
 Began in 1990
 Took 7 years to complete the first
standard

Products available in the
Market
Only products of three standards
 IEEE802.11b


First product in the market
IEEE802.11a and IEEE802.11g arrive
almost simultaneously
 IEEE802.11n


finalized in 2010
comparison
IEEE802.
11b
IEEE802.
11g
IEEE802.
11a
IEEE802.
11n (Draft)
speed
11 Mbps
54 Mbps
54 Mbps
300Mbps
Frequency
2.4 GHz
2.4 GHz
5 GHz
2.4 GHz
Advantages
•
Popular
• inexpensive
Compatible
with
IEEE802.11b
Avoid
interference
with other
devices (such
as cordless
phones,
microwave
oven)
•
Faster than
version b and g
• Compatible
with b and g
Bluetooth
Low-cost, low-power
 Cover 10 meters
 Max speed: 700 Kbps.
 Use 2.4 GHz radio frequency
 Not a competitor of IEEE 802.11
 Replace cables in short distance

User Knowledge
Lack of security features in mobile
devices
 Immature wireless technology
 Security features not turned on
 Users unaware of security problems

Eavesdropping
Access Point
Attacker
User
Internet
Figure 2 Eavesdropping by attacker
Program downloading
Small memory
 More often to download program

Attacker’s computer
Performing illegal activities
URL
URL
Internet
Legitimate user’s
computer
Wireless
router
Web page
Web page
ISP’s computer
Performing illegal activities
Attacker’s mobile phone
Eavesdropping
Difficult to discover
 Can use ordinary mobile device to
attack
(e.g. notebook computer)
 Software available in public domain
 Can attack from 20 miles away

router
Attacker's
computer
Attacker’s
mobile phone
Internet
User
Remote servers
Potential thread of download
programs
Reading or writing files (such as
passwords) on the devices
 Delete files
 Connecting to other computers or
devices
 perform illegal operations (such as
hacking)

Jamming
User
Attacker
Jamming Device
Internet
Access Point
Steps in jamming
Listen to communication first
 Collect information
 Break the communication
 Impersonate the jammed user to
continue communication
Or
impersonate the server

Jamming
User
Jamming Device
User’s Access Point
Attacker’s Access Point
Attacker
Man-in-the-middle
Listen to communication
 Intercepts the message
 Modify or add data in the message
 Confidential and integrity problem

Attacker’s Notebook
User
Send a Message
Original Message
Remote servers
Intercept the message
e.g. transform one million to
David’s account
Modify the message
Send the modified
message
Modified message
e.g. transfer two million
to John’s account
Process the message
Identity of attacker
Mobile device is small (e.g. PDA)
 Difficult to detect
 Difficult to locate the attacker
