Spezifikation, Verifikation, Testtheorie
Download
Report
Transcript Spezifikation, Verifikation, Testtheorie
Information Security of
Embedded Systems
27.1.2010: remote access, wireless networks
Prof. Dr. Holger Schlingloff
Institut für Informatik
und
Fraunhofer FIRST
Structure
1. Introductory example
2. Embedded systems
engineering
1. definitions and terms
2. design principles
3. Foundations of security
1. threats, attacks, measures
2. construction of safe systems
4. Design of secure systems
1. design challenges
2. safety modelling and
assessment
3. cryptographic algorithms
Embedded Security © Prof. Dr. H. Schlingloff 2010
5. Communication of
embedded systems
1.
2.
remote access
sensor networks
6. Algorithms and
measures
1.
2.
3.
4.
digital signatures
key management
authentication
authorization
7. Formal methods for
security
1.
2.
protocol verification
logics and proof methods
27.1.2010
2
Communication of Embedded Systems
• Various wired and wireless bus systems are
being used
CAN, LIN, MOST, I2C, …
GSM, UMTS, …
WiFi, Bluetooth, …
• Security considerations
general rule: newer standards are more secure
known problems with nearly all standards
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
3
Wireless Data Communication
• History: replacement of cables
First: “make it work”
Then: specialization (application-specific)
Now: security vs. resource limitations
• Trend: All IP
coalescence of telephone and data communication
(“B3G”, “NGN”, “4G”)
data- vs. knowledge-communication, semantic net
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
4
WLAN (802.11x)
•
•
•
•
•
•
802.11 a,b (1999); 802.11 g,h(2003)
Widely used (2003 Intel Centrino)
Point-to-point and Access-point networking
Local data transfer, internet-connectivity, integration
in company or private networks
Air frequencies openly accessible (cf. mobile phones)
Threats: illegitimate foreign hard disk access,
unauthorized use of connectivity, unauthorized data
access, masking and fake identities
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
5
WLAN Security Measures
• Frequency hopping ( pseudo-random)
• SSID cloaked mode ( eavesdropping)
• MAC address control ( spoofing)
• VPN and CHAP (Server must know user passwords,
Client calculates hash key possible attacks)
• WEP ( next slide)
• WPA with EAP and TKIP
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
6
WEP
• “Wired Equivalent Privacy”, Authentication & secured
•
communication via symmetric encryption and checksums
Authentication by challenge-response; client proves
knowledge of the common key
up to 4 keys are possible; choice by client; 40 bit weak
all user (and all access points) need to know the key(s);
key exchange difficult
access point does not authentify itself to the client!
-
sending of challenges, analysing responses
denial-of-service, logoff of clients
• Checksums (CRC) instead of secure hashing
modification and generation of messages even without key!
redirection of communication (IP-address-faking)
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
7
WEP-Attack 1
• CRC-property: CRC(M M’)=CRC(M) CRC(M’)
• RC-4-property: M Key Key = M
(M|CRC(M)) Key
(M|CRC(M))
Key
(D|CRC(D))
Key =
(M+D)|CRC(M+D
)
(M|CRC(M)) Key
(D|CRC(D))
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
8
WEP-Attack 2
M’|CRC(M’)
1. M
2. (M|CRC(M)) Key
3. (M|CRC(M)) Key
(M|CRC(M))
(M’|CRC(M’))
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
9
WPA
• WiFi Protected Access
• 128 bit, AES/TKIP (temporal key integrity protocol)
message integrity code (MIC)
sequence numbering against replay-attacks
key management, key mixing, quasi asymmetric encryption
master key, session keys, key renewal
• EAP (extensible authentication protocol)
password-based, certificate-based, SIM-based
forwarding of requests to a designated server
still no authentication of server! ( PEAP)
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
10
Sensor Networks
• Network of small, cheap, low-power nodes
e.g.
e.g.
e.g.
e.g.
earthquake early warning system
ambient assisted living
wireless controller network
logistics routing
Construction of threat scenarios?
• Self-organization
new nodes must integrate into the network
the network must be able to build “trust”
• Several emerging radio technologies
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
11
Bluetooth Security
• Replacement of IrDA
• Bluetooth profiles (> 30)
headset, AV remote control, telephony, obj
exchange, ftp, serial, lan, pan, health devices…
• Security mechanisms
visibility restrictions (“non-discoverable”)
pairing via passkey or PIN
unit keys
encrypted communication
frequency hopping
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
12
Bluetooth Security
http://grouper.ieee.org/groups/1451/5/Comparison%20of%20PHY/Bluetooth_24Security_Paper.pdf
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
13
Vulnerabilities and Attacks
• Passkey for headsets: 1234 or 0000
• Default discoverability
• Pairing in public areas
mobile phone always accepts a basic L2CAP connection request
without acceptance of the user
• Scanning for bluetooth addresses
MAC address ranges of devices are known
• Eavesdropping air frequencies
Pseudo-random frequency hopping scheme
• Reading passkeys from compromised devices
• Unauthorized access to information on devices
http://www.securityfocus.com/infocus/1830
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
14
• Public “Blue Kiosk”
vulnerability: display of
device by name only
• Stack overflow attacks
vCard
file names in File Transfer or
Object Push
• Activating the microphone
• Tracking and positioning attacks
triangulation
antenna extensions
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
15
ZigBee
http://www.zigbee.org/imwp/idms/popups/pop_download.asp?contentID=9436
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
16
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
17
• Infrastructure security
network access; keys installed in a trusted environment
integrity of packet routing
• Application data security
message integrity
authentication
data encryption
• Configurability of security
memory and computational constraints
Embedded Security © Prof. Dr. H. Schlingloff 2010
27.1.2010
18