Professional Documents
Culture Documents
A1402754455 - 21915 - 15 - 2017 - Lecture-34-Wireless Security
A1402754455 - 21915 - 15 - 2017 - Lecture-34-Wireless Security
A1402754455 - 21915 - 15 - 2017 - Lecture-34-Wireless Security
05/25/20 2
Confidentiality refers to data and is provided when
only intended recipient(s) can read the data.
Anyone other than the intended recipients either
05/25/20 3
Non repudiation is a property of data and means that
the sender should not be able to falsely deny (i.e.,
repudiate) sending the data.
This property is important for electronic commerce
05/25/20 4
Availability is a property of systems where a third party
with no access should not be able to block legitimate
parties from using a resource.
There have been numerous DoS attacks; notable ones include “syn
flood,” “smurf,” “ping of death.
The “syn flood” attack creates many “halfopen” Transmission
Control Protocol (TCP) connections so that the target computer no
longer accepts any new connections.
The “smurf” attack sends an Internet Control Message Protocol
(ICMP) packet to a broadcast address resulting in a large number
of replies, flooding a local network.
05/25/20 5
Detectability
05/25/20 6
Another problem unique to mobile systems is that the resources
often are very limited.
To keep the mobile unit small and lightweight, the designers
often make compromises. The CPU speed may be an order of
magnitude or more slower than that of conventional desktop
machines.
The network bandwidth may be similarly limited.
The biggest constraint on these systems is the battery. Often
these systems run on internal batteries because AC power is not
available owing to location (e.g., being outside) or because they
are moving continually and would require a very long and
impractical extension cord.
This leaves these devices open to resource-depletion and
exhaustion attacks.
05/25/20 7
One major difference between wired and wireless
systems is the ease of physical intercept of the signal.
In wireless systems, the signal is broadcast through
05/25/20 8
A final problem we will discuss is theft of service.
While this problem has plagued computer systems
seemingly forever, wireless systems are particularly
prone to it. Normally, a system requires a user name
and password to gain access to it.
05/25/20 9
There is a whole class of war terms that originate
from the term war dialing. Back in the 1980s, before
the widespread popularity of the Internet, hackers
and crackers would search for phone numbers with
modems attached to them by using programs they
would dial every number in an exchange and listen
for the modem tones.
05/25/20 10
War walking and similar variants (e.g., war
flying) reflect different modes of
transportation. In this case, the term refers to
scanning for wireless networks by using a
lightweight computer (personal digital
assistant or palmtop or small laptop) and
walking around an area
05/25/20 11
War driving is the wireless equivalent of war dialing.
The technique involves taking a computer with a
wireless card running some detection software
[netstumbler, kismet, airsnort, wardriving] and
optionally a Global Positioning System (GPS) and
driving around a city. The softwar detects the
presence of wireless networks, and the GPS gives the
location for later reference.
05/25/20 12
One other variant that started to become popular in
2002 is war chalking, which is the practice of
marking the presence of wireless networks with chalk
either on sidewalks or on the sides of buildings.
The three symbols shown in Figure represent an open
05/25/20 13
05/25/20 14
One of the essential characteristics of mobile
computing is that the locations of the nodes change.
Mobility provides many freedoms, but it also
05/25/20 15
ad hoc networks must propagate messages from one
wireless station to the next until they reach the destination
or a border (typically the Internet).
Ad hoc networks form on the fly, without a fixed
infrastructure.
Data in ad hoc networks typically pass through several other
ad hoc nodes. Typically, there is no guarantee as to the
identity of these intermediate nodes, so “man in the middle”
attacks can be used to copy or corrupt data in transit.
Because nodes are mobile, the route between any two nodes
is dynamic, even if the endpoints are stationary.
05/25/20 16
A route between two nodes can be disabled by two
malicious nodes that share a common segment along
the route. In an ad hoc network, key routing nodes
can be disabled via a resource-exhaustion attack in
this manner.
ARP Spoofing
ARP cache posioning
05/25/20 17
One problem when using encryption or authentication is
key management, which involves creating, sharing,
storing, and revoking encryption keys.
Public key encryption is one way to avoid needing a
05/25/20 18
Reconfiguring poses another problem in ad hoc
networking.
Because ad hoc networks are, by nature, dynamic, as
05/25/20 19
The mobile environment is often more hostile than
the non mobile one.
In a non-mobile environment, physical boundaries
05/25/20 20
Electronic commerce is a prime application of and
domain for mobile computing.
The vast commercial potential for this drives the
05/25/20 21
Currently, liability issues relating to computer
security are still being determined.
Not only do computers contain potentially useful
05/25/20 22
Another aspect of electronic commerce is the
“intangibles” from public perceptions.
Companies that suffer from break-ins often are
05/25/20 23
“Man in the middle” attacks
Replay attacks
Buffer-overflow attacks
05/25/20 24