Mobitex security issues
|
|
|
- Myra Woods
- 10 years ago
- Views:
Transcription
1 Mobitex security issues olleb - [email protected]
2 Introduction The Mobitex wireless networking standard was developed jointly by Ericsson and the Swedish national telephone company nearly 30 years ago at a time when wireless networking was in its infancy. It specifies not just a wireless wide-area networking standard but extends to a hierarchal, centrally managed packet switched data network designed for national coverage. Since then it has undergone several major revisions, increasing wireless throughput and adding features such as power-saving and international roaming. According to the Mobitex Association[1] there are 30 networks operational on 5 different continents, two thirds of which are open commercial networks. This paper will attempt to shed some light on how Mobitex networks actually work focusing on the air interface and security features such as subscriber identification and access controls. Previous work Not much is known about Mobitex networks in the security community, despite the many business applications that use this technology. What little information exists is based on an anonymous Usenet posting made in 1997[2] detailing the reverse-engineering of the bit-scrambling and blockcoding in the Mobitex air interface, basically describing OSI layer 1 of the Mobitex networking stack. This paper builds on that previous work and attempts to document the frame format of layer 2 (the ROSI protocol), a work that admittedly is far from complete. Parts of layer 3 will also be described, not in detail but to provide an understanding of the security challenges the Mobitex protocol stack presents. The Mobitex network stack The Mobitex networking stack roughly corresponds to OSI layers 1 through 4, although the official layer 4 protocols (MTP/1) were specified[3] several years after the initial Mobitex launch and seem to have gained little traction with the Mobitex application developer community. Layer 1 The physical radio layer is 8kbaud GMSK with bit-scrambling as described in [2]. The link layer protocol is called ROSI and each frame is preceded by a frame header. The header contains the base station ID and 4 flag bits encoded as two octets with a (12,8) hamming code. If bit 2 in the flag field is set, then the frame header is a roaming header transmitted by base stations as a channel marker to aid mobile stations searching for an active channel. This roaming header is not followed by an actual ROSI frame. The ROSI frame is transmitted using one or more blocks of 18 data bytes + 16 bit CRC encoded using a (12,8) hamming code and interleaved as described in [2]. Layer 2 The first block in a frame contains the ROSI header where the recipient MAN address (or address of a network group), a 3-bit flag field, the 5-bit frame type and the frame length (by number of blocks) are specified. Byte 4 in the ROSI header is type specific but in most frame types contains a field specifying how many bytes are in the last block of the frame and a sequence number used for frame acknowledgment, see Fig. 1. Exceptions to this are the SVP, FRI and TST channel management frames which use byte 4 for other purposes.
3 The rest of the first block (bytes 6 through 17) can be considered the start of the frame payload data, the structure of which depends entirely on the frame type. The ROSI frame types are listed in table 1 where deprecated values associated with features present in the original (1200baud) Mobitex specification have been colored grey. Fig. 1 The initial block of a ROSI frame Destination MAN Address (or group) Flags Type BILB Seq. # Block count Type dependent data (bytes 6-17) Table 1 ROSI frame types Frame type Value MRM 0x01 Mobitex packet (MPAK) ACK 0x02 Acknowledgement Description NACK 0x03 Negative Acknowledgement REB 0x04 Request re-send of selected blocks RES 0x05 Re-send of selected blocks ABD 0x06 Access request for data traffic ABT 0x07 Access request for voice traffic ABL 0x08 Access request for emergency traffic ATD 0x09 Access granted for data traffic ATT 0x0a Access granted for voice traffic ATL 0x0b Access granted for emergency traffic BKD 0x0c Change channel for data traffic BKT 0x0d Change channel for voice traffic FRI 0x0e Channel free marker SVP 0x0f Sweep frame (network parameters) TST 0x10 Silence order (channel reservation) AKT 0x11 Activity check NAT 0x12 Access not granted for voice traffic BBT 0x13 Change base station for voice traffic
4 The ROSI protocol uses a reserve-slotted ALOHA access mechanism, meaning the base station sends a FRI frame indicating it is ready to receive traffic from mobile stations in a number of time slots. Mobile stations can then choose a time slot at random and send a frame upstream. The base station can revoke the FRI status at any time by sending a silence order (TST) frame, for example to prevent interference with a mobile station already transmitting on the upstream channel. Should a mobile station need to send a large frame, such as an MRM frame containing a large data packet, it can reserve time on the upstream channel by sending an access request (ABD) frame with information about the size of the large frame. Re-sends of missed or incompletely received frames are handled by positive or negative acknowledgement of received frames (ACK/NACK) and requests to repeat certain blocks of a particular frame (REB/RES). The sweep frame (SVP) is used by the base station to broadcast network parameters such as adjacent channels and signal threshold values. The activity check (AKT) frame is sent by a base station to determine if a mobile station is still active, the mobile station will send an acknowledgement (ACK) frame as a response. Layer 3 The Mobitex packet switching network relays Mobitex packets or MPAKs. The MPAK is well documented in the open MIS document[4] available online from Mobitex Technology[5] who currently own the Mobitex specification. There are two classes of MPAK, the packet switched subscriber communications class (PSUBCOM) used to carry application data between subscribers, and the data terminal service communications class (DTESERV) which defines packet types used for network signaling between Mobitex terminals and Mobitex network nodes. The MPAK header contains the sender MAN address, the destination MAN address, 8 bits of flags and the packet class and type encoded in 8 bits for a total of 8 bytes. Packet type-dependent data follows the header, unless the SENDLIST flag (bit 3) has been set in which case a 22 byte address list is inserted between the MPAK header and type-dependent data. Table 2 shows the different PSUBCOM class packet types that carry application data in the Mobitex packet switched network. Table 2 PSUBCOM packet types Packet type TEXT DATA STATUS HPDATA EXTPAK Description Text formatted to be output on a printer or display at the terminal. Arbitrary data of application-defined encoding. A one-byte status code, the meaning of which is defined by the application. Protocol identified by an 8-bit ID assigned, user/operator defined. Transparent data to be exchanged with an external telecommunications network.
5 Mobitex security issues Several security issues with the Mobitex wireless protocol have been identified. These issues, concerning all aspects of security, are caused by the goals of the Mobitex designers who were much more concerned with problems such as naturally occurring radio interference and network performance than with any aspect of information security. Confidentiality issues The Velocita Wireless[6] Mobitex System Overview document explains in great detail how the Mobitex framing, error correction and interleaving works. Then it concludes: Hence, eavesdropping on user data is a difficult task. One would require a great deal of experience, as well as sophisticated equipment to be able to break into each packet generation/transmission process. The only part of the air-interface not described in sufficient detail in that document to be able to eavesdrop on user traffic is the bit-scrambling routine. This has been shown in [2] to be trivially reverse-engineered and the details had as such been publicly known for several years at the time of writing the Velocita document. This kind of misleading information from Mobitex network operators is not that uncommon. Many times Mobitex is touted as a secure network protocol when it was never designed with any other security than high availability in mind. To their credit, Velocita Wireless does go on to recommend that customers assess their security needs and implement application level security features such as encryption later in the same chapter. Intercepting Mobitex user traffic by decoding individual Mobitex frame blocks has been done as early as 1997[2] but to the author's knowledge nobody has extended this work to decode the actual layer 1-3 Mobitex network traffic. The Toolcrypt.org Mobitex network monitor[8] project attempts to place full Mobitex protocol monitoring abilities in the hands of security professionals with little experience of wireless technology and using cheap, off the shelf radio equipment. By utilising the sophisticated A/D-converter of the average PC sound-card and feeding raw audio from an inexpensive commercial scanner into it, anyone can decode and monitor Mobitex networks in software running on a consumer PC. Integrity and authentication issues Since Mobitex was developed by the telecommunications industry, the subscriber identity features are similar to those used in mobile telephony at the time. But because this was before rampant tollfraud in the 1G mobile telephony networks necessitated the use of strong identification, the subscriber identity mechanisms in Mobitex are rather weak. The MAN address of a particular subscriber is tied to the ESN of the mobile terminal. This might have been enough had the designers invented some kind of challenge-response scheme, but the ESN is unfortunately just sent in DTESERV packets (ACTIVE, ROAM, ESNINFO, etc.) as an authenticating token. No protections against replay attacks are implemented. If the base station receives an invalid authentication token or the mobile station doesn't respond to ESN queries, the base station will send a DIE DTESERV packet to the mobile station. The mobile station should then immediately go off the air. Personal subscriptions that can be moved between different mobile terminals are protected by an 8 character password which is also sent in clear text when logging in.
6 Because of this weak authentication scheme, any terminal that can be monitored (i.e. attacker is within radio range) can also be impersonated at the attackers discretion (i.e. at any time in the future). The attacker may even force legitimate terminals to go off-air by spoofing base station traffic and sending a DIE DTESERV packet. Mobitex packets do not contain any type of message authentication or integrity protection, making spoofing attacks even more simple. An attacker within base station coverage can send individual packets upstream that appear to be from another wireless terminal using that base station, effectively hijacking its connection without needing to authenticate to the base station at all. Clearly authentication needs to be addressed at the application layer by developers of Mobitex applications. Availability issues Most often when using the word security or secure in their marketing, Mobitex network operators are talking about the supposed high-availability of the Mobitex system. Unfortunately this high-availability goal of the design only manages to protect system traffic against temporary environmental interference and some equipment malfunctions. It is still trivial for a determined adversary to disrupt Mobitex communications either selectively or completely. Normal wide-band jamming transmitters can for example be used to deny a Mobitex wireless terminal access to the network, a technique that could be used quite effectively against security alarm systems. Selective denial of service is also possible by spoofing base station traffic and getting a wireless terminal to choose your channel or simply drowning out the legitimate base station traffic with a sufficiently high-powered transmitter. Individual Mobitex terminals could then be forced off the network using the security features of the Mobitex protocol (DTESERV DIE packet, etc.). Conclusions The Mobitex wireless network is not secure and has large problems with its confidentiality, integrity and availability protections. In fact, Mobitex wireless networks provide no more protection against an attacker than an unencrypted IEEE WiFi network. Application developers and organisations relying on Mobitex wireless terminals for business applications should be made aware of these risks and start working on developing countermeasures at the application level. Future work Implementing a Mobitex wireless terminal and/or base station using software defined radio hardware such as the USRP[9] would be possible and presents an interesting path for further research of Mobitex wireless networking. Extending the MIS MPAK specification to include message authentication features and designing better subscriber authentication features to replace the ESN and password checks might also be a worthwhile exercise.
7 Bibliography [1] - The Mobitex Association [2] Message-ID: <[email protected]> From [email protected] Fri Mar 14 18:12: Newsgroups: rec.radio.scanner Subject: Fun mobitex stuff [3] Ericsson AB - Mobitex Transport Protocol 1 (MTP/1), Doc.no: 1914-FAY [4] Ericsson AB - Mobitex Interface Specification Open Version, Doc.no: 1551-CNH [5] - Mobitex Technology AB [6] - Velocita Wireless L.L.C. [7] Velocita Wireless - Mobitex System Overview, Edition 1.2, 2005 [8] [9] The Universal Software Radio Peripheral, Ettus Research L.L.C. -
Mobitex Network Security
Mobitex Network Security olleb of the Toolcrypt Group [email protected] Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators
Mobitex Network Security
Mobitex Network Security olleb of the Toolcrypt Group [email protected] Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Kingpin, @stake, January 2002
Research In Motion s BlackBerry Wireless E-Mail Devices: Decoding the Mobitex protocol Kingpin, @stake, January 2002 1 Introduction The Research In Motion BlackBerry wireless e-mail device product line
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM
CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM Instructor: Alex C. Snoeren Name SOLUTIONS Student ID Question Score Points 1 15 15 2 35 35 3 25 25 4 15 15 5 10 10 Total 100 100 This exam is
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
High-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
Supporting ZDOs with the XBee API
Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Data Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected] 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
Project 25 Security Services Overview
Project 25 Security Services Overview Bill Janky Director, System Design Harris Corporation 1 Agenda Overview of P25 Security Services What s new; What s coming Other topics 2 If you re in Public Safety...
How To Secure My Data
How To Secure My Data What to Protect??? DATA Data At Rest Data at Rest Examples Lost Infected Easily Used as Backup Lent to others Data Corruptions more common Stolen Left at airports, on trains etc Hard
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Chapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Token-ring local area network management
Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Computer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
Alarms of Stream MultiScreen monitoring system
STREAM LABS Alarms of Stream MultiScreen monitoring system Version 1.0, June 2013. Version history Version Author Comments 1.0 Krupkin V. Initial version of document. Alarms for MPEG2 TS, RTMP, HLS, MMS,
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
How To Understand The Differences Between A Fax And A Fax On A G3 Network
The Fax on IP Networks White Paper February 2011 2 The Fax on IP Networks Contents Overview... 3 Group 3 Fax Technology... 4 G.711 Fax Pass-Through... 5 T.38 IP Fax Relay... 6 Network Design Considerations...
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Operating Systems and Computer Networks / Datenverarbeitung 2 / Data Processing 2
Computer Networks / Datenverarbeitung 2 / Data Processing 2 Exercise 7: Network Transmission & Code Efficiency Faculty of Question 7.1 Code Efficiency Block Length S S S Y Y O N N H 5 characters S T X
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Network Security in Practice
Network Security in Practice Practices of Network Security ccess control: firewalls ttacks and counter measures Security protocol case studies Kai Shen 12/8/2014 CSC 257/457 - Fall 2014 1 12/8/2014 CSC
APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Public Review Draft. ASHRAE Standard
BSR/ASHRAE Addendum g to ANSI/ASHRAE Standard 135-2004 Public Review Draft ASHRAE Standard Proposed Addendum g to Standard 135-2004, BACnet A Data Communication Protocol for Building Automation and Control
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
