IMPLEMENTATION OF SECURE & COST EFFECTIVE AUTHENTICATION PROCESS IN IEEE e WiMAX
|
|
|
- Angelica Wheeler
- 10 years ago
- Views:
Transcription
1 IMPLEMENTATION OF SECURE & COST EFFECTIVE AUTHENTICATION PROCESS IN IEEE e WiMAX [1] B.Sridevi, [2] M.Brindha, [3] R.Umamaheswari, [4] Dr.S.Rajaram [1] Assistant Professor, [2][3] Under Graduate, [4] Associate Professor Department of Electronics & Communication Engineering [1][2][3] Velammal College of Engineering & Technology, Madurai. [4] Thiyagarajar College of Engineering,Madurai om ABSTRACT The Mobile WiMAX IEEE e is a neoteric technology providing broadband data access to mobile and stationary users while supporting handover and roaming capabilities. In the area of security aspects, Mobile WiMAX exhibits vulnerabilities while adopting improved security architecture. Bandwidth is an additional overhead in reducing these vulnerabilities. To compensate bandwidth and security, this project focuses on reducing the security vulnerabilities in the initial network entry process and access network of the WiMAX domain with a view to reduce the memory required for key management. This paper proposes the usage of 1.Modified Diffie-Hellman algorithm and 2.Device certificate for key exchange process to provide secure authentication and 3.Compression technique to reduce the memory space and the transmission bandwidth. The e mobile WiMAX model is implemented using Qualnet and security enhancement is implemented using MATLAB.MYSQL is used as the database for Key storage. This proposed work enhances the security of the WiMAX network and reduces at least 50% of the bandwidth. KEYWORDS IEEE e,WiMAX,Vulnerabilities and security,diffie-hellman Key Exchange,Certificate,Bandwidth, Compression. 1. INTRODUCTION WiMAX, the Worldwide Interoperability for Microwave Access, defined by the IEEE standard as , is a telecommunications technology that provides wireless and broadband data transmission with high bandwidth and transmission rates between point-to-point links and full mobile cellular access. IEEE supports fixed and nomadic nodes whereas IEEE802.16e-2005 the Mobile WiMAX standard derived from Fixed WiMAX supports mobile nodes. IEEE e works in 2.3 GHz and 2.5 GHz frequency bands utilising PKM V2 key management protocol to protect the network from illicit access. The security architecture of WiMAX e is in Figure.1. The overall network may be logically divided into three parts: i. Mobile Stations (MS) or subscriber station (SS) used by the end user.i.e. the mobile devices that would like to join the Mobile WiMAX network. ii. The access service network (ASN) comprising one or more base stations and ASN gateways that form the radio access network at the edge. The ASN interfaces the BS and all-ip core network. The ASN manages radio resources, MS access, mobility, security and QoS. It acts as a relay to CSN for IP address allocation and AAA functions. iii. Connectivity service network (CSN) provides IP connectivity and all the IP core network DOI : /ijdps
2 functions. The CSN performs policy and admission control, IP address allocation, settlement and billing. CSN hosts the Mobile IP Home Agent, Authorization, Authentication and Accounting (AAA) servers, and Public Switched Telephone Network (PSTN) and VoIP gateways. The CSN is also accountable for internetworking with non-wimax networks. Figure.1. WiMAX Security Architecture From security point of view, IEEE e-2005 has advanced security features compared to IEEE e It uses privacy key management protocol version 2 (PKM V2) whereas the latter uses PKM version 1. In IEEE using PKMv1, Authorization Request message includes only the contents for SS authentication. When SS tries to establish a connection to BS, the authorization process based on RSA authentication protocol allows only BS to authenticate SS in PKMv1. There is no way to confirm whether the BS is authorized or not.. Thus, it is possible to masquerade as a Rogue BS after eavesdropping authentication related message from SS. However, in the case of Mobile WiMAX using PKMv2, possibility of Rogue BS attack is reduced. Because mutual authentication function between SS and BS is obligatory during authorization process. Also PKM V2 allows both mutual and unilateral authentication. Also it enables periodic re-authentication/reauthorization and key update. The PKMv2 provides a Message authentication scheme using HMAC or CMAC, device/user authentication using EAP methods, and confidentiality using (Advanced Encryption Scheme in counter with cipher block chaining mode) AES-CCM encryption algorithm. However, there is no guarantee that PKMv2- based Mobile WiMAX network will not have security flaws. PKMV2 based on RSA makes up for the shortcomings of PKMV1, but it does not imply that PKMV2 is absolutely safe, i.e. new attacks may occur. When an MS is switching from one sector to another, the key space is vulnerable i.e., AKs (Authentication key) and TEKs (Traffic Encryption Key) are vulnerable to brute-force attack, Men in the middle attack, replay and Denial of service etc. Therefore this paper focuses on these security vulnerabilities and analyses the memory requirement for key storage and propose their counter measures according to each network domain together with the compression of keys for improved security of the Mobile WiMAX network. This paper is organized as follows: In Section 2, Mobile WiMAX security is analysed considering various security attacks and vulnerabilities in the network. In section 3, solutions are proposed and algorithms are analysed. Finally section4 results are analysed and section 5 is concluded with a summary and discussion of future works. 2. VULNERABILITIES IN IEEE With the publication of the Mobile WiMAX amendment, most of the vulnerabilities were solved in WiMAX. This section explains an assortment of vulnerabilities found in Mobile WiMAX. The security of IEEE e was only analyzed by a few papers and [1] examined the 3-way TEK exchange and the authorization process and could not find any security leak. Also [2] analyzed the key management protocol using protocol analyzing software and did not 216
3 detect any problem. But [3] shows, in mobile WiMAX there are some unauthenticated and unencrypted management messages which threat the reliability of the system. These vulnerabilities are due to a. Unencrypted management Messages The complete management communication between MS and BS is unencrypted. If an adversary listens to the traffic, he can collect lots of information about both instances. b. Unauthenticated messages Mobile WiMAX includes some unauthenticated messages. Their forgery can constrict or even interrupt the communication between mobile station and base station Unencrypted Management Messages Most of the management messages defined in IEEE e are integrity protected. This is done by a hash or cipher based message authentication code (HMAC/CMAC) [4]. A couple of management messages are sent over the broadcast management connection. However, some messages are not covered by any authentication mechanism. In WiMAX security architecture, there is no common key for the authentication of Broad casted management messages. An adversary collecting management information can create detailed profiles about MS including the capabilities of devices and security settings associated with the base stations. Using the data offered in power reports, registration, ranging and handover messages, a listening adversary is able to determine the movement and approximate position of the MS. IEEE standard defines only a set of functions between SS and BS. It means that the security architecture given by IEEE standards does not cover intra-asn and ASN-to-CSN communication [5] [7]. So these domains become insecure and are illustrated in Figure 2. SS BS ASN-GW AA Ranging SBC negotiation Authentication and Key exchange Registration Insecure domain A Data Communications Insecure domain B Insecure domain C Secure Domain Figure.2.Access Network insecure domains 2.2. Unauthenticated Messages In Mobile WiMAX, management messages are sent in the clear. When an MS performs initial network entry, it negotiates communication parameters and settings with the BS. A lot of information like security negotiation parameters, configuration settings, mobility parameters, 217
4 power settings, vendor information, MS's capabilities etc are exchanged. However, specifically, the SBC negotiation parameters and PKM security contexts do not have any security measures to keep their confidentiality. The possibility of exposure to malicious users or outer network always exists in initial network entry process. [6] Even though Mobile WiMAX has a message authentication scheme using HMAC/CMAC codes and traffic encryption scheme using AES- CCM based on PKMv2, the security schemes are only applied to normal data traffic after initial network entry process, not to control messages during initial network entry. An attacker can easily access the security information by listening on the channel. Initial network entry consists of four processes: Initial Ranging process, SS Basic Capability (SBC) negotiation process, PKM authentication process, and registration process. Initial network entry is the most security sensitive processes in Mobile WiMAX network as it is the first gate to establish a connection to the network. Also many physical parameters, performance factors, and security contexts between SS and serving BS are determined during this process. The initial network process and MS Basic Capability negotiation is illustrated in Figure 3. After initial network entry, the management communication over the basic and primary management connections remains unencrypted (described earlier in section 2.1). As most of the management messages are sent on these connections, nearly all management information exchanged between MS and BS can be accessed by a listening adversary. SS BS ASNGW AAA 2 UL- MAP (Initial Ranging codes) Selected Ranging Codes RNG-RSP RNG-REQ RNG-RSP SBC-REQ Parameters SBC-RSP SBC negotiation Context Request Context Report Authentication Procedure PKM-REQ PKM-RSP Secure Communication --Insecure Communication Figure.3. Initial network entry process 3. PROPOSED WORK 3.1. Security Enhancement Modified Initial Network Entry Process The Initial Network Entry procedure is the first stage in establishing connection in any WiMAX network. It should not chip in any security flaw. Since key exchange is done through Diffie- 218
5 Hellman, possibility for Man in the middle attack makes the network scrawny by eavesdropping, interception and interruption of the management messages, resulting in a breach in the reliability of the entire network as it involves the transmission of unencrypted management messages. Also there is no appropriate method to secure the critical information. Hence it results in lack of confidentiality. To overcome this, it is proposed to modify the Diffie Hellman key exchange process by including Hash based authentication as illustrated in Figure.4. When MS is powered on, it firsts scans the downlink channel to determine whether it is currently in the coverage of base station. Each MS stores the list of optional parameters, such as DL frequency. MS synchronizes with the stored DL frequency of the suitable BS. Once the DL synchronization is completed, MS can listen to various control messages, from which it obtains the UL parameters. Based on these UL parameters, MS decides whether the channel is suitable or not. If the channel is suitable MS performs ranging, otherwise it again starts scanning the channel. Ranging process acquires timing and power level adjustment to maintain the UL connection with the BS. BS sends a set of ranging codes to the subscriber station for synchronization. Initial ranging procedure is started when SS receives UL-MAP message including ranging codes. BS MS Ranging codes RC i Select RC n, RC n =C a C b H (RC n ) (C a or C b ) Find RC n, Computes H(RC n ) & verify Authenticated Global parameters p, a Diffie Hellman key Exchange Figure.4. Modified initial network process 219
6 ALGORITHM-1: Ranging Process 1. BS sends ranging codes RC i where i=1,2,...n to MS i.e., RC i MS 2. MS selects a code{ RC n =C a,c b } 3. Computes H( RC n ) (C a or C b ) 4. Sends H( RC n ) (C a or C b ) to BS 5. BS receives H( RC n ) (C a or C b ) 6. if (C a or C b ) RC i then Selects corresponding code RC x Computes H(RC x ) 7. if H(RC x )== H(RC n ) then MS is authorised Starts Diffie-Hellmann Key Exchange (Proceeds as per algorithm 2) end if else Access denied end if Figure.5a Algorithm- Modified Initial Network Entry Process In the proposed model SS selects any one of the ranging codes say RC n where RC n =C a C b. If the ranging code contains two parts, SS selects any one part and sends the hashed value of the ranging code together with this. On reception BS compares the received ranging code part with the pool of ranging codes and identifies the corresponding complete ranging code. Then it hashes the ranging code and compares it with the received hashed ranging code. If it matches, common key will be shared through Diffie-Hellman key exchange. Else it will be declared as unauthorised user and access will be denied. Once the SS is authorized in further steps, it generates other global variable g and public/private key pair and then sends them to BS.BS receives a public key of SS and global variables (prime number and its primitive root). If the received key and variables are verified, BS also sends his public key to SS. Thus BS and SS can share Diffie-Hellman global variables and public key with each other through initial ranging process securely. With this key exchange, shared common key called pre-tek is generated which could be used for further encryption of ranging messages for secure communication. Therefore, the proposed method protects the SBC security parameters and PKM security contexts using the shared traffic encryption key (pre-tek) during initial network entry procedure. The algorithm for this process is illustrated in Figure.5a, 5b. ALGORITHM-2: Diffie-Hellman Key Exchange 1. BS selects Prime number p Primitive root of P i.e. a such that a<p Private Key Xa such that Xa<p 2. Computes public Key Ya=a Xa mod p 3. BS sends a,p,ya 4. MS selects Private Key Xb such that Xb<p 5. Computes public Key Yb=a Xb mod p 6. MS sends Yb to BS 7. BS and MS computes session key as Key_MS=a yb mod p ; Key_BS=a ya mod p such that Key_MS=KEY_BS Figure.5a Algorithm- Modified Initial Network Entry Process 220
7 3.1.2 Modified Access Network Security PKM security architecture covers only the traffic between mobile station and base station. WiMAX Forum assumes that ASN network is trusted and AAA connections between ASN and CSN may be protected with IPSec tunnel. However, there are a lot of possibilities for new security holes to happen including various zero-day attacks. Moreover, IPSec requires additional software and hardware facilities for supporting whole Mobile WiMAX domains. So this paper proposes a device certificate based key exchange method. All devices in mobile WiMAX network have device certificate. Also, it is assumed that all devices are certified by public authority and certificates can be verified through certificate chain. All devices have a certificate chain together with their own certificate. It is illustrated in Figure.6 and the algorithm is illustrated in Figure.7 and 8. BS ASN GW CSN E asn-tek (con-req) E ku-asn (asn- tek*) Timestamp Auth_Cert E asn-tek (con-rly) Auth_cert E csn-tek (con-req) E ku-csn (csn- tek*) Timestamp Auth_Cert E csn-tek (con-rly) Auth_cert Figure.6. Modified Access Network Entry BS and ASN-GW should generate a secret session key in order to exchange message with ASN-GW and CSN. BS, ASN-GW, and CSN have the certificate chain. To exchange message, BS encrypts the message with session key generated (ASN-TEK) padded with the time stamp and the authority certificate. A common key would not completely protect the integrity of the message as the key shared by the mobile station can be generated by unauthenticated BS. Consequently in addition with the encrypted message, the session key is also encrypted with the public key of ASN-GW and padded with the message. When ASN-GW receives the message it verifies the authority certificate and then checks the timestamp for validity. 221
8 ALGORITHM-3: Access Service Network // Between ASN_GW and BS // 1. BS,ASNGW gets the certificate chain from Authority cert_chain = {Auth_cert,BS_cert,ASNGW_cert,CSN_cert} 2. BS sends ASN_GW E asn-tek (con-req) E ku-asn (asn-tek*) Timestamp Auth_cert 3. ASN_GW verifies timestamp & authority certificate 4. if verified then Computes D kr-asn(asn-tek*) Decompress asn-tek* Computes D asn-tek (req) else Access denied end if 5. ASN_GW sends BS, E asn-tek (con-rly) Auth_cert 6. BS verifies authority certificate 7. if Verified then Decrypt reply as D asn-tek (rly) else Deny access endif 8. Connection Established Figure.7. Algorithm-Access Service Network Security ALGORITHM-4: Connectivity Service Network // Between ASN_GW and CSN // 1. ASNGW, CSN gets the certificate chain from Authoritycert_chain ={Auth_cert,BS_cert,ASNGW_cert,CSN_cert} 2. ASN_GW sends CSN E csn-tek (con-req) E ku-csn (csn-tek*) Timestamp Auth_cert 3.CSN verifies timestamp & authority certificate 4. if verified then Computes D kr-csn(csn-tek*) Decompress csn-tek* Computes D csn-tek (req) else Access denied end if 5. CSN sends ASN_GW, E csn-tek (con-rly) Auth_cert 6. ASN_GW verifies authority certificate 7. if Verified then Decrypt reply as D csn-tek (rly) else Deny access endif 8. Connection Established * compressed key Figure.8. Algorithm - Connectivity Service Network. On successful verification ASN-GW decrypts the message and ASN-TEK key. ASN-GW replies by encrypting the connection reply message with the ASN-TEK padded with the authority certificate. Similarly for Connectivity service network, CSN-TEK is generated as 222
9 common encryption key. Thus the secret session key eliminates the insecurity existing between BS-ASN-GW and ASN-GW-CSN. Hence a secure communication is established. To enhances the security and to reduce the authentication cost the session key is compressed (compression explained in section 3.2) and then transferred. 3.2 Authentication Cost Reduction Any secured system can be modelled as a capability-based access control system in which each user is given a set of secret keys to access the granted resources. In resource-constrained devices, the design is sensitive to memory or key storage cost. Data compression saves the transmission time and disk space and more importantly it strengthens the cryptographic security. To crack the cipher, cryptanalysis utilises the pattern found in the plain text. Compression reduces these patterns in the plaintext, thereby increasing the resistance towards cryptanalysis. With a goal to minimize the maximum users' key storage and to enhance security, this paper proposes compression of the cryptographic key. In case of access network security the transferred key is encrypted whereas the buffer space required still remains the same. To reduce this, the transferred key is compressed through Huffman key compression technique and then encrypted for transmission. Huffman coding is an entropy encoding algorithm used for lossless data compression. It uses variable-length code table for encoding. Huffman coding results in prefix code for representing each symbol i.e. the bit string representing some particular symbol is never a prefix of the bit string representing any other symbol. Huffman compression expresses the most common source symbols using shorter strings of bits than are used for less common source symbols. Figure.9. Database Key storage BS compresses ASN-TEK then encrypt and pad it with the encrypted request timestamp and the authority certificate, and send it to ASN-GW.ASN-GW verifies the timestamp and certificate and then decrypt and later on decompress the message. The same procedure is repeated for 223
10 message transaction in connectivity service network. All the keys are stored in the centralised authority s database as shown in Figure.9 4. RESULTS AND ANALYSIS The developed IEEE e mobile WiMAX model using Qualnet, shown in Figure.10, represents 12 mobile nodes. Nodes 1,2,3 represents the access points. Connection between nodes 5 & 10 is through CBR and between nodes 4 & 8 is through FTP. The flags represent the mobility of the nodes. Figure.10.IEEE e mobile wimax model Figure.11 represents the Matlab-GUI implementation of the proposed network entry procedure. It indicates the authentication procedure using Hash based entity verification and Diffie Hellman Key exchange. The Base Station selects and sends three ranging codes to MS.MS selects the first code and compute the hash value and send it back to BS together with its public key. BS after verifying the identity authenticates the MS and sends it public key. With these keys both generate a common session key individually. It has been shown in the result that both the keys generated at BS and MS are identical. With this proposed approach the computation time increases from s to s and thereby increases the computational effort and security. 224
11 Figure.11.Generated Matlab GUI-Initial Network Entry Procedure In case of access network security since the authentication in based on device certificate, each user holds the certificate chain as shown in Figure.11, issued by the authority from which each user and BS can verify the authenticity of other users. Figure.12.Generated Matlab GUI-Certificate Pool 225
12 Figure.13.Generated MATLAB GUI-Modified Access Network Security Figure.13 represents the MATLAB generated GUI for the proposed access network security. It shows the various session keys and their compressed counterpart. AUTH_CERT represents the device certificate used for the authentication of the entities. REQUEST and RESPONSE indicates the connection request and response to and fro the entities which includes the encrypted message, key, certificate and the timestamp. The compression results are discussed below in Figure.14.Results shows that the actual key size 32 hexa digits in reduced to 14(ASN_TEK), 15(CSN_TEK).This reduces the memory and bandwidth required for key storage and transmission and hence the authentication cost. The compression concept has been implemented for multiple users and the resultant graph is shown in Figure.15. For 32 hex bit data compression reduces the key size varying from 5 to 16 bits. Assuming an average of 10 to 15 bits reduction for single user the graph has been plotted. From the graph it has been identified that without compression total buffer space required for 10 users is 160 bytes. But compression reduces this to more than 50% i.e.63 bytes. Compression increases the computation time to s. When the proposed work is done without compression the computation time is s whereas under existing approach it is s. Even though the computational time increases, computational effort is also increased on the other hand. From the results it has been identified that compression reduces the memory and hence the bandwidth to a minimum of 50%. 226
13 Figure.14.Generated Matlab GUI-Compression Result 1600 COMPRESSION ANALYSIS- MEMORY & BANDWIDTH REQUIREMENT M E M O R Y R E Q U IR E D ( in b y t e s ) without compression with compression NUMBER OF USERS Figure.15. Compression analysis. 5. CONCLUSION & FUTURE WORK WiMAX has taken WMAN networks to next level. It is therefore vital to explore and perk up the security aspects of such a future generation network. So this paper proposes authentication of management communication and compression as a key to improve the security of the WiMAX network. This approach reduces the possibility for Man in the middle attack, scrambling, jamming and thereby increases the security of the network. Further compression reduces the key size, saves the transmission time and disk space and more importantly it strengthens the cryptographic security. Result shows that compression reduces key buffer space to a minimum of 50% and provides ample reduction in the bandwidth. For further enhancement, our work will also be implemented in hardware using FPGA (Field Programmable Gate Array). 227
14 REFERENCES [1] Yuksel E, ( 2007) Analysis of the PKMv2 Protocol in IEEE e-2005 Using Static Analysis Informatics and Mathematical Modelling, Technical University Denmark, DTU. [2] Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka,(2007) Security Vulnerabilities 683 and Solutions in Mobile WiMAX, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.ll. [3] Taeshik Shon,1 Bonhyun Koo,1 Jong Hyuk Park,2 and Hangbae Chang3: Novel Approaches to Enhance Mobile WiMAX Security, Hindawii. [4] Prof. Pranita K. Gandhewar, Improving security in initial Network entry process of IEEE , International Journal on Computer Science and Engineering. [5] Gaurav Soni and Sandeep Kaushal, Analysis of security issues of mobile wimax e and their solutions. [6]Beth N. Komu, Mjumo Mzyece and Karim Djouani, Formal Verification of Initial Network Entry in WiMAX Networks. [7] Evren Eren, WiMAX Security Architecture Analysis and Assessment, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 6-8 September [8] Muhammad Sakibur Rahman, Mir Md. Saki Kowsar: (2009) WiMAX Security Analysis and Enhancement, 12th International Conference on Computer and Information Technology (Dhaka, Bangladesh. [9] Jam shed Hassan, Security Issues of IEEE (WiMAX) [10]Wiley, WiMAX Security and Quality of Service, A John Wiley and Sons, Ltd., Publication. Authors B.Sridevi, Assistant Professor of ECE Department of Velammal College of Engineering & Technology, Madurai, obtained her B.E., degree from A.C.C.E.T Karaikudi, Madurai Kamaraj University, Madurai and M.E. degree from Anna University, Chennai. She has 2 years of Industrial experience, 10 years of Teaching,and Research experience. Pursuing Ph.D. in Anna University, Tirunelveli in Networking. She published many research papers in International journals, national and international conferences. Her area of research includes Network Security, Wireless Networks. id: 1 [email protected] Dr.S.Rajaram working as Associate Professor of ECE Department of Thiagarajar College of Engineering, Madurai, obtained his B.E., degree Thiagarajar College of Engineering from Madurai Kamaraj Univeristy, Madurai and M.E. degree from A.C.C.E.T Karaikudi. He was awarded PhD by Madurai Kamaraj University in the field of VLSI Design. He was awarded PDF from Georgia Institute of Technology, USA in 3D VLSI. He has 16 years of experience of teaching and research. His area of research includes VLSI Design, Network Security, Wireless Networks. He has published many research papers in International journals, national and international conferences. 228
15 M.Brindha, Under Graduate scholar, pursuing B.E degree in the Department of Electronics and Communication Engineering at Velammal College of Engineering and Technology, Madurai. Her area of interest includes Computer Networks, Network Security, and Wireless Networks. id: R.Umamaheswari, Under Graduate scholar, pursuing B.E degree in the Department of Electronics and Communication Engineering at Velammal College of Engineering and Technology, Madurai. Her area of interest includes Computer Networks, Network Security, and Wireless Networks. 229
Analysis ofmobile WiMAX Security: Vulnerabilities and Solutions
Analysis ofmobile WiMAX Security: Vulnerabilities and Solutions Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, Yuan'an Liu Key Lab. ofuniversal Wireless Communications, Ministry ofeducation (Beijing University
Network Configuration Setup Guide. Air4G-W24 9.50
For Air4G-W24 9.50 This document forms the release note relevant to the specific product release as stated above. It covers new features, performance and any limitations of the product known at the time
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
www.ijcsi.org 163 Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method Mohammad Zabihi 1, Ramin Shaghaghi 2, Mohammad Esmail kalantari 3 1 Department of Electrical Engineering,
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Analysis and Assessment the Security Issues of IEEE 802.16/WiMax Network
Masters Thesis: MEE10:24 Telecommunication System Analysis and Assessment the Security Issues of IEEE 802.16/WiMax Network Mohammad Hossain Department of Telecommunication System School of Electrical Engineering
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
WiMAX and the IEEE 802.16m Air Interface Standard - April 2010
WiMAX and the IEEE 802.16m Air Interface Standard - April 2010 Introduction The IEEE 802.16e-2005 amendment to the IEEE Std 802.16-2004 Air Interface Standard which added Scalable-Orthogonal Frequency
Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in
01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
The Draft IEEE 802.16m System Description Document
00-0- IEEE 0.m-0/00 0 0 Table of Content Scope References The Draft IEEE 0.m System Description Document Definition, Symbols, Abbreviation Overall Network Architecture IEEE 0.m System Reference Model IEEE
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Internetwork Security
Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
WHITE PAPER. WiMAX Security for Real-World Network Service Provider Deployments
WHITE PAPER WiMAX Security for Real-World Network Service Provider Deployments Executive Summary For network service providers in search of next-generation subscriber services and new revenue streams,
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Keywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16>
Project Title Date Submitted Source(s) Re: Abstract Purpose Notice Release Patent Policy and Procedures IEEE 802.16 Broadband Wireless Access Working Group Method for usage of handover
TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England
TETRA Security TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England www.tetramou.com February 2006 TETRA Security Page 2 of 2 1 The TETRA security functions TETRA contains
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
