Wireless Security Architecture



Similar documents
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Certified Wireless Security Professional (CWSP) Course Overview

Link Layer and Network Layer Security for Wireless Networks

7.1. Remote Access Connection

Link Layer and Network Layer Security for Wireless Networks

CHAPTER 1 INTRODUCTION

Background Implementation Setup MAC Layer Protocols: Hardware Configuration Higher Layer Protocols:

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

Security in IEEE WLANs

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

SpiderCloud E-RAN Security Overview

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

Authentication in WLAN

Best Practices for Deploying Wireless LANs

Computer Networks. Secure Systems

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Secure distribution of the device identity in mobile access network. Konstantin Shemyak senior security specialist, Nokia Siemens Networks

Comparing Mobile VPN Technologies WHITE PAPER

Networking: EC Council Network Security Administrator NSA

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Authentication, Authorization and Accounting (AAA) Protocols

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Wireless Technology Seminar

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Building Robust Security Solutions Using Layering And Independence

Recommended Wireless Local Area Network Architecture

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

SSL VPN Technical Primer

Developing Network Security Strategies

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

VPN. Date: 4/15/2004 By: Heena Patel

m-trilogix White Paper on Security in Wireless Networks

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Industrial Communication. Securing Industrial Wireless

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Securing wireless sensor networks

How To Manage An Wireless Network At A University

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI

SSL VPN vs. IPSec VPN

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Complying with PCI Data Security

Securing Cisco Network Devices (SND)

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard

Configuring Security Solutions

How To Secure Wireless Networks

Security. TestOut Modules

Deploying iphone and ipad Virtual Private Networks

Authentication and Security in IP based Multi Hop Networks

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

A methodology for secure software design

Deploying a Secure Wireless VoIP Solution in Healthcare

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Enterprise A Closer Look at Wireless Intrusion Detection:

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

WFA Device 1.0. Template Version 1.01 January 2006

Network Security Fundamentals

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Network Access Security It's Broke, Now What? June 15, 2010

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Huawei One Net Campus Network Solution

GE Measurement & Control. Cyber Security for NEI 08-09

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS

Security + Certification (ITSY 1076) Syllabus

How To Protect A Web Application From Attack From A Trusted Environment

Best Practices for Outdoor Wireless Security

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

The Importance of Wireless Security

VLANs. Application Note

IT Networking and Security

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Technical White Paper

A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

Transcription:

Wireless Security Architecture Saeed Rajput Dept. of Computer Science and Eng. Florida Atlantic University http://www.cse.fau.edu/~saeed Saeed Rajput, 2005 1

Which Security? Link Layer Network Layer Transport Layer Application Layer Enterprise (Business) Layer Erten, Y.M., A layered security architecture for corporate 802.11 wireless networks, IEEE Wireless Telecommunications Symposium, 2004, Vol., Iss., 14-15 May 2004 2

Security Technologies: (,-!! '!!)* *!!!+ #% + '!!!!(#% & '!! "#$ #%& '! 3

Two Extremes: Of Encryption Options Link Encryption End-to-End Encryption 4

Link Encryption Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc. 5

Encrypted Message (Link Encryption) Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc. 6

End-to-End Encryption Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc. 7

Encrypted Message (End-to-End) Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc. 8

End-to-End Encryption Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc. 9

How is Wireless Security Different? Vulnerable due to open access to wired network. Greater potential of loss of authorized hardware Demands on Ubiquitous access: Changing IP address Demands on sustained connectivity while roaming Unreliable channel Limited computation power of devices Easy to launch DOS attacks Arbaugh, W.A., Wireless security is different, IEEE Computer, Vol.36, Iss.8, Aug. 2003 10

Requirements: Wireless Security Architecture Manageable Security Computationally feasible Security? Multi-layered: To provide failover safety Centralized control and management Supports Roaming Friendly User Interface Authentication (Ed s suggestion) Granular access control Efficient: Does not cause significant overhead 11

Manageable Security WEP is not manageable (Manual Key updates) Centralized access control even at layer 2: e.g. IEEE 802.1X. May use higher layer mechanisms (e.g. EAP- TLS) Issue: How to integrate with other access control mechanisms that are also required in an enterprise. 12

Computationally feasible Security? Used as an excuse by mostly HW vendors to push proprietary protocols. E.g. SSL protocol easy to do even on current Cell Phones (2003) WTLS does not make sense. WEP does not make sense in presence of 802.11i Gupta, V.; Gupta, S., Experiments in wireless Internet security, Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, Vol.2, Iss., Mar 2002, Pages: 860-864 vol.2 13

Multi-layered: To provide failover safety End-to-end security assumes: User will always be aware of security The machine which user is using is secure Security interfaces are anything but intuitive: e.g. Which website is secure? 14

Multi-layered: To provide failover safety Lower layer security mechanisms can provide some degree of security when upper security methods fail They do not need decisions to be made by users and their machines 15

Centralized control and management Difficult to do at lower layers. For IEEE 802.11 -> 802.1x. IKE for IP level Centralized certification authority SSL Need two way authentication Distribute certs to all users Application Level easier. 16

Supports Roaming Need Transport or higher layer security for continuous security sessions. Individual lower layer security associations (e.g. IPSec and 802.11i) are terminated as device moves. Supports Session transfer e.g. from static to mobile stations Issues: Efficiency, and Security Skow, E.; Jiejun Kong; Phan, T.; Cheng, F.; Guy, R.; Bagrodia, R.; Gerla, M.; Songwu Lu, A security architecture for application session handoff, Communications, 2002. ICC 2002. IEEE, International Conference on, Vol.4, Iss., 2002, Pages: 2058-2063 vol.4 Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz, Secure authentication system for public WLAN roaming, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots table of contents, San Diego, CA, USA, Pages: 113-121 17

Granular access control Difficult to provide granular access control at lower layers. Example: 802.1X AAA server, enables and blocks ports (Layer 2). IPSec enables and blocks applications. Only Application Security can provide more granularity. Best provided at application Issues: How to provide central control 18

Efficient: Does not cause significant overhead Specially critical when dealing with roaming PDAs in hospital and disaster recovery efforts Skow, E.; Jiejun Kong; Phan, T.; Cheng, F.; Guy, R.; Bagrodia, R.; Gerla, M.; Songwu Lu, A security architecture for application session handoff, Communications, 2002. ICC 2002. IEEE, International Conference on, Vol.4, Iss., 2002, Pages: 2058-2063 vol.4 Olariu, S.; Maly, K.; Foudriat, E.C.; Yamany, S.M., Wireless support for telemedicine in disaster management, Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on, Vol., Iss., 7-9 July 2004, Pages: 649-656 19

Suggestions Link Layer: (Yes) 802.11i with 802.1x IPSec: (No Yes when IPv6 becomes popular Mike) Not good for roaming TLS: (Yes) Do not use WTLS as it is not true Transport level protocol. Enforce Client side cert.s Web service Security: (Yes) No different from any other enterprise application. Enhance it with location awareness Use hardware tokens to identify users and carry strong credentials for authentication e.g. RFIDS 20

Mike s Recommendation Propose a reference architecture based on suggestions. 21