Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems.

Slides:



Advertisements
Similar presentations
MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Advertisements

DENIAL OF SERVICE IN SENSOR NETWORKS Pratik Zirpe Instructor – Dr. T. Andrew Yang.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Duke Selfish MAC Layer Misbehavior in Wireless Networks Author: Pradeep Kyasanur and Nitin H. Vaidya Some slides are borrowed from the author and others.
How is Information Transferred? Developing an Intuition for Network Communication Protocols a 6.UAT concept talk by Olga Stroilova.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Chapter 1 Read (again) chapter 1.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Network Architecture for Cyberspace
Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur and Nitin H. Vaidya 2005 IEEE Reviewed by Dean Chiang.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
ECE 4450:427/527 - Computer Networks Spring 2015
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
Local Area Networks Chapter 17, Exploring the Digital Domain.
COMMUNICATIONPROTOCOL Kumar Vipul Shrivastawa and Abhinash. Regd.No:050 and 279 Branch: ETC A technical Seminar presented by.
Preserving Location Privacy in Wireless LANs Presented by Alvin Yonggang Yun April 9, 2008 CSCI Wireless and Mobile Security.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Illinois Center for Wireless Systems (ICWS)
Data Transmission Over Wireless Links Fan Yang
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
1 Exploiting Diversity in Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign Presentation at Mesh.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
IEEE WLAN.
1/26 Module C - Part 2 DOMINO Detection Of greedy behavior in MAC layer of IEEE public NetwOrks Prof. JP Hubaux Mobile Networks
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Illinois Center for Wireless Systems Wireless Networks: Algorithms and Optimization R. Srikant ECE/CSL.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Universität Karlsruhe Institut für Telematik ECE 591
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
WLAN.
Session: IT 601: Mobile Computing Session 1 Introduction Prof. Anirudha Sahoo IIT Bombay.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Selfish MAC Layer Misbehavior in Wireless Networks ECE 299, Karthik Balasubramanian February 8, 2007 Nitin Vaidya and Pradeep Kyasanur.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Ad-hoc Transport Layer Protocol (ATCP)
TASK 4 Guideline.
Illinois Center for Wireless Systems (ICWS)
Selfish Misbehavior in Wireless Networks
Network Architecture for Cyberspace
Network Models CCNA Instructor Training Course October 12-17, 2009
Protocol Application TCP/IP Layer Model
Presentation transcript:

Protocol Security for Wireless Networks Yih-Chun Hu Illinois Center for Wireless Systems

Pervasiveness of Security Layers in the Internet divide responsibility Security is important at each layer Physical MAC / Link Network Transport Application a PHY MAC IP TCP, UDP HTTP, IMAP

CIA: Not Just an Intelligence Agency Confidentiality: – Data – Privacy (Location, Identity, Traffic, …) Integrity: – Data Integrity – Origin Integrity (Location, Identity, …) Availability

Solutions Must Pervade Layers Many security properties are vulnerable at several layers: – Availability – Location privacy Physical MAC / Link Network Transport Application

Why Location Privacy? Wireless transmissions can reveal location: – Cellular – Electronic Toll Collection (iPass) – WiFi, Bluetooth, …

Providing Location Privacy Power-control for avoiding localization (Physical) Pseudonymous geographic routing (Network) Anonymous rendezvous (Network) Transaction communication model (Transport) Silent periods (Cross-Layer): – Dissociate one transaction from another – Duration depends on density, mobility User Interface (Application)

Reducing Localization Precision Existing localization techniques: – Rice: less than 1m with 50% error indoors – Place Lab: 15-30m with 50% error outdoors Need (generally) at least 3 APs passively scan all channels order all APs based on their RSSIs: R 1 >= R 2 >= … >= R n exists R 1 -R i-1 <20 dB & R 1 -R i >20 dB? transmit at the maximum power adjust transmit power to TX AP – R i + RS AP -10dB effective area for TPC YES NO

Using Silent Period Decorrelate transmissions: – Deterministic plus random – BusView data validation

User Interface Directs all location privacy mechanisms Privacy on/off checkbox Wait notification

Why Availability? Many different wireless technologies: – Unlicensed bands share spectrum with industrial applications and other users Users running the same protocol might not cooperate: – Selfish misbehavior – Malicious misbehavior – Software and hardware bugs

A Multi-Layer Solution to Availability Jamming mitigation (Physical) Packet leashes (Physical / Network) MAC-level misbehavior detection (MAC) Secure routing protocols (Network)

Possible Misbehavior Do not follow MAC-layer rules for “backoff” Transmit Wait B1 = 1 B2 = 20 Transmit Wait B2 = 19 B1 = 1 Misbehaving node Well-behaved node

Deterministic Backoff Receivers choose the backoff for the senders – Included in the previous acknowledgement DATA Sender S Receiver R CTS ACK(B) RTS B

A Bottom-Up Approach to Availability Start with a trusted core: – (Possibly) a subset of nodes – Very low bandwidth – Highly available Bootstrap services using the core: – Routing – Congestion control Handle failures of core nodes

Wireless Security Faculty at Illinois Tamer Basar Roy Campbell Carl Gunter Christoforos Hadjicostis Yih-Chun Hu Ravishankar K. Iyer Klara Nahrstedt William H. Sanders Nitin H. Vaidya