UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Core and Access Technologies
By, Shah Ankur Vasant. WIMAX stands for Worldwide Interoperability for Microwave Access The original IEEE standard (now called "Fixed WiMAX") was.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
WiMAX CS441 Dr. Kemal Akkaya 12/8/2011 By: Chun-Cheng Chuang.
S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Applied Cryptography for Network Security
WiMax Nadim Bohsali. What is WiMax? Worldwide Interoperability for Microwave Access Telecommunications technology that provides wireless transmission.
WiMAX Vs Wi-Fi. 2 WiMAX Worldwide Interoperability for Microwave Access Brand licensed by the WiMax Forum. “a standards-based technology enabling the.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WiMAX Presented By Ch.Srinivas Koundinya 118T1A0435.
Wimax.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Emerging Technologies
6. Next Generation Networks A. Transition to NGN B
WMAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE family of standards Protocol layering TDD frame.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. WAN Infrastructure  WAN Transmission Technologies  WAN Connectivity Methods 
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
By Omkar KiraniSridhara Chaitanya Sannapureddy Vivek Gupta 1.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
WiMax Security Introduction About WiMax WiMax security
Computer Concepts 2014 Chapter 5 Local Area Networks.
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
WiMAX Fixed Vs. Mobile Mustafa Saad Mustafa Networks Eng. Dept. College of Information Engineering Al-Nahrain University Mustafa Saad Mustafa Networks.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
IEEE &
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Chapter 4 Application Level Security in Cellular Networks.
WiMAX and its impact on wireless communication Presented by Zhen-Yu Fang.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Telecommunications, the Internet, and Wireless Technology.
Teachers Name : Suman Sarker Telecommunication Technology Subject Name : Mobile & Wireless Communication-2 Subject Code : 9471 Semester :7th Department.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless Network Design Principles Mobility Addressing Capacity Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
Femto Network Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
WiMAX Worldwide Interoperability for Microwave Access AMIT KUMAR AMIT KUMAR M TECH (ECE) M TECH (ECE)
WiMAX Chapter 11. Wireless Technologies WWAN (proposed) WMAN 70 Mbps ~50 Km a/e WiMAX New standard for Fixed broadband Wireless. Trying to.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
整合 Wi-Fi 和 WiMAX 之無線網路管理系統 Wireless Network Management System for Wi-Fi and WiMAX Integrated Networks 報告人:李建毅 指導教授:周立德 教授 國立中央大學資工系.
A Technical Seminar Presentation on WIMAX ( Worldwide Interoperability for Microwave Access ) BY M.K.V HARSHA VARDHAN REDDY-07K81A0440.
System Architecture for C2C Communications Based on Mobile WiMAX Michiyo ASHIDA VTT Technical Research Centre of Finland
LONG TERM EVOLUTION DANISH HASRAT (091042) DEEPAK SINGH (091043) GAURAV THAWANI (091052) NILESH SINGH (091079)
History and Implementation of the IEEE 802 Security Architecture
(Worldwide Interoperability for Microwave Access)
WIMAX AND LTE.
History and Implementation of the IEEE 802 Security Architecture
Overview & Applications
Overview & Applications
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” M. Tsagkaropoulos Dept. Of Electrical and Computer Engineering Wireless Telecommunications Laboratory University of Patras Patras Greece Tel: Fax:

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Agenda:  WiMAX implementation  Security Architecture of (WiMAX)  Vulnerabilities and possible solutions  Open Issues  Conclusions

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Fixed Mobile Portable modem PSTN 14.4 kbps ISDN 64 kbps modem PSTN 56.6 kbps ADSL 256 kbps 516 kbps xDSL 2 Mbps GSM 9.6 kbps HSCSD 28.8 kbps GPRS 40 kbps EGDE 384 kbps W-CDMA 384 kbps W-CDMA 2 Mbps HSDPA 10 Mbps OFDMA 50 Mbps b 10 Mbps g 56 Mbps Mbps Broadband technology starts about here Change of Telecoms Trends

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Converged Network Concept IP Network Management Control Signalling AP WiMAX GGSNSGSN UMTS/ WCDMA AP WLAN AAA Application Policing Server Farm Internet

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” What is WiMAX ? WiMAX - Worldwide Interoperability for Microwave Access WiMAX: broadband wireless network based on IEEE standard, which ensures compatibility and interoperability between broadband wireless access (BWA) equipment. –Efficient range of up to 48km. –Provides wireless last-mile broadband access in the Metropolitan Area Network (MAN). –Performance comparable to traditional cable, DSL, or T1 offerings –Enables non line-of-sight performance - broadband network access widely available without the expense of stringing wires. WiMAX Key points:  High speed of broadband service  Wireless rather than wired access  Broad Coverage

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Security Architecture of WiMAX (1) IEEE specifies the PHY Layer and MAC Layer for BWA MAC Layer sublayers: –Service Specific Convergence Sublayer : maps higher level data services to MAC layer service flows and connections. –MAC Common Part Sublayer : rules and mechanisms for system access, bandwidth allocation, connection management and QoS decisions for transmission scheduling. –Security Sublayer : provides: privacy, authentication, and confidentiality protects against unauthorized access to data transport services

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos Security Sublayer

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Security Architecture of WiMAX (2) The security architecture of WiMAX is based on two component protocols : – an encapsulation protocol: defines a set of supported cryptographic suites and the rules for applying those algorithms. –a key management protocol (PKM) : synchronize keying data between Subscriber Station (SS) and Base Station (BS); the BS enforces conditional access to network services.

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Security Layer basic components Security Associations (SA) X.509 certificates Privacy Key Management (PKM) authorization protocol Privacy Key Management protocol Encryption

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Security Analysis Improvements: –Robust protection in the form of certificate-based encryption –X.509-based PKI (public key infrastructure) certificate authorization Base station validates the client’s digital certificate before permitting access to the physical layer. –Protection of integrity of data traffic

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Vulnerabilities(1) Physical threats –Jamming –Jamming : insert noise strong enough to decrease the capacity of the channel dramatically. –Scrambling –Scrambling: similar to jamming but it targets to specific frames or part of frames for short intervals of time. –Insert malicious data –Insert malicious data: properly tuned transmitter can write on to the channel. Possible solutions –Increase the power of signals or their bandwidth (spreading techniques, powerful transmitter or high gain transmission antennas and high gain receiving antennas) –Mechanism to authenticate the data received

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Vulnerabilities (2) MAC threats –Lack of mutual authentication between the SS and the BS Eavesdropping of management traffic or user traffic Replay Attack: repeat messages –Denial of service (DoS) attacks Possible solutions –Transient information in the message ( timestamp or a serial number) –Forward Error Correction mechanisms –Enhanced authentication mechanisms

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Open Issues Mutual authentication of communicating entities (issue of appropriate certificates) Secure encryption scheme of Data encryption that adopts: confidentiality, data origin authentication, (connectionless) data integrity, anti-replay service.

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Conclusions WiMAX has a potential market: Basic component of last mile connections in upcoming NGN Networks Successful only if: Ensured security of end-to-end communications Advanced security implementation NEXT STEP  Review of current security infrastructure  Mobility schemes that guarantee security and QoS

UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing WiMAX converged networks: threats and solutions” Thank you for your attention UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunication Laboratory Michail Tsagkaropoulos mailto: