1 Securing Mobile and Wireless Networks Is It Possible?

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Secure Mobile IP Communication
Security in Mobile Ad Hoc Networks
IP EDGE DEVICES A solution for the Internet Migration Patrick Cocquet, 6WIND CEO, IPv6 Forum VP Dubai IPv6 Forum Summit – February 2001.
MOBILE NETWORK LAYER Mobile IP.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 Securing Mobile Networks An Enabling Technology for National and International Security and Beyond.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Network Security Overview Tales from the trenches.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Internet Protocol Security (IPSec)
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Mobile IP Seamless connectivity for mobile computers.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Golden G. Richard III, Ph.D. University of New Orleans (With thanks to Sumi U of F ) Introduction to Mobile IP.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
Communication System Design, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson.
1 Mobile Networking As Applied to Any Mobile Network Including Aeronautical Internets Airborne Internet Collaboration Group meeting April 17, 2003 Will.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Req1 - Separability Old: –An RO scheme MUST have the ability to be bypassed by traffic types that desire to use bidirectional tunnels through an HA. New:
IPv6 for Mobile and Wireless Internet Alper E. Yegin DoCoMo USA Labs IPv6 Forum Technical Directorate Member, IETF PANA Working Group Chairman.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Module 11: Remote Access Fundamentals
NEMO Requirements and Mailing List Discussions/Conclusions T.J. Kniveton - Nokia Pascal Thubert - Cisco IETF 54 – July 14, 2002 Yokohama, Japan.
Practical Considerations for Securely Deploying Mobility Will Ivancic NASA Glenn Research Center (216)
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
The 4x4 Approach, a MobileIP Variation An Address Mobility SolutionsAn Address Mobility Solutions Extension of MobileIPExtension of MobileIP.
Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Securing Mobile Networks in an Operational Setting Will Ivancic (216)
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
1 © 1999, Cisco Systems, Inc. Mobile Router Technology Development Dan Shell - Cisco Will Ivancic - NASA Glenn.
1. Mobile Router Networks in Motion (tm) 2. Mobile Router Features Uses Internet standards-bases Mobile-IP technology - RFC 2002 Mobile Router allows.
4x4 Optimization Alkesh Patel & Hemant Patel. Background IP address – identify computer on the network Mobile domain - mobile host IP address is not restricted.
Site Multihoming for IPv6 Brian Carpenter IBM TERENA Networking Conference, Poznan, 2005.
Glenn Research Center Satellite Networks & Architectures Branch Communications Technology Division IEEE Aerospace Conference March Architecture.
Glenn Research Center Satellite Networks & Architectures Branch Communications Technology Division I-CNS Workshop April/May, Securing Mobile and.
1 Mobile Router Technology Development David Stewart, Will Ivancic, Dan Shell, Kent Leung, Brian Kachmar and Terry Bell.
IS3220 Information Technology Infrastructure Security
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
th IETF NEMO WG 1 NEMO RO Problem Space Prepared for 55 th IETF By Pascal Thubert (Cisco), Ng Chan Wah & Takeshi Tanaka (Panasonic)
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
 Mobile IP is the underlying technology for support of various mobile data and wireless networking applications.  It is designed by IETF.
An Analysis on NAT Security
Introduction Wireless devices offering IP connectivity
Virtual Private Networks
MOBILE IPv6 SECURITY ISSUES
If your customer has or wants… …and you can cross-sell
Mobile IP.
Securing Mobile Networks
Virtual Private Networks
Unit 3 Mobile IP Network Layer
Mobile Router Technology Development
Practical Considerations for Securely Deploying Mobility
An Enhanced Mobility Management Approach for Wireless IP Networks
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile Networking Through Mobile IP
Presentation transcript:

1 Securing Mobile and Wireless Networks Is It Possible?

2 Panelists David Wagner: Univ. of Calf. Berkeley Security of large-scale systems and networks; design and analysis of symmetric-key cryptosystems; Insecurity Avi Rubin: AT&T Labs – Research Cryptography, network security, Web security and secure Internet services. Paul Ratazzi: Air Force Research Laboratory Practical testing and analysis of vulnerabilities of Wireless Systems; Military perspective James Sterbenz: BBN Technologies Mobile, Wireless, Active Networking, Network Survivability

3 Motivation- Neah Bay Project Mobile Router Deployment

4 Mobile Network Design Goals Secure Scalable Manageable Ability to sharing network infrastructure

5 Constraints / Tools Policy Architecture Protocols

6 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN IPv4 Utopian Operation Triangular Routing

7 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN IPv4 “Real World” Operation PROXyPROXy Proxy had not originated the request; therefore, the response is squelched. Peer-to-peer networking becomes problematic at best. Glenn Research Center Policy: No UDP, No IPSec, etc… Mobile-IP stopped in its tracks. What’s your policy? Ingress or Egress Filtering stops Transmission due to topologically Incorrect source address. IPv6 Corrects this problem. USCG Requires 3DES encryption. WEP is not acceptable due to known deficiencies.

8 Public Internet FA MR US Coast Guard Mobile Network HA US Coast Guard Operational Network (Private Address Space) CN Current Solution – Reverse Tunneling PROXyPROXy Anticipate similar problems for IPv6. Adds Overhead and kills route optimization.

9 Public Internet FA MR US Coast Guard Canadian Coast Guard ACME Shipping HA ACME SHIPPING MRMR US Navy Shared Network Infrastructure Encrypting wireless links makes it very difficult to share infrastructure. This is a policy issue.

10 Conclusions Security Breaks Everything  At least it sometimes feels like that. Need to change policy where appropriate. Need to develop good architectures that consider how the wireless systems and protocols operate. Possible solutions that should be investigated: Dynamic, Protocol aware firewalls and proxies. Possibly incorporated with Authentication and Authorization.