Documente Academic
Documente Profesional
Documente Cultură
Mobile Wireless future is here but security is not ready for it Cell phones, Laptops, RFID, Applications are built around mobility Unfortunately security is not enough to secure mobile wireless network Techniques available : Cryptography, VPN, and Digital Authentication Not sufficient to solve security problem
Introduction
First worm designed to move from desktop machines to cell phones was recently discovered Recent cases in Afghanistan of sales in bazaars of stolen flash drives filled with classified data Providing security for mobile wireless is difficult Mesh networks and MANET are known to challenges to secure operation that we cannot properly address today Extreme Constraint of sensor network rely on wireless communication make many of the security solution infeasible Scale and openness of proposed ubiquitous computing environments pose tremendous challenges to security
Introduction
Loss of privacy enables cell phones, Bluetooth and wifi laptops ,RFID affects all of us Simple solutions are required to control anonymity while guaranteeing accountability Security for this future world cannot depend on manual configuration, deep understanding of security threats or reactions to ongoing problems by human working with the system We must move to a future where devices and networks are secure on their own without ongoing human supervision These dangers motivated NSF to fund this study Based on leading researchers NSF sponsored WSPWN
Much of the work already done in Cryptography Useful in the wireless domain We already know how to maintain privacy of data sent over wireless networks, how to detect alterations of such data during transmission and how to determine authenticity of messages Many devices in wireless networks are battery powered so have limitations such as limited processing capacity, memory and secondary storage Years of research on cryptography for low power devices are not succeeded in finding algorithms and no techniques exist to convert existing algorithms to low powered variants
Security Solutions
WPA and WEP Hacking into a wireless system is easy if encryption is not available Install Firewall at where wireless and wired network meet Little to handle DOS Attack-Future research
3G Wireless Networks
Features by 3G Huge Capacity and Broadband Capabilities to support Greater number of voice and Data Transfers at a lower cost Both voice and Non voice data at speeds upto 384 Kbps Stealing Cellular airtime by tampering with cellular NAMs
3G Wireless Networks
Ensuring Safe and Reliable Interoperability of 3 G and wireless LAN technologies No well defined security solutions Threats to 3 G and other wireless network technologies are active attacks on the radio interface between the terminal and serving network Attacks: Attacks on wireless interfaces, wired interfaces and attack which cannot be attributed to a single interface
Cryptography
Processing and power costs of performing cryptography, complexity of algorithms and key distribution Key Distribution drains Batter power
Routing Protocols
External Threat- Cryptographic schemes such as Encryption and Digital Signature Internal Threat- Difficult to detect since malicious information sent by a compromised node is a difficult task Techniques developed for adhoc network rely on sharing information among many nodes over course of time to detect cheating Sensor network special resource constraint make such techniques unusable Research- Different style of routing strategies
Location Security
Important when proper behavior of a sensor network depends on knowledge of physical location of its nodes Small and accessible Attackers may gain advantage to know about location
Data Fusion
Save Energy in sensor networks Data Fusion-Data is combined and forwarded If any nodes are compromised then they can falsify not only its data but also fused data AlternativesCollective endorsements to Filter Faults, voting mechanism Data Aggregation- Cipher text in intermediate nodes
RFID Tags
Sensing uses passive or reactive power free nodes Readers are needed to power up sensors Research- Security
when analyzing the kinds of risks devices face as they move from place to place in a ubiquitous environment style and movement have effect