1 Securing Mobile and Wireless Networks Is It Possible?

10
1 Securing Mobile and Wireless Networks Is It Possible?

Transcript of 1 Securing Mobile and Wireless Networks Is It Possible?

1

Securing Mobile and Wireless Networks

Is It Possible?

2

Panelists David Wagner: Univ. of Calf. Berkeley

Security of large-scale systems and networks; design and analysis of symmetric-key cryptosystems; 802.11 Insecurity

Avi Rubin: AT&T Labs – Research Cryptography, network security, Web security and secure

Internet services. Paul Ratazzi: Air Force Research Laboratory

Practical testing and analysis of vulnerabilities of Wireless Systems; Military perspective

James Sterbenz: BBN Technologies Mobile, Wireless, Active Networking, Network Survivability

3

Detroit

Foreign-Agent

Home-Agent Coast Guard

Network Operations Center

Internet Foreign-Agent Southbury,CT

Cleveland Foreign-Agent

Neah Bay Connected to FA via wireless LAN at Cleveland harbor

Neah Bay Outside of wireless LAN range, connected to FA via Inmarsat.

Motivation- Neah Bay ProjectMobile Router Deployment

4

Mobile Network Design Goals Secure Scalable Manageable Ability to sharing network

infrastructure

5

Constraints / Tools Policy Architecture Protocols

6

PublicInternet

FA

MR

US Coast GuardMobile Network

HA

US Coast GuardOperational Network

(Private Address Space)

CN

IPv4 Utopian Operation

Triangular Routing

7

PublicInternet

FA

MR

US Coast GuardMobile Network

HA

US Coast GuardOperational Network

(Private Address Space)

CN

IPv4 “Real World” Operation

PROXy

Proxy had not originated the request; therefore, the response is squelched.Peer-to-peer networking becomes problematic at best.

Glenn Research Center Policy:No UDP, No IPSec, etc…Mobile-IP stopped in its tracks.What’s your policy?

Ingress or Egress Filtering stopsTransmission due to topologicallyIncorrect source address. IPv6 Corrects this problem.

USCG Requires 3DES encryption.WEP is not acceptable due to known deficiencies.

8

PublicInternet

FA

MR

US Coast GuardMobile Network

HA

US Coast GuardOperational Network

(Private Address Space)

CN

Current Solution – Reverse Tunneling

PROXy

Anticipate similar problems for IPv6.

Adds Overhead and kills route optimization.

9

PublicInternet

FA

FA

MR

MR

MR

US Coast Guard

Canadian Coast Guard ACME Shipping

HA

HA

HA

HA

ACMESHIPPING

MR

US Navy

Shared Network Infrastructure

Encrypting wireless links makes it very difficult to share infrastructure.This is a policy issue.

10

Conclusions Security Breaks Everything

At least it sometimes feels like that. Need to change policy where appropriate. Need to develop good architectures that

consider how the wireless systems and protocols operate.

Possible solutions that should be investigated: Dynamic, Protocol aware firewalls and proxies.

Possibly incorporated with Authentication and Authorization.