Securing Future Wireless Networks: Challenges and Strategies . Pandurang Kamat Wade Trappe. Talk Overview. Security has been one of the great detractors for wireless technologies (and the Internet, too!) We have a chance to consider security as we redesign the network
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Securing Future Wireless Networks: Challenges and Strategies
System (CIA) Paradigm
These paradigms have been the traditional
frameworks for security on conventional
networks, but what can we do
differently for wireless systems?
Wireless is easy to sniff.
We still need encryption services and key management.
Key freshness is an issue.
RF energy radiates, and wireless entities within the radio coverage pattern may serve as witnesses for the actions of the transmitter.
The value of a wireless network is its promise of ubiquitous availability.
Wireless networks are easy to break!
Wireless hardware/equipment need to be safe from modification.
Data/control info should not be modified before or during transit.
We still need traditional security methods.
But the wireless world has additional problems
and new modalities for solutions!
The pervasiveness of the wireless networks should not mean that just anyone can participate!
Example: Rogue APs
Location is a new form of information provided by wireless systems that will facilitate new services. Location information needs to be trusted.
Perpetual connectivity can mean constant surveillance!
With snooping one can monitor mobility and handoffs between networks.
Wireless resources (e.g. power and spectrum) must be managed.
Greedy user behavior will cause resource management to malfunction.
Drill Down:Specific Challenges and Some Strategies
PDR VS. SS
Channel Surfing Experiment
Packet Delivery Rate
Jammer turned on
Trial Number (Time)
Is cryptography alone enough?
Localization algorithms depend on measurements that are susceptible to attack!!