Sponsor
Download
1 / 1

Sponsor: - PowerPoint PPT Presentation


  • 103 Views
  • Uploaded on

Sponsor:. MN. HA. AT. CN. Start Return Routability. H. o. T. I. C. o. T. I. H. o. T. I. T. o. C. T. o. H. T. o. H. Bind Update (Sniffed by AT along the way). Bind Ack Spoofed by AT. Restart Return Routability. Bind Ack. Silently Discard Bind Ack.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Sponsor:' - hector-hoffman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Sponsor

Sponsor:

MN

HA

AT

CN

Start

Return

Routability

H

o

T

I

C

o

T

I

H

o

T

I

T

o

C

T

o

H

T

o

H

Bind Update (Sniffed by AT along the way)

Bind Ack Spoofed by AT

Restart

Return

Routability

Bind Ack

Silently

Discard

Bind Ack

Northwestern Lab for Internet and Security Technology (LIST)Prasad Narayana, Sagar Vemuri, Yanmei Zhang, Yao Zhao, Nikos Liveris, Yan Chen, Hai Zhou, Judy Fu{p-narayana, s-vemuri, yanmei-zhang, jingo, n-liveris2, ychen, haizhou}@northwestern.edu, [email protected]://list.cs.northwestern.edu/

Vulnerability Analysis of WiMAX Network Protocols

1.

2.

Motivation

Related Work

  • IEEE 802.16 technology, popularly called as WiMAX, with enormous backing from the industry is set to lead the broadband wireless space

  • Security, as always, is key for it’s functioning and growth

  • Security Analysis of Mobile IP and IEEE 802.16 protocols largely confined to manual analysis

  • Fast evolution of the 802.16 standard resulted in many incomplete (and sometimes even incorrect!) analysis

3.

Our Approach

Manual Analysis

TLA Modeling

Logic-based Analysis

4.

Model of the adversary used in our analysis

Work Done

  • Completed the outsider threat analysis of IEEE 802.16e and Mobile IP protocols

  • Found a vulnerability in the Return Routability of Mobile IPv6

  • Powerful attack to cause a service disruption for a large number of machines in foreign networks at a small cost

  • No need to change the MAC layer

  • Implemented and tested in our lab testbed

  • “Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols through TLA+”, in Proc. of the Second Workshop on Secure Network Protocols (NPSec), 2006.

5.

Work in Progress

  • Analyze the EAP protocols thoroughly, especially EAP-SIM for GSM networks and EAP-AKA for 3G, CDMA2000.

  • Focus on insider attacks to check protocol vulnerabilities after the authentication step

To Summarize our work, manual analysis has yielded insightful scenarios whereas TLA modeling has proved very useful due to the exhaustive nature of its search method

MIPv6 Return Routability Attack in action


ad