I E S College Of Engineering
Dept .Of Electronics And Communication Engineering
SEMINAR : A SURVEY ON WIRELESS SECURITY: TECHNICAL CHALLENGES
AND FUTURE TRENDS
Guided By : Ms.LINU BABU Presented By: SARATH K
CONTENTS
INTRODUCTION
LITERATURE SURVEY
OSI ARCHITECTURE
SECURITY VULNERIBILITIES
WIRELESS NETWORKS
UPCOMING TRENDS
CONCLUSION
REFERENCE
INTRODUCTION
Wireless communication is a widely used technology nowadays.
The number of mobile subscribers has reached 6.8 billion worldwide and
almost 40% of the world’s population is now using the Internet.
Due to broadcast nature wireless communication is vulnerable to security
threats like Hacking , Eavesdropping , Malicious attacks etc…
It is of paramount importance to improve wireless communications security
to fight against cybercriminal activities
LITERATURE SURVEY
Wireless Communication Security Requirements :
AUTHENTICITY : Differentiate Authorized from unauthorized users
CONFIDENTIALITY : Limit confidential data access to intended users only
INTEGRITY : Guarantee accuracy of the transmitted info without falsification
AVAILABILITY : Make sure authorised user is able to acces the network
whenever needed
GENERIC WIRELESS OSI LAYERED ARCHITECTURE
OSI LAYERED ARCHITECTURE
Common for both wired and wireless communication systems
Each layer is separately protected using various mechanisms such as MAC
Address, WPA/WPA2,Cryptographic Keys etc…
Physical and MAC Layer differs for wireless communication
Each layer supports various protocols like HTTP,FTP,TCP,UDP etc…
Each layer is vulnerable to different type of attacks like Eaves dropping,
MAC spoofing, Malware attack ,Jamming etc…
SECURITY VULTERABILITIES
PHYSICAL LAYER ATTACKS
 The broadcast nature of wireless communications makes its physical layer
extremely vulnerable to external attacks
 Jamming (DoS Attack) and Eavesdropping are two main attacks considering
physical layer.
Typically cryptographic techniques relying on secret keys are adopted for
preventing eavesdropping attacks from intercepting the data transmission.
Spread spectrum techniques are effective means of defending against DoS
attacks by spreading the transmit signal over a wider spectral bandwidth than its
original frequency band (FHSS /DSSS)
MAC LAYER ATTACKS
Each network node is equipped with a NIC and has a unique MAC address,
which is used for user authentication
An attacker that attempts to change its assigned MAC address with a
malicious intention is termed as MAC spoofing
A MAC attacker may overhear the network traffic and steal a legitimate
node’s MAC address by analysing the overheard traffic is referred to as an
Identity-theft attack
MITM Attack is the impersonation of a pair of communicating nodes.
NETWORK LAYER ATTACKS
The network-layer attacks mainly aim for exploiting IP weaknesses
Main network layer attacks are IP Spoofing , IP Hijacking and Smurfing.
 Falsification of IP address is called IP Spoofing
Impersonation of legitimate users IP Address is IP Hijacking
Paralysation of a network by sending huge number of ICMP Requests is
called Smurf Attacking
TRANSPORT LAYER ATTACKS
Malicious activity in transport layer is mainly TCP and UDP Attacks.
TCP attacks include TCP flooding attacks and sequence number prediction
attacks is a DoS attack in the transport layer.
TCP Flooding is due to sending huge number of Ping requests.
UDP Flooding is due to launching over whelming number of UDP packets.
APPLICATION LAYER ATTACKS
The application layer supports HTTP for web services, FTP for file
transfer and SMTP for e-mail transmission.
application-layer attacks may hence be classified as HTTP attacks, FTP
attacks, and SMTP attacks
The main HTTP attacks include the malware attack (e.g., Trojan horse,
viruses, worms, backdoors, key loggers, etc.)
WIRELESS NETWORKS
BLUETOOTH
WIFI
WI-MAX
Long Term Evolution (LTE)
BLUETOOTH
Bluetooth is a short-range and low-power wireless networking standard
The authentication represents the process of verifying the identity of
Bluetooth devices based on the BD_ADDR
Both the verifier and claimant perform the same authentication function
using the random number AU RANDA
the link key to obtain their responses denoted by SRES’ and SRES
BLUETOOTH: WORKING
WIFI
The family of Wi-Fi networks mainly based on the IEEE 802.11
The most common security protocols in Wi-Fi are referred to as WEP and
WPA
The WEP protocol consists of two main parts, namely the authentication
part and encryption part. preventing unauthorized access without an
appropriate WEP key
The main advantage of WPA over WEP is that WPA employs more
powerful data encryption
WIFI
WI-MAX
Protocol stack of wimax defines 2 Layers. PHY Layer and MAC Layer
LONG TERM EVOLUTION
LTE is the most recent standard developed by the 3G partnership project for
next-generation mobile networks
Its also the dominant technology used for 4G and upcoming 5G Technology
An LTE network typically consists of an EPC and an E-UTRAN
The EPC comprises an MME, a serving gateway, a packet data network
gateway (PDN GW), and an HSS
The E-UTRAN includes a base station (also termed as eNodeB in LTE) and
several UE
LTE
UPCOMING TRENDS
This section presents a range of challenging open issues and future
directions for wireless security research
Mixed Attacks in Wireless Networks
Joint Optimization of Security, Reliability, and Throughput
Cross-Layer Wireless Security Design and Analysis
Physical-Layer Security for the Emerging 5G Systems
Mixed Attacks in Wireless Networks
Most of the physical-layer security research only addressed the
eavesdropping attacks
The joint consideration of different types of wireless attacks, such as
eavesdropping and DoS attacks
It will be of particularly importance to explore new techniques of jointly
defending against multiple types of wireless attacks, which may be termed
as Mixed wireless attacks
JOINT OPTIMISATION
Security, reliability, and throughput constitute the main driving factors for
the research and development of wireless networks
It is necessary to investigate the joint optimization of security, reliability,
and throughput
It helps maintaining secure, reliable, and high-rate wireless
communications, which is an open challenge to be solved in the future.
Cross-Layer Wireless Security
Presently, cross-layer-aided security design is in its infancy.
The goal of wireless cross-layer-aided security design is to enable efficient
information exchange among different protocol layers for the sake of
improving the level of wireless security with minimal network overhead
In Conventional OSI Each layer separately protected adding complexity
and latency
It will be of high interest to explore the benefits of cross-layer-aided
wireless security for added efficiency against multiple attacks.
Physical-Layer Security for the Emerging 5G Systems
Mobile traffic has substantially grown in recent years and it may soon
exceed the capacity of the operational fourth-generation (4G)
It is expected that a strict security requirement is desired for the 5G systems
Physical-layer security as a beneficial complement to conventional security
mechanisms will have a great potential in the context of 5G systems.
It is of high importance to explore the opportunities and challenges of
combining the physical-layer security techniques with 5G
CONCLUSION
Survey of the wireless security challenges and defence mechanisms
conceived for protecting the authenticity, confidentiality, integrity, and
availability of wireless transmissions against malicious attacks
Discussed modern and conventional threats and vulnerabilities faced in
wireless communication
Discussed about popular wireless communication methods and safety
measures
Discussed about modern wireless technologies and modern trends in
wireless security
REFERENCES
A Survey on Wireless Security: Technical Challenges, RecentAdvances, and Future
Trends by Yulong Zou, Senior Member IEEE, Jia Zhu, Xianbin Wang, Senior Member
IEEE, and Lajos Hanzo, Fellow IEEE
O. Aliu, A. Imran, M. Imran, and B. Evans, “A survey of self-organisation in future
cellular networks,” IEEE Commune. Survey. Tut. vol. 15, no. 1, pp. 336–361, Feb. 2013.
C. Elliott, “Quantum cryptography,” IEEE Security Privacy, vol. 2, no. 4, pp. 57–61, Apr.
2004.
G. Raju and R. Akbani, “Authentication in wireless networks,” in Proc. 40th
Annu.Hawaii Int. Conf. Syst. Sci.,Waikoloa, HI,USA,
W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd Ed.
Englewood Cliffs, NJ, USA: Prentice-Hall, Jan. 2010.

A Survey On Wireless security

  • 1.
    I E SCollege Of Engineering Dept .Of Electronics And Communication Engineering SEMINAR : A SURVEY ON WIRELESS SECURITY: TECHNICAL CHALLENGES AND FUTURE TRENDS Guided By : Ms.LINU BABU Presented By: SARATH K
  • 2.
    CONTENTS INTRODUCTION LITERATURE SURVEY OSI ARCHITECTURE SECURITYVULNERIBILITIES WIRELESS NETWORKS UPCOMING TRENDS CONCLUSION REFERENCE
  • 3.
    INTRODUCTION Wireless communication isa widely used technology nowadays. The number of mobile subscribers has reached 6.8 billion worldwide and almost 40% of the world’s population is now using the Internet. Due to broadcast nature wireless communication is vulnerable to security threats like Hacking , Eavesdropping , Malicious attacks etc… It is of paramount importance to improve wireless communications security to fight against cybercriminal activities
  • 4.
    LITERATURE SURVEY Wireless CommunicationSecurity Requirements : AUTHENTICITY : Differentiate Authorized from unauthorized users CONFIDENTIALITY : Limit confidential data access to intended users only INTEGRITY : Guarantee accuracy of the transmitted info without falsification AVAILABILITY : Make sure authorised user is able to acces the network whenever needed
  • 5.
    GENERIC WIRELESS OSILAYERED ARCHITECTURE
  • 6.
    OSI LAYERED ARCHITECTURE Commonfor both wired and wireless communication systems Each layer is separately protected using various mechanisms such as MAC Address, WPA/WPA2,Cryptographic Keys etc… Physical and MAC Layer differs for wireless communication Each layer supports various protocols like HTTP,FTP,TCP,UDP etc… Each layer is vulnerable to different type of attacks like Eaves dropping, MAC spoofing, Malware attack ,Jamming etc…
  • 7.
    SECURITY VULTERABILITIES PHYSICAL LAYERATTACKS  The broadcast nature of wireless communications makes its physical layer extremely vulnerable to external attacks  Jamming (DoS Attack) and Eavesdropping are two main attacks considering physical layer. Typically cryptographic techniques relying on secret keys are adopted for preventing eavesdropping attacks from intercepting the data transmission. Spread spectrum techniques are effective means of defending against DoS attacks by spreading the transmit signal over a wider spectral bandwidth than its original frequency band (FHSS /DSSS)
  • 8.
    MAC LAYER ATTACKS Eachnetwork node is equipped with a NIC and has a unique MAC address, which is used for user authentication An attacker that attempts to change its assigned MAC address with a malicious intention is termed as MAC spoofing A MAC attacker may overhear the network traffic and steal a legitimate node’s MAC address by analysing the overheard traffic is referred to as an Identity-theft attack MITM Attack is the impersonation of a pair of communicating nodes.
  • 9.
    NETWORK LAYER ATTACKS Thenetwork-layer attacks mainly aim for exploiting IP weaknesses Main network layer attacks are IP Spoofing , IP Hijacking and Smurfing.  Falsification of IP address is called IP Spoofing Impersonation of legitimate users IP Address is IP Hijacking Paralysation of a network by sending huge number of ICMP Requests is called Smurf Attacking
  • 10.
    TRANSPORT LAYER ATTACKS Maliciousactivity in transport layer is mainly TCP and UDP Attacks. TCP attacks include TCP flooding attacks and sequence number prediction attacks is a DoS attack in the transport layer. TCP Flooding is due to sending huge number of Ping requests. UDP Flooding is due to launching over whelming number of UDP packets.
  • 11.
    APPLICATION LAYER ATTACKS Theapplication layer supports HTTP for web services, FTP for file transfer and SMTP for e-mail transmission. application-layer attacks may hence be classified as HTTP attacks, FTP attacks, and SMTP attacks The main HTTP attacks include the malware attack (e.g., Trojan horse, viruses, worms, backdoors, key loggers, etc.)
  • 12.
  • 13.
    BLUETOOTH Bluetooth is ashort-range and low-power wireless networking standard The authentication represents the process of verifying the identity of Bluetooth devices based on the BD_ADDR Both the verifier and claimant perform the same authentication function using the random number AU RANDA the link key to obtain their responses denoted by SRES’ and SRES
  • 14.
  • 15.
    WIFI The family ofWi-Fi networks mainly based on the IEEE 802.11 The most common security protocols in Wi-Fi are referred to as WEP and WPA The WEP protocol consists of two main parts, namely the authentication part and encryption part. preventing unauthorized access without an appropriate WEP key The main advantage of WPA over WEP is that WPA employs more powerful data encryption
  • 16.
  • 17.
    WI-MAX Protocol stack ofwimax defines 2 Layers. PHY Layer and MAC Layer
  • 18.
    LONG TERM EVOLUTION LTEis the most recent standard developed by the 3G partnership project for next-generation mobile networks Its also the dominant technology used for 4G and upcoming 5G Technology An LTE network typically consists of an EPC and an E-UTRAN The EPC comprises an MME, a serving gateway, a packet data network gateway (PDN GW), and an HSS The E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE
  • 19.
  • 20.
    UPCOMING TRENDS This sectionpresents a range of challenging open issues and future directions for wireless security research Mixed Attacks in Wireless Networks Joint Optimization of Security, Reliability, and Throughput Cross-Layer Wireless Security Design and Analysis Physical-Layer Security for the Emerging 5G Systems
  • 21.
    Mixed Attacks inWireless Networks Most of the physical-layer security research only addressed the eavesdropping attacks The joint consideration of different types of wireless attacks, such as eavesdropping and DoS attacks It will be of particularly importance to explore new techniques of jointly defending against multiple types of wireless attacks, which may be termed as Mixed wireless attacks
  • 22.
    JOINT OPTIMISATION Security, reliability,and throughput constitute the main driving factors for the research and development of wireless networks It is necessary to investigate the joint optimization of security, reliability, and throughput It helps maintaining secure, reliable, and high-rate wireless communications, which is an open challenge to be solved in the future.
  • 23.
    Cross-Layer Wireless Security Presently,cross-layer-aided security design is in its infancy. The goal of wireless cross-layer-aided security design is to enable efficient information exchange among different protocol layers for the sake of improving the level of wireless security with minimal network overhead In Conventional OSI Each layer separately protected adding complexity and latency It will be of high interest to explore the benefits of cross-layer-aided wireless security for added efficiency against multiple attacks.
  • 24.
    Physical-Layer Security forthe Emerging 5G Systems Mobile traffic has substantially grown in recent years and it may soon exceed the capacity of the operational fourth-generation (4G) It is expected that a strict security requirement is desired for the 5G systems Physical-layer security as a beneficial complement to conventional security mechanisms will have a great potential in the context of 5G systems. It is of high importance to explore the opportunities and challenges of combining the physical-layer security techniques with 5G
  • 25.
    CONCLUSION Survey of thewireless security challenges and defence mechanisms conceived for protecting the authenticity, confidentiality, integrity, and availability of wireless transmissions against malicious attacks Discussed modern and conventional threats and vulnerabilities faced in wireless communication Discussed about popular wireless communication methods and safety measures Discussed about modern wireless technologies and modern trends in wireless security
  • 26.
    REFERENCES A Survey onWireless Security: Technical Challenges, RecentAdvances, and Future Trends by Yulong Zou, Senior Member IEEE, Jia Zhu, Xianbin Wang, Senior Member IEEE, and Lajos Hanzo, Fellow IEEE O. Aliu, A. Imran, M. Imran, and B. Evans, “A survey of self-organisation in future cellular networks,” IEEE Commune. Survey. Tut. vol. 15, no. 1, pp. 336–361, Feb. 2013. C. Elliott, “Quantum cryptography,” IEEE Security Privacy, vol. 2, no. 4, pp. 57–61, Apr. 2004. G. Raju and R. Akbani, “Authentication in wireless networks,” in Proc. 40th Annu.Hawaii Int. Conf. Syst. Sci.,Waikoloa, HI,USA, W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd Ed. Englewood Cliffs, NJ, USA: Prentice-Hall, Jan. 2010.