Wireless Security

advertisement
Security Issues, Concepts and
Strategies in Wireless And
Mobile Systems
By: Imad Jawhar
Outline
• Introduction
• The wireless environment and systems
• Concepts and terminologies used in wireless
security
• Some commonly used wireless and mobile
systems and protocols
• Wireless application protocol (WAP)
• Wireless transaction protocol (WTP)
• Wireless transport layer security (WTLS)
protocol
• Some additional concerning WAP security
• Some research and future directions in
wireless system security
• Conclusions
The Wireless Environment
• Communications in the wireless environment has
its own issues and challenges.
• Generally, it has the following characteristics:
– Relatively low bandwidth and data rate.
– Relatively high error rates.
– Need for low power consumption to preserve battery
life of mobile systems.
– Mobility of the nodes adds more complexity because of
topology changes.
–
–
–
–
Signal fading.
Handoff issues.
And other challenges.
All of these issues affect design and design for
security
• There exists many forms of wireless
communications and networking, and the
number of these forms dynamically
increasing.
• The following is a list of the some very
popular forms of wireless communications.
• Satellite Communications:
– Uses microwave links and provides global
connection of many network infrastructures.
– Three types of satellites:
• GEO: Geostationary Earth Orbit Satellites.
• MEO: Medium Earth Orbit Satellites.
• LEO: Low Earth Orbit Satellites.
• Cellular Networks:
– Widely used recently. Quickly increasing in
popularity all over the world.
– Geographic area is divided into cells.
– Each cell is serviced by a base station (BS).
– Several stations are served by a Mobile
Telecommunications Switching Office
(MTSO), or a similar structure.
– Base station connects mobile users to MTSO.
– MTSO connects base station (BS’s) to
telephone switching office.
– The first generation of systems was AMPS
(Advanced Mobile Phone Service) which used
analog communications
• The second generation uses digital traffic
channels, encryption, error detection,
correction, and allow channel access to be
dynamically shared by all users.
• Third generation systems will have:
– Voice quality that is comparable to public
switched telephone networks.
– Higher data rates.
– Symmetrical and asymmetrical data
transmission rates.
– Support for both packet and circuit switched
data services.
– Adaptive interface to the Internet to reflect
common asymmetry between inbound and
outbound traffic.
– More efficient use of available spectrum
– Support for wide variety of mobile .equipment.
– More flexibility to accept new services and
techniques.
• Cordless Systems:
– Used inside homes and buildings.
– Allow wireless communications between
cordless devices such as a telephone to a single
multiple base stations using TDMA (Time
Division Multiple Access) and TDD (Time
Division Duplex) communications.
• Wireless Local Loop (WLL):
– Increasingly more popular way to provide
wireless last mile connections between the end
user and the local switching telephone center.
– Allows reduction in installation cost, and time.
– Selective installation is possible (only install
when customer desires service, not in
anticipation of the customer desiring service).
• Mobile IP:
– Allows nomadic access to the Internet from
different access points.
– A user is able to maintain connectability to the
Internet while moving from one access point to
another.
– It uses process registration, agent solicitation,
move detection, and tunneling to achieve this
objective.
• Wireless Local Area Networks (WLANs):
– Rapidly becoming very popular.
– This is due to many characteristics such as:
•
•
•
•
Need for mobility.
Cost effectiveness.
Convenience.
Rapid deployment ability.
• Decrease in size of electronic and digital equipment.
• Speed of mobile computing devices.
• There are four types of wireless LANs
• LAN Extension:
– Provide wireless connections of mobile
computing units to a wired network.
– Used in manufacturing, stock exchange, and
warehouses.
.
• Cross-building Interconnect:
– Used to provide wireless connections between
buildings.
– Uses microwave communications with dish
shaped antennas.
– More of a link than a LAN.
• Nomadic Access:
– Used to provide connectivity from mobile units
such as a laptop, PDA or other computing
devices to a fixed campus network per example.
• Ad Hoc Networking:
– Also called rapidly deployable networks.
– An increasingly popular form of establishing
networks between mobile computing devices,
such as laptops, computers inside moving
vehicles.
– The temporary wireless network is established
dynamically on the fly.
– Very dynamic in nature because topology
changes while nodes move from one location to
another, and nodes dynamically move in and
out of each other’s range and are added and
deleted to the network all together.
– Require robust communications algorithms and
protocols, which have the following
characteristics:
• Can quickly adapt to the changing network
topology.
• Maintain efficient connectivity and routing between
various nodes while wireless links are lost and
established dynamically as nodes move in and out of
each other’s range.
– There are numerous applications for Ad Hoc
Networks, such as:
•
•
•
•
•
•
Tactical military operations.
Conferences.
Campus and classroom environments.
Disaster recovery.
Search and rescue operations.
And so on.
• Bluetooth:
– A wireless communications protocol.
– Originally started by Ericsson.
– Quickly became adopted by a consortium of
companies in the computer industry.
– Grew from a few companies to thousands
including all of the major companies in the
industry.
– Designed to establish and maintain connections
between various computing devices and
electronic equipment such as: Computers,
cellular phones, PDA’s, and so on.
– This is done wirelessly avoiding the need for
wires to establish the connections.
– Intended to work in a close proximity
environments such as homes, offices,
classrooms, hospitals, airports, etc.
– Connections are established by designating
master and slave nodes.
– It uses profiles for different devices, which
characterize the applications.
– There are types of communication links which
are multiplexed over the same RF (Radio
Frequency):
• Synchronous Connection-oriented (SCO) for voice.
• Asynchronous connectionless (ACL) links for data.
– Uses Frequency-hopping spread spectrum with
a high rate 1600 hops/sec to reduce
interference, and provide low power, and low
cost of radio communications.
– Operates in the ISM band at 2.45 GHz with a
transmission of 1 to 100 mW, and a range of 10
to 100 meters, and a maximum bit rate of 1
Mbps, and an effective data transfer rate of 721
Kbps.
802.11 wireless standard
• This is a wireless LAN standard.
• which is increasingly being adopted by
many wireless devices to establish
communications at the physical and data
link layers of the OSI model.
• In 2000 vendors sold around a million
802.11 network interface cards, and sales
are expected to go up to 3.9 million in 2004
Security Issues
• Importance of wireless systems.
• In every aspect of our lives.
• Sensitivity of information shared on
wireless systems (increasingly important)
financial, personal, social, confidential, etc.
• example: wireless cameras (watching nanny
and baby in house…the whole block
watching).
Security services needed
• (especially in e-commerce transactions)
• User authentication: The process of
proving to the system that the user is whom
he/she says he/she is.
• Data authentication: It is further subdivided into
two sub-services.
• The first is data integrity, which is the process of
guaranteeing to the receiver that the data was not
changed during the transmission process.
• The second is data origin authentication is the
process of proving to the receiver that the data was
actually sent by the stated sender.
• Data confidentiality: It ensures that
unintended parties are not able to read the
data while in transit. Encryption is used to
achieve this objective.
• Authorization:
• It is the process of ensuring that only authorized users are
allowed to access the data/resources. In a “closed system”
a user is not allowed access without explicit authorization.
Typically, this is the desired model of secure systems. On
the other hand, in an “open system” a user is allowed
access (implicit authorization) unless specifically
deauthorized by the system. The latter model is
undesirable for the design of secure systems, unless
absolutely necessary because of the nature of the
application (a public library, etc.)
• Audit: An audit trail is used to keep track
of who, when, what, and how transactions
took place in a system. This audit trail can
be an essential tool for after the fact
analysis in cases intentional or unintentional
security attacks. It can also be used by
intrusion detection algorithms to detect and
prevent current and future attacks.
• Non-repudiation: This is an important
service that is essential for the proper
operation of certain e-commerce
transactions. It is the process of
guaranteeing that a certain user actually did
issue a certain order or required a certain
transaction. Non-repudiation is usually
implemented using digital signatures,
which are unique to users and provide proof
that a particular user initiated a particular
transaction.
• Some Commonly Used Mobile and
Wireless and Mobile Systems and
Protocols:
• 802.11
• Bluetooth
• Mobile IP
IEEE 802.11
• This is a wireless LAN standard.
• which is increasingly being adopted by
many wireless devices to establish
communications at the physical and data
link layers of the OSI model.
• In 2000 vendors sold around a million
802.11 network interface cards, and sales
are expected to go up to 3.9 million in 2004
• The 802.11 architecture uses the wired
equivalent privacy protocol (WEP).
• Data is encrypted with WEP to protect the
wireless link between clients and access
points.
• Network administrators distribute a WEPalgorithm-based key for authorized users,
which prevents access by unauthorized
users.
• The protocol has authentications,
deauthentication (this service is invoked
whenever an existing authentication is to be
terminated), and privacy provisions [1] [3].
• Authentication (and deauthentication)
services are used for establishing identity of
a station.
• The standard does not specify any particular
authentication scheme.
• Privacy services are used to prevent the
content of messages from being read by
other than intended recipients [3].
Bluetooth
• This is a wireless communications protocol,
which was originally started by Ericsson.
• quickly became adopted by a consortium of
companies in the computer industry.
• The consortium grew from a few companies
to thousands including all of the major
companies in the industry.
• It is designed to establish and maintain
connections between computing devices,
and electronic equipment, such as
computers, PDA’s, cell phones, and so on,
wirelessly avoiding the need for wires.
• It is intended to work in a close proximity
environment, such as homes, offices,
classrooms, hospitals, airports, etc.
• Connections are established using
designated master and slave nodes.
• It uses profiles for different devices, which
characterize the applications, synchronous
connection-oriented (SCO) for data, and
asynchronous connectionless (ACL) links
for voice, which are multiplexed on the
same RF link.
• Frequency-hopping spread spectrum with a
high 1600 hops/sec rate is used to reduce
interference, and provide low power, low
cost radio communications.
• It operates in the ISM band at 2.45 GHz
with a transmission power of 1 to 100 mW
and a range of 10 to 100 meters, and a
maximum bit rate of 1 Mbps, and an
effective data transfer rate of 721 Kbps.
• Up to 8 devices can communicate in a
Piconet with one device acting as the master
and the other devices as slaves. Several
Piconet in one area can form a “Scatternet”
in which all nodes use the same frequency
range with each “Piconet” using a different
hop sequence.
• The bluetooth baseband specification
defines a facility for link security between
any two Bluetooth devices, consisting of the
following elements [3]:
- Authentication
- Encryption (privacy)
- Key management and usage.
• The security algorithms use four
parameters:
– Unit address: The 48-bit device address,
which is publicly known.
– Secret authentication key: A secret 128-bit
key.
– Secret Privacy key: A secret key of length
from 4 to 128 bits.
– Random number: A 128-bit random number
derived from a pseudorandom generation
algorithm executed in the Bluetooth unit.
• The two secret keys are generated and
configured with the unit and are not
disclosed.
• The authentication process is used to
provide verification of the claimed identity
of one of the two Bluetooth devices
involved in an exchange.
• Authentication is done by verifying that the
two devices share the same preconfigured
authentication key.
• Encryption of packet payload can be used to
protect user information. The access code
and the packet header are never encrypted.
• The encryption is done using an encryption
algorithm known as E0 [3]. For each packet
transmission, a new encryption key is
generated.
• The algorithm generates a one-time payload
key by combining in a complex fashion a
random number, which is sent to the slave,
the master's address, the current clock value
and a shared secret key. Because the clock
value changes for each encryption, a
different encryption key is used each time,
enhancing security.
Mobile IP
• It is used to enable computers to maintain
Internet connectivity while moving from
one Internet attachment point to another.
• It uses the concept of home and foreign
networks and home and foreign agents.
• Messages intended for a certain node, which
are sent to its home network, are forwarded
to a care of address to the mobile node at
the foreign network where it is registered
previously when the move was detected.
• The forwarding process uses datagramtunneling and encapsulation options, which
include IP-within-IP, minimalencapsulation, or Generic routing
encapsulation (GRE) [3].
• Mobile IP has security features, which are
essential to its operation. This is because a
wide variety of attacks could be used by an
unauthorized user to access information of
another user.
• It uses message authentication, registration
request and reply contain authentication
extensions with security parameter index
(SPI) and authenticator.
• Authentication procedures are carried out to
secure mobile-home (mobile node/home
communication), mobile-foreign (mobile
node/foreign agent communications), and
foreign-home (foreign agent/home agent
communications).
Wireless Application Protocol
(WAP)
• This is an open standard, which provides
mobile users of wireless terminals such as
wireless phones, pagers, and PDA’s access
to telephony and information services [3].
• It is designed to work with all wireless
network technologies such as GSM,
CDMA, and TDMA.
• It is based on existing Internet standards
such as IP, XML, HTML, and HTTP [3]
[10] [9] [12].
• The WAP forum is an industry association
of over 500 members “that has developed
the de-facto world standard for wireless
information and telephony services on
digital mobile phones and other wireless
terminals” [16].
• In the latest class of secure wireless
protocols from the WAP Forum, client-side
certificates are specified and used as part of
client-side authentication and nonrepudiation services [10].
• Users are able to access e-commerce sites
from new wireless devices such as PDAs
and mobile phones.
The WAP Specification:
• WAP defines an open, standard architecture,
and a set of protocols for the
implementation of wireless access to the
Internet.
• The WAP specifications include [14] [3]:
• An XML-type markup language, Wireless
Markup Language (WML): It has text and
image support with formatting layout and
commands.
• Deck/card organizational metaphor (documents
subdivided into cards which specify one or more
units of interaction), and support for navigation
among cards and decks.
• A sample of WML code, consider the following
simple deck with one card [20].
•
<wml>
•
<card id=’card1’>
•
<p>
•
Hello WAP World.
•
</p>
•
</card>
•
</wml>
• The tags <wml>, <card>, and <p> enclose the
deck, card, and paragraph, respectively. When a
wireless device receives this code, it will display
the message “Hello WAP World” on the terminal’s
screen.
• The book in [3] has a table with all of WML tags,
which are divided into eight functional groups:
Deck Structure, Content, Formatting, User Input,
Variables, Tasks, and Task/Event Bindings. Refer
to [3] [12] for more information on the WML
language.
• A “microbrowser” specification: It
defines how WML and WMLScripts are
determined in the wireless device.
• A lightweight protocol stack: Wireless
Session Protocol is equivalent to HTTP in a
compressed format. Designed to minimize
bandwidth use allowing different wireless
networks, with varying bandwidth
capacities, to run WAP applications.
• Framework for Wireless Telephony
Applications (WTA): It provides access to
traditional telephony services (such as Call
Forwarding) through WMLScripts.
• Provisioning: It allows Service Providers to
reconfigure mobile devices remotely using
Short Messaging System (SMS), which is a
GSM standard [17].
Components of the WAP
Architecture
• The WAP model consists of three elements:
the client, gateway, and original server.
This is shown in figure 1.
• The gateway serves as a proxy, which
connects the wireless device/s to the
original server.
• HTTP is used to communicate between the
gateway and the original server.
• The WAP gateway performs functions,
which are spared from the relatively less
capable processor in the wireless devices.
• It provides DNS service, converts between
the WAP protocol stack (protocols that have
been optimized for low bandwidth, low
power consumption, limited screen sized,
and limited storage) and the traditional
WWW stack which includes HTTP and
TCP/IP.
• encodes/decodes information from the
wired web to more compact form.
• which is more easily digested and displayed
by the more limited wireless device.
• This reduces the amount of data
communicated wirelessly.
• The gateway also reduces communication
overhead and latency by caching recently
requested web pages and information.
Client
Gateway
Encoded requests
WAE user agent
Encoded response
Original Server
Requests
Encoders and
Decoders
Response (content)
Figure 1 – The WAP Programming Model.
CGI
Scripts, etc.
Content
• WAP specifications have several
components to provide secure
communications.
• These components include the WTLS
protocol, WAP identity module (WIM)
smart cards for storing user certificates, and
functions such as Crypto.signText(), which
is used for signing of WAP transactions.
• As shown in figure 2, the WAP Protocol
Stack is a layered architecture which
consists of several protocol layers.
• We will briefly describe each of the layers
and focus on the the WTP and WTLS layers
in this paper.
• On top is the Wireless Markup Language
(WML) (described later), and WMLScript
layer, which is a scripting language with
similarities to JavaScript.
• Below WML and WMLScript is the
Wireless Application Environment (WAE)
layer, which specifies an application
framework for wireless devices such as
mobile phone, pagers, and PDAs.
• WAE consists of tools and formats that are
designed to ease the task of developing
applications and devices supported by WAP.
Wireless Markup Language (WML)
WMLScript
Wireless Application Environment (WAE)
Wireless Session Protocol (WSP)
Wireless Transaction Protocol (WTP)
Wireless Transport Layer Security (WTLS)
UDP
Wireless Datagram Protocol (WDP)
IP
GSM
D-AMPS
IS-95
Figure 2 – WAP Protocol Stack.
3G
Bluetooth
• The WAE layer is followed by the Wireless
Session Protocol (WSP).
• WSP provides applications with an interface
for two session services connection-oriented
operating over the Wireless Transport
Protocol (WTP) (comparable to TCP on the
in wired networks) and connectionless
operating over the unreliable transport
protocol called Wireless Datagram Protocol
(WDP) (comparable to UDP in wired
• Basically, WSP is based on HTTP with
some modifications and additions to
optimize its use over wireless links.
• Below the WSP layer, resides the Wireless
Transaction Protocol (WTP), which will be
described later.
• Then below WTP, resides the Wireless
Transport Layer Security (WTLS), which
will also be discussed later.
• Below the WTLS layer, follows the
Wireless Datagram Protocol (WDP), which
in turn operates on top of the a number of
bearer service providers such as GSM, DAMPS, IS-95, 3G, Bluetooth, etc.
• We will only concentrate on the WTP and
WTLS layers in this presentation.
Wireless Transaction Protocol
(WTP)
• WTP manages transactions by conveying
requests and responses between a user agent
(such as a WAP browser) and an application
server for such activities as browsing and ecommerce transactions [3].
• It provides reliable transport services
without the undesirable overhead of TCP,
which is the transport layer protocol, used
in wired networks.
• This results in a lightweight protocol more
suitable for implementation in “thin” clients
(such as wireless/mobile devices) and over
low-bandwidth wireless links.
• It includes the following features:
– Optional user-to-user reliability: WTP user
triggers the confirmation of each received
message.
– Optional out-of-band data on
acknowledgments.
– PDU concatenation and delayed
acknowledgment to reduce the number of
messages sent.
– Asynchronous transactions.
– Three classes of transaction services to provide:
unreliable datagram service, reliable datagram
service, and request/response transaction
service and support the execution of multiple
transactions during one WSP session.
The Wireless Transport Layer
Security (WTLS) Protocol
• The WAP protocol stack includes security
features in its Wireless Transport Layer
Security (WTLS) layer, which is directly
below the Wireless Transaction Protocol
(WTP).
WTLS
Handshake
Protocol
WTLS Change
Cipher Spec
Protocol
WTLS Alert
Protocol
WTLS Record Protocol
WDP or UDP/IP
Figure 3 – WTLS Protocol Stack
WTP
• Security of WAP transactions is achieved
using the WTLS protocol [18] [3].
• The WTLS protocol provides entity
authentication, data confidentiality, and data
integrity.
• It is based on the IETF SSL/TLS protocols
[10][19]. WTLS provides security for
communications between the WAP wireless
device and the WAP Gateway.
• As shown in figure 3, the WTLS Protocol
Stack includes WTLS handshake protocol,
WTLS Change Cipher Spec Protocol,
WTLS Alert Protocol, and WTP at the top.
Below resides the WTLS Record Protocol,
which in turn lays on top of the WDP or
UDP/IP layer.
• The function of the WTLS Record Protocol
is to take the user data from the next higher
layer (WTP, WTLS handshake protocol,
WTLS Alert Protocol, WTLS change cipher
spec protocol) and encapsulates the data in a
PDU (Protocol Data Unit) [3].
• The PDU contains the data in a compressed,
and encrypted form with a WTLS record
header appended to it. Encryption is done
using a symmetric encryption algorithm.
The allowable encryption algorithms are
DES, triple DES, RC5 and IDEA [13].
• The WTLS protocol has three different
classes of service [10]:
– Class 1: This class implements
unauthenticated Diffie-Hellman key exchange
to establish the session key. Early WAP devices
only implement this level, which is insufficient
and should not be used for e-commerce
transactions [21].
– Class 2: This class enforces server side
authentication using public key certificates
similar to SSL/TLS protocol. The WAP
Gateway uses a WTLS certificate, which is a
particular form of X.509 certificate compressed
to save bandwidth. This level is used in
currently available devices, which are being
used in several read-only access and ineconomy banking applications in Europe and
the UK [22].
– Class 3: Using this class, clients are able to
authenticate using client side certificates, which
are regular X.509 format. These certificates
can be stored either on the client or on a
publicly accessible server with a pointer to the
certificate stored in the wireless device. This
class is beginning to be used in wireless phones
[23].
• Nokia, KPN Mobile, and Interpay Nederland have
successfully tested financial transaction on a
mobile network [23], based on WIM technology,
which is a part of the WAP 1.2 (Wireless
Application Protocol) specification.
• With this real time payment solution, a mobile
telecommunications network operator, a mobile
phone and infrastructure manufacturer and a
payment processor have made improvement in
security for mobile commerce transactions.
• The solution is based on WIM (Wireless Identity
Module), which is a mobile Internet technology
enabling more secure transactions.
• Non-repudiation of transactions is ensured by a
digital signature. In practice, this means users can
perform transactions safely using a single PINcode.
• In addition, built-in security elements in the
terminal and network ensure more secure and
reliable transactions.
• Class 3 security services, which are in the process
of being offered by different wireless device
manufacturers such as Nokia and Motorola, are
expected to allow banking institutions to enhance
their current wireless e-commerce services to
allow “out-of-economy” transactions.
• As shown in figure 3, the WTLS protocol
stack also contains the following protocols:
• The Change Cipher Spec Protocol:
– The cipher spec is associated with the current
transaction.
– It specifies the encryption algorithm, the hash
algorithm used as part of HMAC, and
cryptographic attributes, such as MAC code
size. This protocol is used in the process of
establishing the cipher suite used for
subsequent communications during a session.
• The Alert Protocol:
– Used to convey WTLS-related alerts to the peer
entity. Alert messages are compressed and
encrypted as well.
• The Handshake Protocol in the WTLS:
– It allows the server and client to authenticate
each other and to negotiate an encryption and
MAC algorithm and cryptographic keys to be
used to protect the data sent in the WTLS
record. The Handshake protocol is used to
establish the security provisions before any
application data is exchanged [3].
Some Additional Issues
Concerning WAP Security:
• Research has identified some additional
issues regarding the security of WAP based
systems. The following are some of these
issues.
• About Maintenance of the WAP
Gateway:
– The WAP Gateway can be maintained by the
Wireless Service Provider (WSP) or by the
Enterprise (on the server side).
– If the WSP maintains the WAP gateway
however, some literature [10] refers to the
presence of a security “gap” caused by the
ending of the Wireless Transport Layer Security
(WTLS) session at the Gateway.
– The data is temporarily in clear text on the
Gateway until it is re-encrypted under the SSL
session established with the Enterprise’s web
server.
– In such cases, the WAP Gateway should be
maintained at the Enterprise. A more detailed
discussion of this issue is presented in [10].
• The WAP Identity Module (WIM):
– New generation of WAP phones will provide
WIM to facilitate client side authentication
[24]. WIM is used to implement WTLS
protocol Class 3 functionality.
– It has embedded support for public key
cryptography. With the WIM implementation,
RSA [21] is mandatory and Elliptic Curve
Cryptography [21] is optional.
– Smart card is one possible implementation of
WIM. It could be a part of the SIM (subscriber
identity module) card in a cellular phone (in
GSM [17]) or an separate smart card (WIM
card).
– A combination of SIM-WIM card is typically
called a SWIM card. The WIM card would be
configured by the manufacturer with two sets of
private-public key pairs (one for signing and
one for authentication), and two manufacturer’s
certificates.
– All WTLS sessions established through a WIM
and a WAP Gateway will use the same public
keys for initial session negotiations.
– A WIM is able to store a number of certificates
or user certificate references, such as a URLbased reference.
– A user will be required to register a certificate
at each Enterprise (such as a Bank, etc.).
– The WIM must be tamper resistant to make it
not feasible to extract or change information in
the module, because it contains user private
keys, which never leave the WIM.
User Identification and
Authentication in WAP
• The type of user identification and authentication
possible in WAP differs with the WTLS class of
service used.
• Username/password identification and
authentication can be used with WML forms
exchanged between the server and the wireless
device.
• It is also possible to have client-side identification
and authentication based on the public/private key
pair that is hardcoded on the WIM card and bound
with the user’s name in their certificate.
• Non-repudiation in WAP:
– It requires client side certificates that bind the
user’s signing key with their name.
– The WAP browser, on the WAP device,
provides WMLScript function,
Crypto.signText() [25], which achieves this
purpose using different scenarios depending on
the implementation.
Some Research and Future
Directions in Wireless Systems
Security
• What is Secure Sockets Layer (SSL) ?
– SSL is the most widely deployed and used
security protocol in the world.
– Essentially every commercial Web browser and
server supports secure Web transactions using
SSL.
– You are almost certainly using SSL every time
you buy online using “secure” Web pages [13].
Currently, tens of billions of dollars worth of
SSL transactions occur per year.
– SSL is mostly used for securing Web traffic
transactions, however, it is a general protocol
suitable for securing many other types of
traffic.
– In addition to the World Wide Web, SSL and its
successor, Transport Layer Security (TLS), are
used in other popular applications such as File
Transfer Protocol (FTP), remote object access
(RMI, CORBA, IIOP), e-mail transmission
(SMTP), remote terminal service (Telnet) and
directory access (LDAP) to secure their
transactions.
– As will be shown later in this paper, SSL is
currently being used in different stages of the
transaction communications between wireless
devices and the wired infrastructure.
On Using SSL in Wireless
Communications
• Due to the perceived relative decrease in
capabilities of wireless device CPUs and lower
bandwidth capabilities of wireless channels, there
is a drive away from SSL and toward security
architectures designed for wireless transactions
that lack end-to-end security.
• However, some literature [6] show that SSL is a
practical solution for end-to-end transaction
security of wireless Internet applications even
considering the limitation of the wireless devices
and environment.
The Development of Lightweight Security
Mechanisms for Wireless Multimedia
Traffic Transmission
• In addition to the above protocols, and
architectures, research is being done in
order to design “lightweight” encryption
algorithms for MPEG video transmission.
• In [7], researchers propose to provide
encryption of video data while increasing
the decodability of the video stream in the
presence of errors.
• These algorithm explore the predictable
relationship between the I, P, and B-frames
of compressed video, and decrease the
expected number of bit errors left in the
data after encoding.
• For more information on these techniques
the reader is referred to [7].
On Security of Mobile Phone
Communications
• Furthermore, some research is being done
on the security management planning for
telecommunication systems, with focus on
intrusion detection and cloning mobile
phone problems.
• In [8], researchers discuss mobile phone
network security management planning
with its various aspects such as access
control, confidentiality, authentication, nonrepudiation, and integrity of data
• The research also addresses intrusion
detection systems design for mobile phone
communications.
• Intrusion can be classified as: (i) misuse
intrusion, i.e., well defined attacks against
known system vulnerabilities; and (ii)
anomaly intrusion, i.e., activities based on
deviation from normal system usage
patterns.
• Intrusion detection systems are considered
effective security tools to defend against
such attacks [8].
• Research shows that current software in
mobile phone systems
– (i) do not have an efficient scheme to verify if a
call is out of the client patterns of
communications (in most of these systems
human staffs are used to identify cloned phones
and warn their clients in such situations);
– (ii) have no efficient ways to control and
identify the impostor; and
– (iii) use an “experimental satisfaction” to prove
the correctness of their security mechanisms.
Better, and more automated techniques for
security management and identification of
frauds, and impostors using cloned mobile
phones are needed.
– Some research uses neural network techniques
to classify phone users into groups according to
their past/current profiles. It is then relatively
easy to determine whether a call was made by
the actual subscriber, or an impostor/intruder
[8]. Such technology can be very effective in
battling and preventing cloning of mobile
devices and consequently result is substantial
savings and more security and privacy for
wireless service providers and their customers.
Concluding Remarks
• Wireless systems are quickly becoming an
important and increasingly essential part of
our every day activities.
• They provide unlimited potential for
convenience, more independence,
portability, availability, instantaneous, and
ubiquitous connectivity wherever we go.
• They promise great financial gains to the
companies that invest in the development,
marketing, sales, leasing, maintenance and
use of these quickly evolving and
increasingly smaller, easily portable, and
progressively more intelligent products.
• Wireless devices are expected to hold and
communicate a large amount of data and
information about every aspect of our lives.
• They are also expected to carry out
numerous, important, and sensitive financial
transactions, which can only be done in a
relatively secure and well-protected
environment.
• This protection and security is required to
varying degrees depending on the
application involved.
• The authors in [6] argue that the use of proxy
based architectures in popular environments such
as WAP and Palm.Net, where a different security
protocol (incompatible with SSL) is used between
the mobile client and the proxy/gateway (e.g.
WAP uses WTLS [16] and Palm.Net uses a
proprietary protocol on the wireless link) has some
drawbacks.
• This is the case, since the proxy constitutes a
“man-in-the-middle” which is involved in all
“secure” communications, in addition to being a
potential performance bottleneck.
• Some experiments show that SSL, which is a welltested and evaluated technology, is able to be
practically and efficiently used in current and the
future wireless and portable devices.
• This is particularly the case considering that the
capabilities of the CPU’s, memory, and bandwidth
of these devices is significantly improving every
day.
• This efficiency is achieved by carefully selecting
and implementing a subset of the protocol’s many
features (Full versus abbreviated SSL handshake
per example, etc.) to ensure acceptable
performance and compatibility with a large
installed base of secure web servers.
• All this can be done while maintaining a small
memory footprint. This is in concert with the
concept stated by the Ice Hockey Legend, Wayne
Gretzsky who said: “Don’t skate to the puck;
skate to where it’s going” [6].
• Wireless systems’ full potential and promise
can only be realized if the security aspects
of these systems are well considered.
• Proper design and implementation must be
done according to sound security principles,
which must be employed throughout the
analysis, design, implementation, testing,
and maintenance phases of these products
and systems.
• During their initial inception and the first years of
their introduction to the market, security was not a
major concern or design objective.
• However, this is quickly changing to take a proper
high priority in the design and implementation of
wireless systems.
• Considerable amount of research has been and is
being done to provide for more secure wireless
systems at every level of their architecture.
• This research is needed to provide security
mechanisms at the level of the portable device as
well as the supporting wired and wireless system
infrastructures.
References
1. Sandra Kay Miller, “Facing the Challenge of Wireless Security”, IEEE Computer. July
2001. Pages: 16-18.
2. S.F. Russell, “Wireless Network Security for Users”, Information Technology: Coding
and Computing, 2001. Proceedings. International Conference on, 2001. Pages: 172177.
3. William Stallings, “Wireless Communications and Networks”, Prentice-Hall, 2002.
4. W. Stallings, “Network and Internetwork Security Principles and Practice”, PrenticeHall, 1995.
5. P. Bahl, S. Venkatachary, “Secure Wireless Internet Access in Public Places”,
Communications, 2001. ICC 2001. IEEE International Conference on, Volume: 10,
2001. Page(s): 3271-3275.
6. V. Gupta, S. Gupta, “Experiments in Wireless Internet Security”, Wireless
Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, Volume:
2, Mar 2002. Page(s): 860 – 864.
7. A.S. Tosun, Feng Wu-Chi, “Lightweight Security Mechanisms for Wireless Video
Transmission”. Information Technology: Coding and Computing, 2001. Proceedings.
International Conference on, 2001. Pages: 157-161.
8. M.S.M.A.Notare, A. Boukerche, C. Westphal, “Safety and security for 2000
telecommunications”, EUROCOMM 2000. Information Systems for Enhanced Public
Safety and Security. IEEE/AFCEA , 2000. Page(s): 359 -363
9. D. Van Thanh, “Security issues in mobile ecommerce”, Database and Expert Systems
Applications, 2000. Proceedings. 11th International Workshop on, 2000. Page(s): 412 425
10. P. Ashley, H. Hinton, M. Vandenwauver, “Wired versus Wireless Security: The Internet,
WAP and imode for E-commerce”, Computer Society Applications Conference, 2001.
ACSAC 2001. Proceedings 17th Annual, 2001. Page(s): 296-306.
11. Rolf Oppliger, “Internet and Intranet Security”, Artech House Inc.,Norwood, MA. 1998.
12. Pekka Niskanen, “Inside WAP, Programming Applications with WML and
WMLScripts”, Addison-Wesley, 2001.
13. Eric Rescorla, “SSL and TLS”, Designing and Building Secure Systems. AddisonWesley, 2001.
14 .D. Denning, “Information Warfare and Security”, Addison-Wesley Publishers, 1999.
15. Eric Maiwald, “Network Security: A Beginner’s Guide”, Osborne/McGraw-Hill, 2001.
16. The WAP Forum, http://www.wapforum.org
17. GSM Association, http://www.gsmworld.com
18. Wireless Application Protocol Wireless Transport Layer Security Specification (WTLS),
http://www.wapforum.org/tech/documents/WAP-199-WTLS-20000218-a.pdf.
19. T. Dierks, C. Allen, The TLS Protocol – Version 1.0, RFC 2246, 1999.
20. R. Mann, “The Wireless Application Protocol”, Dr. Dobb’s Journal, October 1999.
21. J. Menezes, P.C. van Oorschot, and S.A. Vanston. “Handbook of Applied
Cryptography”, CRC Press, 1997.
22. Dankse Bank, Denmark, www.danskebank.dk
23. Nokia, KPN Mobile and Interpay Test Mobile Commerce Solution,
http://press.nokia.com/PR/200104/816440_5.html
24. Wireless Application Protocol Identity Module Specification,
http://www1.wapfoum.org/tech/documents/WAP-198-WIM-20000218-a.pdf
25. Wireless Application Protocol WMLScript Crypto Library Specification,
http://www1.wapforum.org/tech/documents/WAP-161-WMLScriptCrypto-19991105a.pdf
26. National Institute of Standards and Technology (NIST), “Data Encryption Standard”,
FIPS PUB 46-2, U.S. Department of Commerce (December 1993).
Download