security issues, concepts and strategies in wireless and mobile systems by: imad jawhar

121
Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Post on 18-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Security Issues, Concepts and Strategies in Wireless And

Mobile SystemsBy: Imad Jawhar

Page 2: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Outline

• Introduction

• The wireless environment and systems

• Concepts and terminologies used in wireless security

• Some commonly used wireless and mobile systems and protocols

• Wireless application protocol (WAP)

Page 3: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Wireless transaction protocol (WTP)

• Wireless transport layer security (WTLS) protocol

• Some additional concerning WAP security

• Some research and future directions in wireless system security

• Conclusions

Page 4: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

The Wireless Environment

• Communications in the wireless environment has its own issues and challenges.

• Generally, it has the following characteristics:– Relatively low bandwidth and data rate.

– Relatively high error rates.

– Need for low power consumption to preserve battery life of mobile systems.

– Mobility of the nodes adds more complexity because of topology changes.

Page 5: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Signal fading.– Handoff issues.– And other challenges.– All of these issues affect design and design for

security

Page 6: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• There exists many forms of wireless communications and networking, and the number of these forms dynamically increasing.

• The following is a list of the some very popular forms of wireless communications.

Page 7: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Satellite Communications:– Uses microwave links and provides global

connection of many network infrastructures.– Three types of satellites:

• GEO: Geostationary Earth Orbit Satellites.

• MEO: Medium Earth Orbit Satellites.

• LEO: Low Earth Orbit Satellites.

Page 8: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Cellular Networks:– Widely used recently. Quickly increasing in

popularity all over the world.– Geographic area is divided into cells.– Each cell is serviced by a base station (BS).– Several stations are served by a Mobile

Telecommunications Switching Office (MTSO), or a similar structure.

Page 9: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Base station connects mobile users to MTSO.– MTSO connects base station (BS’s) to

telephone switching office.– The first generation of systems was AMPS

(Advanced Mobile Phone Service) which used analog communications

Page 10: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The second generation uses digital traffic channels, encryption, error detection, correction, and allow channel access to be dynamically shared by all users.

Page 11: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Third generation systems will have:– Voice quality that is comparable to public

switched telephone networks.– Higher data rates.– Symmetrical and asymmetrical data

transmission rates.– Support for both packet and circuit switched

data services.

Page 12: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Adaptive interface to the Internet to reflect common asymmetry between inbound and outbound traffic.

– More efficient use of available spectrum– Support for wide variety of mobile .equipment.– More flexibility to accept new services and

techniques.

Page 13: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Cordless Systems:– Used inside homes and buildings.– Allow wireless communications between

cordless devices such as a telephone to a single multiple base stations using TDMA (Time Division Multiple Access) and TDD (Time Division Duplex) communications.

Page 14: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Wireless Local Loop (WLL):– Increasingly more popular way to provide

wireless last mile connections between the end user and the local switching telephone center.

– Allows reduction in installation cost, and time.– Selective installation is possible (only install

when customer desires service, not in anticipation of the customer desiring service).

Page 15: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Mobile IP:– Allows nomadic access to the Internet from

different access points.– A user is able to maintain connectability to the

Internet while moving from one access point to another.

– It uses process registration, agent solicitation, move detection, and tunneling to achieve this objective.

Page 16: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Wireless Local Area Networks (WLANs):– Rapidly becoming very popular.– This is due to many characteristics such as:

• Need for mobility.

• Cost effectiveness.

• Convenience.

• Rapid deployment ability.

Page 17: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Decrease in size of electronic and digital equipment.

• Speed of mobile computing devices.

Page 18: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• There are four types of wireless LANs .

• LAN Extension:– Provide wireless connections of mobile

computing units to a wired network.– Used in manufacturing, stock exchange, and

warehouses.

Page 19: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Cross-building Interconnect:– Used to provide wireless connections between

buildings.– Uses microwave communications with dish

shaped antennas.– More of a link than a LAN.

Page 20: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Nomadic Access:– Used to provide connectivity from mobile units

such as a laptop, PDA or other computing devices to a fixed campus network per example.

Page 21: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Ad Hoc Networking:– Also called rapidly deployable networks.– An increasingly popular form of establishing

networks between mobile computing devices, such as laptops, computers inside moving vehicles.

– The temporary wireless network is established dynamically on the fly.

Page 22: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Very dynamic in nature because topology changes while nodes move from one location to another, and nodes dynamically move in and out of each other’s range and are added and deleted to the network all together.

Page 23: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Require robust communications algorithms and protocols, which have the following characteristics:

• Can quickly adapt to the changing network topology.

• Maintain efficient connectivity and routing between various nodes while wireless links are lost and established dynamically as nodes move in and out of each other’s range.

Page 24: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– There are numerous applications for Ad Hoc Networks, such as:

• Tactical military operations.

• Conferences.

• Campus and classroom environments.

• Disaster recovery.

• Search and rescue operations.

• And so on.

Page 25: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Bluetooth:– A wireless communications protocol.– Originally started by Ericsson.– Quickly became adopted by a consortium of

companies in the computer industry.– Grew from a few companies to thousands

including all of the major companies in the industry.

Page 26: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Designed to establish and maintain connections between various computing devices and electronic equipment such as: Computers, cellular phones, PDA’s, and so on.

– This is done wirelessly avoiding the need for wires to establish the connections.

– Intended to work in a close proximity environments such as homes, offices, classrooms, hospitals, airports, etc.

Page 27: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Connections are established by designating master and slave nodes.

– It uses profiles for different devices, which characterize the applications.

– There are types of communication links which are multiplexed over the same RF (Radio Frequency):

• Synchronous Connection-oriented (SCO) for voice.

• Asynchronous connectionless (ACL) links for data.

Page 28: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Uses Frequency-hopping spread spectrum with a high rate 1600 hops/sec to reduce interference, and provide low power, and low cost of radio communications.

– Operates in the ISM band at 2.45 GHz with a transmission of 1 to 100 mW, and a range of 10 to 100 meters, and a maximum bit rate of 1 Mbps, and an effective data transfer rate of 721 Kbps.

Page 29: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

802.11 wireless standard

• This is a wireless LAN standard.• which is increasingly being adopted by

many wireless devices to establish communications at the physical and data link layers of the OSI model.

• In 2000 vendors sold around a million 802.11 network interface cards, and sales are expected to go up to 3.9 million in 2004

Page 30: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Security Issues

• Importance of wireless systems.• In every aspect of our lives.• Sensitivity of information shared on

wireless systems (increasingly important) financial, personal, social, confidential, etc.

• example: wireless cameras (watching nanny and baby in house…the whole block watching).

Page 31: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Security services needed

• (especially in e-commerce transactions)

• User authentication: The process of proving to the system that the user is whom he/she says he/she is.

Page 32: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Data authentication: It is further subdivided into two sub-services.

• The first is data integrity, which is the process of guaranteeing to the receiver that the data was not changed during the transmission process.

• The second is data origin authentication is the process of proving to the receiver that the data was actually sent by the stated sender.

Page 33: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Data confidentiality: It ensures that unintended parties are not able to read the data while in transit. Encryption is used to achieve this objective.

Page 34: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Authorization:• It is the process of ensuring that only authorized users are

allowed to access the data/resources. In a “closed system” a user is not allowed access without explicit authorization. Typically, this is the desired model of secure systems. On the other hand, in an “open system” a user is allowed access (implicit authorization) unless specifically deauthorized by the system. The latter model is undesirable for the design of secure systems, unless absolutely necessary because of the nature of the application (a public library, etc.)

Page 35: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Audit: An audit trail is used to keep track of who, when, what, and how transactions took place in a system. This audit trail can be an essential tool for after the fact analysis in cases intentional or unintentional security attacks. It can also be used by intrusion detection algorithms to detect and prevent current and future attacks.

Page 36: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Non-repudiation: This is an important service that is essential for the proper operation of certain e-commerce transactions. It is the process of guaranteeing that a certain user actually did issue a certain order or required a certain transaction. Non-repudiation is usually implemented using digital signatures, which are unique to users and provide proof that a particular user initiated a particular transaction.

Page 37: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Some Commonly Used Mobile and Wireless and Mobile Systems and Protocols:

• 802.11

• Bluetooth

• Mobile IP

Page 38: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

IEEE 802.11

• This is a wireless LAN standard.• which is increasingly being adopted by

many wireless devices to establish communications at the physical and data link layers of the OSI model.

• In 2000 vendors sold around a million 802.11 network interface cards, and sales are expected to go up to 3.9 million in 2004

Page 39: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The 802.11 architecture uses the wired equivalent privacy protocol (WEP).

• Data is encrypted with WEP to protect the wireless link between clients and access points.

• Network administrators distribute a WEP-algorithm-based key for authorized users, which prevents access by unauthorized users.

Page 40: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The protocol has authentications, deauthentication (this service is invoked whenever an existing authentication is to be terminated), and privacy provisions [1] [3].

• Authentication (and deauthentication) services are used for establishing identity of a station.

• The standard does not specify any particular authentication scheme.

Page 41: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Privacy services are used to prevent the content of messages from being read by other than intended recipients [3].

Page 42: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Bluetooth

• This is a wireless communications protocol, which was originally started by Ericsson.

• quickly became adopted by a consortium of companies in the computer industry.

• The consortium grew from a few companies to thousands including all of the major companies in the industry.

Page 43: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• It is designed to establish and maintain connections between computing devices, and electronic equipment, such as computers, PDA’s, cell phones, and so on, wirelessly avoiding the need for wires.

• It is intended to work in a close proximity environment, such as homes, offices, classrooms, hospitals, airports, etc.

Page 44: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Connections are established using designated master and slave nodes.

• It uses profiles for different devices, which characterize the applications, synchronous connection-oriented (SCO) for data, and asynchronous connectionless (ACL) links for voice, which are multiplexed on the same RF link.

Page 45: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Frequency-hopping spread spectrum with a high 1600 hops/sec rate is used to reduce interference, and provide low power, low cost radio communications.

• It operates in the ISM band at 2.45 GHz with a transmission power of 1 to 100 mW and a range of 10 to 100 meters, and a maximum bit rate of 1 Mbps, and an effective data transfer rate of 721 Kbps.

Page 46: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Up to 8 devices can communicate in a Piconet with one device acting as the master and the other devices as slaves. Several Piconet in one area can form a “Scatternet” in which all nodes use the same frequency range with each “Piconet” using a different hop sequence.

Page 47: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The bluetooth baseband specification defines a facility for link security between any two Bluetooth devices, consisting of the following elements [3]:

- Authentication

- Encryption (privacy)

- Key management and usage.

Page 48: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The security algorithms use four parameters:– Unit address: The 48-bit device address, which

is publicly known.

– Secret authentication key: A secret 128-bit key.

– Secret Privacy key: A secret key of length from 4 to 128 bits.

Page 49: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Random number: A 128-bit random number derived from a pseudorandom generation algorithm executed in the Bluetooth unit.

• The two secret keys are generated and configured with the unit and are not disclosed.

Page 50: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The authentication process is used to provide verification of the claimed identity of one of the two Bluetooth devices involved in an exchange.

• Authentication is done by verifying that the two devices share the same preconfigured authentication key.

Page 51: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Encryption of packet payload can be used to protect user information. The access code and the packet header are never encrypted.

• The encryption is done using an encryption algorithm known as E0 [3]. For each packet transmission, a new encryption key is generated.

Page 52: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The algorithm generates a one-time payload key by combining in a complex fashion a random number, which is sent to the slave, the master's address, the current clock value and a shared secret key. Because the clock value changes for each encryption, a different encryption key is used each time, enhancing security.

Page 53: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Mobile IP• It is used to enable computers to maintain

Internet connectivity while moving from one Internet attachment point to another.

• It uses the concept of home and foreign networks and home and foreign agents.

• Messages intended for a certain node, which are sent to its home network, are forwarded to a care of address to the mobile node at the foreign network where it is registered previously when the move was detected.

Page 54: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The forwarding process uses datagram-tunneling and encapsulation options, which include IP-within-IP, minimal-encapsulation, or Generic routing encapsulation (GRE) [3].

• Mobile IP has security features, which are essential to its operation. This is because a wide variety of attacks could be used by an unauthorized user to access information of another user.

Page 55: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• It uses message authentication, registration request and reply contain authentication extensions with security parameter index (SPI) and authenticator.

• Authentication procedures are carried out to secure mobile-home (mobile node/home communication), mobile-foreign (mobile node/foreign agent communications), and foreign-home (foreign agent/home agent communications).

Page 56: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Wireless Application Protocol (WAP)

• This is an open standard, which provides mobile users of wireless terminals such as wireless phones, pagers, and PDA’s access to telephony and information services [3].

• It is designed to work with all wireless network technologies such as GSM, CDMA, and TDMA.

• It is based on existing Internet standards such as IP, XML, HTML, and HTTP [3] [10] [9] [12].

Page 57: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The WAP forum is an industry association of over 500 members “that has developed the de-facto world standard for wireless information and telephony services on digital mobile phones and other wireless terminals” [16].

• In the latest class of secure wireless protocols from the WAP Forum, client-side certificates are specified and used as part of client-side authentication and non-repudiation services [10].

Page 58: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Users are able to access e-commerce sites from new wireless devices such as PDAs and mobile phones.

Page 59: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

The WAP Specification:

• WAP defines an open, standard architecture, and a set of protocols for the implementation of wireless access to the Internet.

• The WAP specifications include [14] [3]:

Page 60: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• An XML-type markup language, Wireless Markup Language (WML): It has text and image support with formatting layout and commands.

• Deck/card organizational metaphor (documents subdivided into cards which specify one or more units of interaction), and support for navigation among cards and decks.

Page 61: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• A sample of WML code, consider the following simple deck with one card [20].

• <wml>• <card id=’card1’>• <p>• Hello WAP World.• </p>• </card>• </wml>

Page 62: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The tags <wml>, <card>, and <p> enclose the deck, card, and paragraph, respectively. When a wireless device receives this code, it will display the message “Hello WAP World” on the terminal’s screen.

• The book in [3] has a table with all of WML tags, which are divided into eight functional groups: Deck Structure, Content, Formatting, User Input, Variables, Tasks, and Task/Event Bindings. Refer to [3] [12] for more information on the WML language.

Page 63: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• A “microbrowser” specification: It defines how WML and WMLScripts are determined in the wireless device.

• A lightweight protocol stack: Wireless Session Protocol is equivalent to HTTP in a compressed format. Designed to minimize bandwidth use allowing different wireless networks, with varying bandwidth capacities, to run WAP applications.

Page 64: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Framework for Wireless Telephony Applications (WTA): It provides access to traditional telephony services (such as Call Forwarding) through WMLScripts.

• Provisioning: It allows Service Providers to reconfigure mobile devices remotely using Short Messaging System (SMS), which is a GSM standard [17].

Page 65: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Components of the WAP Architecture

• The WAP model consists of three elements: the client, gateway, and original server. This is shown in figure 1.

• The gateway serves as a proxy, which connects the wireless device/s to the original server.

• HTTP is used to communicate between the gateway and the original server.

Page 66: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The WAP gateway performs functions, which are spared from the relatively less capable processor in the wireless devices.

• It provides DNS service, converts between the WAP protocol stack (protocols that have been optimized for low bandwidth, low power consumption, limited screen sized, and limited storage) and the traditional WWW stack which includes HTTP and TCP/IP.

• encodes/decodes information from the wired web to more compact form.

Page 67: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• which is more easily digested and displayed by the more limited wireless device.

• This reduces the amount of data communicated wirelessly.

• The gateway also reduces communication overhead and latency by caching recently requested web pages and information.

Page 68: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Figure 1 – The WAP Programming Model.

Client Original Server

WAE user agent

Gateway

Encoders andDecoders

Content

CGIScripts, etc.

Response (content)Encoded response

RequestsEncoded requests

Page 69: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• WAP specifications have several components to provide secure communications.

• These components include the WTLS protocol, WAP identity module (WIM) smart cards for storing user certificates, and functions such as Crypto.signText(), which is used for signing of WAP transactions.

Page 70: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• As shown in figure 2, the WAP Protocol Stack is a layered architecture which consists of several protocol layers.

• We will briefly describe each of the layers and focus on the the WTP and WTLS layers in this paper.

• On top is the Wireless Markup Language (WML) (described later), and WMLScript layer, which is a scripting language with similarities to JavaScript.

Page 71: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Below WML and WMLScript is the Wireless Application Environment (WAE) layer, which specifies an application framework for wireless devices such as mobile phone, pagers, and PDAs.

• WAE consists of tools and formats that are designed to ease the task of developing applications and devices supported by WAP.

Page 72: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Wireless Application Environment (WAE)

Wireless Transaction Protocol (WTP)

Wireless Session Protocol (WSP)

Wireless Transport Layer Security (WTLS)

Wireless Markup Language (WML) WMLScript

Wireless Datagram Protocol (WDP)

UDP

GSM

IP

D-AMPS IS-95 3G Bluetooth

Figure 2 – WAP Protocol Stack.

Page 73: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The WAE layer is followed by the Wireless Session Protocol (WSP).

• WSP provides applications with an interface for two session services connection-oriented operating over the Wireless Transport Protocol (WTP) (comparable to TCP on the in wired networks) and connectionless operating over the unreliable transport protocol called Wireless Datagram Protocol (WDP) (comparable to UDP in wired networks).

Page 74: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Basically, WSP is based on HTTP with some modifications and additions to optimize its use over wireless links.

• Below the WSP layer, resides the Wireless Transaction Protocol (WTP), which will be described later.

• Then below WTP, resides the Wireless Transport Layer Security (WTLS), which will also be discussed later.

Page 75: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Below the WTLS layer, follows the Wireless Datagram Protocol (WDP), which in turn operates on top of the a number of bearer service providers such as GSM, D-AMPS, IS-95, 3G, Bluetooth, etc.

• We will only concentrate on the WTP and WTLS layers in this presentation.

Page 76: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Wireless Transaction Protocol (WTP)

• WTP manages transactions by conveying requests and responses between a user agent (such as a WAP browser) and an application server for such activities as browsing and e-commerce transactions [3].

• It provides reliable transport services without the undesirable overhead of TCP, which is the transport layer protocol, used in wired networks.

Page 77: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• This results in a lightweight protocol more suitable for implementation in “thin” clients (such as wireless/mobile devices) and over low-bandwidth wireless links.

• It includes the following features: – Optional user-to-user reliability: WTP user triggers

the confirmation of each received message.– Optional out-of-band data on acknowledgments.

Page 78: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– PDU concatenation and delayed acknowledgment to reduce the number of messages sent.

– Asynchronous transactions.– Three classes of transaction services to provide:

unreliable datagram service, reliable datagram service, and request/response transaction service and support the execution of multiple transactions during one WSP session.

Page 79: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

The Wireless Transport Layer Security (WTLS) Protocol

• The WAP protocol stack includes security features in its Wireless Transport Layer Security (WTLS) layer, which is directly below the Wireless Transaction Protocol (WTP).

Page 80: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

WTLSHandshakeProtocol

WTLS AlertProtocol

WTP

WTLS Record Protocol

WTLS ChangeCipher SpecProtocol

Figure 3 – WTLS Protocol Stack

WDP or UDP/IP

Page 81: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Security of WAP transactions is achieved using the WTLS protocol [18] [3].

• The WTLS protocol provides entity authentication, data confidentiality, and data integrity.

• It is based on the IETF SSL/TLS protocols [10][19]. WTLS provides security for communications between the WAP wireless device and the WAP Gateway.

Page 82: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• As shown in figure 3, the WTLS Protocol Stack includes WTLS handshake protocol, WTLS Change Cipher Spec Protocol, WTLS Alert Protocol, and WTP at the top. Below resides the WTLS Record Protocol, which in turn lays on top of the WDP or UDP/IP layer.

Page 83: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The function of the WTLS Record Protocol is to take the user data from the next higher layer (WTP, WTLS handshake protocol, WTLS Alert Protocol, WTLS change cipher spec protocol) and encapsulates the data in a PDU (Protocol Data Unit) [3].

• The PDU contains the data in a compressed, and encrypted form with a WTLS record header appended to it. Encryption is done using a symmetric encryption algorithm. The allowable encryption algorithms are DES, triple DES, RC5 and IDEA [13].

Page 84: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The WTLS protocol has three different classes of service [10]:– Class 1: This class implements

unauthenticated Diffie-Hellman key exchange to establish the session key. Early WAP devices only implement this level, which is insufficient and should not be used for e-commerce transactions [21].

Page 85: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Class 2: This class enforces server side authentication using public key certificates similar to SSL/TLS protocol. The WAP Gateway uses a WTLS certificate, which is a particular form of X.509 certificate compressed to save bandwidth. This level is used in currently available devices, which are being used in several read-only access and in-economy banking applications in Europe and the UK [22].

Page 86: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Class 3: Using this class, clients are able to authenticate using client side certificates, which are regular X.509 format. These certificates can be stored either on the client or on a publicly accessible server with a pointer to the certificate stored in the wireless device. This class is beginning to be used in wireless phones [23].

Page 87: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Nokia, KPN Mobile, and Interpay Nederland have successfully tested financial transaction on a mobile network [23], based on WIM technology, which is a part of the WAP 1.2 (Wireless Application Protocol) specification.

• With this real time payment solution, a mobile telecommunications network operator, a mobile phone and infrastructure manufacturer and a payment processor have made improvement in security for mobile commerce transactions.

Page 88: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The solution is based on WIM (Wireless Identity Module), which is a mobile Internet technology enabling more secure transactions.

• Non-repudiation of transactions is ensured by a digital signature. In practice, this means users can perform transactions safely using a single PIN-code.

• In addition, built-in security elements in the terminal and network ensure more secure and reliable transactions.

Page 89: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Class 3 security services, which are in the process of being offered by different wireless device manufacturers such as Nokia and Motorola, are expected to allow banking institutions to enhance their current wireless e-commerce services to allow “out-of-economy” transactions.

Page 90: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• As shown in figure 3, the WTLS protocol stack also contains the following protocols:

• The Change Cipher Spec Protocol: – The cipher spec is associated with the current

transaction.

– It specifies the encryption algorithm, the hash algorithm used as part of HMAC, and cryptographic attributes, such as MAC code size. This protocol is used in the process of establishing the cipher suite used for subsequent communications during a session.

Page 91: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The Alert Protocol: – Used to convey WTLS-related alerts to the peer entity.

Alert messages are compressed and encrypted as well.

• The Handshake Protocol in the WTLS:– It allows the server and client to authenticate each

other and to negotiate an encryption and MAC algorithm and cryptographic keys to be used to protect the data sent in the WTLS record. The Handshake protocol is used to establish the security provisions before any application data is exchanged [3].

Page 92: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Some Additional Issues Concerning WAP Security:

• Research has identified some additional issues regarding the security of WAP based systems. The following are some of these issues.

Page 93: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• About Maintenance of the WAP Gateway:– The WAP Gateway can be maintained by the

Wireless Service Provider (WSP) or by the Enterprise (on the server side).

– If the WSP maintains the WAP gateway however, some literature [10] refers to the presence of a security “gap” caused by the ending of the Wireless Transport Layer Security (WTLS) session at the Gateway.

Page 94: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– The data is temporarily in clear text on the Gateway until it is re-encrypted under the SSL session established with the Enterprise’s web server.

– In such cases, the WAP Gateway should be maintained at the Enterprise. A more detailed discussion of this issue is presented in [10].

Page 95: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The WAP Identity Module (WIM):– New generation of WAP phones will provide

WIM to facilitate client side authentication [24]. WIM is used to implement WTLS protocol Class 3 functionality.

– It has embedded support for public key cryptography. With the WIM implementation, RSA [21] is mandatory and Elliptic Curve Cryptography [21] is optional.

Page 96: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Smart card is one possible implementation of WIM. It could be a part of the SIM (subscriber identity module) card in a cellular phone (in GSM [17]) or an separate smart card (WIM card).

– A combination of SIM-WIM card is typically called a SWIM card. The WIM card would be configured by the manufacturer with two sets of private-public key pairs (one for signing and one for authentication), and two manufacturer’s certificates.

Page 97: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– All WTLS sessions established through a WIM and a WAP Gateway will use the same public keys for initial session negotiations.

– A WIM is able to store a number of certificates or user certificate references, such as a URL-based reference.

– A user will be required to register a certificate at each Enterprise (such as a Bank, etc.).

– The WIM must be tamper resistant to make it not feasible to extract or change information in the module, because it contains user private keys, which never leave the WIM.

Page 98: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

User Identification and Authentication in WAP

• The type of user identification and authentication possible in WAP differs with the WTLS class of service used.

• Username/password identification and authentication can be used with WML forms exchanged between the server and the wireless device.

• It is also possible to have client-side identification and authentication based on the public/private key pair that is hardcoded on the WIM card and bound with the user’s name in their certificate.

Page 99: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Non-repudiation in WAP: – It requires client side certificates that bind the

user’s signing key with their name. – The WAP browser, on the WAP device,

provides WMLScript function, Crypto.signText() [25], which achieves this purpose using different scenarios depending on the implementation.

Page 100: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Some Research and Future Directions in Wireless Systems

Security• What is Secure Sockets Layer (SSL) ?

– SSL is the most widely deployed and used security protocol in the world.

– Essentially every commercial Web browser and server supports secure Web transactions using SSL.

– You are almost certainly using SSL every time you buy online using “secure” Web pages [13]. Currently, tens of billions of dollars worth of SSL transactions occur per year.

Page 101: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– SSL is mostly used for securing Web traffic transactions, however, it is a general protocol suitable for securing many other types of traffic.

– In addition to the World Wide Web, SSL and its successor, Transport Layer Security (TLS), are used in other popular applications such as File Transfer Protocol (FTP), remote object access (RMI, CORBA, IIOP), e-mail transmission (SMTP), remote terminal service (Telnet) and directory access (LDAP) to secure their transactions.

Page 102: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– As will be shown later in this paper, SSL is currently being used in different stages of the transaction communications between wireless devices and the wired infrastructure.

Page 103: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

On Using SSL in Wireless Communications

• Due to the perceived relative decrease in capabilities of wireless device CPUs and lower bandwidth capabilities of wireless channels, there is a drive away from SSL and toward security architectures designed for wireless transactions that lack end-to-end security.

• However, some literature [6] show that SSL is a practical solution for end-to-end transaction security of wireless Internet applications even considering the limitation of the wireless devices and environment.

Page 104: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

The Development of Lightweight Security Mechanisms for Wireless Multimedia

Traffic Transmission

• In addition to the above protocols, and architectures, research is being done in order to design “lightweight” encryption algorithms for MPEG video transmission.

• In [7], researchers propose to provide encryption of video data while increasing the decodability of the video stream in the presence of errors.

Page 105: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• These algorithm explore the predictable relationship between the I, P, and B-frames of compressed video, and decrease the expected number of bit errors left in the data after encoding.

• For more information on these techniques the reader is referred to [7].

Page 106: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

On Security of Mobile Phone Communications

• Furthermore, some research is being done on the security management planning for telecommunication systems, with focus on intrusion detection and cloning mobile phone problems.

• In [8], researchers discuss mobile phone network security management planning with its various aspects such as access control, confidentiality, authentication, non-repudiation, and integrity of data communications.

Page 107: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The research also addresses intrusion detection systems design for mobile phone communications.

• Intrusion can be classified as: (i) misuse intrusion, i.e., well defined attacks against known system vulnerabilities; and (ii) anomaly intrusion, i.e., activities based on deviation from normal system usage patterns.

Page 108: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Intrusion detection systems are considered effective security tools to defend against such attacks [8].

• Research shows that current software in mobile phone systems – (i) do not have an efficient scheme to verify if a call is

out of the client patterns of communications (in most of these systems human staffs are used to identify cloned phones and warn their clients in such situations);

Page 109: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– (ii) have no efficient ways to control and identify the impostor; and

– (iii) use an “experimental satisfaction” to prove the correctness of their security mechanisms. Better, and more automated techniques for security management and identification of frauds, and impostors using cloned mobile phones are needed.

Page 110: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

– Some research uses neural network techniques to classify phone users into groups according to their past/current profiles. It is then relatively easy to determine whether a call was made by the actual subscriber, or an impostor/intruder [8]. Such technology can be very effective in battling and preventing cloning of mobile devices and consequently result is substantial savings and more security and privacy for wireless service providers and their customers.

Page 111: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

Concluding Remarks

• Wireless systems are quickly becoming an important and increasingly essential part of our every day activities.

• They provide unlimited potential for convenience, more independence, portability, availability, instantaneous, and ubiquitous connectivity wherever we go.

Page 112: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• They promise great financial gains to the companies that invest in the development, marketing, sales, leasing, maintenance and use of these quickly evolving and increasingly smaller, easily portable, and progressively more intelligent products.

• Wireless devices are expected to hold and communicate a large amount of data and information about every aspect of our lives.

Page 113: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• They are also expected to carry out numerous, important, and sensitive financial transactions, which can only be done in a relatively secure and well-protected environment.

• This protection and security is required to varying degrees depending on the application involved.

Page 114: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• The authors in [6] argue that the use of proxy based architectures in popular environments such as WAP and Palm.Net, where a different security protocol (incompatible with SSL) is used between the mobile client and the proxy/gateway (e.g. WAP uses WTLS [16] and Palm.Net uses a proprietary protocol on the wireless link) has some drawbacks.

• This is the case, since the proxy constitutes a “man-in-the-middle” which is involved in all “secure” communications, in addition to being a potential performance bottleneck.

Page 115: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Some experiments show that SSL, which is a well-tested and evaluated technology, is able to be practically and efficiently used in current and the future wireless and portable devices.

• This is particularly the case considering that the capabilities of the CPU’s, memory, and bandwidth of these devices is significantly improving every day.

Page 116: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• This efficiency is achieved by carefully selecting and implementing a subset of the protocol’s many features (Full versus abbreviated SSL handshake per example, etc.) to ensure acceptable performance and compatibility with a large installed base of secure web servers.

• All this can be done while maintaining a small memory footprint. This is in concert with the concept stated by the Ice Hockey Legend, Wayne Gretzsky who said: “Don’t skate to the puck; skate to where it’s going” [6].

Page 117: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• Wireless systems’ full potential and promise can only be realized if the security aspects of these systems are well considered.

• Proper design and implementation must be done according to sound security principles, which must be employed throughout the analysis, design, implementation, testing, and maintenance phases of these products and systems.

Page 118: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

• During their initial inception and the first years of their introduction to the market, security was not a major concern or design objective.

• However, this is quickly changing to take a proper high priority in the design and implementation of wireless systems.

• Considerable amount of research has been and is being done to provide for more secure wireless systems at every level of their architecture.

• This research is needed to provide security mechanisms at the level of the portable device as well as the supporting wired and wireless system infrastructures.

Page 119: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

References1. Sandra Kay Miller, “Facing the Challenge of Wireless Security”, IEEE Computer. July 2001.

Pages: 16-18.

2. S.F. Russell, “Wireless Network Security for Users”, Information Technology: Coding and Computing, 2001. Proceedings. International Conference on, 2001. Pages: 172-177.

3. William Stallings, “Wireless Communications and Networks”, Prentice-Hall, 2002.

4. W. Stallings, “Network and Internetwork Security Principles and Practice”, Prentice-Hall, 1995.

5. P. Bahl, S. Venkatachary, “Secure Wireless Internet Access in Public Places”, Communications, 2001. ICC 2001. IEEE International Conference on, Volume: 10, 2001. Page(s): 3271-3275.

6. V. Gupta, S. Gupta, “Experiments in Wireless Internet Security”, Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, Volume: 2, Mar 2002. Page(s): 860 – 864.

7. A.S. Tosun, Feng Wu-Chi, “Lightweight Security Mechanisms for Wireless Video Transmission”. Information Technology: Coding and Computing, 2001. Proceedings. International Conference on, 2001. Pages: 157-161.

8. M.S.M.A.Notare, A. Boukerche, C. Westphal, “Safety and security for 2000 telecommunications”, EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security. IEEE/AFCEA , 2000. Page(s): 359 -363

Page 120: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

9. D. Van Thanh, “Security issues in mobile ecommerce”, Database and Expert Systems Applications, 2000. Proceedings. 11th International Workshop on, 2000. Page(s): 412 -425

10. P. Ashley, H. Hinton, M. Vandenwauver, “Wired versus Wireless Security: The Internet, WAP and imode for E-commerce”, Computer Society Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual, 2001. Page(s): 296-306.

11. Rolf Oppliger, “Internet and Intranet Security”, Artech House Inc.,Norwood, MA. 1998.12. Pekka Niskanen, “Inside WAP, Programming Applications with WML and WMLScripts”,

Addison-Wesley, 2001.13. Eric Rescorla, “SSL and TLS”, Designing and Building Secure Systems. Addison-Wesley,

2001.14 .D. Denning, “Information Warfare and Security”, Addison-Wesley Publishers, 1999.15. Eric Maiwald, “Network Security: A Beginner’s Guide”, Osborne/McGraw-Hill, 2001.16. The WAP Forum, http://www.wapforum.org17. GSM Association, http://www.gsmworld.com18. Wireless Application Protocol Wireless Transport Layer Security Specification (WTLS),

http://www.wapforum.org/tech/documents/WAP-199-WTLS-20000218-a.pdf.

Page 121: Security Issues, Concepts and Strategies in Wireless And Mobile Systems By: Imad Jawhar

19. T. Dierks, C. Allen, The TLS Protocol – Version 1.0, RFC 2246, 1999.

20. R. Mann, “The Wireless Application Protocol”, Dr. Dobb’s Journal, October 1999.

21. J. Menezes, P.C. van Oorschot, and S.A. Vanston. “Handbook of Applied Cryptography”, CRC Press, 1997.

22. Dankse Bank, Denmark, www.danskebank.dk

23. Nokia, KPN Mobile and Interpay Test Mobile Commerce Solution, http://press.nokia.com/PR/200104/816440_5.html

24. Wireless Application Protocol Identity Module Specification, http://www1.wapfoum.org/tech/documents/WAP-198-WIM-20000218-a.pdf

25. Wireless Application Protocol WMLScript Crypto Library Specification, http://www1.wapforum.org/tech/documents/WAP-161-WMLScriptCrypto-19991105-a.pdf

26. National Institute of Standards and Technology (NIST), “Data Encryption Standard”, FIPS PUB 46-2, U.S. Department of Commerce (December 1993).