WiMAX poster

January 8, 2018 | Author: Anonymous | Category: Engineering & Technology, Electrical Engineering, Telecommunications
Share Embed Donate


Short Description

Download WiMAX poster...

Description

Northwestern Lab for Internet and Security Technology (LIST) Prasad Narayana, Sagar Vemuri, Yanmei Zhang, Yao Zhao, Nikos Liveris, Yan Chen, Hai Zhou, Judy Fu {p-narayana, s-vemuri, yanmei-zhang, jingo, n-liveris2, ychen, haizhou}@northwestern.edu, [email protected] http://list.cs.northwestern.edu/

Vulnerability Analysis of WiMAX Network Protocols

1. Motivation

2. Related Work

•IEEE 802.16 technology, popularly called as WiMAX, with enormous backing from the industry is set to lead the broadband wireless space

•Security Analysis of Mobile IP and IEEE 802.16 protocols largely confined to manual analysis •Fast evolution of the 802.16 standard resulted in many incomplete (and sometimes even incorrect!) analysis

• Security, as always, is key for it’s functioning and growth

3. Our Approach Manual Analysis

TLA Modeling

Identification of Security Loopholes, e.g., unprotected messages. Classification of vulnerability levels of Mobile IP and various IEEE 802.16e Protocol Processes

Formal Specification of the Protocol and Potential capabilities of the Attacker using TLA (Temporal Logic of Actions)

4. Work Done

Complete vulnerability search using TLC Model-Checker

Model of the adversary used in our analysis The Attacker can: Eavesdrop on and store messages Replay old / Inject spoofed messages Corrupt messages on the channel by causing collisions

•Completed the outsider threat analysis of IEEE 802.16e and Mobile IP protocols •Found a vulnerability in the Return Routability of Mobile IPv6 •Powerful attack to cause a service disruption for a large number of machines in foreign networks at a small cost •No need to change the MAC layer •Implemented and tested in our lab testbed MN

Logic-based Analysis

HA

AT

CN

•“Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols through TLA+”, in Proc. of the Second Workshop on Secure Network Protocols (NPSec), 2006.

5. Work in Progress •Analyze the EAP protocols thoroughly, especially EAP-SIM for GSM networks and EAP-AKA for 3G, CDMA2000.

Start Return Routability

•Focus on insider attacks to check protocol vulnerabilities after the authentication step

To Summarize our work, manual analysis has yielded insightful scenarios whereas TLA modeling has proved very useful due to the exhaustive nature of its search method

Restart Return Routability Silently Discard Bind Ack

Sponsor:

MIPv6 Return Routability Attack in action

View more...

Comments

Copyright � 2017 NANOPDF Inc.
SUPPORT NANOPDF