Sei sulla pagina 1di 7

Art Survey of Secure Mobile Computing

P. Mounika
MTech 2nd Year, Dept. of CSE, CVSR College, Hyderabad, Telangana, India
S. Deepika
Assistant Professor, Dept. of CSE, CVSR College, Hyderabad, Telangana, India
Dr G. Vishnu Murthy
Associate Professor, Dept. of CSE, CVSR College, Hyderabad, Telangana, India

ABSTRACT: As more and more people person. A WPAN can be easily formed by
enjoy the various services brought by mobile replacing cables between computers and
computing, it is becoming a global trend in their peripherals, helping people do their
today’s world. At the same time, securing everyday chores or establish location aware
mobile computing has been paid increasing services. One noteworthy technique of
attention. In this article, we discuss the WPANs is a Bluetooth based network.
security issues in mobile computing However, WPANs are constrained by short
environment. We analyze the security risks communication range and cannot scale very
confronted by mobile computing and present well for a longer distance. Wireless local
the existing security mechanisms. area networks (WLANs) have gained
1. INTRODUCTION enhanced usefulness and acceptability by
The last few years have seen a true providing a wider coverage range and an
revolution in the telecommunications world. increased transfer rates. The most well-
Besides the three generations of wireless known representatives of WLANs are based
cellular systems, ubiquitous computing has on the standards IEEE 802.11 [1],
been possible due to the advances in HiperLAN and their variants. IEEE 802.11
wireless communication technology and has been the predominant standard for
availability of many light-weight, compact, WLANs, which support two types of
portable computing devices, like laptops, WLAN architectures by offering two modes
PDAs, cellular phones, and electronic of operation, ad-hoc mode and client-server
organizers. The term of mobile computing is mode. In ad-hoc (also known as peer-to-
often used to describe this type of peer) mode (Figure 1(a)), connections
technology, combining wireless networking between two or more devices are established
and computing. Various mobile computing in an instantaneous manner without the
paradigms are developed, and some of them support of a central controller. The client-
are already in daily use for business work as server mode (Figure 1(b)) is chosen in
well as for personal applications. Wireless architectures where individual network
personal area networks (WPANs), covering devices connect to the wired network via a
smaller areas (from a couple of centimeters dedicated infrastructure (known as access
to few meters) with low power transmission, point), which serves as a bridge between the
can be used to exchange information mobile devices and the wired network. This
between devices within the reach of a type of connection is comparable to a
centralized LAN architecture with servers device. As shown in Figure 1 an access
offering services and clients accessing them. point communicates with devices equipped
A larger area can be covered by installing with wireless network adaptors and connects
several access points, as with cellular to a fixed network infrastructure. Since there
structure having overlapped access areas. is no physical link between the nodes of the
wireless network and the access point, the
users transmit information through the “air”
and hence anyone within the radio range
(approximately 300 feet for 802.11b) can
easily intercept or eavesdrop on the
communication channels. Further, an
attacker can deploy unauthorized devices or
create new wireless networks by plugging in
unauthorized clients or setting up renegade
access points.
Constrained Network Bandwidth: The use of
Fig.1: WLAN Architectures
wireless communication typically implies a
2. WHY IS SECURITY AN ISSUE?
lower bandwidth than that of traditional
Security is a prerequisite for every network,
wired networks. This may limit the number
but mobile computing presents more
and size of the message transmitted during
security issues than traditional networks due
protocol execution. An attacker with the
to the additional constraints imposed by the
proper equipment and tools can easily flood
characteristics of wireless transmission and
the 2.4 GHz frequency, corrupting the signal
the demand for mobility and portability. We
until the network ceases to function. Since
address the security problems for both
the aim of this type of attack is to disable
infrastructure-based WLANs and
accessing network service from the
infrastructure-less ad hoc networks.
legitimate network users, they are often
Security Risks of Infrastructure-Based
named denial of service (DoS) attack.
WLANs Because a wireless LAN signal is
Denial of service can originate from outside
not limited to the physical boundary of a
the work area serviced by the access point,
building, potential exists for unauthorized
or can inadvertently arrive from other
access to the network from personnel
802.11b devices installed in other work
outside the intended coverage area. Most
areas that degrade the overall signal.
security concerns arise from this aspect of a
Energy Constrained Mobile Hosts: To
WLANs and fall into the following basic
support mobility and portability, mobile
categories:
devices generally obtain their energy
Limited Physical Security: Unlike traditional
through batteries or other exhaustive means,
LANs, which require a wire to connect a
hence they are considered as energy
user’s computer to the network, a WLAN
constrained mobile hosts. Moreover, they
connects computers and other components
are also resource-constraint relative to static
to the network using an access point (AP)
elements in terms of storage memory, SECURITY SCHEMES FOR AD HOC
computational capability, weight and size. In NETWORKS
WLANs, two wireless clients can talk
directly to each other, bypassing the access
point. A wireless device can create a new
type of denial of service attack by flooding
other wireless clients with bogus packets to
consume its limited energy and resources.
SECURITY COUNTERMEASURES
Secure mobile computing is critical in the
development of any application of wireless
networks.
Security Requirements
Fig.2: IEEE 802.11 Authentication Modes
Similar to traditional networks, the goals of
The IEEE 802.11b standard identifies
securing mobile computing can be defined
several security services such as encryption
by the following attributes: availability,
and authentication to provide a secure
confidentiality, integrity, authenticity and
operating environment and to make the
non-repudiation.
wireless traffic as secure as wired traffic. In
Availability ensures that the intended
the IEEE 802.11b standard, these services
network services are available to the
are provided largely by the WEP (Wired
intended parties when needed.
Equivalent Privacy) protocol to protect link-
Confidentiality ensures that the transmitted
level data during wireless transmission
information can only be accessed by the
between clients and APs. That is, WEP does
intended receivers and is never disclosed to
not provide any end-to-end security but only
unauthorized entities.
for the wireless portion of the connection.
Authenticity allows a user to ensure the
Apart from WEP, other well-known
identity of the entity it is communicating
methods that are built into 802.11b networks
with. Without authentication, an adversary
are: Service Set Identifier (SSID), Media
can masquerade a legitimate user, thus
Access Control (MAC) address filtering, and
gaining unauthorized access to resource and
open system or shared-key authentication.
sensitive information and interfering with
SSID: Network access control can be
the operation of users.
implemented using an SSID associated with
Integrity guarantees that information is
an AP or group of APs. Each AP is
never corrupted during transmission. Only
programmed with an SSID corresponding to
the authorized parties are able to modify it.
a specific wireless LAN. To access this
Non-repudiation ensures that an entity can
network, client computers must be
prove the transmission or reception of
configured with the correct SSID. Typically,
information by another entity, i.e., a
a client computer can be configured with
sender/receiver cannot falsely deny having
multiple SSIDs for users who require access
received or sent certain data.
to the network from a variety of different
locations. Because a client computer must authentication mode, and the problem of
present the correct SSID to access the AP, rogue AP is not solved.
the SSID acts as a simple password and, Virtual Private Networking (VPN): To
thus, provides a measure of security. further address the concerns with WEP
However, this minimal security is security, many organizations adopt the
compromised if the AP is configured to virtual private network (VPN) technology.
“broadcast” its SSID. When this broadcast The VPN approach has a number of
feature is enabled, any client computer that advantages. Firstly, it is scalable to a large
is not configured with a specific SSID is number of 802.11 clients and has low
allowed to receive the SSID and access the administration requirements for the IEEE
AP. MAC Address Filtering: While an AP 802.11 APs and clients. Secondly, the VPN
can be identified by an SSID, a client servers can be centrally administered and the
computer can be identified by a unique traffic to the internal network is isolated
MAC address of its 802.11b network card. until VPN authentication is performed.
To increase the security of an 802.11b Thirdly, if this approach is deployed then a
network, each AP can be programmed with WEP key and MAC address list
a list of MAC addresses associated with the management is not needed because of
client computers allowed to access the AP. security measures created by the VPN
If a client's MAC address is not included in channel itself. This is a good solution for
this list, the client is not allowed to associate networks, particularly with existing VPN
with the AP. MAC address filtering (along infrastructure for remote access. However,
with SSIDs) provides improved security, but though the VPN approach enhances the air-
is best suited to small networks where the interface security significantly, this
MAC address list can be efficiently approach does not completely address
managed. Each AP must be manually security on the enterprise network. For
programmed with a list of MAC addresses, example, authentication and authorization to
and the list must be kept up-to-date. enterprise applications are not always
WEP2: As an interim improved solution to addressed with this security solution. Some
the many flaws of WEP, the TGI Working VPN devices can use user-specific policies
Group of the IEEE proposed WEP2. to require authentication before accessing
Unfortunately, similar to major problems enterprise applications. Another drawback in
with WEP, WEP2 is not an ideal solution. the VPN solution is the lack of support for
The main improvement of WEP2 is to multicasting, which is a technique used to
increase the IV key space to 128 bits, but it deliver data efficiently in real time from one
fails to prevent IV replay and still permits source to many users over a network.
IV key reuse. The weakness of plaintext Multicasting is useful for streaming audio
exploits and same IV replay are the same and video applications such as press
with that in WEP. In WEP2, the conferences and training classes. Also, a
authentication is still a one-way minor issue of VPNs is that roaming
between wireless networks is not completely
transparent. Users receive a logon dialog propose ARAN, in which every node
when roaming between VPN servers on a forwarding a route request and route reply
network or when the client system resumes message must sign it. Although their
from standby mode. Some VPN solutions approach could provide strong security,
address this issue by providing the ability to performing a digital signature on every
“autore-connect” to the VPN. routing packet could lead to performance
IEEE 802.11i Robust Security Network bottleneck on both bandwidth and
(RSN) standard: To help overcome this computation. In [6], Zapata proposed a
security gap in wireless networks, the IEEE secure extension of the Ad Hoc On-demand
802.11 working group instituted Task Group Distance Vector routing protocol, named
i (802.11i) has proposed significant SAODV. The basic idea of SAODV is to
modifications to the existing IEEE 802.11 use RSA signature and one-way hash chain
standard as a long-term solution for security, (i.e., the result of n consecutive hash
called Robust Security Network (RSN). An calculations on a random number) to secure
interim draft of IEEE 802.11i is now the AODV routing messages. The
available, known as Wi-Fi Protected Access effectiveness of this approach is sensitive to
(WPA). The draft of IEEE 802.11i standard the tunneling attacks. IP spoofing is still
consists of three major parts: Temporal Key possible in SAODV routing protocol.
Integrity Protocol (TKIP), counter mode Trust and Key Management Most of the
cipher block chaining with message protocols discussed above make an
authentication codes (counter mode CBC- assumption that efficient key distribution
MAC) and IEEE 802.11x access control. and management has been implemented by
Secure Routing Establishing correct route some kind of key distribution center, or by a
between communicating nodes in ad hoc certificate authority, which has super power
network is a pre-requisite for guaranteeing to keep connecting to the network and can
the messages to be delivered in a timely not be compromised, but how to maintain
manner. If routing is misdirected, the entire the server safely and keep it available when
network can be paralyzed. The function of needed presents another major issue and can
route discovery is performed by routing not be easily solved. To mitigate this
protocols, and hence securing routing problem, the concept of threshold secret
protocols has been paid more attention. The sharing is introduced and there are two
routing protocols designed for ad hoc proposed approaches. Zhou and Hass [15]
networks assume that all the nodes within use a partially distributed certificate
the network behave properly according to authority scheme, in which a group of
the routing protocols and no malicious nodes special nodes is capable of generating partial
exist in the network. Obviously this certificates using their shares of the
assumption is too strong to be practical. The certificate signing key. This work is the first
use of asymmetric key cryptography have to introduce the threshold scheme into
been proposed [5][6] to secure ad hoc security protocols in ad hoc networks and
network routing protocols. Dahill et al. [5] provides an excellent guide to the following
work. The problem of this solution is that it Each network entity keeps track of other
still requires an administrative infrastructure entities’ collaboration using a technique
available to distribute the shares to the called reputation. The reputation is
special nodes and issue the public/private calculated based on various types of
key pairs to all the nodes. How to keep the n information. Since there is no incentive for a
special nodes available when needed and node to maliciously spread negative
how the normal nodes know how to locate information about other nodes, simple denial
the server nodes make the system of service attacks using collaborative
maintenance difficult. In [16], Kong et al. technique itself are prevented.
proposed another threshold cryptography 3. CONCLUSION
scheme by distributing the RSA certificate Mobile computing technology provides
signing key to all the nodes in the network. anytime and anywhere service to mobile
This scheme can be considered as having a users by combining wireless networking and
fully distributed certificate authority, in mobility, which would engender various
which the capabilities of certificate authority new applications and services. However, the
are distributed to all nodes and any inherent characteristics of wireless
operations requiring the certificate communication and the demand for mobility
authority’s private key can only be and portability make mobile computing
performed by a coalition of k or more nodes. more vulnerable to various threats than
This solution is better in the sense that it is traditional networks. Securing mobile
easier for a node to locate k neighbor nodes computing is critical to develop viable
and request the certificate authority service applications.
since all nodes are part of the certificate 4. REFERENCE:
authority service, but it requires a set of [1] “LAN Standards of the IEEE Computer
complex maintenance protocols. Society. Wireless LAN medium access
Service Availability Protection To protect control (MAC) and physical layer (PHY)
the network from the problem of service specification. IEEE Standard 802.11, 1999
unavailability due to the existence of selfish Edition,” 1999.
nodes, Buttyan and Hubaux proposed so- [2] D. P. Agrawal and Q-A. Zeng,
called Nuglets [17] that serve as a per-hop Introduction to Wireless and Mobile
payment in every packet or counters to Systems, Brooks/Cole publisher, 2002.
encourage forwarding. Both nuglets and [3] J. Walker, “Overview of IEEE 802.11b
counters reside in a secure module in each Security”,
node, are incremented when nodes forward http://www.intel.com/technology/itj/q22000/
for others and decremented when they send pdf/art_5.pdf.
packets as an originator. Another approach, [4] N. Borisov, I. Goldberg, and D. Wagner,
the Collaborative Reputation Mechanism “Intercepting Mobile Communications: the
(CORE) [18] is proposed, in which node Insecurity of 802.11”,
cooperation is stimulated by a collaborative http://www.isaac.cs.berkeley.edu/isaac/mobi
monitoring and a reputation mechanism. com.pdf.
[5] B. Dahill, B. N. Levine, E. Royer, and C.
Shields, “A Secure Routing Protocol for Ad
Hoc Networks,” Technical Report UM-CS-
2001-037, Electrical Engineering and
Computer Science, University of Michigan,
August 2001.
[6] M. G. Zapata, “Secure Ad hoc On-
Demand Distance Vector Routing,” ACM
SIGMOBILE Mobile Computing and
Communications Review, Vol. 6 , No. 3, pp.
106-107, 2002.
[7] Y. C. Hu and D. B. Johnson and A.
Perrig, “SEAD: Secure Efficient Distance
Vector Routing in Mobile Wireless Ad-Hoc
Networks,” Proceedings of the 4th IEEE
Workshop on Mobile Computing Systems
and Applications (WMCSA '02), pp. 3-13,
2002.
[8] Y. C. Hu, A. Perrig, and D. B. Johnson,
“Ariadne: A Secure On-Demand Routing
Protocol for Ad Hoc Networks,”
Proceedings of the 8th ACM International
Conference on Mobile Computing and
Networking, September, 2002.

Potrebbero piacerti anche