55
1 Securing Mobile Networks An Enabling Technology for National and International Security and Beyond

Securing Mobile Networks

  • Upload
    klaus

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

Securing Mobile Networks. An Enabling Technology for National and International Security and Beyond. Goals for November 6th. Highlight Mobile Networking Technology Emphasizing National and International Security today due to time limitations. Discuss security policy - PowerPoint PPT Presentation

Citation preview

Page 1: Securing Mobile Networks

1

Securing Mobile Networks

An Enabling Technology for National and International

Security and Beyond

Page 2: Securing Mobile Networks

2

Goals for November 6th Highlight Mobile Networking

Technology Emphasizing National and International

Security today due to time limitations. Discuss security policy

Enabling shared infrastructure (when reasonable)

Next Steps (Afternoon Session) Other Items (Afternoon Session)

Page 3: Securing Mobile Networks

3

Today’s Audience Big Picture People Policy Makers Media Code Writers Implementers

Please, don’t be afraid to ask questions.

Page 4: Securing Mobile Networks

Neah Bay / Mobile Router ProjectNeah Bay / Mobile Router Project

Cleveland

Detroit

Foreign-Agent

Foreign-AgentSomewhere, USA

Foreign-Agent

Home-AgentAnywhere, USA

Internet

Neah BayOutside of wireless LAN range, connected to FA via Globalstar.

Neah BayConnected to FA via wireless LAN at Cleveland harbor

Page 5: Securing Mobile Networks

5

Why NASA/USCG/Industry Real world deployment issues can only be

addressed in an operational network. USCG has immediate needs, therefore

willingness to work the problem. USCG has military network requirements. USCG is large enough network to force us to

investigate full scale deployment issues USCG is small enough to work with. NASA has same network issues regarding

mobility, security, network management and scalability.

Page 6: Securing Mobile Networks

6

Mobile-Router Advantages Share wireless and network resources with

other organizations $$$ savings

Set and forget No onsite expertise required However, you still have to engineer the network

Continuous Connectivity (May or may not be important to your

organization) Robust

Secondary Home Agent (Reparenting of HA)

Page 7: Securing Mobile Networks

7

Mobile Network Design Goals Secure Scalable Manageable Ability to sharing network

infrastructure Robust

Page 8: Securing Mobile Networks

8

PublicInternet

FA

FA

MR

MRMR

US Coast Guard

Canadian Coast Guard ACME Shipping

HA

HA

HA

HAACME

SHIPPING

MR

US Navy

Shared Network Infrastructure

Encrypting wireless links makes it very difficult to share infrastructure.This is a policy issue.

Page 9: Securing Mobile Networks

9

Secondary Home Agent(reparenting the HA)

PrimaryHome Agent

SecondaryHome Agent

Reparenting Home AgentHelps resolve triangular routingProblem over long distances

X

Page 10: Securing Mobile Networks

10

Emergency Backup(Hub / Spoke Network)

If primary control site becomesphysically inaccessible but can be electronically connected, asecondary site can be established.

If primary control site is physically incapacitated, there is no backup capability.

Page 11: Securing Mobile Networks

11

Secondary Home Agent(Fully Meshed Network)

1

2

3

4

5

If primary control site is physically incapacitated, a second or third or forth site take over automatically.

Page 12: Securing Mobile Networks

12

We Are Running with Reverse Tunneling Pros

Ensures topologically correct addresses on foreign networks

Required as requests from MR LAN hosts must pass through Proxy inside main firewall

Greatly simplifies setup and management of security associations in encryptors

Greatly simplifies multicast – HA makes for an excellent rendezvous point.

Cons Uses additional bandwidth Destroys route optimization

Page 13: Securing Mobile Networks

MobileLAN10.x.x.x

INTERNET USCGINTRANET

10.x.x.x

FA - Detroit

FA – Cleveland

HA

Encryption

PRO

XY

Encr

yptio

n

802.11b link

FIR

EWA

LLPublic Address

MRTunnel

Endpoint(Public Space)

HATunnel Endpoint(Public Space)

Page 14: Securing Mobile Networks

MobileLAN10.x.x.x

INTERNET USCGINTRANET

10.x.x.x

FA - Detroit

FA Cleveland

HA

Encryption

PRO

XY

Encr

yptio

n

802.11b link

FIR

EWA

LLPublic Address

USCG Officer’s Club

EAST

WEST

Dock

EAST

WEST

Dock

Open NetworkData Transfers

Page 15: Securing Mobile Networks

MobileLAN10.x.x.x

INTERNET USCGINTRANET

10.x.x.x

FA - Detroit

FA Cleveland

HA

Encryption

PRO

XY

Encr

yptio

n

802.11b link

FIR

EWA

LLPublic Address

USCG Officer’s Club

EAST

WEST

Dock

EAST

WEST

Dock

Encrypted NetworkData Transfers

Page 16: Securing Mobile Networks

MobileLAN10.x.x.x

INTERNET USCGINTRANET

10.x.x.x

FA - Detroit

FA Cleveland

HA

Encryption

PRO

XY

Encr

yptio

n

802.11b link

FIR

EWA

LLPublic Address

OpenNetwork

MonitoringPoint

OpenNetwork

MonitoringPoint

USCG Officer’s Club

EAST

WEST

Dock

EAST

WEST

Dock

Monitoring Points

Page 17: Securing Mobile Networks

MobileLAN10.x.x.x

INTERNET USCGINTRANET

10.x.x.x

FA - Detroit

FA Cleveland

HA

Encryption

PRO

XY

Encr

yptio

n

802.11b link

FIR

EWA

LLPublic Address

USCG Officer’s Club

EAST

WEST

Dock

EAST

WEST

Dock

Note, We are monitoringThe Neah Bay.

We are using lots of bandwidthTo do this.

Page 18: Securing Mobile Networks

MobileLAN10.x.x.x

INTERNET USCGINTRANET

10.x.x.x

FA - Detroit

FA Cleveland

HA

Encryption

PRO

XY

Encr

yptio

n

802.11b link

FIR

EWA

LLPublic Address

USCG Officer’s Club

EAST

WEST

Dock

EAST

WEST

Dock

Note, We are monitoringThe Neah Bay.

We are using lots of bandwidthTo do this.

Page 19: Securing Mobile Networks

MobileLAN10.x.x.x

Encr

yptio

n

EAST

WEST

Dock

RF Bandwidth

1.0 Mbps (manually set)

1.0 Mbps (manually set)

11.0 Mbps (auto-negotiated and shared with Officer’s Club)

7 Kbps to 56 Kbps in 7 Kbps chunks (1 to 2.5 seconds delay)

Page 20: Securing Mobile Networks

20

Wireless Only? Wireless can be jammed

Particularly unlicensed spectrum such as 802.11

Satellites is a bit harder Solution is to find interferer and make

them stop. You still want land line connections

Mobile Routing can be used over land lines.

Page 21: Securing Mobile Networks

21

Globalstar/Sea Tel MCM-8 Initial market addresses maritime and

pleasure boaters. Client / Server architecture

Current implementation requires call to be initiated by client (ship).

Multiplexes eight channels to obtain 56 kbps total data throughput.

Full bandwidth-on-demand. Requires use of Collocated Care-of-Address

Page 22: Securing Mobile Networks

22

Satellite Coverage

Globalstar

From SaVi

INMARSAT

Page 23: Securing Mobile Networks

23

Layer 2 Technology

GlobalstarMCM-8

Hypergain802.11b

Flat Panel

8 dBiDipole

L3-Comm15 dBic

Tracking Antenna

Sea Tel Tracking Antenna

Page 24: Securing Mobile Networks

Backbone Network Topology Detail Network Diagram

(Intentionally Blank)

Page 25: Securing Mobile Networks

Neah Bay Network Topology Detail Network Diagram

(Intentionally Blank)

Page 26: Securing Mobile Networks

USCG Officer’s Club Network Topology

Detail Network Diagram(Intentionally Blank)

Page 27: Securing Mobile Networks

27

Securing Mobile and Wireless Networks

Some ways may be “better” than others!

Page 28: Securing Mobile Networks

28

Constraints / Tools Policy Architecture Protocols

Page 29: Securing Mobile Networks

29

PublicInternet

FAMR

US Coast GuardMobile Network

HA

US Coast GuardOperational Network

(Private Address Space)

CN

IPv4 Utopian Operation

Triangular Routing

Page 30: Securing Mobile Networks

30

PublicInternet

FAMR

US Coast GuardMobile Network

HA

US Coast GuardOperational Network

(Private Address Space)

CN

IPv4 “Real World” Operation

PROXy

Proxy had not originated the request; therefore, the response is squelched.Peer-to-peer networking becomes problematic at best.

Glenn Research Center Policy:No UDP, No IPSec, etc…Mobile-IP stopped in its tracks.What’s your policy?

Ingress or Egress Filtering stopsTransmission due to topologicallyIncorrect source address. IPv6 Corrects this problem.

USCG Requires 3DES encryption.WEP is not acceptable due to known deficiencies.

Page 31: Securing Mobile Networks

31

PublicInternet

FAMR

US Coast GuardMobile Network

HA

US Coast GuardOperational Network

(Private Address Space)

CN

Current Solution – Reverse Tunneling

PROXy

Anticipate similar problems for IPv6.

Adds Overhead and kills route optimization.

Page 32: Securing Mobile Networks

32

PublicInternet

FA

FA

MR

MRMR

US Coast Guard

Canadian Coast Guard ACME Shipping

HA

HA

HA

HAACME

SHIPPING

MR

US Navy

Shared Network Infrastructure

Encrypting wireless links makes it very difficult to share infrastructure.This is a policy issue.

Page 33: Securing Mobile Networks

Security• Security Bandwidth Utilization • Security Performance • Tunnels Tunnels Tunnels and more Tunnels• Performance Security

User turns OFF Security to make system usable!• Thus, we need more bandwidth to ensure

security.

PAYLOADHEADER

ORIGINAL PACKET

HEADER

VIRTUAL PRIVATE NETWORK

HEADER

ENCRYPTION AT THE NETWORK LAYER

HEADER

ENCRYPTION ON THE RF LINK

Page 34: Securing Mobile Networks

34

Additional and FutureSecurity Solutions AAA

Routers (available today) Wireless bridges and access points

(available 2002) IPSec on router interface Encrypted radio links

IPSec, type1 or type2, and future improved WEP

Page 35: Securing Mobile Networks

35

Conclusions Security Breaks Everything

At least it sometimes feels like that. Need to change policy where appropriate. Need to develop good architectures that

consider how the wireless systems and protocols operate.

Possible solutions that should be investigated: Dynamic, Protocol aware firewalls and proxies.

Possibly incorporated with Authentication and Authorization.

Page 36: Securing Mobile Networks

36

Moblile-IP Operation

IPv4

Page 37: Securing Mobile Networks

Mobile Node

Foreign Agent Foreign Agent

Home Agent

“ ”

139.88.111.1

143.232.48.1NASA Ames

Corresponding Node

Internet or Intranet

139.88.112.1NASA Glenn

143.232.48.1

Home IP 128.183.13.103Care-Off-Address139.88.111.50

128.183.13.1NASA Goddard

Mobile-IP (IPv4)

Page 38: Securing Mobile Networks

Mobile Router(Mobile Node)

Foreign Agent

Home AgentCorresponding Node

139.88.112.1Internet WAN

Tunnel-0

10.2.3.101

128.183.13.1Internet WAN

Internet

10.2.2.1RoamingInterface

10.2.3.1Virtual LANInterface

Tunnel-1

128.184.25.1HA LoopbackVirtual Interface

139.88.100.1FA WAN

10.2.4.10MR Loopback

Virtual InterfaceCOA 139.88.100.1

Mobile-Router (IPv4)Mobile Router

Page 39: Securing Mobile Networks

Mobile Router(Mobile Node)

Home AgentCorresponding Node

139.88.112.1Internet WAN

Tunnel-0

10.2.3.101

128.183.13.1Internet WAN

10.2.2.1RoamingInterface

10.2.3.1Virtual LANInterface

Foreign Agent Tunnel-1

128.184.25.1HA LoopbackVirtual Interface

139.88.100.1FA WAN

10.2.4.10MR Loopback

Virtual InterfaceCOA 139.88.100.1

Mobile-Router (IPv4)Collocated Care-Of-Address

Internet No Foreign AgentNo Second Tunnel

Page 40: Securing Mobile Networks

Mobile Router(Mobile Node)

Home AgentCorresponding Node

139.88.112.1Internet WAN

Tunnel-0

10.2.3.101

128.183.13.1Internet WAN

Internet

10.2.2.1RoamingInterface

10.2.3.1Virtual LANInterface

128.184.25.1HA LoopbackVirtual Interface

139.88.100.1

10.2.4.10MR Loopback

Virtual InterfaceCOA 139.88.100.1

Mobile-Router (IPv4)Collocated Care-Of-Address

Page 41: Securing Mobile Networks

41

What’s Next

The End Game

Page 42: Securing Mobile Networks

42

Mobile Networks Share Network Infrastructure

USCG, Canadian Coast Guard, Commercial Shipping, Pleasure Boaters

Open Radio Access / Restricted Network Access Authentication, Authorization and Accounting

Architecture Limited, experimental deployment onboard

Neah Bay Move RIPv2 routing from Fed. Bldg to Neah Bay

Move to full scale deployment Requires full commitment

Page 43: Securing Mobile Networks

MRPublic

MobileLAN10.x.x.x

INTERNET

INTRANET10.x.x.x

FA – ClevelandPublic

HAPublic

PIX- 506 – until we install our PIX FWThen we should not need the babyPIX.

PRO

XY

PIX-506

802.11b link

FA - Detroit

Page 44: Securing Mobile Networks

44

HA Outside Main Firewall Firewall between MR interfaces and

public Internet as well as the HA and Private Intranet.

Reverse tunneling required as requests from MR LAN hosts must pass through Proxy inside main firewall.

Page 45: Securing Mobile Networks

45

Areas that need to be addressed Home Agent Placement

Inside or Outside the Firewall AAA Issues

Open Radio Access / Restricted Network Access Secure Key Management

IPv6 Mobile Networking Development Work with industry and IETF

Develop radio link technology Enable better connectivity throughout the world

for both military and aeronautical communications (voice, video and data).

Page 46: Securing Mobile Networks

46

NASA’s Needs

Mobile Networks

Page 47: Securing Mobile Networks

47

Relevant NASA Aeronautics Programs Advanced Air Transportation

Technology (AATT) Weather Information

Communication (WINCOMM) Small Aircraft Transportation

System (SATS)

Page 48: Securing Mobile Networks

48

Aeronautic Networking Issues

Move to IPv6 IPv6 Mobile Networking

Authentication, Authorization and Accounting

Bandwidth, Bandwidth, Bandwidth Media Access Policy

Sending of Operations over Entertainment Channels

Page 49: Securing Mobile Networks

Earth Observation

T1T2?

T3

Page 50: Securing Mobile Networks
Page 51: Securing Mobile Networks

51

Space Flight Implementation Sharing Infrastructure

Common Media Access Common Ground Terminal Capabilites Common Network Access

AAA Common Modulation and Coding

Software Radio

Page 52: Securing Mobile Networks

Backup

Page 53: Securing Mobile Networks

53

Asymmetrical Pathing

Mobile Router

MilStar,Globalstar,

Others

DVBSatellite

Internet

Home Agent

Foreign AgentForeign Agent

Page 54: Securing Mobile Networks

54

Neah Bay

Page 55: Securing Mobile Networks

55

Papers and Presentationshttp://roland.grc.nasa.gov/~ivancic/papers_presentations/

papers.html or

http://roland.grc.nasa.gov/~ivancic/ and pick

“Papers and Presentations”