Energy News  
Wireless Networks: Open To Stealth Attacks


Washington (UPI) Feb 22, 2005
Wireless networks could link up police on the streets, soldiers in the battlefield and rescue workers in disaster zones, but computer scientists warned they remain dangerously vulnerable to stealth attacks.

"An attack might be a terrorist who wants to disconnect emergency crews from each other and make his physical attack more effective, or a criminal who wishes to disconnect members of police in their efforts to chase him," said researcher Markus Jakobsson at Indiana University in Bloomington. Such an attack also "could hijack normal traffic for corporate espionage or identity theft."

Jakobsson and colleagues are developing the digital equivalents of magic envelopes and invisible ink that promise to protect cell phones and laptops against these attacks.

"We hope to have a version in a few months," Jakobsson told United Press International.

Jakobsson discussed wireless-network vulnerability at the American Association for the Advancement of Science annual meeting.

The networks are surprisingly easy to attack, he said. "A wired network is like talking in a room with a group of colleagues. You know who they are. In a wireless network, it's more like a phone call from a stranger. You have no idea who they are, where they are (and you) don't know whether to trust them or not."

He described one type of attack, called "man in the middle," where an enemy impersonates a friend.

"If you go to a wireless access point at Starbucks and do some online banking," Jakobsson explained, "when you come in, my computer can broadcast that it's the Starbucks' wireless access point. You think you're sending securely to the bank, but you're (actually) sending to me. There's a great threat (of) identity theft in wireless networks. We haven't seen it yet, but it's the next thing. In this hijacking attack, you don't know it's taking place."

The problem could be worse in the so-called ad-hoc wireless networks expected to become popular in the near future. In such a network, each laptop or cell phone takes on the added responsibility of serving as a relay that forwards data to others.

"They're easy to deploy and less dependent on infrastructure such as base stations, which can be pretty expensive," said Susanne Wetzel of the Stevens Institute of Technology in Hoboken, N.J.

For example, Wetzel said, "you don't want to send soldiers on a battlefield blind, you want to see what's going on. If we could deploy a ton of sensors, have the sensors report back to base on what the surroundings are (such as) the chemicals in the area, you have the possibility of exploring territory without the risk of sending soldiers in directly."

The networks also would prove valuable in search-an d-rescue operations.

"You could make use of ad-hoc networks where regular cell-phone networks are not available," said researcher Adrian Perrig of Carnegie Mellon University in Pittsburgh.

"You could have an ad-hoc network when you would like to get to a wireless access point too far away, and leverage other intermediate nodes to reach an access point."

Perrig told UPI an analogy would be trying to access a cell-phone signal in a tunnel. "You can relay a signal from car to car until you can get a signal outside the tunnel," he said.

The biggest problem, he continued, is ad-hoc networks have not yet resolved security issues.

"It's a challenge to create an ad-hoc network even without considering security, so they've only considered trustworthy environments where no one cheats - so it becomes trivial to attack," Perrig said.

"We have a great opportunity today to deploy secure protocols before ad-hoc net works are widely deployed."

System designers worry about how easy ad-hoc networks are to attack.

"There are quite serious attacks that are simple to execute that cannot be detected. That's what makes them stealth attacks," Perrig said.

In one strategy, called a wormhole attack, an enemy pretends to provide the shortest route between all nodes in the network, thus attracting all data traffic and then suddenly killing communication.

The answer is to authenticate as trustworthy the computers or cell-phones with whom one communicates, Jakobsson said. When sending a password, that password should be encased in the digital equivalent of a magic envelope, in which the message it carries can be read only by its intended receiver and any attempt to access it would be revealed.

In the computer-network equivalent, Jakobsson explained, if the receiver already knows the password, the receiver can modify the incoming message in an agreed-upon manner via a kind of invisible ink.

If the sender is legitimate, the sender will recognize the invisible-ink response as legitimate. If the sender is a hacker, the receiver will not divulge the proper password.

The solution must prove compatible with existing systems and look and feel the same to all users, Jakobsson said, adding that his team is working on data packets that resemble software patches, or updates.

"People download software patches all the time. A simple patch would make this possible," he explained.

Charles Choi covers research and technology for UPI Science News.

Community
Email This Article
Comment On This Article

Related Links
SpaceDaily
Search SpaceDaily
Subscribe To SpaceDaily Express
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


US Military Mounts International Psyops Campaign
Washington (AFP) Dec 14, 2005
The US military is mounting a 300 million dollar psychological operations campaign to sway international opinion of the US war on terrorism through messages placed in foreign media, officials said Wednesday.







  • Analysis: Mideast Oil Will Be More Important
  • Billions Investment Needed for Hydrogen Infrastructure by 2012, Says ABI Research
  • Analysis: The Kremlin's Majority Share
  • Tiny Superconductors Withstand Stronger Magnetic Fields

  • New Nuclear Friction In West
  • Iran Says Ready To Sign Key Deal With Russian On Nuclear Plant
  • Tsunami Makes India's Nuke Workers Jittery
  • Japan Begins Controversial Uranium Test To Recycle Nuclear Fuel





  • NASA Uses Remotely Piloted Airplane To Monitor Grapes



  • Northrop Grumman Begins Upgrade To Joint STARS Air-Traffic Management Systems
  • Boeing Rolls Out Longest Flying Airliner
  • Political Fur Flies Over Marine One Deal
  • Military Sales Lift Lockheed Martin Profit To $372 Million

  • NASA plans to send new robot to Jupiter
  • Los Alamos Hopes To Lead New Era Of Nuclear Space Tranportion With Jovian Mission
  • Boeing Selects Leader for Nuclear Space Systems Program
  • Boeing-Led Team to Study Nuclear-Powered Space Systems

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement