Master Thesis
Total Page:16
File Type:pdf, Size:1020Kb
Master's Programme in Computer Network Engineering, 60 credits MASTER Connect street light control devices in a secure network THESIS Andreas Kostoulas, Efstathios Lykouropoulos, Zainab Jumaa Network security, 15 credits Halmstad 2015-02-16 “Connect street light control devices in a secure network” Master’s Thesis in Computer Network engineering 2014 Authors: Andreas Kostoulas, Efstathios Lykouropoulos, Zainab Jumaa Supervisor: Alexey Vinel Examiner: Tony Larsson Preface This thesis is submitted in partial fulfilment of the requirements for a Master’s Degree in Computer Network Engineering at the Department of Information Science - Computer and Electrical Engineering, at University of Halmstad, Sweden. The research - implementation described herein was conducted under the supervision of Professor Alexey Vinel and in cooperation with Greinon engineering. This was a challenging trip with both ups and downs but accompanied by an extend team of experts, always willing to coach, sponsor, help and motivate us. For this we would like to thank them. We would like to thank our parents and family for their financial and motivational support, although distance between us was more than 1500 kilometres. Last but not least we would like to thank our fellow researchers and friends on our department for useful discussions, comments, suggestions, thoughts and also creative and fun moments we spend together. i Abstract Wireless communications is a constantly progressing technology in network engineering society, creating an environment full of opportunities that are targeting in financial growth, quality of life and humans prosperity. Wireless security is the science that has as a goal to provide safe data communication between authorized users and prevent unauthorized users from gaining access, deny access, damage or counterfeit data in a wireless environment. In order to success it uses layers of protection that consist of software and hardware mechanisms that are able to monitor network’s behavior and in coordination provide a safe and secure environment for the user. In this thesis, a scientific research will be conducted in a given wireless network topology designed for an original application. This is about an intelligent street lightning system and it has already been implemented by Greinon Engineering which is the company that we are cooperating with. It is a matter of great importance that this thesis was conducted under real life criteria and in cooperation with an engineering company. This means that our programming, our ideas, our study research were all rotated and concentrated in certain type of hardware – software and network topology. In this thesis there is a detailed overview of basic wireless security mechanisms – vulnerabilities – types of attacks and countermeasures focused on 802.11b protocol. Moreover there will be security weak point’s analysis on the given industrial network; our proposals to protect and secure this network based on our threat analysis of the current system. There is an analysis on the most up to date VPN security implementations and reasoning that guided our team to conclude in a specific procedure - protocol and implementation, including limitation factors – obstacles faces during this procedure. During this research iterative approach in procedures – ideas and implementation attempts is followed. Basic goal is to provide security solutions that are easy applicable, low cost, easy to maintain and monitor. ii Table of Contents Preface .........................................................................................................................................i Abstract ...................................................................................................................................... ii List of Figures .............................................................................................................................. v List of Tables .............................................................................................................................. vi Chapter 1 - Introduction ............................................................................................................ 1 1.1 Background ................................................................................................................ 1 1.2 Motivation ................................................................................................................. 2 1.3 System view ............................................................................................................... 2 1.4 Description of Wireless Network - Problem Formulation ......................................... 3 1.5 Objectives .................................................................................................................. 6 1.6 Project organizing structure ...................................................................................... 7 Chapter 2 - Overview in wireless security focused on IEEE 802.11b ........................................ 8 2.1 Anatomy of Ad-hoc network ..................................................................................... 8 2.2 Anatomy of IEEE 802.11b ........................................................................................ 10 2.3 Overview Security Mechanism ................................................................................ 12 2.3.1 Authentication ................................................................................................. 12 2.3.2 Encryption........................................................................................................ 13 Chapter 3 – Security Threats – Countermeasures Analysis. .................................................... 15 3.1 General Categories of Network Security Threats .......................................................... 15 3.1.1 Loss of Confidentiality ............................................................................................ 18 3.1.2 Loss of Integrity ...................................................................................................... 19 3.1.3 Loss of Availability .................................................................................................. 19 3.1.4 Other Security Risks ................................................................................................ 20 3.2 Security Threats for ad-hoc mesh Network................................................................... 20 3.2.1 Network Layer Threats ........................................................................................... 21 3.2.2 Transport Layer Threats ......................................................................................... 22 3.2.3 Multi-layer Threats ................................................................................................. 23 3.3 Proposed Countermeasures .......................................................................................... 24 Chapter 4 – Method-Implementation ..................................................................................... 28 4.1 OpenVPN Implementation for public segment ............................................................. 28 4.1.1 Installation .............................................................................................................. 29 4.1.2 Network setup ........................................................................................................ 30 iii 4.1.3 Server and Client Certificates ................................................................................. 31 4.1.4 Other measures ...................................................................................................... 34 4.2 Implementation for private segment ............................................................................ 35 4.2.1 Encryption types ..................................................................................................... 35 4.2.2 Installing WPA_Supplicant ...................................................................................... 36 4.2.3 OpenVPN in Private segment: ................................................................................ 37 4.3 Firewall .......................................................................................................................... 38 Chapter 5 – Why OpenVPN ..................................................................................................... 40 Chapter 6 – Conclusions .......................................................................................................... 44 Appendix .................................................................................................................................. 45 References ............................................................................................................................... 48 Abbreviations Table ................................................................................................................. 50 iv List of Figures FIGURE 1: SERVER MANAGEMENT CONTROL SYSTEM .................................................................. 3 FIGURE 2 : PART OF THE NETWORK SYSTEM TOPOLOGY CONSISTING OF NODES, GATEWAY NODES (IMPLEMENTED IN TRAFFIC LIGHT MECHANISM) AND CUSTOMER DEVICES THAT CAN CONNECT WIRELESSLY TO THE AD-HOC NETWORK THROUGH GATEWAY NODES. ...................................... 4 FIGURE 3: SCHEMATIC REPRESENTATION OF THE INITIAL CONNECTION PROCESS BEFORE SECURITY IMPLEMENTATIONS APPLIED. .........................................................................................