SlideShare a Scribd company logo
Secure Systems Research Group - FAU
Patterns for Wireless Web
Services
Nelly Delessy
January 19, 2006
Secure Systems Research Group - FAU
Agenda
• Reviews
– “Wi-Foo The Secrets of Wireless hacking”
– “Mobile Commerce and Wireless Computing
Systems”
• Ideas of Patterns for Wireless Web Services
Secure Systems Research Group - FAU
“Wi-Foo The Secrets of Wireless
hacking”
• by A. Vladimirov, K. V. Gavrilenko, A. A.
Mikhailovsky
• Summary:
– Mixes theory, tools, and techniques about
how attacks against wireless networks are
performed and how one can defend its
network
– Assume that the reader has a good
technical knowledge of networks (I
particular IEEE 802 standards)
– Intended for system administrators,
network managers, + penetration testing
Secure Systems Research Group - FAU
“Wi-Foo The Secrets of Wireless
hacking”
• Focuses on 802.11:widespread area of network
coverage
• How to use a Pda or laptop, choose a wireless card,
antenna, configure the OS to make a penetration
testing on the network
• Using the penetration testing tools:
– Network discovery and traffic logging
– Traffic decoding and analysis
– Encryption cracking tools (WEP crackers)
– 802.11 frame-generating tools
– Encrypted traffic injection tools
– Access point management software
Secure Systems Research Group - FAU
“Wi-Foo The Secrets of Wireless
hacking”
• Attacks:
– closed ESSID, MAC and protocol filtering
– Cracking WEP
– Wireless man-in-the-middle attack and
rogue access points deployment
– Authentication systems attacks
– DoS attacks
Secure Systems Research Group - FAU
“Wi-Foo The Secrets of Wireless
hacking”
• Defenses:
– Security policies
– Hardened gateway
– Improvements to WEP, use of WPA
– Use of radius, LDAP
– Use Of a VPN (IPSec)
– Wireless IDS systems
• Also chapters about cryptography
Secure Systems Research Group - FAU
“Mobile Commerce and Wireless
Computing Systems”
• by Geoffrey Elliott, Nigel Phillips
• Intended for managers, or beginners in the
technology field
• About the capabilities of the wireless
technology and what people want to do
with it
• M-Commerce = “The mobile devices and
wireless networking environments
necessary to provide location independent
connectivity”
Secure Systems Research Group - FAU
“Mobile Commerce and Wireless
Computing Systems”
• Chapters about:
– M-commerce
– Networks
– wireless protocols
– Wireless programming (WAP)
– Os for micro devices
– Mobile networking (bluetooth)
– Services and products
– Pervasive and embedded mobile systems
– Security
– Mobile applications
Secure Systems Research Group - FAU
Patterns for wireless web services
(ideas)
• Architectural patterns
– Wireless web services gateway
– Direct Use of web services over wireless links
– Mobile agents for wireless devices
• Implementation patterns
– Wireless CallBack
– Format compression
– Device Authentication
– User Authentication
– Wireless attribute provider
Secure Systems Research Group - FAU
Wireless web services gateway
• Context
– portable devices are limited in memory and
computational power.
– the connection bandwidth and reliability of
the wireless connection are limited
compared to wired connections
• Problem
– How to deliver the web service to the
clients?
Secure Systems Research Group - FAU
Wireless web services gateway
• Solution
– Web services are not delivered directly to the
portable device but transformed in a gateway
– The gateway is in charge of transforming the
SOAP messages into a compressed form that will
be used by the mobile device. It can also
implement cache functions.
Mobile device Gateway
Web
Service
Web services formats
Compressed formats
Secure Systems Research Group - FAU
Wireless web services gateway
• Example
– An example of this compressed format
could be WML (equivalent of HTML in the
WAP stack, available in many phones), or
for basic scenarios such as the “push” of
information, the gateway can transform
SOAP messages into SMS, or voice.
Secure Systems Research Group - FAU
Direct Use of web services over
wireless links
• Context
– portable devices must have built-in
implementations of the web services
technologies. This concerns the high end
market segment, and includes smart
phones, PDAs, and laptops.
• Problem
– How to deliver the web service to the
clients?
Secure Systems Research Group - FAU
Direct Use of web services over
wireless links
• Solution
– the device, that is now a consumer of web
services, can run client applications from
different providers
Mobile device
Web
Service
Web services formats
Secure Systems Research Group - FAU
Mobile agents for wireless devices
• Context
– using a web service can imply multiple
passes between client, server and third
parties (for security purposes for example)
while the wireless link is not reliable and
the bandwidth can be limited.
• Problem
– How to deliver the web service to the
clients?
Secure Systems Research Group - FAU
Mobile agents for wireless devices
• Solution
– The agents act as proxies on behalf of a
client.
Mobile device
Web
Service
Mobile
agent
Mobile
agent
Mobile
agent
Web services formats
Web services formats
Web services formats

More Related Content

PPTX
Introduction To Mobile Computing
PDF
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
PPT
Past, Present and Future of Mobile Computing
PPT
6053298.ppt
PDF
IT6601 MOBILE COMPUTING
PPT
Lec 1 introduction to wireless communication(1)
PPTX
MOBILE COMMUNICATION
PDF
introductionsssssssss-140822224222-phpapp01 (2).pdf
Introduction To Mobile Computing
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
Past, Present and Future of Mobile Computing
6053298.ppt
IT6601 MOBILE COMPUTING
Lec 1 introduction to wireless communication(1)
MOBILE COMMUNICATION
introductionsssssssss-140822224222-phpapp01 (2).pdf

Similar to PatternsWirelessWebServicestecgnivsj (1).ppt (20)

PPTX
lect 10 & 11.pptx MOBILE COMPUTING AND INFO
PPS
DOC
Mobile Computing I-Unit Notes
PDF
Wireless Internet Security Architecture and Protocols 1st Edition James Kempf
PPTX
Mobile computing
PPTX
CS8601 Unit-1.pptx
PPTX
You think your WiFi is safe?
PDF
CS8601 MOBILE COMPUTING
PDF
mobile computing - Unit 1 Material.pdf
PDF
Management Information Systems 3rd Edition Rainer Solutions Manual
PPTX
Work exp ( wireless netwrk)
PPT
Chapter30
PPTX
MOBILE COMPUTING Unit 1.pptx
PPTX
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
PPT
Types o Wireless Networks in computer networks
PDF
Manika
PPTX
1. Introduction to Mobile Computing-1.pptx
DOCX
The mfn 3
PPTX
Communications & Networks
PPTX
Communications & Networks
lect 10 & 11.pptx MOBILE COMPUTING AND INFO
Mobile Computing I-Unit Notes
Wireless Internet Security Architecture and Protocols 1st Edition James Kempf
Mobile computing
CS8601 Unit-1.pptx
You think your WiFi is safe?
CS8601 MOBILE COMPUTING
mobile computing - Unit 1 Material.pdf
Management Information Systems 3rd Edition Rainer Solutions Manual
Work exp ( wireless netwrk)
Chapter30
MOBILE COMPUTING Unit 1.pptx
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
Types o Wireless Networks in computer networks
Manika
1. Introduction to Mobile Computing-1.pptx
The mfn 3
Communications & Networks
Communications & Networks
Ad

Recently uploaded (20)

PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Trump Administration's workforce development strategy
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Introduction to Building Materials
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
HVAC Specification 2024 according to central public works department
PDF
1_English_Language_Set_2.pdf probationary
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Indian roads congress 037 - 2012 Flexible pavement
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
B.Sc. DS Unit 2 Software Engineering.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Introduction to pro and eukaryotes and differences.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
Trump Administration's workforce development strategy
Chinmaya Tiranga quiz Grand Finale.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Introduction to Building Materials
Unit 4 Computer Architecture Multicore Processor.pptx
20th Century Theater, Methods, History.pptx
Hazard Identification & Risk Assessment .pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Virtual and Augmented Reality in Current Scenario
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
HVAC Specification 2024 according to central public works department
1_English_Language_Set_2.pdf probationary
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Ad

PatternsWirelessWebServicestecgnivsj (1).ppt

  • 1. Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006
  • 2. Secure Systems Research Group - FAU Agenda • Reviews – “Wi-Foo The Secrets of Wireless hacking” – “Mobile Commerce and Wireless Computing Systems” • Ideas of Patterns for Wireless Web Services
  • 3. Secure Systems Research Group - FAU “Wi-Foo The Secrets of Wireless hacking” • by A. Vladimirov, K. V. Gavrilenko, A. A. Mikhailovsky • Summary: – Mixes theory, tools, and techniques about how attacks against wireless networks are performed and how one can defend its network – Assume that the reader has a good technical knowledge of networks (I particular IEEE 802 standards) – Intended for system administrators, network managers, + penetration testing
  • 4. Secure Systems Research Group - FAU “Wi-Foo The Secrets of Wireless hacking” • Focuses on 802.11:widespread area of network coverage • How to use a Pda or laptop, choose a wireless card, antenna, configure the OS to make a penetration testing on the network • Using the penetration testing tools: – Network discovery and traffic logging – Traffic decoding and analysis – Encryption cracking tools (WEP crackers) – 802.11 frame-generating tools – Encrypted traffic injection tools – Access point management software
  • 5. Secure Systems Research Group - FAU “Wi-Foo The Secrets of Wireless hacking” • Attacks: – closed ESSID, MAC and protocol filtering – Cracking WEP – Wireless man-in-the-middle attack and rogue access points deployment – Authentication systems attacks – DoS attacks
  • 6. Secure Systems Research Group - FAU “Wi-Foo The Secrets of Wireless hacking” • Defenses: – Security policies – Hardened gateway – Improvements to WEP, use of WPA – Use of radius, LDAP – Use Of a VPN (IPSec) – Wireless IDS systems • Also chapters about cryptography
  • 7. Secure Systems Research Group - FAU “Mobile Commerce and Wireless Computing Systems” • by Geoffrey Elliott, Nigel Phillips • Intended for managers, or beginners in the technology field • About the capabilities of the wireless technology and what people want to do with it • M-Commerce = “The mobile devices and wireless networking environments necessary to provide location independent connectivity”
  • 8. Secure Systems Research Group - FAU “Mobile Commerce and Wireless Computing Systems” • Chapters about: – M-commerce – Networks – wireless protocols – Wireless programming (WAP) – Os for micro devices – Mobile networking (bluetooth) – Services and products – Pervasive and embedded mobile systems – Security – Mobile applications
  • 9. Secure Systems Research Group - FAU Patterns for wireless web services (ideas) • Architectural patterns – Wireless web services gateway – Direct Use of web services over wireless links – Mobile agents for wireless devices • Implementation patterns – Wireless CallBack – Format compression – Device Authentication – User Authentication – Wireless attribute provider
  • 10. Secure Systems Research Group - FAU Wireless web services gateway • Context – portable devices are limited in memory and computational power. – the connection bandwidth and reliability of the wireless connection are limited compared to wired connections • Problem – How to deliver the web service to the clients?
  • 11. Secure Systems Research Group - FAU Wireless web services gateway • Solution – Web services are not delivered directly to the portable device but transformed in a gateway – The gateway is in charge of transforming the SOAP messages into a compressed form that will be used by the mobile device. It can also implement cache functions. Mobile device Gateway Web Service Web services formats Compressed formats
  • 12. Secure Systems Research Group - FAU Wireless web services gateway • Example – An example of this compressed format could be WML (equivalent of HTML in the WAP stack, available in many phones), or for basic scenarios such as the “push” of information, the gateway can transform SOAP messages into SMS, or voice.
  • 13. Secure Systems Research Group - FAU Direct Use of web services over wireless links • Context – portable devices must have built-in implementations of the web services technologies. This concerns the high end market segment, and includes smart phones, PDAs, and laptops. • Problem – How to deliver the web service to the clients?
  • 14. Secure Systems Research Group - FAU Direct Use of web services over wireless links • Solution – the device, that is now a consumer of web services, can run client applications from different providers Mobile device Web Service Web services formats
  • 15. Secure Systems Research Group - FAU Mobile agents for wireless devices • Context – using a web service can imply multiple passes between client, server and third parties (for security purposes for example) while the wireless link is not reliable and the bandwidth can be limited. • Problem – How to deliver the web service to the clients?
  • 16. Secure Systems Research Group - FAU Mobile agents for wireless devices • Solution – The agents act as proxies on behalf of a client. Mobile device Web Service Mobile agent Mobile agent Mobile agent Web services formats Web services formats Web services formats