Motorola Wireless Broadband Platform manual Passive Monitoring

Page 6

PASSIVE MONITORING

As mentioned previously, it is relatively easy to monitor clear text transmissions over an IP network. Unfortunately, most of the time invaders are not easily detected. This is because monitoring of the traffic is performed using passive devices that do not transmit any data of their own. Therefore, they can’t be easily detected. In addition, attackers do not require physical access to any particular facility to conduct these passive monitoring sessions.

END-TO-END SECURITY

While hackers don’t require physical access to monitor (hack) a network, they can be easily connected by placing a probe or analyzer anywhere along the transmission path — from system initialization to destination. Since vulnerabilities can exist anywhere along the IP transmission path, complete system security can only be achieved by applying end- to-end security measures. The security measures built into the Canopy system architecture are designed to cover only the wireless portions of the network. These include:

Access Point (AP)

Subscriber Module (SM)

Backhaul (BH) Module

Cluster Management Module (CMM)

Bandwidth and Authentication Manager (BAM)

The Canopy system security does not include elements outside of the wireless transport, such as:

Client (Computer)

Wireless Modems

Local Area Networks

Routers

Printers

Servers

Various Network Peripheral Equipment

Protecting equipment outside of the Canopy system from security invasions can be accomplished using software, devices and security techniques from various manufacturers and should be included as part of an end-to-end system design.

SECURITY FEATURES WITHIN CANOPY SYSTEM

Privacy and integrity of data are key considerations for both broadband network subscribers and operators. Security and authentication to prevent unwanted access to critical data or services are necessary for the effective operation of any broadband network. Applications such as medical, remote surveillance, safety, security and homeland defense would not be possible without incorporating advanced security features into the fixed wireless network. Gone are the days when it wasn’t necessary to be concerned with security as a fundamental building block.

2

Image 6
Contents Advanced Security Techniques List of Tables List of Acronyms Page Clear Text Transmissions Passive Monitoring CANOPY’S Proprietary Protocol AP then sends an authentication request to Authentication ProcessWhen an SM attempts to enter the Canopy network SM calculates a response using either its factoryData Encryption Standard DES Advanced Encryption Standard AES X 1038 possible 128-bit keysMethods of Encryption and Their Associated Keys4 Encryption Bits Number of Possible KeysSummary Motorola Canopy