Skip to content

Commit f3cc49b

Browse files
committed
update notes
1 parent b291423 commit f3cc49b

4 files changed

Lines changed: 35 additions & 1 deletion

File tree

course/postgraduate/network.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -659,6 +659,26 @@ with the attacker through network protocols
659659
- Necessarily malicious
660660

661661
# IPsec
662+
## Security Association
663+
- A security association (SA) is a one-way relationship between sender and receiver defining security services
664+
- SA specifies things like:
665+
- Authentication algorithm (AH)
666+
- Encryption algorithm (ESP)
667+
- Keys
668+
- Key lifetimes
669+
- Lifetime of security association
670+
- Protocol mode (tunnel or transport)
671+
672+
- SA is uniquely identified by three parameters:
673+
- **Security Parameters Index (SPI)**: a bit string assigned to this SA and
674+
having local significance only. SPI is carried in AH and ESP headers to
675+
enable receiving system to select SA under which a received packet will
676+
be processed.
677+
- **IP destination address**: address of destination endpoint of SA (may be an
678+
end-use system or a network system such as a firewall or router)
679+
- **Security Protocol Identifier**: a field from the outer IP header that
680+
indicates whether the SA is an AH or ESP SA.
681+
662682
## Authentication Header (AH)
663683
**Header**:
664684
<div style="text-align:center">
@@ -853,11 +873,25 @@ $\\{r_1, \\{r_0, M\\}\_{pk_b}, B\\}\_{pk_{mix}} \rightarrow \\{r_0, M\\}_{pk_b},
853873
remote and / or hostile locations
854874
- This greatly increases their vulnerability to physical attacks
855875

876+
## 802.11i Operation
877+
<div style="text-align:center">
878+
<img src="/static/course/postgraduate/network/80211i.png" alt=""/>
879+
</div>
880+
881+
856882
## IoT Security
883+
### IoT Architecture
884+
<div style="text-align:center">
885+
<img src="/static/course/postgraduate/network/iotarch.png" alt=""/>
886+
</div>
887+
857888
### IoT vulnerabilities by layers
858889
- Device-based: vulnerabilities associated with the hardware
859890
- Network-based: vulnerabilities caused by weakness
860891
originated from communication protocol
861892
- Software-based: vulnerabilities related to the firmware
862893
and/or the software of IoT device.
863-
894+
895+
<div style="text-align:center">
896+
<img src="/static/course/postgraduate/network/iotvul.png" alt=""/>
897+
</div>
118 KB
Loading
120 KB
Loading
83.8 KB
Loading

0 commit comments

Comments
 (0)