Presentation is loading. Please wait.

Presentation is loading. Please wait.

Daniel Bichler 2005-10-12 Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on 2005-05-01.

Similar presentations


Presentation on theme: "Daniel Bichler 2005-10-12 Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on 2005-05-01."— Presentation transcript:

1 Daniel Bichler Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on Supervisor –Univ.-Prof. Dr. Mario Huemer, University of Erlangen-Nuremberg –Dr. Guido Stromberg, Infineon AIM SC D TD Outline –Security scenarios for Personal Area Network Home Automation –Key generation

2 Daniel Bichler Page 2 Security and Privacy in Pervasive Computing Environments Pervasive computing…... is the disappearance of electronics into the environment of human beings, serving the human demands … is based on the intelligent, autonomous interaction of sensors, actuators and user interfaces... evolutionary trend of electronic communication from … … man-to-man via … … man-to-machine to … … machine-to-machine Requirements –Facilitate usability –Security and privacy

3 Daniel Bichler Page 3 Typical Pervasive Computing Devices Mobile Phone Switch Smoke Detector Wristwatch BT Headset Accelerometer Keypad Door Lock PDA Lamp Home- automation Personal Area Network Heart Rate Detector

4 Daniel Bichler Page 4 Personal Area Network, Scenario I Components –Mobile phone –Bluetooth headset Boundary conditions –Bidirectional wireless exchange of audio data Demand on cryptography –Facilitate connection establishment –Proof against eavesdropping –Proof against interference Essential cryptographic methods –Authentication –Encryption BT Headset Mobile Phone

5 Daniel Bichler Page 5 Personal Area Network, Scenario II Components –Mobile phone –Wristwatch Boundary conditions –Wireless notification of status information SMS received: The display of the wristwatch shows a notice when the mobile phone received an SMS. Demand on cryptography –Facilitate connection establishment –Proof against interference Essential cryptographic method –Authentication Wristwatch Mobile Phone

6 Daniel Bichler Page 6 Requirements on Cryptography for PAN Boundary conditions –Mobility of components –Frequently no interface for user inputs –Frequently interaction with one powerful device –Less amount of data transmission –Wireless communication –Battery powered components Demand on cryptography –Security level diverse –Facilitate connection establishment –Proof against interference –Proof against eavesdropper

7 Daniel Bichler Page 7 Management of Cryptographic Keys Asymmetric encryption (public and private key) –Key generation, coding and decoding are computational power intensive –Not suitable for pervasive computing devices Symmetric encryption –Same key for encryption and decryption –Problem with key exchange

8 Daniel Bichler Page 8 Management of Cryptographic Keys ETH Zurich, Prof. Mattern, Smart-Its Friends –Accelerometer link devices together –No encryption Idea: Key Generation using Accelerometer –Shaking devices together –Dedicated devices generating exactly the same key –Encrypt communication with generated key –Facilitate connection establishment –Ensures security and privacy –No key exchange required –No user configuration required

9 Daniel Bichler Page 9 Typical Pervasive Computing Devices Mobile Phone Switch Smoke Detector Wristwatch BT Headset Accelerometer Keypad Door Lock PDA Lamp Home- automation Personal Area Network Heart Rate Detector

10 Daniel Bichler Page 10 Home Automation Security Domain 1 Security Domain 2Security Domain 4 Security Domain 3

11 Daniel Bichler Page 11 Communication between Security Domains

12 Daniel Bichler Page 12 Home Automation, extended Security Domain 1 Security Domain 2Security Domain 4 Security Domain 3 Authenticated User

13 Daniel Bichler Page 13 Requirements on Cryptography for Home Automation Boundary conditions –Providing hierarchical security domain –Facilitate extensibility of network components –Facilitate connection establishment –Automatically logon and logout in security domain –Proof against interference –Proof against eavesdropper Demand on cryptography –Facilitate extensibility of network components –Facilitate connection establishment –Security and privacy issues –Proof against interference –Proof against eavesdropper

14 Daniel Bichler Page 14 Key Generation from Physical Environmental Parameters Physical environmental parameters –Sound pattern –Light modulation –Infrared signal Devices generating exactly the same key inside security domain Encrypt communication with generated key No key exchange Facilitates adding new devices No user interaction

15 Daniel Bichler Page 15 Summary Security concept: –PAN –Home automation Key generation from physical parameters –Accelerometer –Sound pattern –Light modulation –Infrared Security domain Easy connection establishment

16 Daniel Bichler Page Mainframe Computers 1990Personal Computer 2010 Pervasive Computing Pervasive Computing as as Social Trend


Download ppt "Daniel Bichler 2005-10-12 Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on 2005-05-01."

Similar presentations


Ads by Google