Challenges and Architectural Approaches for Authenticating Mobile Users João Pedro Sousa George Mason University Fairfax, VA Workshop on Software Architectures.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
SCSC 455 Computer Security
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Secure Communication Architectures.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Grid Security. Typical Grid Scenario Users Resources.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Core Web Service Security Patterns
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Chapter 10: Authentication Guide to Computer Network Security.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
An Analysis of Bluetooth Security
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Today’s Lecture Covers < Chapter 6 - IS Security
CSC8320. Outline Content from the book Recent Work Future Work.
© Synergetics Portfolio Security Aspecten.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Chapter 21 Distributed System Security Copyright © 2008.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Presented by: Sanketh Beerabbi University of Central Florida.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authentication What you know? What you have? What you are?
Computer Science and Engineering 1 Mobile Computing and Security.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
CSCE 201 Identification and Authentication Fall 2015.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Deployment Planning Services
ISSeG Integrated Site Security for Grids WP2 - Methodology
Chapter One: Mastering the Basics of Security
Access control techniques
Grid Security.
Cryptography and Network Security
Security in Networking
Presentation transcript:

Challenges and Architectural Approaches for Authenticating Mobile Users João Pedro Sousa George Mason University Fairfax, VA Workshop on Software Architectures and Mobility

authentication of mobile users what is the problem? what are solutions? requirements media library: verify that the user has access smart space: verify that the user has access display: verify that PDA is intended remote control media library: verify that display is intended output... establish secure channels example: user wants to access media library for which has membership stream media to wall in lounge use PDA as remote control media library

ICSE 2008 authenticating mobile users © Sousa3 verification vs. selection two related but distinct problems verify properties identity membership trustworthiness uncompromised platform demographics customer segments mechanism: authentication answer: yes/no predict QoS properties success/failure latency integrity confidentiality... mechanism: trust management recommender systems answer: quantitative assessment

ICSE 2008 authenticating mobile users © Sousa4 outline classes of the verification problem User Access to Services Group Access to Services Link Peers architectural patterns challenges remote personalized service group/public services

ICSE 2008 authenticating mobile users © Sousa5 UAS User Access to Services -telnet -PC anywhere -e-banking -e-payments -... remote personalized service personal/local device + connectivity personal/local device + connectivity server URL user credentials verify identity

ICSE 2008 authenticating mobile users © Sousa6 GAS Group Access to Services group/public services (personal +) local devices: -membership services (library...) -e-voting -services in smart spaces -e-commerce -... (personal +) local devices: -membership services (library...) -e-voting -services in smart spaces -e-commerce -... proof of membership/trustworthiness demographics/interests info verify membership trustworthiness uncompromised platform demographics k-anonymity

ICSE 2008 authenticating mobile users © Sousa7 LP Link Peers personal devices: -social exchange/chatting -file sharing -media streaming -remote control -... personal devices: -social exchange/chatting -file sharing -media streaming -remote control -... verify demographics /interests membership /identity co-ownership

ICSE 2008 authenticating mobile users © Sousa8 credentials play key role many types with pros and cons UAS: prove identity GAS: prove right to access LP: prove co-ownership what you know passwords easy to change /keep private hard to keep track of disruptive to provide zero-knowledge proofs doesn’t reveal what you know very complex to provide who you are fingerprints, face, voice, gait recognition very easy to provide false positives/negatives hard to change /keep private what’s in your vicinity where you are: secure spaces what you carry: smart cards, one-time pwd may preserve anonymity feasible to change /keep private may be hard to keep track of

ICSE 2008 authenticating mobile users © Sousa9 outline classes of the verification problem User Access to Services Group Access to Services Link Peers architectural patterns challenges

ICSE 2008 authenticating mobile users © Sousa10 traditional authentication addresses UAS WS server uid → ACLissuers tickets issuer uid → pwd Needham-Schroeder protocol tickets protocol access protocol encrypted text uid, URL server URL user credentials

ICSE 2008 authenticating mobile users © Sousa11 reveals credentials & intention to communicate with specific server before issuer is authenticated may have to trust shared WS implicitly trusts server traditional authentication conceived to protect servers WS server uid → ACLissuers tickets issuer uid → pwd server URL user credentials

ICSE 2008 authenticating mobile users © Sousa12 LP is increasingly popular for mobile devices short range radio: Bluetooth... line of sight: infra-red co-location: shake local connector wide-area connector ownership dev applications media sharing/streaming remote control dev peers dev peers

ICSE 2008 authenticating mobile users © Sousa13 LP is used in P2P systems to establish a secure link local connector wide-area connector ownership local area networks (with free connectivity) peers may establish secure link while hiding identity from others no need for central authority peers need to know each other beforehand (off band) authentication of users implied by ownership (what you carry) dev peers dev peers selection (trust management) is arguably just as relevant as authentication in P2P systems

ICSE 2008 authenticating mobile users © Sousa14 LP combined with UAS/GAS for wide-area/paid connectivity peers (service consumers/providers) and carriers may each have their own security policies multilateral security (telecom) for billing, prior to LP users authenticate with carriers UAS for personalized billing GAS for using certified e-currency (UAS with broker entity) dev peers dev peers

ICSE 2008 authenticating mobile users © Sousa15 in membership-based spaces, users’ PDA: starts secure UAS to certificates issuer obtains anonymous one-time certificates reveals membership to ambient (k-anonymity) ambient cannot track identity or usage patterns may request identity of malicious users to cert. issuer certificates issuer may track identity and usage hence backlash against MS Passport zero-knowledge proofs do not require third party (cert. issuer) limited use due to complexity GAS in shared spaces: users remain k-anonymous ambient services gid → ACL certificates issuer PDA issuers profiles certificates protocol ambient access identification protocol

ICSE 2008 authenticating mobile users © Sousa16 in public/commercial spaces, ambient seeks to obtain demographics/interests for targeting info & services PDA may release a diff pseudonym at each location (requires autonomous location awareness) ambient remembers habits/prefs of regular users can’t transfer knowledge across similar spaces PDA may release one-time pseudonyms PDA remembers habits/prefs of user and releases the ones associated to each type of space/requested service GAS in shared spaces: users remain k-anonymous ambient services gid → ACL PDA issuers profiles ambient access

ICSE 2008 authenticating mobile users © Sousa17 UAS in shared spaces appealing and risky users will access personalized services may not have the skill or the will to protect PDA from cyber attacks at malicious/unsecure spaces compromised PDAs can act as stepping stones to attack personalized services (stored URLs & pwds) servers may adjust ACL based on user’s location PDA compromised at high-risk location may manifest at location deemed low-risk (and open access) ambient services gid → ACL PDA issuers profiles server uid → ACL certificates issuer certificates protocol ambient access identification protocol

ICSE 2008 authenticating mobile users © Sousa18 UAS in shared spaces PDA may get in the way give users a false sense of security in high-risk spaces limiting: users may want to engage local capabilities for accessing remote services overhead: remember to carry PDA and charge battery may not be justified in trusted spaces medical staff moving within a hospital corporate campuses… ambient services gid → ACL PDA issuers profiles server uid → ACL certificates issuer certificates protocol ambient access identification protocol access protocol

ICSE 2008 authenticating mobile users © Sousa19 UAS in shared spaces possible without PDA as in traditional authentication malicious space may capture credentials replay and piggyback attacks space may obtain undue access to personal services new risks associated with ubiquitous access space may reveal user presence and activity threats to privacy and personal security if space is not secure enough it may unintentionally facilitate all of the above ambient services uid → ACL issuers server uid → ACL certificates issuer certificates protocol server URL user credentials access protocol

ICSE 2008 authenticating mobile users © Sousa20 UAS in shared spaces broaden perspective on protection (as) before ACL protects server’s resources against malicious users now, also protect user’s assets/privacy against malicious spaces/others ambient services uid → ACL issuers server X → ACL certificates issuer certificates protocol server URL user credentials access protocol

ICSE 2008 authenticating mobile users © Sousa21 UAS in shared spaces tradeoff access and protection protection: some spaces have trusted admin some don’t access: users may be ok with accessing a subset of personalized services at different spaces authentication and granting access becomes a multilateral problem logging and accountability complements upfront access control ambient services uid → ACL issuers server X → ACL certificates issuer ambient services uid → ACL issuers ambient services uid → ACL issuers ambient services uid → ACL issuers

ICSE 2008 authenticating mobile users © Sousa22 authentication gets complex even in simple scenarios challenge: framework help users manage the release of credentials and be aware of access/protection tradeoffs works in degraded modes when parts are missing role of infrastructure/trusted third parties? role of personal devices? example: user wants to access media library for which has membership stream media to wall in lounge use PDA as remote control media library GAS local LP remote LP

ICSE 2008 authenticating mobile users © Sousa23 discussion classes of the verification problem User Access to Services Group Access to Services Link Peers architectural patterns challenges remote personalized service group/public services

ICSE 2008 authenticating mobile users © Sousa24 UAS in shared spaces multilateral authentication & trust ambient services facilitate UAS each party needs to authenticate and grant access to others each party may establish access control policies for others personalized server may grant less to user at risky ambient a user may trust a space for certain things, but not others logging and accountability complements upfront access control ambient services uid → ACL issuers server X → ACL certificates issuer server URL user credentials ambient services gid → ACL PDA issuers profiles server X → ACL certificates issuer dev peers dev peers