1 Intelligent Agents - Security Katia Sycara The Robotics Institute

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Cryptography and Network Security Chapter 17
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Internet Security Terms and Techniques Chris Avram Faculty of Information Technology Monash University 1U-Cubed ‘99Chris Avram.
Chapter 8 Web Security.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Fall 2006CS 395: Computer Security1 Key Management.
Electronic Banking & Security Electronic Banking & Security.
Cryptography and Network Security
Cryptography and Network Security
Cryptography and Network Security
Presentation transcript:

1 Intelligent Agents - Security Katia Sycara The Robotics Institute

2 Security for Electronic Commerce

3 Insecure Internet The original Internet was designed for research, not as a commercial environment. The TCP/IP protocol suite used by all computers connected to the Internet is fundamentally lacking in security services.

4 Internet Security Weaknesses - 1 Confidentiality: –Most lower layer protocols, including Ethernet, are “broadcast” in nature: machines connected to a LAN can eavesdrop on each other; –Nodes lying on the path between two communicating parties can “eavesdrop” on traffic as it passes; –Theft of account information, credit card numbers; theft of information-based products; – Other info on “who talked to whom” (even without knowing the content involved) leads to loss of privacy;

5 Internet Security Weaknesses - 2 Authentication: –Virtually impossible to accurately determine whether the addresses in data packets are genuine or not; –Hosts and users can spoof (impersonate) each other; Integrity: –Packet contents: no service provided to authenticate the content of packets; –Ex: modification of payee of a check; the value of a check.

6 Internet Security Weaknesses - 3 Repudiation: –parties may deny having participated in transaction, sent messages, given authorization, etc.; Hosts need to be protected as well; attacks targeted to retrieve cleartext information from poorly protected systems;

7 Security Requirements for Commercial Transactions Confidentiality; Authentication; Data Integrity; Non-repudiation; Security mechanisms based on cryptography

8 Some Existing Solutions

9 Cryptographic Building Blocks - 1 Symmetric key cryptography: –Two parties share a common secret or key; –Keys are used to encrypt and decrypt messages; Can be used for authentication with the help of a third party.

10 Cryptographic Building Blocks - 2 Public-key cryptographic: –Matching private and public keys: –Can be used to sign and verify signatures:

11 Public Key Infrastructure Ability to match specific keys with their owners: –Public key certificates (Bind public keys to specific entities and allow for a third party to validate the binding); –Ex: x509 certificate. Can be used for encryption and decryption alone

12 The Risks of Electronic Commerce - 1 The customers’ perspective: –Stolen payment credentials + passwords; –Dishonest merchants; –Disputes over service qualities; –Dishonest financial service providers; –Inappropriate use of transaction details. The merchants’ perspective: –Forged or copied instruments; –Disputed charges; –Insufficient funds in customer accounts; –Unauthorized redistribution of purchase items; –Dishonest financial service providers;

13 Not Everything has a Technical Solution There are problems where solutions can’t be enforced in advance, but where accepted practices solve the problem if followed: –privacy protection; –intellectual property rights; –quality of service. These practices will usually be followed if: –They are easy to follow; –Social and legal enforcements.

14 Other Weak Points Hardware; Operating systems; System configuration; System management; Compilers; Poorly written software; Application-level access control; User neglect

15 Adding Security to Retsina

16 Why do we need to worry about security? We want to deploy our system in open networks; –Agents come and go => agents interact with strangers; –Can agents be trusted? Can their deployers be trusted? Agents are expected to do more serious things. Ex: –Getting info on your banking account; –Carry out sales transactions.

17 Assumptions we make Neither agents nor their deployers are trustworthy (They can misbehave): –Agents may eavesdrop on communication between two other agents; –An agent may masquerade as some other agent; –Agents may not behave as expected (e.g., an agent may not want to pay for goods received). There must be a few, selected entities that can be trusted.

18 Adding Security to Retsina (MAS in general) Prevent misbehaviors from happening + have recovery mechanisms if they happen: –Identify different security issues that MAS face; –Propose solutions for these problems; –Design and implement a security infra-structure for Retsina. Focus: application-independent issues: –Communication security: yes; –Fair exchange in electronic sales: no. Approach: Standard security techniques used in distributed systems –Authentication; –Access control; –etc.

19 Security Threats in MAS System-level threats: Those that subvert inter-agent interactions, independently of the application a system is running. –Untrustworthy ANSs and matchmakers; –Untrustworthy application agents; –Insecure communication channels. Application-level threats: Those that subvert the security of applications. They may exist even if the underlying system of agents is secure. –Service providers that do not implement appropriate access control policies; –Untrustworthy application agents.

20 Our Solution (1) To guarantee the integrity of naming and matchmaking services: –Include access control: – trusted ANSs and matchmakers! Make agents uniquely identifiable, and give them unforgeable proofs of identity: –Prevents spoofing; Make deployers of agents liable for the actions of their agents: –Agents are given proofs of identity only when deployers allow their own identities to be linked with those of their agents.

21 Our Solution (2) Protect communication channels; Add access control mechanisms (which usually rely on the delegators’ Ids); Make agents prove that they are delegates of whom they claim to be.

22 A Design of a Security Infra-structure for Retsina Assumptions: Deployers have public key certificates binding their physical identities (SSN, company names, etc.) to their public keys; DCAs are assumed to exist (lie outside our security infra-structure); ANSs and matchmakers –are trusted entities; –their public keys are publicly known. The addresses of ANSs are publicly known.

23 Public Key Cryptography Key pairs: –Private keys: a ; –Public keys: A ; pub(a) Digital signatures: (m) a Signature verification: –Use A to verify (m) a Public key certificates: –(Name, Public key) ca

24 Giving Identities to Agents + Establishing Liability (1) 1. Choose an Agent ID AID 2. Generate a public key pair {a, pub(a)} 3. m 1 =(certify AID,pub(a),t) d 4. Verify the validity of the request 5. Generate m 2 =ACA-signed certificate binding pub(a) to AID 6. Creates an entry [D’s public key certificate, m 1 ] in the certification DB 8. Verify the signature in m 2 with ACA’s public key.

25 Giving Identities to Agents + Establishing Liability (2) Agents are given: –a public key certificate, and –a matching private key. The certification process: –certification can be requested only by deployers who can prove their own identities => make the deployer aware of his or her liabilities.

26 Revoking an Agent’s Public Key

27 Registering at an ANS

28 Unregistering at an ANS

29 The Lookup Protocol Agents are identified by their keys, and not their names!!

30 Matchmaker Protocols Very similar to ANS protocols; Differences: –Physical addr may not be shared by more than one agent; capabilities may; –Agents use ANSname.Agentname to register with the matchmaker; –The lookup protocol: 1. CAP 2. [CAP, {[ANS-x 1.AID 1,CERT 1 ],… [ANS-x n.AID n, CERTn]}, T] mm

31 Secure Communication Channels SSL (Netscape’s Secure Socket Layer protocol); Why? –Keep communication security transparent from the application; –Off-the-shelf trustworthy technology (extensible too). Implementation: –Local effort: at the Communicator.

32 Secure Delegation + Access Control Knowing who is the delegator may be necessary or desirable; Original design: Have the agent know the secret key of its deployers; Weaknesses: –Agents should not know such important secrets; –Sometimes they do not even have to know (ex: PIN); –Should have a “weaker,” “temporary” solution.

33 Some Interesting Pages –Some introductory material on standards for cryptographic object; –Info on a real-world security package (can download the code and play); Communications of the ACM - June 1996, volume 39, Number 6 –An issue dedicated to EC; from which the article is extracted.