Brian Padalino Sammy Lin Arnold Perez Helen Chen

Slides:



Advertisements
Similar presentations
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Advertisements

 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
LOGO A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks O. Arazi, H. Qi, D. Rose IEEE SECON 2007 proceedings.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Key Establishment Techniques: Key Distribution and Key Agreement
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Key Distribution CS 470 Introduction to Applied Cryptography
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Computer Science Public Key Management Lecture 5.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Chapter 10: Authentication Guide to Computer Network Security.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Certification asynchrone à grande échelle avec des arbres de vérification de certificats Josep Domingo-Ferrer Universitat Rovira i Virgili
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Credential Verification in Mobile Ad-hoc Networks Team Challenger 2/21/2005.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Use of certificates as a base security level for securing PoS/MN multicast communication.
Computer and Network Security - Message Digests, Kerberos, PKI –
To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
A Novel Cryptography for Ad Hoc Network Security ► Pi Jian-yong; Liu Xin-song; Wu Ai; Liu Dan; ► 2006 International Conference on Communications, Circuits.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Golden Linear Group Key Agreement Protocol
CS480 Cryptography and Information Security
Chapter 4 Cryptography / Encryption
Presentation transcript:

Brian Padalino Sammy Lin Arnold Perez Helen Chen Team Challenger Brian Padalino Sammy Lin Arnold Perez Helen Chen

Group Communication Authentication Huang, Q. et al “Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks” (2003) International Conference on Sensor Wireless Networks and Applications pp.141 I

Sensor Networks Background: Supports dynamic scenarios, large scale, real-time data processing Does not require any centralized administration or fixed infrastructure Authentication between sensor nodes and security managers

Sensor Networks Problems Sensors have limited power supply and computational resources Should only send out packets when necessary to help save power Accurately authenticate with a security manager without using an online centralized database

Sensor Networks Authentication solutions A hybrid authentication key establishment protocol symmetric key cryptographic operations elliptic curve implicit certificates

Sensor Networks Implementation Elliptic Curve Cryptography Symmetric-Key Operations Certificates Certificate contains public key, device ID and certification expiration date, digitally signed Certificates are acquired before a sensors can join the network

Trust Groups Keoh, S.L. et al “Towards flexible Credential Verification in Mobile Ad-hoc Networks” (2002) Annual International Workshop on Principles of Mobile Computing, Toulouse, France pp. 58

System Implementation

XML Credential Generator Key Management Every device maintains a key ring that contains a list of trusted public keys and their associated trustworthiness level. Ensures that only trusted public keys are considered when checking assertions. XML Credential Generator Used to group the user’s credentials together in order to create a readable credential assertion statement (CAS).

Security Assertion Module Main functionality is to issue assertions to other users after verifying credentials listed in the CAS successfully. Verification and Validation Module Used to determine whether a CAS is authentic and based on authentic credentials. When a user presents his/her CAS together with the corresponding ASSs, the V&V checks the signatures against the key ring to determine whether the assertions can be trusted.

Group Communication Security Contributory key agreement 1) Group Diffie-Hellman key exchange 2) Key trees

Diffie-Hellman Key exchange Alice picks BK=x Bob Picks BK=y 1 p, , K=x mod p 2 K= y mod p Bob computes K BK = (x mod p)y = xy mod p Alice computes K BK = (y mod p)x = xy mod p The shared secret key

Key trees K p =( BK (L) ) K (R) mod p =( BK (R) ) K (L) mod p = f (K (L) K (R)) Key trees <0,0> <1,0> <1,1> <2,0> <2,1> <2,2> <2,3> <3,0> <3,0> <3,6> <3,7>

Problems and Solutions Join, Leave, Partition and Merge by Updating Current Tree <0,0> <1,0> <1,1> <2,0> <2,1> <2,2> <2,3> <3,0> <3,0> <3,6> <3,7>

Project Idea Will be implementing system outlined by “Towards Flexible Credential Verification in Mobile Ad-hoc Networks” Will be adding certificate/assertion revocations and some sort of black listing policy for untrustworthy nodes to increase security of the proposed system.

Project Idea (cont.) Will be building a game on top of our system to demo what it can do. Social engineering game geared towards building and losing trust. Player must try and obtain as much ASS as possible. Then use that ASS to get more ASS.

Papers to be used… “Towards a human trust model for mobile ad-hoc networks,” Licia Capra “A certificate revocation scheme for wireless ad-hoc networks,” Claude Crepeau and Carlton Davis “Trust and establishment of ad-hoc communities,” Sye Long Keoh and Emil Lupu