Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

Expanding LTE for Devices European Commission Information Society and Media The aim of EXATED is to realise the vision of a new scalable.
Encrypting Wireless Data with VPN Techniques
Information Society Technologies programme 1 IST Programme - 8th Call Area IV.2 : Computing Communications and Networks Area.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
End-to-End Efficiency (E 3 ) Integrated Project of the EC 7 th Framework Programme E 3 WP5 Objectives E 3 WP5 Structure and Research Challenges
Chapter 19: Network Management Business Data Communications, 5e.
Chapter 19: Network Management Business Data Communications, 4e.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Wired Equivalent Privacy (WEP)
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Chapter 10: Authentication Guide to Computer Network Security.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
© Synergetics Portfolio Security Aspecten.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
IEEE SCC41 PARs Dr. Rashid A. Saeed. 2 SCC41 Standards Project Acceptance Criteria 1. Broad market application  Each SCC41 (P1900 series) standard shall.
Doc.: IEEE 802 ec-12/0006r0 Submission Liaison presentation to SC6 regarding Internet Security Date: 2012-February-13 Authors: IEEE 802 LiaisonSlide 1.
ECE 4450:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
 Working Group 2: Optimal Approach to NG9-1-1 Architecture Implementation by PSAPs Status Report September 29, 2015.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Nicholas D. Lane, Hong Lu, Shane B. Eisenman, and Andrew T. Campbell Presenter: Pete Clements Cooperative Techniques Supporting Sensor- based People-centric.
Providing Teleworker Services
Security in Wireless Residential Networks Han Sang Kim.
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
COGNITIVE NETWORK ACCESS USING FUZZY DECISION MAKING Nicola Baldo and Michele Zorzi Department of Information Engineering – University of Padova, Italy.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy, Yang-Fang Li, Pei-Jia Yang,
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Security of the Internet of Things: perspectives and challenges
Computer Systems Architecture Edited by Original lecture by Ian Sunley Areas: Computer users Basic topics What is a computer?
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Providing Teleworker Services
ECE 4450:427/527 - Computer Networks Spring 2017
Providing Teleworker Services
PREPARED BY: RIDDHI PATEL (09CE085)
Providing Teleworker Services
Network Architecture By Dr. Shadi Masadeh 1.
Presentation transcript:

Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015

Motivation  The development of mobile devices (MD) has grown significantly over the last decade from a simple mobile phone to a pocket size computing device with the capability to access the Internet via various wireless systems such as Wi-Fi and 3.5G networks.  The increase in MD capability (processing power, memory, storage) as well as the introduction of wireless systems (Bluetooth, Wi-Fi, WiMAX, 3.5G) open new opportunities for the next generation of mobile services such as mobile Internet, m-commerce and m-government.

Problem Statement  Three main challenges in mobile security are illustrated below:  First and second challenges are mobile devices and wireless systems as they inherit some limitations that threaten the information protection system.  The third challenge comes from some security protocols such as the popular network layer protocol IPSec and the transport layer TLS/SSL protocol.

 This paper identifies the MD research challenges and proposes practical solution to maintain the balance between protection and efficiency to secure mobile communication.  The research challenges have been identified, namely: terminal heterogeneity, network heterogeneity and inflexible security protocols.  This increasingly heterogeneous environment presents a challenge on how to secure communication on any type of terminal over any type of network. As guiding principles of our research, we have set a number of objectives that address the MD challenges.

These objectives include:  Design an adaptable approach deals with terminal heterogeneity (processing power, memory capacity and power supply).  Design an adaptable approach deals with network heterogeneity (wire and wireless capabilities gap).  Link the provision of security with requested information.  Increase security beyond one fixed key size technique.  Provide a balance between security and performance.

Dynamic Key Size (DKS) architecture  Now In this section I am going to proposed dynamic key size (DKS) architecture and its components will be described. The Architecture covers general concepts, security requirements, definitions and mechanisms defining DKS approach.

DKS architecture  As the figure shows, the DKS architecture consists of two main blocks. The first block is the approach operation unit, which contains of two core components, namely Capability Performance Levels and Information Security Levels. The second block is the customization and maintenance unit, which contain two components (Policy and Key Management).

DKS architecture  In the DKS architecture, the first block supports the selection of the suitable algorithm, which is based on the availability of the algorithm on both sides. The decision of the most appropriate algorithm key size is based on capability performance level and the degree of information sensitivity level.

DKS architecture  While the second block support the first block through both policy management, which customize the approach and define its configuration, and key management, which deals with storing keys and maintaining them.

DKS architecture  Our approach is thus particularly effective to achieve a flexible selection of the appropriate algorithm key size to meet the objective of a balance between efficiency and protection in a mobile system.

A. Capability performance levels  The device and network capability performance levels are defined and customized by a set of policies. The goal of this component is to provide a flexible security system with a variety of performance levels that can deal with different MD and network capabilities.  Category 1: Processing Power and Memory Capacity.  Category 2: Power Supply.  Category 3: Communication System.

B. Information security levels  This section defines four information security levels, named none critical, least critical, critical and most critical.  The most critical level represents the highest sensitive information; while none critical level contains the least significant information to the system security.  the decision can be made as to what information is sensitive and what is not.

C. Key management  This component accommodates the generation and maintenance of keys that are used in the encryption processes to provide the security services of DKS approach.  It contains identifiers for agreed authentication, encryption and message authentication algorithms, operational parameters like key lifetime.  Key management plays an important role for generating, exchanging, storing, safeguarding, using, vetting, and replacing of keys.

D. Policy management  This is an important component that defines the DKS approach implementation. The policy addresses application customization details of the DKS approach.  The policy gives a specification of the seven performance levels as well as a description of every information security level including the information type and the protection tolerance.  The key management policy, states the storage, protection, employ, selection, and replacement of keys.

CONCLUSION  We argued in this paper the need to adopt flexible, multi- level security, based on different algorithm key sizes, tied specifically to the information sensitively and capability status in a mobile environment. We proposed the DKS approach as a practical solution to maintain the balance between protection and efficiency to secure mobile communication.

REFERENCES  Abdullah Almuhaideb, Mohammed Alhabeeb, Phu Dung Le, Bala Srinivasan, "Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance," Advanced Information Networking and Applications, International Conference on, pp , th IEEE International Conference on Advanced Information Networking and Applications, 2010.