Usable Bootstrapping of Secure Ad Hoc Communication Ersin Uzun PARC 1.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Gold Country Computer Learning Center March 2006 Is Wireless for You? Roger Thornburn.
Chapter 7: Physical & Environmental Security
-Priyanka, Madhurima. IDEA of WIRELESS LEASH Your devices go…. Wherever you go!!
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
Background Information. 2 Scope: Computer Hardware  Tablets, Laptops, Embedded Systems  Desktops, Servers, Supercomputers  Peripherals and Accessories:
By Md Emran Mazumder Ottawa University Student no:
Doc.: IEEE /655r0 Submission May 2006 Slide 1Scott Lee, et al., Samsung Electronics Use Cases of WLAN for AV Streams Scott Seongwook Lee, Huai-Rong.
Daniel Bichler Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on
Off-the-Record Communication, or, Why Not To Use PGP
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
NFC Devices: Security and Privacy
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Tight Bounds for Unconditional Authentication Protocols in the Moni Naor Gil Segev Adam Smith Weizmann Institute of Science Israel Modeland Shared KeyManual.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Device(-to-Device) Authentication Nitesh Saxena Polytechnic Institute of NYU.
Device-to-Device Authentication Nitesh Saxena Polytechnic Institue of NYU.
SOUPS July 24, 2008 Universal Device Pairing using an Auxiliary Device Nitesh Saxena, Md. Borhan Uddin and Jonathan Voris Polytechnic Institute of New.
Design Wireless Network 2
Wireless setup utility for Portable Printer P-20.
Seeing-Is-Believing: Using Camera Phones for Human- Verifiable Authentication Jonathan M. McCune Adrian Perrig Michael K. Reiter Carnegie Mellon University.
Seeing-Is-Believing: using camera phones for human-verifiable authentication Jonathan M. McCune, Adrian Perrig and Michael K. Reiter Int. J. Security and.
SafeSlinger Easy-to-Use and Secure Public-Key Exchange Michael Farb (CMU), Yue-Hsun Lin (CMU), Tiffany Hyun-Jin Kim (CMU), Jonathan McCune (Google), Adrian.
Physical Contact in Ad-Hoc Wireless Network Nie Pin
Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU.
1/46 SPIES: Security and Privacy In Emerging computing and networking Systems Nitesh Saxena Polytechnic Institute of NYU
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
SECURE DEVICE ASSOCIATION: TRENDS AND ISSUES Presenter Gicheol Wang Yasir Arfat Malkani, Dan Chalmers, and Ian Wakeman.
Lecture 12.1: User-Enabled Device Authentication CS 436/636/736 Spring 2013 Nitesh Saxena.
Lecture 8: User-Enabled Device Authentication CS 436/636/736 Spring 2014 Nitesh Saxena.
Lecture 12.1: User-Enabled Device Authentication - I CS 436/636/736 Spring 2012 Nitesh Saxena.
Device(-to-Device) Authentication Nitesh Saxena Polytechnic University.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
1 Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup Cynthia KuoCarnegie Mellon University.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
July 24, 2008 SOUPS 2008 Universal Device Pairing using an Auxiliary Device Nitesh Saxena, Md. Borhan Uddin and Jonathan Voris Polytechnic Institute of.
University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.
Integrity-regions: Authentication Through Presence in Wireless Networks Srdjan Čapkun 1 and Mario Čagalj 2 1 Department of Computer Science, ETH Zurich.
Center for Cyber-Security and Privacy1 Loud And Clear Security Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun.
Lecture 12.2: User-Enabled Device Authentication II CS 436/636/736 Spring 2012 Nitesh Saxena.
Network Security Lecture 8 Presented by: Dr. Munam Ali Shah.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Research Overview Nitesh Saxena Research areas: computer and network security, applied cryptography.
Technology A-Z by RJizzle. A is for Antenna B is for Bluetooth.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Communications Standard ‘wired’ networks are connected together using copper cables that carry data around the network in the form of electrical.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Computer Networks CSC September 23,
How to Connect Wi-Fi HP Laptop/Desktop with Android Smart Phone? ( )
Presented by Khaled Al Otaishan
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
TERMINOLOGY Define: WPAN
Outline What is Wireless LAN Wireless Transmission Types
Wireless Fidelity 1 1.
Wireless Networking Chapter 23.
The security and vulnerabilities of IoT devices
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Wi-Fi Technology.
PREPARED BY: RIDDHI PATEL (09CE085)
Presentation transcript:

Usable Bootstrapping of Secure Ad Hoc Communication Ersin Uzun PARC 1

Outline What is first connect (aka device pairing or bootstrapping secure communication)? Why is it hard to secure? Why usability is important? Methods & standards, and the current state. 2

Secure pairing of personal devices Pairing: bootstrapping the association and the security contexts for subsequent communication. E.g., Pairing a bluetooth phone and a headset Enrolling a phone or PC into a home WLAN 3

4 What devices? Desktops Laptops PDAs Phones MP3 Players Wireless Headsets Cameras Device (e.g., TV) Remotes Access Points FAX-s/Copiers/Printers Sensors? RFIDs? Pacemakers? Dialysis devices?

Setting up a security association (authenticated secure communication) where: no prior context exists (no PKI, common TTPs, key servers, shared secrets, etc.) Ordinary non-expert users Cost-sensitive commodity devices Problem Ohh! I cannot even pair my socks! 5

Wireless channel: susceptible to eavesdropping Lets use K as the secret key Alice Bob OK 6 Encrypted Communication using K

Uups! Lets use K as the secret key Alice Bob OK Eve can decrypt the communication! Eve can impersonate either party! 7 Communication

Also open to active attacks… PK E1 Eve PK A Alice Bob PK E2 PK B Man in the middle attack over Diffie-Hellman key agreement 8

Mechanisms should be intuitive...and work on various devices! SSID? WPA? Passcode! Which E61? 9

… and secure 10

Security and usability coexistence Better usability = insecure? More security = harder to use? 11

Goal: Secure, intuitive, inexpensive methods for secure communication bootstrapping One well-studied approach: using two communication channels Assumption: Peer devices are physically identifiable Two channels: 1. Wireless channel 2. OOB channel: Human perceivable or location-limited Other approaches Based on physical properties of wireless signals Distance-bounding Environmental sensing 12

Some examples (not a complete list!) Various OOB channels Cables Resurrecting Duckling, [Stanajo, et al. IWSP99] Camera, barcodes/LEDs Seeing-is-believing, [McCune, et al. S&P05] SIB revisited, [Saxena, et al. S&P06] GAnGS, [Chen, et al. Mobicom08] SPATE, [Lin, et al. Mobisys09] Speakers and microphones Loud And Clear, [Goodrich, et al. ICDCS06) HAPADEP, [Soriente, et al. ISC08) Other hardware Accelerometers Shake well before use, [Mayrhofer, et al. Pervasive07] Ultrasound, laser transceivers and many others.... Standardization activities Wi-fi protected setup Bluetooth secure pairing Wireless USB association models Location limited channels IrDA: Talking to Strangers, [Balfanz, et al. NDSS02] NFC: Bluetooth specs draft Distance-bounding (e.g., Capkun et al. TMC10), Env. sensing (Krumm et al. Ubicomp07) 13

Where are we now? Proposals are not adapted by manufacturers I still cannot securely pair a Bluetooth handset and a phone in the presence of an active attacker My mother still cannot secure her WLAN at home without my help Emerging scenarios are even more challenging Group pairing Home sensor networks Pairing with personal RFID tags 14

Thanks! 15