International Telecommunication Union ITU-T Workshop on Home Networking and Home Services Tokyo, Japan, 17-18 June 2004 Securing Home Networks Tsutomu.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Doc.: IEEE Submission May 2014, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Status of IPv6 John Sweeting Time Warner Cable Oct 5, 2011.
International Telecommunication Union Committed to connecting the world 4 th ITU Green Standards Week Bettina Tratz-Ryan Gartner The Internet of Things.
Home Networking Jessica Knox. Home Networking is… The collection of elements that process, manage, transport, and store information, Enabling the connection.
Applied Cryptography for Network Security
© Folens 2008 Transfer of data in ICT systems Using ICT networks.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
ZigBee.  ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Technological Innovation & Integrated Products in Consumer Electronics Industry September 14, 2005 Japan Electronics & Information Technology Industries.
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
03/09/2006W3C Uniquitous Web Workshop1 PUCC and WEB Nobuo Saito Keio University W3C Associate Chair PUCC Chairperson.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
IoT, Big Data and Emerging Technologies
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
The Future of the Home Network By: David Paehlke.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
思科网络技术学院理事会. 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Smart Grid Energy Generation Renewable Energy Distributed Generation Transmission & Distribution Load Management Demand Response Electrical Vehicles Charging.
International Telecommunication Union ITU-T Workshop on Home Networking and Home Services Tokyo, Japan, June 2004 Home Networking U.S. Cable Perspective.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Setting Wireless Network At Home By: Parveen Sharma.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
June 17, 2009 Michael W. Howard, Ph.D. Sr. Vice President The Interoperable Smart Grid Evolving.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Lecture 24 Wireless Network Security
INFORMATION TECHNOLOGIES LABORATORY «Information technologies» laboratory «Information technologies» laboratory Was established on the 23th of December.
Microsoft Confidential 1 WWSMM 2000 Next Generation Networking Device Ecosystem Shunichi Kajisa ( 加治佐 俊一 ) Director East Asia Windows Division Microsoft.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
COMPUTER NETWORK CREATED BY:- PALASH SACHAN. CONTENTS INTRODUCTION COMPUTER NETWORK TYPES OF NETWORK CLASSIFICATION OF NETWORK ARCHITECTURE NETWORK TOPOLOGY.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Realization of Home Appliances Control System based on Power Line Communication Technology.
Chapter 1 The Data Communication Industry The best way to approach data communication The data communication industry Challenge & solution to business-oriented.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
11/8/2012Proprietary & Confidential1. Enhancing the learning environment to… Increase student & teacher competencies in technology Support the integration.
Security of the Internet of Things: perspectives and challenges
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Living in a Network Centric World
Living in a Network Centric World
SMART BUILDING WITH INDOOR NAVIGATION SYSTEM -using iot
Real-Time Collaboration Hub Larry Dorie CEO
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Session 5: Securing Home Networks Conclusions & Recommendations
Online Learning.
Living in a Network Centric World
Session 26 INST 346 Technologies, Infrastructure and Architecture
Living in a Network Centric World
Living in a Network Centric World
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
The OSI Security Architecture
Living in a Network Centric World
Presentation transcript:

International Telecommunication Union ITU-T Workshop on Home Networking and Home Services Tokyo, Japan, June 2004 Securing Home Networks Tsutomu Matsumoto Professor, Yokohama National University

ITU-T 2 Taxonomy of Home Networks o Network of Audio, Visual, Communication Devices and Personal Computers o Network of Facility Control Devices including Sensors for Physical Security o Network of Electrical Appliances

ITU-T 3 Architecture of Concern How to achieve quality of security almost equivalent as that achieved by Wired Network of Appliances The Internet General Network Security Mechanisms such as Firewalls, etc. Air-Conditioner Refrigerator Washing Machine Wireless Network of Appliances etc

ITU-T 4 Conventional Security Issues o Confidentiality o Integrity o Availability Use of appropriate Cryptography and Network Security Technologies Make appropriate Standards to gain Interoperability among multi- vendor appliances

ITU-T 5 Typical Example F 1 C & S 1 Appliance 1 Appliance 3 Appliance 2 F 2 C & S 2 F 3 C & S 3 F : Functional Part C & S : Communication and Security Part Wireless Medium

ITU-T 6 The Real Issue for Security o The allowed computational complexity or the cost for mechanisms to enhance security may be highly limited o Often the appliances DO NOT have their Identifiers in digital form Key Management including Key Establishment, Key Revocation, and Key Renewal needs Innovative Technologies o How to achieve acceptable Quality of Security in such a tough environment