Presentation is loading. Please wait.

Presentation is loading. Please wait.

Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.

Similar presentations


Presentation on theme: "Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊."— Presentation transcript:

1 Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

2 Outline Introduction FACE Ad-hoc authentication

3 Introduction Current wireless personal area network (WPAN) standers provide no method for two previously unacquainted parties to authenticate to one another in a trusted manner upon first encounter. The target environment for FACE is wirelessly enabled mobile devices that form ad-hoc network.

4 FACE Motivation – reducing the passage of malicious code from one wireless enabled device to another – bring people in contact with others they may not typically associate – the proposed ubiquitous authentication method can assist in reducing identity theft occurrences Requirement –Low resource consumption –To include battery life –Processing power –Application footprint

5 FACE Assumption –all devices within the ad-hoc network have already agreed on a given routing to communicate – at lease one device has access to the internet – the user has already been authenticated to the actual in-hand Environment –wirelessly enabled mobile devices

6 Ad-hoc authentication Towards Flexible Credential Verification in Mobile Ad-hoc Network SHAD:A Human Centered Security Architecture for Partitionable, Dynamic and Heterogeneous Distributed System Talking To Strangers: Authentication in Ad- hoc Wireless Network

7 Towards Flexible Credential Verification in Mobile Ad-hoc Network It improves the likelihood that participants in an ad-hoc network can verify each others credentials despite the lack of access certification and attribute authorities. It combines aspect in PGP, XML Signature and SMAL and comprise four architecture. – the XML credential generator Create the readable credential assertion statement (CAS) – the security assertion module Issue assertion to other users (ASS) – the verification and validation module Determinate whether a CAS is authentic – the key management module Provide key

8 Towards Flexible Credential Verification in Mobile Ad-hoc Network

9 SHAD:A Human Centered Security Architecture for Partitionable, Dynamic and Heterogeneous Distributed System SHAD avoids the use of centralized entities and it is designed to be agile in a peer-to peer environment. SHAD will meet the following requirements: –1.Independence of centralized services or authentication servers. –2.Ease of use and the non-obtrusiveness. –3.Supporting of disconnections and delegation. –4.Minimizing of power consumption and the processing limitations of mobile devices –Ease of deployment

10

11 Talking To Strangers: Authentication in Ad-hoc Wireless Network They provide secure authentication using almost any established public-key-based key exchange protocol. A few concepts: –Demonstrative identification –Location-limited channels –Pre-authentication

12

13

14


Download ppt "Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊."

Similar presentations


Ads by Google