Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M

Slides:



Advertisements
Similar presentations
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Advertisements

IPSec.
Mobile IP By Keenan Yang May 29, 2003 MultiMedia Systems CSE 228.
Secure Mobile IP Communication
Internetworking II: MPLS, Security, and Traffic Engineering
Mobile IP: enable mobility for IP-based networks CS457 presentation Xiangchuan Chen Nov 6, 2001.
A Seamless Handoff Approach of Mobile IP Protocol for Mobile Wireless Data Network. 資研一 黃明祥.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Providing Anonymity Services in SIP L. Kazatzopoulos, K. Delakouridis, G.F. Marias PIMRC 2008 Sept. 15,
Chapter 5 TCP/IP: Routing – Part 1 Dr. V.T. Raja Oregon State University.
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
Communication Network Protocols ----Krishna Priyanka Chebrolu.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Networking Basics Lesson 1 Introduction to Networks.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
1 HAWAII- Handoff-Aware Wireless Access Internet Infrastructure Reporter : Jing-Shiuan Hua Date : 2005/4/26.
多媒體網路安全實驗室 Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments Date:2011/05/05 報告人:向峻霈 出處 : Jalal Al-Muhtadi,
PTCL Training & Development1 H.323 Terminals Client end points on the network IP phones, PCs having own OS Terminals running an H.323 protocols and the.
1 My Dream of Jini Fabio Kon Jalal Al-Muhtadi Roy Campbell M. Dennis Mickunas Department of Computer Science University of Illinois at.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Virtual Private Networks
The Secure Sockets Layer (SSL) Protocol
Chapter 3: Packet Switching (overview)
Chapter 2 Network Models
Chapter 5 Network and Transport Layers
Chapter 5 Network and Transport Layers
Introduction Wireless devices offering IP connectivity
Tor Good + Evil.
Version B.00 H7076S Module 3 Slides
Chapter 4 Introduction to Network Layer
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Unit 1: Introduction. From IPv4 to IPv6
Wireless Instant Messaging Using J2ME
Seraphim : A Security Architecture for Active Networks
ECEN 619 “Internet Protocols and Modeling”
File Transfer Protocol
Chapter 4 Introduction to Network Layer
Goals Introduce the Windows Server 2003 family of operating systems
ECEN “Internet Protocols and Modeling”
NET 536 Network Security Lecture 5: IPSec and VPN
The Secure Sockets Layer (SSL) Protocol
Network Architecture for Cyberspace
Install AD Certificate Services
CSE 313 Data Communication
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Cengage Learning: Computer Networking from LANs to WANs
InfoShare A Distributed P2P Information Storage & Retrieval System
System Software for Ubiquitous Computing
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Read this to find out how the internet works!
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
A lighttwiht reconfigurable security mechanism for 3G/4G mobile devices 2019/7/1 A Lightweight reconfigurable security mechanism for 3G/4G mobile devices.
USN Introduction Computer Engineering Sejin Oh.
Internet Protocol version 6 (IPv6)
Mobile IP Neil Tang 11/12/2008 CS440 Computer Networks.
Presentation transcript:

Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M. Dennis Mickunas, Seung Yi University of Illinois at Urbana-Champaign Presented by: Wayland Ni

Outline Introduction Related Work System Design Implementation Future Work Conclusion

Problem Ubiquitous computing prevalent User privacy threatened Proliferation of embedded devices, sensors, etc… User privacy threatened Physical locations compromised Eavesdroppers

Solution Privacy protocol Overlay network Gaia Communicate freely while preserving privacy Overlay network Mist Router hierarchy Handle-based routing Gaia

Privacy Goals Location privacy Anonymous connections Confidentiality

Related Work Lesson User anonymity Anonymous communication Consider privacy from beginning User anonymity Anonymizer SafeWeb Anonymous communication Crowds Lack authentication Cricket

System Design Overview Router hierarchy Mist Circuits Locating users Communication setup Security

Mist Router Hierarchy Domains Portals Lighthouse Physical spaces Leaves Lighthouse Representative

User Registration Mobile device, portal Lighthouse designation Tradeoff: privacy vs. performance Migration

Mist Circuits Hop-to-hop, handle-based routing Public-key encryption Virtual circuit built upon registration Router, certificate pair Packet format Message payload

Mist Circuits (cont.) Presence Table Mist Routing Table Portals Mist Routing Table Intermediate routers User Binding Table Lighthouses Failures

Locating Users Register and lookup <user, lighthouse> pairs Lightweight Directory Access Protocol Register attributes and distinguished names Enables user lookups Security Signed special tokens

Communication Setup Between lighthouses Asymmetric key encryption to exchange handles Mist Communication Binding src_handle, dest_handle Send handles back to users

Implementation Mist incorporated into Gaia OS Overlay network over TCP/IP Java instant messaging application

Future Work Optimize communication Lowest common ancestor lighthouse Get rid of extra “hops” Lowest common ancestor lighthouse