TRUST:Team for Research in Ubiquitous Secure Technologies

Slides:



Advertisements
Similar presentations
The role of network capabilities Xiaowei Yang UC Irvine NSF FIND PI meeting, June
Advertisements

This Material Will Not be In Final Exam. Cross-Site Scripting (XSS)
Chris Karlof and David Wagner
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
SCION: Scalability, Control and Isolation On Next-Generation Networks
A Survey of Secure Wireless Ad Hoc Routing
FastPass: Availability Tokens to Defeat DoS Presented at CMU Systems Seminar by: Dan Wendlandt Work with: David Andersen & Adrian Perrig.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
15-441: Computer Networking Lecture 26: Networking Future.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
Security Issues In Sensor Networks By Priya Palanivelu.
Challenge: Securing Routing Protocols Adrian Perrig
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
1 cs526 chow Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET) WSNMANET SimilarityWirelessMulti-hop networking SecuritySymmetric Key CryptographyPublick.
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
DARPA Security Mini-task Naveen Sastry. Groups Involved BBN SRI UMass / UMich / U. Arizona UC Berkeley.
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas.
Tesseract A 4D Network Control Plane
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Towards a More Functional and Secure Network Infrastructure Dan Adkins, Karthik Lakshminarayanan, Adrian Perrig (CMU), and Ion Stoica.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Computer Science Secure Hierarchical In-network Data Aggregation for Sensor Networks Steve McKinney CSC 774 – Dr. Ning Acknowledgment: Slides based on.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Border Gateway Protocol BGP-4 BGP environment How BGP works BGP information BGP administration.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Packet Leashes: Defense Against Wormhole Attacks
Pi: A Path Identification Mechanism to Defend Against DDoS Attacks
Goals of soBGP Verify the origin of advertisements
Who should be responsible for risks to basic Internet infrastructure?
Implementing a Scalable Multiarea Network OSPF-Based Solution
TRUST:Team for Research in Ubiquitous Secure Technologies
A DoS-limiting Network Architecture
Working at a Small-to-Medium Business or ISP – Chapter 6
TRUST:Team for Research in Ubiquitous Secure Technologies
Preventing Internet Denial-of-Service with Capabilities
TRUST:Team for Research in Applied Cryptography
DDoS Attack Detection under SDN Context
SPINS: Security Protocols for Sensor Networks
Routing Protocols (RIP, OSPF, BGP).
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
TRUST:Team for Research in Ubiquitous Secure Technologies
COMPUTER NETWORKS CS610 Lecture-42 Hammad Khalid Khan.
SPINS: Security Protocols for Sensor Networks
Next-generation Internet architecture
Applying Policy-Based Intrusion Detection to SCADA Networks
An Overview of Security Issues in Sensor Network
Proposed DTN WG Charter Items
Intelligent Network Services through Active Flow Manipulation
Presentation transcript:

TRUST:Team for Research in Ubiquitous Secure Technologies Security Protocols for the Internet and Sensor Networks Adrian Perrig Carnegie Mellon University NSF STC Review September 6, 2004

SPV: Secure Path Vector Routing Securing BGP routing is a priority SPV uses efficient one-way functions to secure ASNs in BGP ASPATHs [Sigcomm 2004] Key insight: no need for AS authentication to prevent worst attacks Excellent incremental deployment properties Collaboration with Yih-Chun Hu @ UC Berkeley c3 c4 A A, B c2 c1 NSF STC Review December 8, 2018

DDoS Attack Defense Link flooding is a serious challenge Fundamental Internet limitation: receiver cannot control flows, anybody can flood traffic Collaboration with Ion Stoica @ UC Berkeley Use I3 for receiver-controlled flows [Hotnets 2003] SIFF: Stateless Internet Flow Filter [IEEE S&P 2004] No per-flow state on routers Enables receiver to terminate flows inside network Excellent incremental deployment properties Based on network capabilities that routers insert and verify NSF STC Review December 8, 2018

Projects to Secure Sensor Networks Basic security building blocks Secure key distribution Secure node-to-node and broadcast communication Secure routing Secure information aggregation External verification of memory contents Secure location determination Use building blocks to construct secure, attack-resilient sensor network NSF STC Review December 8, 2018