SCONCE: Secure Computing and Networking Center

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

SPLASH Project INRIA-Eurecom-UC Irvine November 2006.
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
Optionally Identifiable Private Handshakes Yanjiang Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
Secret Handshakes from CA-Oblivious Encryption Asiacrypt 2004, Jeju-do, Korea Claude Castelluccia, Stanisław Jarecki, Gene Tsudik UC Irvine.
SPLASH Project INRIA-Eurecom-UC Irvine November 2006.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Lect. 11: Public Key Cryptography. 2 Contents 1.Introduction to PKC 2.Hard problems  IFP  DLP 3.Public Key Encryptions  RSA  ElGamal 4.Digital Signatures.
1 A few challenges in security & privacy in the context of ubiquitous computing Gene Tsudik SCONCE: Secure Computing and Networking Center UC Irvine
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Wireless Sensor Network Security Anuj Nagar CS 590.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
30/04/2004Gene Tsudik, UCLA CSD Research Review1 Some Security Issues & Challenges in MANETs and Sensor Nets Gene Tsudik SCONCE: Secure Computing and Networking.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
1 Secure Ad-Hoc Network Eunjin Jung
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
1 ? Admission Control in Peer Groups Gene Tsudik, School of ICS, UC Irvine Yongdae Kim, CS Dept., U. of Minnesota Peer Groups:
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
1 Membership Control in P2P and MANETs Nitesh Saxena, Gene Tsudik, Jeong H. Yi Computer Science Department University of California at Irvine {nitesh,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
10/25/04 Security of Ad Hoc and Sensor Networks (SASN) 1/22 An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Research Overview Nitesh Saxena Research areas: computer and network security, applied cryptography.
Computer Science and Engineering 1 Mobile Computing and Security.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Security of the Internet of Things: perspectives and challenges
1 Secret Handshakes or Privacy-Preserving Interactive Authentication Gene Tsudik University of California, Irvine joint work with: Claude Castelluccia,
Wireless Networks Projects Roberto Riggio, PhD CREATE-NET Via Alla Cascata 56/c 38123, Povo (TN)
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
Presented by: Saurav Kumar Bengani
Further Simplifications in Proactive RSA Signatures
Some Issues in MANET, Wireless & Cellular Security/Privacy
Transmission of IPv6 Packets over IEEE OCB Networks
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
MOBILE AD-HOC NETWORKS
Receiver Anonymity via Incomparable Public Keys
Mobile ad hoc networking: imperatives and challenges
SRDP: Securing Route Discovery in DSR
doc.: IEEE <doc#>
PLUG-N-HARVEST ID: H2020-EU
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Practical Considerations for Securely Deploying Mobility
Multi-party Authentication in Web Services
Protocol ap1.0: Alice says “I am Alice”
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Amar B. Patel , Shushan Zhao
Install AD Certificate Services
Afzal Hussain Mohammad and Abdul Ahad Yahiya Mohammed
Handbook of Applied Cryptography - CH11, from 11.5~11.8
Web Information Systems Engineering (WISE)
EEL 6935 Wireless Ad Hoc Networks
An Overview of Security Issues in Sensor Network
Smart Meter Data Privacy: A Survey
Cross-layer Analysis for detecting Wireless Misbehavior
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Presentation transcript:

SCONCE: Secure Computing and Networking Center A few challenges in security & privacy in the context of ubiquitous computing Gene Tsudik SCONCE: Secure Computing and Networking Center UC Irvine http://sconce.ics.uci.edu/ 06/13/2005

Some Challenges Location privacy, network unobservability and location verification Distributed decision-making in MANETs Privacy-preserving authentication and authorization Secure data and tag aggregation Device pairing with varying degrees of human intervention

Secure Membership Control in MANETs Membership control is the foundation of all security features/services in a MANET Why is Membership Control Hard? No omni-present centralized/trusted authority Dynamic topology Sporadic connectivity Frequent outages/failures New nodes can “appear” at any time, esp. in a battlefield setting Trust in nodes is ephemeral, e.g., captured nodes/units must be evicted from network Objective: A set of practical, robust and secure techniques for distributed decision-making in multi-hop MANETs. Employ (and design) state-of-the-art (threshold and proactive) cryptographic methods to construct protocols for distributed admission and eviction of nodes in a MANET. Implement in a general-purpose toolkit & integrate with sample applications; experiment with limited deployment scenarios. Technical Approach: Architecture: consider security needs of various applications. Short-lived versus long-lived MANETs/groups Interaction with outside: closed vs open groups Is non-repudiation needed? Is communication pair-wise or group-wise? RSA doesn’t work DSA, Schnorr, ID-based techniques for long-lived groups Bivariate polynomial secret sharing for short-lived groups http://sconce.ics.uci.edu/gac

Some Recent Results: An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol, Stanislaw Jarecki, Nitesh Saxena and Jeong H. Yi, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2004. Identity-based Access Control for Ad Hoc Groups, Nitesh Saxena, Gene Tsudik and Jeong H. Yi, International Conference on Information Security and Cryptology (ICISC),  December 2004. Futher Simplifications in Proactive RSA Signature Schemes, Stanislaw Jarecki and Nitesh Saxena,  Theory of Cryptography Conference (TCC), February 2005. Efficient Node Admission for Short-Lived MANETs in submission.

Privacy-preserving Authentication and Authorization A few basic concepts: Oblivious Envelopes Alice is an informant, has secret info for police Bob claims to be a cop, doesn’t want to show his credentials See, e.g., Li, et al. PODC’03 Secret Handshakes Alice wants to talk to Bob iff Bob is a CIA agent Bob wants to talk to Alice iff Alice is a CIA agent Must be unobservable to others, anonymous, unlinkable Generalizable to groups? See, e.g., Balfanz, et al. S&P’03, Castelluccia, et al. AC’04 Privacy-Preserving Trust Negotiation (Hidden Credentials) Alice wants to access one of Bob’s resources Bob doesn’t want to divulge his access control policies More generally, Alice has many credentials; doesn’t want Bob to know them; as long as at least one satisfies one of Bob’s policies See, e.g., Bradshaw et al. CCS’04

Secure Data and Tag Aggregation Data Aggregation: how to reduce bw if only interested in statistical values? E.g., in sensor nets and MANETs Tag Aggregation: how to reduce bw consumed by multiple MACs, signatures, etc? E.g., in reliable multicast, sensor nets, MANET routing, etc. Aggregated MACs are easy, but… Aggregated signatures by same signer are cheap (e.g., RSA) Aggregated signatures by different signers are viable but expensive (e.g., BLS ID/pairing-based) Some require partial interaction, e.g., Schnorr-based ASM

Some Recent Results: Securing Route Discovery in DSR. Jihye Kim and Gene Tsudik IEEE Mobiquitous, July 2005. Secure and Robust Acknowledgement Aggregation Claude Castelluccia, Stas Jarecki and Gene Tsudik Security in Computer Networks (SCN). September 2004. Aggregation of Encrypted Data in WSNs Claude Castelluccia, Einar Mykletun and Gene Tsudik IEEE Mobiquitous Authentication and Integrity for Outsourced Data Maithili Narasimha, Einar Mykletun and Gene Tsudik Network and Distributed System Security (NDSS) February 2004.

Secure Device Pairing Two devices must be securely paired on-the-fly No prior association No specialized connection No common PKI  authentication irrelevant Involving human as an aid E.g., “Seeing-is-believing” (S&P’05) or “Shake-them-up” (Mobihoc’05) What if we want to pair more than 2 devices?

The end…