Security and Privacy in Pervasive/Ubiquitous Computing Systems

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
E-transaction Security The PKI Tunis, January 2010 H. Kaffel-Ben Ayed 1 Security of Mobile Transactions Over Wireless Pervasive Networks Hella KAFFEL-BEN.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Basic radio frequency communications - 2 Session 1.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Developing RFID Application In Supply Chain
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
RFID SECURITY.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
Threats and Solutions of Information Security - Confidentiality, Integrity and Availability Hyunsung Kim.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Security of the Internet of Things: perspectives and challenges
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Created by: Prashant More Dipak Chavan Ajinkya Khude WI-FI.
CS457 Introduction to Information Security Systems
Microwave Communication Project
English for Advance Learners I
Security Issues With Mobile IP
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Mobile RFID Topics in Internet JinKyu, Yoo
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
A Wireless LAN Security Protocol
Wireless Local Area Network (WLAN)
CNET334 - Network Security
Chair Professor Chin-Chen Chang Feng Chia University
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
CompTIA Security+ Study Guide (SY0-501)
امنیت شبکه علی فانیان
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Recent Developments on Multimedia and Secure Networking Technologies
Chair Professor Chin-Chen Chang Feng Chia University
A Restricted Region-based Data-hiding Scheme
An Improved Novel Key Management Protocol for RFID Systems
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Recent Developments on Multimedia and Secure Networking Technologies
An Overview of Security Issues in Sensor Network
Security Attacks Network Security.
LM 7. Mobile Network Overview
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Security and Privacy in Pervasive/Ubiquitous Computing Systems Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc

Outline Mobile services Radio Frequency Identification (RFID) Roaming between cellular network and WLAN MSN lab

Mobile services (1/4) MSN lab

Mobile services (2/4) MSN lab

Mobile services (3/4) MSN lab

Treats ? (4/4) User perspective Network perspective Spoofing Framing Denial-of-service Network perspective Passive Active 1. Eavesdropping 2. Traffic analysis 1. Masquerading 2. Replay 3. Message modification MSN lab

Spoofing MSN lab

Framing Legitimate? Bogus? MSN lab

Denial-of-service MSN lab

RFID (1/4) Tag Reader Database Antenna MSN lab

RFID (2/4) Shopping Library Transportation Household appliance … MSN lab

Risk? (3/4) Eavesdropping Traffic analysis Replay attack Position detection Physical attack MSN lab

Issue? (4/4) Anonymity -> Privacy Synchronization Authentication Efficiency MSN lab

Roaming (1/3) Access to the Internet anywhere & anytime Mobile device Base station AP AS ISP WLAN Cellular network AS: Authentication server AP: Access point MSN lab

Roaming (2/3) Cellular networks : wide service areas and continuous pervasive access WLAN : high-speed pervasive communications How to integrate? MSN lab

Issues? (3/3) Mutual authentication Anonymous service Charging MSN lab

Conclusions The biggest risk: eavesdropping The limitation: power & computing capability MSN lab

Security and Privacy in Pervasive/Ubiquitous Computing Systems MSN lab