TELE3119: Trusted Networks Week 10

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Advertisements

Web Page Design Chapter 1 Introducing Networks and the Internet.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Evaluating scalability Peer-to-Peer File Sharing Networks of Sayantan Mitra Vibhor Goyal.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Distributed Systems 1 Topics  What is a Distributed System?  Why Distributed Systems?  Examples of Distributed Systems  Distributed System Requirements.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Object Naming & Content based Object Search 2/3/2003.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
For more notes and topics visit:
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
1 Secure Ad-Hoc Network Eunjin Jung
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Ch. 9. The Cloud of Things 1Ch. 9. CoT.  Current M2M/IoT solutions are focusing on communications and integration. Future Web of Things (WoT) evolution.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
Client – Server Architecture A Basic Introduction 1.
INTRODUCTION TO GRID & CLOUD COMPUTING U. Jhashuva 1 Asst. Professor Dept. of CSE.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
Key management issues in PGP
Secure and sMARrter ciTIes Data ManagEment
5th Edition, Irv Englander
Securing Network Servers
Web Applications Security Cryptography 1
Blockchain Infrastructure for e-Science
Peer 2 Peer & Client Server
Introduction to Windows Azure AppFabric
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Ieva Juodelytė IT 3 kursas 4 grupė
Security and Privacy Consideration of aq
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
CHAPTER 3 Architectures for Distributed Systems
TYPES OF SERVER. TYPES OF SERVER What is a server.
Introduction to client/server architecture
Network Services.
The Internet of Things (IoT)
Computer Security Network Security
Comparison of LAN, MAN, WAN
Design Unit 26 Design a small or home office network
Peer to Peer Information Retrieval
DATABASE SYSTEM UNIT I.
Distributed Peer-to-peer Name Resolution
Introduction to Local Area Networks
Getting Started.
Lecture 1: Multi-tier Architecture Overview
Network Media, models and number systems
Getting Started.
Edge Recorder Client
MIS2502: Data Analytics MySQL and MySQL Workbench
Client/Server and Peer to Peer
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Firmware security integrity checking Andrea Battaglia, Aspisec IT
Presentation transcript:

TELE3119: Trusted Networks Week 10 Course Coordinator: Prof. Aruna Seneviratne, Room EE 312 E-mail – a.seneviratne@unsw.edu.au Course web-page: https://subjects.ee.unsw.edu.au/tele3119/

IoT and Blockchains Access & Availability Confidentiality Integrity Authentication Cryptography Symmetric Asymmetric IoT & Blockhains Stream Ciphers Block Ciphers Trusted Networks

IoT/Blockchains Blockchain will enable IoT ecosystems to break from the traditional broker-based networking paradigm, where devices rely on a central cloud server to identify and authenticate individual devices.” “Blockchain technology will enable the creation of secure mesh networks, where IoT devices will interconnect in a reliable way while avoiding threats such as device spoofing and impersonation.” “With every legitimate node being registered on the blockchain, devices will easily be able to identify and authenticate each other without the need for central brokers or certification authorities, and the network will be scalable to support billions of devices without the need for additional resources. Security 8-3

Advantages Trusted Networks

Decentralised Architecture  Manufacturer The current centralized model has a high maintenance cost Consumer, lack of trust in devices that ``phone home'' in the background need for a ``security through transparency’’ Consider the distribution of software updates to millions of devices for years after they have been long discontinued One of major security issues Solution:  a scalable, trustless peer-to-peer system that can operate transparently and distribute data securely Blockchains provide an elegant solution Security 8-5

Example  All the IoT devices of a manufacturer operate on the same blockchain network. The manufacturer deploys a smart contract that allows them to store the hash of the latest firmware update on the network. The devices either ship with the smart contract's address baked into their blockchain client, or they find out about it via a discovery service They can then query the contract and find out about the new firmware and request it by its hash via a distributed peer-to-peer filesystem  The first requests for the file will be served by the manufacturer’s own node (also taking part into the network)   After the binary has propagated to enough nodes the manufacturer's node can stop serving it!  Assuming the devices are configured so as to share the binary they got  a device that joins the network long after the manufacturer has stopped participating in it, can still retrieve the sought after firmware update and be assured that it is the right file Device polls the manufacturer's server for an update and gets a 404 error Security 8-6

Case Studies https://www.chainofthings.com/ Security 8-7