“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu.

Slides:



Advertisements
Similar presentations
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Advertisements

Public Key Infrastructure Ben Sangster February 23, 2006.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Public Key Algorithms …….. RAIT M. Chatterjee.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
I-4 security.
Network Security Lecture 17 Presented by: Dr. Munam Ali Shah.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Midterm Review Cryptography & Network Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Security Enhancement for Wireless Communication Bassam Almogahed.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
14-1 Last time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Key management issues in PGP
Basics of Cryptography
Hash Functions Which of these problems is easier to solve:
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Protocol Analysis.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Privacy & Security.
Information Security message M one-way hash fingerprint f = H(M)
e-Health Platform End 2 End encryption
A Wireless LAN Security Protocol
Public Key Encryption and Digital Signatures
Chapter 8 Network Security.
Introduction to security goals and usage of cryptographic algorithms
Cryptography.
Presented by: Dr. Munam Ali Shah
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
NET 311 Information Security
Quantum Key Distribution
CompTIA Security+ Study Guide (SY0-501)
Cryptography Basics and Symmetric Cryptography
Public Key Infrastructure
doc.: IEEE <doc#>
Asymmetric Cryptography
Security in Network Communications
Secure Electronic Transaction (SET) University of Windsor
Public-key encryption
Information Security message M one-way hash fingerprint f = H(M)
The Secure Sockets Layer (SSL) Protocol
DATA COMMUNICATION Lecture-3.
Network Security - A Lecture 1 - NETW4006 NETW4006-Lecture01 1.
Lecture 10: Network Security.
Install AD Certificate Services
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Public-Key, Digital Signatures, Management, Security
Chapter 29 Cryptography and Network Security
Basic of Modern Cryptography
An Architecture for Secure Wide-Area Service Discovery
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu Shaoen.wu@usm.edu

Outline Information Security 101 Wireless Channel Characteristics Wireless Physical Security 10/27/2019 10/27/2019 2

Outline Information Security 101 Wireless Channel Characteristics Wireless Physical Security 10/27/2019 10/27/2019 3

Security Model Secrecy / Confidentiality Authentication / Integrity 10/27/2019

Encryption Conventional Encryption (Shared Key Encryption, Symmetric Encryption) 10/27/2019 10/27/2019 5

Encryption Public-Private Key Encryption (PKI, asymmetric encryption) 10/27/2019 10/27/2019 6

Encryption Shared Key PKI Fast Hard in key distribution Slow Easy in key distribution But require infrastructure 10/27/2019

Wireless Communication Channel uncorrelated at different locations 10/27/2019 10/27/2019 8

Wireless Communication Channel reciprocity 10/27/2019 10/27/2019 9

Wireless Signal Symbol 10/27/2019 10/27/2019 10

Key Generation Metrics Goals (controversial) Channel Response; Received Signal Strength, Phase Goals (controversial) fast strong 10/27/2019

Generation Procedures Probing / Sampling Quantization Information Reconciliation Privacy Amplification 10/27/2019

Design Issues Probing Sampling time duplex Time selective Interpolation ---finite impulse response (FIR) fractional delay filter Time selective Frequency selective Sampling Autocorrelation -- key strength Frequency (open question) 10/27/2019

Design Issues Quantization More levels, more bits, but less agreement Information Reconciliation --- key agreement hash (verification) + exhaustive search (correction) Correction codes interactive information reconciliation protocol Privacy Amplification Leftover hash lemma 10/27/2019

10/27/2019