Fully Decentralised Authentication Scheme for ICN in Disaster Scenarios (Demonstration on Mobile Terminals) Jan Seedorf, Bilal Gill, and Dirk Kutscher.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Using ICN in disaster scenarios (draft-seedorf-icn-disaster-01) M. Arumaithurai, J. Seedorf, A. Tagami, K. Ramakrishnan, N. Blefari Melazzi IETF 88, Vancouver.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Digital certificates One concern with the public key approach: must ensure that you are encrypting to the correct person’s public key  Otherwise, you.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Infrastructure to Application Exposure - USE CASE: CDN – Jan Seedorf IETF 83, Paris i2aex BoF Monday, March
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Chapter 10: Authentication Guide to Computer Network Security.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Digital Object Architecture
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Unit 1: Protection and Security for Grid Computing Part 2
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
Secure Credential Manager Claes Nilsson - Sony Ericsson
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Protocols for public-key management. Key management –two problems Distribution of public keys (for public- key cryptography) Distribution of secret keys.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
1 reTHINK Deliverables, How To Read reThink deliverables quick starter.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Wireless and Mobile Security
Jabber Technical Overview Presenter: Ming-Wei Lin.
Creating and Managing Digital Certificates Chapter Eleven.
Using Public Key Cryptography Key management and public key infrastructures.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Fall 2006CS 395: Computer Security1 Key Management.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
Trust Anchor Management Problem Statement
Cryptography and Network Security
S/MIME T ANANDHAN.
CCN application-domains: brainstorming from GreenICN project
Choosing the Discovery Model Martin Forsberg
PLUG-N-HARVEST ID: H2020-EU
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Presentation transcript:

Fully Decentralised Authentication Scheme for ICN in Disaster Scenarios (Demonstration on Mobile Terminals) Jan Seedorf, Bilal Gill, and Dirk Kutscher NEC Laboratories Europe Benjamin Schiller and Dirk Kohlweyer Technical University of Darmstadt Contact: IETF-91 Honolulu, Hawaii, USA

Scenario and Use Case Page 2 ▐Disaster Scenario The aftermath of a disaster, e.g. hurricane, earthquake, tsunami, or a human-generated network breakdown E.g. the enormous earthquake which hit Northeastern Japan on March 11, 2011 (causing extensive damages including blackouts, fires, tsunamis and a nuclear crisis) ▐Objective: Message Authentication Assuming that a message can somehow be delivered across fragmented networks (via content-oriented, DTN-like mechanisms), Y still needs to be able to verify that a message published by Z is trustworthy E.g. for “Assessing Warnings“ published by citizens

Challenge: Binding in Naming Schemes* Page 3 *Ghodsi et al: “Naming in Content-Oriented Architectures”, SIGCOMM ICN Workshop 2011 Our Scheme: Using a Web-of-Trust in a Decentralised Fashion to Provide this Binding (Decentralised = No Connectivity to any kind of server needed) Our Scheme: Using a Web-of-Trust in a Decentralised Fashion to Provide this Binding (Decentralised = No Connectivity to any kind of server needed)

High-Level Overview of Scheme * ▐Based on a Web-of-Trust (WoT) A so-called 'WoT file' is being used by terminals can be retrieved from a WoT keyserver before the disaster takes place contains the veried certicate graph for the whole WoT in a compressed, machine-readable format. Terminals thus  Terminals have the complete trust relationships within the WoT at their disposal in the from of a 'WoT-graph' stored in a file ▐Binding between self-certifying ICN names and a Web-of-Trust The WoT key-ID is equivalent to the self-certifying name part used in the ICN naming scheme This ties the self-certifying name with the ID of the correct public key in the WoT, and thus transitively with the RWI in the WoT (e.g. address) ▐Assessing information received (as a response to a given request for a certain name) A double-sided Breadth First Search ( dBFS ) algorithm is executed on the WoT-graph to find certificate chains between the initiator of the request and the publisher of the content Depending on a trust metric (see demo for examples) the information received is regarded as trustworthy or not by the initiator of the request trust metric is applied on the result of the dBFS algorithm *J. Seedorf, D. Kutscher, and F. Schneider: „Decentralised binding of self-certifying names to real-world identities for assessment of third-party messages in fragmented mobile networks," 2nd Workshop on Name Oriented Mobility (NOM), 2014

Demo Overview ▐Implementation Developed a methodology to synthesize large-scale WoT-graphs maintaining several key graph theoretic properties as prevalent in the PGP Web-of-Trust (degree distribution, path length distribution, …) implemented this WoT-model in the JAVA-based Graph-Theoretic Analysis Framework (GTNA)* Implemented a dBFS-algorithm for finding certificate chains on WoT-graphs Implemented several trust metrics shortest certificate chain found number of certicate chains found with maximum length ▐Demo: Running on Android Pre-loaded WoT-files of different size User can select a) WoT-size, b) trust metric, c) parameters for trust metric Shows runtime of selection when choosing two users in the WoT randomly, thus showing how the dBFS algorithm scales with increasing WoT sizes how the dBFS algorithm scales depending on trust metric how it would perform on common smartphones Page 5 *

Acknowledgements Acknowledgement: This work has been partially supported by the GreenICN project (GreenICN: Architecture and Applications of Green Information Centric Networking ), a research project supported jointly by the European Commission under its 7th Framework Program (contract no ) and the National Institute of Information and Communications Technology (NICT) in Japan (contract no. 167). The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the GreenICN project, the European Commission, or NICT.

APPENDIX Page 7

▐Enabling usage of functional parts of the infrastructure, even when these are disconnected from the rest of the network ▐Delivering/obtaining information in (highly) congested networks ▐Decentralised authentication In today’s mobile networks, users are authenticated via central entities In order to communicate in fragmented or disconnected parts of a mobile network, the challenge of decentralising user authentication arises  Data origin authentication of content retrieved from the network is challenging when being 'offline' (e.g. disconnected from servers of a security infrastructure such as a PKI) High-Level Research Challenges* Focus of this Demo *See further M. Arumaithurai, J. Seedorf, et. al: “Using ICN in disaster scenarios”, draft-seedorf-icn-disaster Existing Solutions Assumed Page 8

Detailed Scheme Page 9

Analytical Estimation of Time & Space Needed ▐Time and Space Requirements for Graph Search b: branching factor; d: the depth of the search In our case: d is the certificate path length and b is the average number of identities a member of the WoT has signed m req (node) refers to the space needed for storing a single node (i.e. as graph vertex) in memory ▐Size of Compressed Certificate Graph n: total number of nodes (i.e. real-world identities) in the WoT m req (name) av : average space needed for storing a real-world identity Page 10