Carnegie MellonCarnegie Mellon Context-Aware Authentication Framework CyLab Mobility Research Center Mobility Research Center Carnegie Mellon Silicon Valley.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Smartphone-based authorization system Advisor: Dr. Wenjun Zeng - Professor Presenter: Yilihamujiang, Ailiyasijiang Zhou, Guanlong Al-Sinani, H. S. (2011).
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
ISIS Katrinebjerg i n t e r a c t i v e s p a c e s. n e t 1 Frank Allan Hansen, Representing Context in Hypermedia Data Models International.
Implementing An Extensible Role-Based Security Module in a Java Web Development Framework Joe Hesse Technology Director, UCSF Memory and Aging Center Dept.
School Management Software
Managing Master Data with MDS and Microsoft Excel
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
Bluetooth Low Energy Based Ticketing Systems 11 th February, 2015 Sriharsha Kuchimanchi Supervisor: Prof. Riku Jantti Instructor: Shkumbin Hamiti.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Carnegie MellonCarnegie Mellon PMA: A Mobile Context-Aware Personal Messaging Assistant Senaka Buthpitiya Deepthi Madamanchi Sumalatha Kommaraju Martin.
Carnegie MellonCarnegie Mellon 1 Business Meeting Organizer A Multi-Agent Meeting Scheduler using Mobile Context Kathleen Yang
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Solutions to Security and Privacy Issues in Mobile Social Networking
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Of Rostock University DuDE: A D istributed Computing System u sing a D ecentralized P2P E nvironment The 4th International Workshop on Architectures, Services.
Presentation. Recap A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate. Taken advantage of Spring’s multi layer.
1 Extending User Profiles with Line of Business Data Patrick Curran, MCT.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Support for Context-Aware Intelligibility and Control Anind K. Dey Human-Computer Interaction Institute Carnegie Mellon University, Pittsburgh
.  A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate.  Taken advantage of Spring’s multi layer injection.
I4ma Server Overview. High Level Architecture Internet Mobile Device Web Browser I4ma Server SMS SMS Service.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
An Architecture to Support Context-Aware Applications
Microsoft Management Seminar Series SMS 2003 Change Management.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
How Your Customers Will Pay Online & by Phone
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Presentation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
CSCE 201 Identification and Authentication Fall 2015.
Using Service-Oriented Architecture in Context-Aware Applications Damião Ribeiro de Almeida Information System Laboratory Universidade Federal de Campina.
Database Form Processing Made Easy Chad Killingsworth Web Projects Coordinator.
RAPT RFID based Asset and Personnel Tracker Team 24.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Estate MANAGEMENT. Estate MANAGEMENT Holistic solution to manage residential villages and estates. Developed by Impro.
A Multi-Dimensional Configurable Access Control Framework for Mobile Applications By: Yaira K. Rivera Sánchez Major Advisor: Steven A. Demurjian.
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
Role-based authentication framework for enterprise Vishal Kher Yongdae Kim Friday, November 19, 2004.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
CLOUDENTIFY.
Grid Computing Security Mechanisms: the state-of-the-art
ISSeG Integrated Site Security for Grids WP2 - Methodology
Two-Step Verification
draft-ipdvb-sec-01.txt ULE Security Requirements
AAA: A Survey and a Policy- Based Architecture and Framework
Presentation transcript:

Carnegie MellonCarnegie Mellon Context-Aware Authentication Framework CyLab Mobility Research Center Mobility Research Center Carnegie Mellon Silicon Valley Diwakar Goel, Eisha Kher, Shriya Joag, Veda Mujumdar, Martin Griss, Anind K. Dey 1

Carnegie MellonCarnegie Mellon Outline Background A Scenario The Architecture Threats and Attacks Mitigated Conclusion 2 October 26, 2009 Context-Aware Authentication Framework

Carnegie MellonCarnegie Mellon Outline Background A Scenario The Architecture Threats and Attacks Mitigated Conclusion 3 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Context-Awareness Context: Context: ‘information about the situation of an entity’, e.g., location, identity, time, activity Context-Aware Systems: Context-Aware Systems: relevant use context to provide relevant information and/or services to the user enhance enhance the behavior of any application by informing it of the context of use 4 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Our solution framework Authentication algorithm Authentication algorithm – User scans QR codes using camera-phones, requests access – Context contains authentication information – Access may be granted based on policies Contextual cues used Contextual cues used – Location (coordinates, using Wi-Fi positioning) – Roles (faculty, student, staff, admin) – Time of day Context-Aware Authentication Framework 5 October 26, 2009

Carnegie MellonCarnegie Mellon Context-Aware Authentication Enhances usability Enhances usability – Password replaced by gesture Enhances Robustness Enhances Robustness – Adaptive instead of static passwords Scalable Scalable – Ubiquitous use of mobile phones Extensible Extensible – Multiple contextual cues, e.g., time, location, ‘roles’ Context-Aware Authentication Framework 6 October 26, 2009

Carnegie MellonCarnegie Mellon Outline Background A Scenario The Architecture Threats and Attacks Mitigated Conclusion 7 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon A scenario 8 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Outline Background A Scenario The Architecture Threats and Attacks Mitigated Conclusion 9 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon The Architecture 10 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon The Architecture 11 Context-Aware Authentication Framework Dynamic: -Linked to server -On tablets, kiosks, other screens Static: -Inexpensive -On Paper October 26, 2009

Carnegie MellonCarnegie Mellon The Architecture 12 Context-Aware Authentication Framework Maintains: -QR code info -Location info -Expiry time Logs: -Authentication attempts -Time -Result -Context info October 26, 2009

Carnegie MellonCarnegie Mellon The Architecture 13 Context-Aware Authentication Framework Stores: -User-specific info -Session token -Calendar id October 26, 2009

Carnegie MellonCarnegie Mellon Example 14 Context-Aware Authentication Framework Step 1: Scan QR code Step 2: Extra authentication Optional extra layer of security Step 3: Context-based Access October 26, 2009

Carnegie MellonCarnegie Mellon Outline Background A Scenario The Architecture Threats and Attacks Mitigated Conclusion 15 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Threats and Attacks Mitigated Replication of displayed code Replication of displayed code – Time varying, location varying QR codes Cloning/ theft of user device Cloning/ theft of user device – Session tokens, ‘line-of-sight’ property Brute force/guessing attack Brute force/guessing attack – Dynamically generated codes Faking/manipulating context information Faking/manipulating context information – Weighted context cues, peer verification Sniffing attack Sniffing attack 16 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Why QR codes? Can be read fast Easy to generate Can be displayed anywhere – on screens/print outs Can be read by nearly all camera equipped phones Robust against sniffing attacks ‘Line-of-sight ‘ property 17 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Outline Background A Scenario The Architecture Threats and Attacks Mitigated Conclusion 18 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Conclusion Role-based and location-based access control Role-based and location-based access control – Leveraged user’s context – Used light-weight tagging Advantages Advantages – Simple, inexpensive, scalable, extensible – Centralized control over authentication sites – Smarter and robust authentication Future work Future work – Adding other contextual cues, user profiling 19 Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Acknowledgments Thanks to Thanks to – Co-authors for their contribution – CyLab, ARO and Nokia for their grants – You for patient listening! October 26, Context-Aware Authentication Framework October 26, 2009

Carnegie MellonCarnegie Mellon Context-Aware Authentication Framework CyLab Mobility Research Center Mobility Research Center Carnegie Mellon Silicon Valley Diwakar Goel, Eisha Kher, Shriya Joag, Veda Mujumdar, Martin Griss, Anind K. Dey 21