Secure Group communication for First Responders [SGFR] By Ganesh Godavari.

Slides:



Advertisements
Similar presentations
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
LYU0002 Wireless Cyber Campus Supervisor: Prof. LYU, Rung Tsong Michael Marker: Prof. CAI, Leizhen Students:Jang Kim Fung, Harvest Tang Ho Man, Sunny.
Maninder Kaur COMPUTER NETWORKS Maninder Kaur 14/10/2010
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
P2P (Peer To Peer) Used: when applications need to communicate between devices. Examples: – Interactive game of checkers – Instant Messaging P2P can be.
12/2/2003chow1 Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Lecturer: Sebastian Coope Ashton Building, Room G.18 COMP 201 web-page: Lecture.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Revision Week 13 – Lecture 2. The exam 5 questions Multiple parts Read the question carefully Look at the marks as an indication of how much thought and.
Electrical Engineering Department Software Systems Lab TECHNION - ISRAEL INSTITUTE OF TECHNOLOGY Persistent chat room Authors: Hazanovitch Evgeny Hazanovitch.
Secure Group communication for First Responders [SGFR] By Ganesh Godavari.
XMPP (eXtensible Messaging and Presence Protocol ) Reporter : Allen.
RASD Rapid Adaptive Secure DNS Matthew Weaver Jeremy Witmer Dr. Chow, Advising CS 622 – Fall 2007.
Web Resources Andrew Corallino Feb. 3, 2009 Andrew Corallino Feb. 3, 2009.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
1 DACAManet Proposer’s Workshop UCCS-Raytheon Terry Boult C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs Leland.
Distributed Real-time Systems of Future Dr Peter Parnes
Dr. Philip Cannata 1 Principles of Network Applications.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Picture Users Making Art Chat An interactive communication tool.
A Web Services Based Streaming Gateway for Heterogeneous A/V Collaboration Hasan Bulut Computer Science Department Indiana University.
Joining the Future. Superfast Britain – What does this mean for you  High data connection both up and down  Not shared with other people  Business.
1 NETE4631 Communicating with the Cloud and Using Media and Streaming Lecture Notes #14.
“VoIP” Update New / expanded voice, collaboration, and mobility services for STScI.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Chapter Two Application Layer Prepared by: Dr. Bahjat Qazzaz CS Dept. Sept
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
1 Real-Time Collaboration Instant Messaging Chat Services Online Conferencing.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Chow6/23/2003 sgfr1 SFGR: Secure Groupware for First Responder C. Edward Chow Chip Benight Ganesh Godavari.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Jabber Client Jeevan Varma Anga Distributed Systems(CSC8530) Villanova University.
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
1 ITS-ZeeWave Meeting 2/26/2004 UCCS Chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department.
A Case Study: UIM The Universal Instant Messenger Babak Esfandiari Carleton University SYSC 5800 Winter 2003.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Introduction to 學校:大同大學 班級: GI1 學號: 姓名:李奕銳 教師:葉慶隆 Jabber 1.
An analysis of Skype protocol Presented by: Abdul Haleem.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Presence Networking: XMPP and Jabber Joe Hildebrand Chief Architect Jabber, Inc. Networld+Interop 1 May 2003.
Jabber Technical Overview Presenter: Ming-Wei Lin.
A Demonstration of Collaborative Web Services and Peer-to-Peer Grids Minjun Wang Department of Electrical Engineering and Computer Science Syracuse University,
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
15 May 2006 IVOA - Victoria: VOEvent 11 Jabber/XMPP Matthew J. Graham Caltech T HE US N ATIONAL V IRTUAL O BSERVATORY.
Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
The way we communicate has changed over time. The Internet has changed many aspects of our lives, including the way we communicate with each other, how.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Building Distributed Educational Applications using P2P
The Impact of Cloud Computing to Technology-Based Companies
Protocols 2 Key Revision Points.
SFGR: Secure Groupware for First Responder
New Tools In Education Minjun Wang
Presentation transcript:

Secure Group communication for First Responders [SGFR] By Ganesh Godavari

Outline of Talk About SGFR Goals Software Used Work done till date Conclusion

SGFR This project is sponsored by Network, Information and Space Security (NISSC) Duration 3 months [June 03 – Aug 03 ] Principal instructor – Dr Edward Chow, Computer Science, UCCS – Dr Chip Benight, Psychology Dept., UCCS

Goal The goal is to design a framework for enhancing groupware packages such as instant messenger and video conferencing tools with security through scalable group key management (Keystone from UT Austin), and secure model (Bell La Padula)

Software Used Jabberd –Jabber is an open XML protocol for the real-time exchange of messages and presence between any two points on the Internet. JabberX –A console-mode client for Jabber Keystone –A Group Key Management system that establishes and maintains group keys for a group of clients

Work Done Till Date Integrated JabberX with Keystone for secure group chatting. Able to transfer files from one machine to all others in the group. Need to add in the BLP model for file distribution.

Conclusion Need to modify keystone for error handling Need to reduce keystone’s dependency on 2 encryption libraries i.e. Cryptolib-1.2, Openssl. Openssl’s crypto library must be sufficient enough. Need to find another method for file transfer as the current way of file transfer i.e. broadcast is not good. ( I know TCP broadcast is not used for file transfer ) Have a partial access control provided by Keystone. Need to provide the access control for file transfer