LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
CSC 774 Advanced Network Security
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
Digital Signatures and Hash Functions. Digital Signatures.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
© 2004 Mobile VCE June 2004 Security – Requirements and approaches to securing future mobile services Malcolm K Payne BT.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
G Robert Grimm New York University Using Encryption for Authentication in Computer Networks.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
A Secure Network Access Protocol (SNAP) A. F. Al Shahri, D. G. Smith and J. M. Irvine Proceedings of the Eighth IEEE International Symposium on Computers.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
1 Timed Efficient Stream Loss-tolerant Authentication.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
SafeSlinger Easy-to-Use and Secure Public-Key Exchange Michael Farb (CMU), Yue-Hsun Lin (CMU), Tiffany Hyun-Jin Kim (CMU), Jonathan McCune (Google), Adrian.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Chapter 21 Distributed System Security Copyright © 2008.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
ARSA: An Attack-Resilient Security Architecture for Multi-hop Wireless Mesh Networks Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Group-based Source Authentication in VANETs You Lu, Biao Zhou, Fei Jia, Mario Gerla UCLA {youlu, zhb, feijia,
“Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC” Analysis of a technical report from Stephan Eichler and Christian Roman,
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten.
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Stanford University Ari Juels, RSA Laboratories Alex Halderman, Princeton University.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Computer and Network Security - Message Digests, Kerberos, PKI –
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Security for Broadcast Network
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Chapter 3 Basic Protocols. 3.1 Key Exchange n Session Key - Why? n Key Exchange with Symmetric Cryp. KDC request E KA (K AB ), E KB (K AB ) E KB (K AB.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Authentication Celia Li Computer Science and Engineering York University.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Basic Network Encryption
Presentation transcript:

LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006

Why Location-Based Access Control? Previous user identity- based access control approaches cannot verify Physical location of the access requester, which plays an important role in determining access rights  Secure verification of location claims is required Secure verification of location claims  Natural  No need to establish shared secrets in advance Information about Location can strengthen access control policy  Not just which subject is accessing what object  Where the subject and object are located Subject belongs to a location group as long as she can listen to one of the beacons in that group

Previous Works Hardware dependency to determine location  GPS  Temper resistant device  Ultrasonic signals Need central server Expensive crypto and overhead  PKI, DH key exchange

Properties No servers No pre-registration No expensive crypto No expensive hardware (e.g. GPS) Low communication/computation Different from localization problem

Notation

Protocol Description Each access point (AP j )periodically broadcasts its nonce (r j )  Assume each AP j knows other AP's nonces (r j ) through a secure channel A mobile station (MS i ) collects nonces of the access points MS i derives its location key (k i ) by XOR-ing all the nonces of access points MS i constructs its access request (AR i ) using hash of k i and claims its location to its associated access point with it.  If MS i is located in the access-granted area, it can access to the resource  o/w, it cannot access it This system is secure if each entity does not collude each other Assume trust AP  not mutual authentication.

What is AP group ? Define three AP groups:  G1={AP1, AP2},  G2={AP3, AP4},  G3={AP1, AP4} Each AP's group:  AP1 is in G1, G3  AP2 is in G1  AP3 is in G2  AP4 is in G2,G3 G1G1 G2G2 G3G3 Access-Granted Area

1) 2) 3)

Security Analysis Insecure nonce combination  RNG with k=|nonce|  80 bits Bogus location claim  zero-false positive with Interval T < Speed of MS  cf. GPS error, sector error, etc.

Security Analysis (cont.) Wormhole attack

Security Analysis (cont.) The Sybil attack Simple solution  Assume each mobile station has APs Certificates of each  Using AP's signature of BBM Better solution? Man-in-the-Middle Attack?

Efficiency Estimation Various Hash Function Computation Times ( μseconds) based on the Crypto benchmark tested on the AMD Opteron 1.6 GHz processor under Linux Let |nonce|= 80 bits and |ID|=8 bits and use 160-bit SHA-1  Computation Time Only μseconds to compute access request of mobile station side  Communication Load |BBM|  *|L|*|N| bits of each access point |AR| = 160 bits of each mobile station  Storage Requirement For the mobile stations, there is no storage requirement

Simulation Result Simulation condition  23 MSs, 2 APs  propagation and path-loss model in the free-space model without a routing protocol between mobile stations  Two access points broadcast beacons with nonces (r1, r2) 1000 times in every broadcasting interval  False positive rate with various nonce sizes |r 1 | = |r 2 | = 4, 8, 16 bits of access points under T=  =1 second of static mobile station model False positive rate with various T=1, 2, 4, 8 seconds with  = 1 second T  under |r 1 | = |r 2 | = 16 bits of randomly moving mobile station model

Application and Extension HotSpot  Cyber Cafe, coffee shop, airport Data encryption key as well as access control key Location Tracking  Sensor network

Future Work Scalability Applicable to Sensor Network LBS (Location Based Services)  Location Tracking  Location Privacy  Secure Data Aggregation

Conclusion Easy Simple Cheap Practical Applicable

Q & A