Department of Electrical & Computer Engineering Advisor: Michael Zink.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Chapter 1: Computers and Digital Basics 1 Computers and Digital Basics Chapter 1.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Department of Electrical and Computer Engineering He Zhou Hui Zheng William Mai Xiang Guo Advisor: Professor Patrick Kelly ASLLENGE.
Department of Electrical & Computer Engineering Advisor: Professor Michael Zink Team: Brigit Lyons Fadi Maalouli Tony Panetta Renzo Silva Final Project.
Department of Electrical & Computer Engineering Advisor: Professor Michael Zink Team: Brigit Lyons Fadi Maalouli Tony Panetta Renzo Silva Midway Design.
Department of Electrical & Computer Engineering Advisor: Professor Michael Zink Team: Brigit Lyons Fadi Maalouli Tony Panetta Renzo Silva Comprehensive.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Data Encryption Overview South Seas Corporation Jared Owensby.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
Department of Electrical & Computer Engineering Preliminary Design Review Team: Lucas Root Telin Kim Brandon Thorpe Michael Shusta Advisor: Professor Tessier.
Wireless PDA Text Messaging A Full-Duplex Messaging System between 2 PDAs Jency Jacob Talat Ozyagcilar.
Final Project Review Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root.
Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 5 Database Application Security Models
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Database Application Security Models
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Elements of a Computer System Dr Kathryn Merrick Thursday 4 th June, 2009.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Electrical & Computer Engineering Presentation by: Andrew Frieden Matthew Weydt Nick Setzer Tyler Dunn PDR 2012 – Team Gong Self Sustaining Sensor System.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Networking Basics Lesson 1 Introduction to Networks.
Database Application Security Models Database Application Security Models 1.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Protecting Data on Smartphones and Tablets from Memory Attacks
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Smart Card Technology & Features
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Friend-Foe Identification System Justin Ayvazian, Ben Johnson, Eric Putney, Mike Ruth Faculty Advisor: Prof. Sandip Kundu Department of Electrical and.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Remote Control of Home Appliances PROJECT PLAN Team: ◦ Elie Abichar –CE ◦ Chris Tefer –CE ◦ Ananta Upadhyaya.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
ECE 477 DESIGN REVIEW TEAM 3  SPRING 2015 Garrett Bernichon Bryan Marquet John Skubic Tim Trippel.
NETWORKING & SYSTEM UPDATES
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CSCE 201 Identification and Authentication Fall 2015.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
Common Methods Used to Commit Computer Crimes
Planning & System Installation
The Client/Server Database Environment
Wireless Universal Serial Bus
Chapter 3: Windows7 Part 4.
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Presentation transcript:

Department of Electrical & Computer Engineering Advisor: Michael Zink

Department of Electrical & Computer Engineering Team Organization Project Lead: Fadi Maalouli Web & Software Development: Brigit Lyons Software Development: Anthony Panetta Hardware Development: Renzo Silva 2

Department of Electrical & Computer Engineering Outline Problem Statement Existing Products Our Solution Overall Operation Security Analysis Description of Main Components  Requirements  Implementation  Cost Design Challenges MDR Deliverables 3

Department of Electrical & Computer Engineering Problem Statement Hard drives contains a lot of information Easy to lose or get stolen Secure Important Data on your Hard Drive  Thieves  Hackers  Coworkers Secure Personal Data  From Family members  From Friends 4

Department of Electrical & Computer Engineering Existing Product Software that encrypts your entire Hard Drive  TrueCrypt  SafeGuard® Easy  SafeHouse Explorer  Seagate Self-Encrypting Drives They have static password protection  Not effective 5

Department of Electrical & Computer Engineering Our Approach Secure any non-bootable SATA HDD Use phone as hard token to lock/unlock data stored on HDD Locking/Unlocking requires 2-tiered user password authentication, hardware authentication, and physical locality 6

Department of Electrical & Computer Engineering Design Overview Website Account Database Bluetooth Module 7

Department of Electrical & Computer Engineering Typical Use Scenario Website Account Database Bluetooth Module

Department of Electrical & Computer Engineering Security Concerns Database hack Phone identity spoofing Eavesdropping Brute force attack to crack encryption 9

Department of Electrical & Computer Engineering System Components Server Android Application Bluetooth Module 10

Department of Electrical & Computer Engineering Server User Accounts Database Query Database Website User Account Administration Encryption Module Message to Phone Message from Phone 11

Department of Electrical & Computer Engineering Server Website provides interface for account administration Create account, change password, register Bluetooth module/Phone, etc. Communications to and from website will be encrypted Decrypted only by Bluetooth module Database as backend of website User account information Registered phone IDs Registered Bluetooth modules Encryption keys 12

Department of Electrical & Computer Engineering Android Application Convert Bluetooth Packet to Wireless (WiFi/3G) Packet Convert Wireless (WiFi/3G) Packet to Bluetooth Packet Account Login/Validation Login Phase HDD Usage Phase Android Message To Bluetooth Module Message From Bluetooth Module Message To Bluetooth Module Message To Website Message From Website 13

Department of Electrical & Computer Engineering Android Application Communication with Bluetooth module Detect and register Bluetooth modules Lock/unlock message Encrypted communications Communication with website Convert between Bluetooth packets and wireless (WiFi/3G) packets Access user account and gain information to communicate with selected Bluetooth module Encrypted communications The phone will not be able to decrypt Only relays encrypted messages between website and Bluetooth module Develop using the Android SDK Eclipse plugin 14

Department of Electrical & Computer Engineering Dynamic Encryption Encrypted network communications 128-bit AES encryption Database and Bluetooth module share an encryption key Key changes upon unlock Website creates new key New key encrypted using old key Bluetooth module decrypts and stores new key Provides another layer of protection against attackers 15

Department of Electrical & Computer Engineering Hardware Structure Unlock Power Up SecurityReport. Doc ClientSS.doc Account #’s Decryption Request Retrieve Key Decrypt File Make File Names Available Bluetooth Device     16

Department of Electrical & Computer Engineering Security Lock Controller Processor BlueCore 5MM with 8MBit internal flash 512k EEPROM Power Supply 5V regulated stand-alone Lithium rechargeable battery, 4.2V, mAH 3V primary cell Bluetooth Module: AIRcable SMD Wirelessly Programmable Micro Controller Event Handling 4 Simultaneous Connections PIN code request PIN code limit: 15 characters Performance max 1000 lines per second Port Access Parallel IO ports, 12 ports TTL level, 5V tolerant 17

Department of Electrical & Computer Engineering Data Encryption SeriesIntel Atom Clock Rate1600 MHz Front Side Bus 533 MHz Level 1 Cache56 KB Level 2 Cache 512 KB Max. Power 2.5 Watt 18

Department of Electrical & Computer Engineering Design Challenges and Limitations Hardware and Software Security Small, Fast and intuitive interface Encrypting at a minimum speed of 3Gb/s Interfacing with the operating system 19

Department of Electrical & Computer Engineering Cost Analysis AIRCable SMD$60 Intel Atom$40 Web Hosting$5/month Sata receptacle (data/power) $2.5/each The Sata Cables (power/data) $2.5/each 20

Department of Electrical & Computer Engineering Deliverables for MDR Working encryption algorithm Basic phone application Basic Bluetooth communication Design of Bluetooth module 21

Department of Electrical & Computer Engineering Questions? 22