Introduction to ubiquitous security Kevin Wang. Scenario Take photos Ask position Position voice Time More information.

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
Lecture 6 User Authentication (cont)
Frank Stajano Presented by Patrick Davis 1.  Ubiquitous Computing ◦ Exact concept inception date is unknown ◦ Basically background computing in life.
Computer Security Computer Security is defined as:
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Smart card based authentication and identity management Lecture 4.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
Authentication. Terminology  Authentication التثبت من الهوية  Access Control (authorization) التحكم في الوصول  Note the difference between the two.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Marjie Rodrigues
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
The Impact of Physical Security on Network Security
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
BUSINESS B1 Information Security.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Network Security & Accounting
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Biometric Technologies
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Technical Devices for Security Management Kathryn Hockman COSC 481.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
An Introduction to Biometrics
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.
Challenge/Response Authentication
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Network Security (the Internet Security)
System Access Authentication
Challenge/Response Authentication
Secure Software Confidentiality Integrity Data Security Authentication
Security in Networking
2016 Annual CPNI Training CPNI & PI Awareness Beth Slough,
CLIENT/SERVER COMPUTING ENVIRONMENT
Introduction to Cybercrime and Security
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Introduction to ubiquitous security Kevin Wang

Scenario Take photos Ask position Position voice Time More information

Essential terminology Oxford English Dictionary –Ubiquitous: present or appearing everywhere; omnipresent Like: light switches, door locks, fridges and shoes –Ad hoc networking: Devoted, appointed, etc., to or for some particular purpose.

Common mistake Security = cryptology? What fails in real life is rarely the crypto. –Record voice to photo, the phone is in hand. –Need to crypto?

Example of Resident Security

Assessment Threat –Your money getting stolen Vulnerability –Thin wood and glass, your front door or windows. Attack –Thief breaks and in your house. Safeguard –A priori vaccines Countermeasure –A posteriori remedies RFID …

Problem Confidentiality –Disclosed to unauthorized principals Integrity –Altered in an unauthorized way Availability –Honors any legitimate requests by authorized principals –As attacks succeed in denying service to legitimate users, typically using up all the available resources Authorize Authentication Anonymity –Traffic analysis –Intrusive dossiers, credit cards … can make data fusion.

Notation E(m) E K (m)

A Secure Technology for Determining Client Computer User and Location Authentication Braun martin Chief Technology Officer Kevin Wang

Introduction Scenario? Technology background Possible inherent problem Conclusion

Scenario Nevada 內華達州

Nevada Casino Gamble Drinking 51 area Reno city And so on

Casino In room, we can make sure who is adult, who is boy. But in internet, how can I know who are you? –A dog? –A cat? –Or dinosaur?

Solution User authentication Location authentication

User authentication Information the user knows –Password, personal identification number An object (access token) the user possesses –Physical keys, mag stripe cards and smart cards A personal (biometric) characteristic –Hand geometry, fingerprints, voiceprint, retinal scans and DNA profiles

Location authentication Telephone –Prefix region Internet protocol mapping –IP is address Cellular digital packet data –Precise location of the transmitting dervice Global positioning system –Satellite

Possible inherent pronlems In user authentication –Passwords and PINs Share or hacking –Access token Be duplicated easily –Biometric characteristics False positive False negative duplication

In location authentication –Caller ID Some area doesn ’ t permit gambling –IP addressing Real ip can map area, but, visual ip? –Cellular digital packet data Low reliability or nonexistent in many areas. –Global position system Steel buildings

Conclusions Combine user and location authentication Integrate biometric scanner with smart card in a secure networked computers.