A first Demonstrator for a CAHN infrastructure Bluetooth in CAHN.

Slides:



Advertisements
Similar presentations
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Advertisements

Always Best Connected Architecture and Design Rajesh Mishra Ericsson Berkeley Wireless Center.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Secure Socket Layer.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Uncovering Performance and Interoperability Issues in the OFED Stack March 2008 Dennis Tolstenko Sonoma Workshop Presentation.
Signalling Flows for the IP Multimedia Call Control in 3G Wireless Network Master’s Project By Sanjeev Kayath.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Rev A8/8/021 ABC Networks
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
The Museum Project The Museum Project Yoav Gvili & Asaf Stein Supervisor : Alexander Arlievsky.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Computer Network Architecture and Programming
Blue Tears Project Bluetooth Tracking: Distributed Information Systems.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Bluetooth Introduction The Bluetooth Technology
Host Identity Protocol
Bluetooth based home automation system N.Sriskanthan, F.Tan, K. Karande Microprocessors and Microsystems 26(2002) Presenter: Bui Phuong Nhung.
2011 Embedded Systems Software Training Center BluRapport SDK.
Hacking the Bluetooth Pairing Authentication Process Graduate Operating System Mini Project Siyuan Jiang and Haipeng Cai.
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
Small Devices on DBGlobe System George Samaras Chara Skouteli.
第十四章 J2EE 入门 Introduction What is J2EE ?
GSM Network Structure Lance Westberg.
COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium July, 2006, Patras, Greece Security in Wireless Networks:
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
OPTICAL ANSWERS TO GRID QUESTIONS Karen McPherson C.S. Major Radford University.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
University of Bern A novel and flexible Architecture for CAHN Marc Danzeisen.
OSI Model. Topics What is the OSI Model? What is a Protocol? Why 7 Layers? The 7 Layers – Application – Presentation – Session – Transport – Network –
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Chapter 4 Application Level Security in Cellular Networks.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
WLAN-GPRS Integration For Next-Generation Mobile Data Networks Wireless Communications IEEE 2002 報告者:陳崇凱.
William Stallings Data and Computer Communications
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Web application architecture1 Based on Jim Conallen: Web Applications with UML.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Mapping Salutation to Bluetooth 4 Overview 4 Bluetooth Summary 4 Salutation Architecture Summary 4 Mapping Bluetooth SDP to Salutation APIs 4 Mapping Bluetooth.
JPMA PROJECT PRESENTATION (ITU) 1 INTRODUCTION BLUETOOTH CHAT DESIGN JAVA ON MOBILE DEVICE Presenters Benjamin Boateng Abass Omer Venkateshwar Rao Namilakonda.
ATM Protocol Architecture Mode. ATM architecture uses a logical reference model to describe its functions ATM functions correspond to physical layer and.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Ben - Gurion University Department Of Communication Systems Engineering DNS For Cell Phones Yoav Peer, Eugene Volchek Instructor: Dr. Chen Avin.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
Bluetooth Technology -Prepared By Jasmin Patel -Guided By Jagruti Goswami.
CH9. HOST CONTROLLER INTERFACE AND COMMANDS CH10. LOGICAL LINK AND ADAPTATION PROTOCOL(L2CAP) RTLAB YuJin Park.
Resource subscription using DDS in oneM2M
Bluetooth connection & GAIA protocol
Channel Control Interim substates for adding new slaves
A Wireless LAN technologies IEEE
Understanding the OSI Reference Model
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
PREPARED BY: RIDDHI PATEL (09CE085)
Presentation transcript:

A first Demonstrator for a CAHN infrastructure Bluetooth in CAHN

Reminder on Bluetooth Security Bluetooth provides three Security Modes: No Security Authentication Authentication and Encryption Authentication is based on a PIN Encryption is based on encryption keys, which are derived from the link key, which in turn is based on the PIN

The Bootstrapping Problem How can a PIN between two entities be defined, when the entities do neither know each other nor see each other? A Service Provider can sell PINs (Pre Paid Solution, Authorization, not Authentication) A third Entity can provide PINs on demand for registered users (all users have to have a subscription with this third party, which provides a higher level authentication) Our suggestion: CAHN

How CAHN can help to get a PIN The Scenario Service Connection Request Service Connection Response, including the PIN Secure Connection

Bluetooth Goodies Inquiries Helps to find other devices in vicinity Service Discovery Helps to find services on a given device in vicinity Profiles Services are well defined by Profiles

Example: PAN Profile, Network Access Point Service Name: Network Access Point Service RecHandle: 0x804ccf0 Service Class ID List: "Network access point" (0x1116) Protocol Descriptor List: "L2CAP" (0x0100) PSM: 15 "BNEP" (0x000f) Version: 0x0100 SEQ16: Profile Descriptor List: "PAN access point" (0x1116) Version: 0x0100

New Profile: CAHN Is it possible to create a new Profile for CAHN The goal of the Profile would be to find out which devices are able to “speak” CAHN MSISDN as Attribute

The Scenario with Service Discovery 12:34:56:78:9a:bc

The Scenario with Service Discovery 12:34:56:78:9a:bc Service Browse Request Service Browse Response MSISDN

The Scenario with Service Discovery 12:34:56:78:9a:bc Connection Request Link Key Request MSISDN Link Key Negative Response PIN Request PIN Negative Response Connection Negative Response

The Scenario with Service Discovery 12:34:56:78:9a:bc MSISDN Service Connection Request Processes Request (AC) Generates a PIN Sends back a Response

The Scenario with Service Discovery 12:34:56:78:9a:bc MSISDN PIN Service Connection Response (incl. PIN) Connection Request Link Key Request Link Key Negative Response PIN Request PIN Positive Response Connection Positive Response

Implementation – Flow Chart WLANBLTCellular USSDSMS CAHN Communication Module (CCM) Het. VPNFile Transfer GUI Key Management CAHN Protocol via Cellular

CAHN Communication Module (CCM) Responsible to treat Requests and Responses and to handle the Bluetooth Connector or the Cellular Adapter Daemon waiting for Requests Provides a socket interface to the Cellular Adapter (local, multiplexed UNIX socket)

Cellular Adapter Translates packets from the CCM to Cellular packets and vice versa Communicates with the local CCM via a socket interface Communicates with the Cellular with help of the gsmlib and a serial connection to a cell phone

Bluetooth Connector Is invoked by the CCM Responsible for Access Control PIN Generation Service Configuration PIN Database (MySQL) (Billing Records)

Consists of three messages CAHN Bluetooth Service Request CAHN Bluetooth Service Response Error Message CAHN Protocol PDU_IDP_LENSRC_MSISDNDST_MSISDNSRC_BADST_BABluetooth Service ID HDRCAHN HDRBLT HDRSVC DATA PDU_IDP_LENSRC_MSISDNDST_MSISDNSRC_BADST_BABluetooth Service ID HDRCAHN HDRBLT HDRSVC DATA PIN PDU_IDP_LENSRC_MSISDNDST_MSISDNSRC_BADST_BAError Code HDRCAHN HDRBLT HDRSVC DATA (Optional)

Open Issues Bluetooth related Can this really be a Profile? Creation of a UUID Attributes Standardization through Bluetooth SIG Cellular related Transport Mechanism (USSD, GPRS or SMS?) Architecture Realization (Java?) General GUI Definition of Interfaces between the different modules Further Protocol Definition Access Control PIN Generation by the Operator

Thank you! Questions? Suggestions?