Motorola Israel Project: Authentication Center for SDP Federation ARD The Team: Alina Mirinzon Dadi Suissa Gabi Brontvin Raz Zieber.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Application Server Based on SoftSwitch
Always Best Connected Architecture and Design Rajesh Mishra Ericsson Berkeley Wireless Center.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
INVESTMENT GAME IN SOCIAL NETWORK Academic Advisor: Dr. Yuval Alovici Professional Advisor: Dr. Mayer Goldberg Team Members: Ido Bercovich Dikla Mordechay.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
SOCIAL NETWORK INFORMATION CONSOLIDATION Developers:  Klasquin Tomer  Nisimov Yaron  Rabih Erez Advisors:  Academic: Prof. Elovici Yuval  Technical:
Revision Week 13 – Lecture 2. The exam 5 questions Multiple parts Read the question carefully Look at the marks as an indication of how much thought and.
People Technical AdvisorsAcademic AdvisorFinal Project By Prof. Shlomi Dolev Prof. Ehud Gudes Boaz Hilemsky Dr. Aryeh Kontorovich Moran Cohavi Gil Sadis.
Background Background Problem domain Current situation Proposed solution System architecture Functional requirements Non-functional requirements Major.
Academic Advisor: Prof. Ronen Brafman Team Members: Ran Isenberg Mirit Markovich Noa Aharon Alon Furman.
Authentication Center for SDP Federation
Authentication Center for SDP Federation Motorola Israel Project: ADD The Team: Alina Mirinzon Gabi Brontvin Raz Zieber Dadi Suissa.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
SmartSQL AlfaTech Software Solutions Application Requirements Document  Radi Bekker  Vladimir Goldman  Marina Shaevich  Alexander Shapiro Team Members:
1 Extending SIP Speaker: Hsuan-Ming Chen Adviser: Ho-Ting Wu Date: 2005/04/26.
Strabismus Checking System The Team: Lior Barak Omri Mosseri Application Requirements Document.
Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
TTA Views on Technical Scope of M2M Consolidation 17 August 2011 TTA M2MCons02_16 (Agenda 4.3)
Generic Simulator for Users' Movements and Behavior in Collaborative Systems.
September 2011 At A Glance The API provides a common interface to the GMSEC software information bus. Benefits Isolates both complexity of applications.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Motivation. Part of Deutsche Telekom project:
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Business Analysis and Essential Competencies
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
WSB / MobiHealth Hugo Geuverink MobiHealth WP3 meeting 12/13 November 2002, Madrid.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
© 1998 R. Gemmell IETF WG Presentation1 Robert Gemmell ROAMOPS Working Group.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
.  A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate.  Taken advantage of Spring’s multi layer injection.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Problem Scope Objective To demonstrate/determine clearly the need for an edge protocol that allows a user to interact with an agent in the network for.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
ARCH-5: Service Interfaces in Practice Christian Stiller Technical Architect.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
IPS Infrastructure Technological Overview of Work Done.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Dr. Ir. Yeffry Handoko Putra
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Radius, LDAP, Radius used in Authenticating Users
CHAPTER 3 Architectures for Distributed Systems
Cloud Computing By P.Mahesh
Chapter 3: Windows7 Part 4.
מרכז אימות לפלטפורמת מתן שירותים
AAA: A Survey and a Policy- Based Architecture and Framework
3GPP and SIP-AAA requirements
Presentation transcript:

Motorola Israel Project: Authentication Center for SDP Federation ARD The Team: Alina Mirinzon Dadi Suissa Gabi Brontvin Raz Zieber

Introduction

Network & SDP Authentication Center : Universal system based on AAA principle for authentication and authorization of users and applications that want to receive services that provider by SDP. What is AAA? Authentication, Authorization, Accounting What is SDP? Service Delivery Platform - The network infrastructure provider who gives AAA.

Introduction - cont. Each time user wants to access a network, in order to establish the connection, an AAA process is needed. AAA process: Interests: identify user, user permissions, billing. Functionaries: –SDP –Users - The clients –Applications - activate services supplied by the SDPs.

Vision

The project goal is to research, design and implement a proof of concept for authentication aspects of the SDP. The project outcome expected to be an Authentication Center for SDP Federation, serving multiple authentication decision-points and security policies.

Problem Domain

Our project deals with three subjects: Network Authentication SDP Authentication Privacy Policy (out of our scope) All the above will be resolved by a Single Authentication Center.

Problem Domain – cont. Network Authentication: Description: A client (supplicant) of one SDP wants to use infrastructure of any SDP. This authentication process is a precondition for establishing a connection between the client and the desired SDP.

Problem Domain – cont. Network Authentication – cont. Examples: You go on a trip oversea. You forgot to tell your mom (Polish mom) that you got married in Las-Vegas with a Christian lady. You reach for your mobile phone but you forgot to make the arrangement for using your phone in U.S. - OOOOOOOOPS. You are driving by bus in Beer-Sheva and want to send urgent talkback via your laptop (will be possible in the near future - WiMax technology) about the exam in compilation (it was a piece of cake). Beer-Sheva is covered by provider A but you are subscribed to provider B. - BASA

Problem Domain – cont. Network Authentication – cont. Traditional solution: Every SDP shall know all other SDPs. Each SDP Supports the protocols of all other SDPs. Agreements between SDPs in advance. Subscribed SDP#4 SDP#3 SDP#2 SDP#1 Connection request

Problem Domain – cont. Network Authentication – cont. Problems: Duplicate implementation of protocols. Severe data duplication. Subscribed SDP#4 SDP#3 SDP#2 SDP#1 Connection request

Problem Domain – cont. Network Authentication – cont. Suggested solution: One Authentication Center will receive all requests for authorization and handle it: protocols conversion Routes authentication request to DSP who user is subscribed to. Subscribed SDP#1 SDP#2 Authentication/ Privacy Center Authentication Proxy Server SDP#4 SDP#3 Connection request

Problem Domain – cont. Network Authentication – cont. Solve Problems: Convertor - Duplicate implementation of protocols. The SDPs are required to know only the center and its private subscribers - (Severe data duplication).

Problem Domain – cont. SDP Authentication : Description: Application needs to use a specific service. The same service is provided and available in several servers. In order to learn about the capabilities of the service and choose the most suitable one, the application needs to authenticate with each server. (For a “get location“ service, capabilities parameters can be - location accuracy, location update frequency, service cost).

Problem Domain – cont. SDP Authentication – cont. Example: User operates an application of searching restaurants in his current position. This application uses the service “get location”. High Accuracy and frequent update isn’t relevant for this application.

Problem Domain – cont. SDP Authentication – cont. Existing solution: Application trying to find all available services with the same functionality. Application needs to authorize with all servers. Application has to ask each server what it supports, rejecting those that aren’t suitable to its needs. Application chooses the most suitable and profitable service. Client Application Service SDP#1 SDP#2

Problem Domain – cont. SDP Authentication – cont. Problems: Repetition process authentication. Application will check servers that some of them aren’t relevant at all. No standard for service request protocols. Application service request should suite to Server protocol.

Problem Domain – cont. SDP Authentication – cont. Suggested solution: An authentication center will implement the authentication process and service request, using standard API. The center will give to application only the available and relevant services. SDP#1 Authentication/ Privacy Center Authenticator Proxy OSA Gateway SDP#2 EAP Authenticator EAP Supplicant Client Application Service

Problem Domain – cont. SDP Authentication – cont. Solve Problems: One Authentication center - Repetition process authentication. Implementing Standard API - Diversity of authentication protocols and No standard for service requests. The center provides only the relevant services - Application will check servers that some of them aren’t relevant at all.

Architecture & Technologies

EAP-MD5 Authenticator – Parlay framework Repository Convertor EAP Proxy Repository Application - Demo Access SDP Authentication Network Authentication

Functional Requirements

Repository  Select SDP record  Select record of application's server

Functional Requirements – cont. EAP Proxy  Receive authentication details.  Select the record from the repository.  Execute converter.  Send authorization request to SDP.  Return the response.

Functional Requirements – cont. Converter  RADIUS-DIAMETER conversion.  DIAMETER-RADIUS conversion.

Functional Requirements – cont. Network Gateway - Access Point  Get an authentication request from the client in layer 2.  Manage protocol handshake.  Sends authentication request to the Authentication Center through RADIUS protocol.  Block the user from entering the network.  Enter the user or refuse, according to authentication response.

Functional Requirements – cont. Supplicant Application (Parlay)  Request for service.  Selects a service.  Receive a service.

Functional Requirements – cont. Server Authenticator  Parlay Interface - Framework

Functional Requirements – cont. GUI  User connection.  Insert user personal details  Insert user connection details  Connection and Application process notification.  Initializing  Connecting  Accept\Reject  Disconnecting  Show Reports.

Non-Functional Requirements

Speed, Capacity & Throughput, Availability, Usability – Irrelevant Reliability – 100% correctness in supplying services and network access to entitled users only. Safety & Security  RADIUS & DIAMETER authentication protocols  Identify EAP-MD5 hash function.

Non-Functional Requirements Portability – different operating systems:  Supplicants - EAP Supplicant in Windows Parlay Supplicant in Linux  SDPs – Linux, RADIUS \ DIAMETER  Programming Languages -

Use-Cases

Use-Cases 1 Network authentication The story: A SDP supplicant wants to connect to the network. Post conditions: authorize network access.

Use-Cases 1

Use-Cases 2 Application authentication The story: The application wants to use a service and needs to be authenticated. Post conditions: The application is authenticated and is able to get the desired service.

Use-Cases 2

Risks

Proof Of Concept – possible won’t be implemented A lot of advanced networking technologies – wide knowledge needed (Parlay, DIAMETER, RADIUS, EAP-MD5…)

Thank You !!!