1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.

Slides:



Advertisements
Similar presentations
Implementing IPv6 Module B 8: Implementing IPv6
Advertisements

ZERO CONFIGURATION NETWORKING PUSPARAJ MOHAPATRA SCHOOL OF INFORMATION TECHNOLOGY IIT KHARAGPUR.
DHCP Dynamic Host Configuration Protocol by: Kirk Z. Moreno.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
1 Name Service in IPv6 Mobile Ad-hoc Network connected to the Internet Jaehoon Jeong, ETRI PIMRC 2003.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Measurements of Multicast Service Discovery in a Campus Wireless Network Se Gi Hong, Suman Srinivasan, and Henning Schulzrinne Columbia University.
1 DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad-hoc Network Jaehoon Jeong, ETRI ICACT.
7DS Seven Degrees of Separation Suman Srinivasan IRT Lab Columbia University.
Accelerating Service Discovery in Ad Hoc Zero Configuration Networking
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
Multicast DNS Draft-aboba-dnsext-mdns-00.txt. Outline Goals and objectives Scope of the multicast DNS DNS server discovery Non-zeroconf behavior Zeroconf.
IP ADDRESS(ıNTERNET PROTOCOL) Betül ŞAHİN
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Technology ICT Communications & Computer Networks Resource Notes - Network Software.
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) BY: SAMHITA KAW IS 373.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
DNSNA: DNS Name Autoconfiguration for IoT Home Devices SeJun Lee, Jaehoon (Paul) Jeong, and Jung-Soo Park Sungkyunkwan University & ETRI.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
11 CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK Chapter 10.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Grid Appliance – On the Design of Self-Organizing, Decentralized Grids David Wolinsky, Arjun Prakash, and Renato Figueiredo ACIS Lab at the University.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Dynamic Host Configuration Protocol Engr. Mehran Mamonai.
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Multicast In Wireless Mobile Environments Reporter: 江俊毅.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
The InetAddress Class Nipat J.. public class InetAddress  This class represents an Internet Protocol (IP) address.  An IP address is either a 32-bit.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Translate tech terms into plain English. ?
Ryan Troll Carnegie Mellon University Project Orpheus Network Issues.
TCP/IP Protocol Suite 1 Chapter 16 Upon completion you will be able to: Host Configuration: BOOTP and DHCP Know the types of information required by a.
DHCP Meha Modi. “Dynamic Host Configuration Protocol” Automatically assigns IP addresses to devices (I.e. hosts) on your network. -Prevents to enter data.
BZUPAGES.COM BOOTP and DHCP The Bootstrap Protocol (BOOTP) is a client/server protocol that configures a diskless computer or a computer that is booted.
1 Service Discovery based on Multicast DNS in IPv6 Mobile Ad-hoc Networks Jaehoon Jeong, ETRI VTC2003-Spring.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
WLAN.
Welcome to Early Bird Class
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Autoconf WG 66 th IETF, Montreal. Agenda and Status (1/2) Agenda Bashing min WG & Doc Status
1/7 zerouter BoF Problem Statement 19 th Nov th IETF - Atlanta, Georgia, USA
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
© 2015 Infoblox Inc. All Rights Reserved. Tom Coffeen, IPv6 Evangelist UKNOF January 2015 Tom Coffeen, IPv6 Evangelist UKNOF January 2015 DHCPv6 Operational.
Threaded Case Study Acacia School Project Project Members: Md. Shafayet Hossain Md. Shakhawat Hossain Md. Moniruzzaman Md. Maksudur Rahman.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Chapter 5 Network and Transport Layers
Module 8: Networking Services
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Host Configuration: BOOTP and DHCP
CAPWAP BOF IETF-57, Vienna Inderpreet Singh
Troubleshooting IP Communications
Hiding Network Computers Gateways
CSE 4340/5349 Mobile Systems Engineering
Communications & Computer Networks Resource Notes - Network Software
Host Configuration: BOOTP and DHCP
Network Models, Hardware, Protocols and number systems
Network Hardware and Protocols
Presentation transcript:

1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University of London 10 February 2005

Secure ZeroConf in UbiComp 10 February Agenda Security Issues Our Goal Ongoing and Future Work Possible Solutions What and why

Secure ZeroConf in UbiComp 10 February What is Zero Configuration The IETF Zero Configuration Networking (ZeroConf) Working Group has defined a ZeroConf protocol as follows: “A ZeroConf protocol is able to operate correctly in the absence of either user configuration or external configuration from infrastructure services such as conventional DHCP or DNS servers. ZeroConf protocols may use configuration, when it is available, but do not rely on it being present.”

Secure ZeroConf in UbiComp 10 February Areas IP host configuration Multicast address allocation Host name to IP address resolution Service discovery Getting Addresses, Names and Services A link-local technology suitable for use in small wired or wireless local-area networks

Secure ZeroConf in UbiComp 10 February Zero Configuration is a highly desired goal in Ubiquitous Computing Why Zero Configuration is Needed? In a ubiquitous computing environment: Dynamic topology of networks (e.g. ad hoc networks) No centralised servers or administration exist No infrastructure can be relied on Growing number of devices Static configuration or pre-configuration infeasible No skilled administrators or experts available From users’ point of view: Configuration should be as little/easy as possible

Secure ZeroConf in UbiComp 10 February Our Goal Devices can be configured automatically and be connected to the networks without any centralised servers or user intervention. Devices can automatically discover the services available in the network without any user administration or centralised service discovery servers. All this should be done in a secure way!

Secure ZeroConf in UbiComp 10 February Security Issues (1) Wireless networking is widely used in ubiquitous computing. Network bandwidth is limited; Wireless links are vulnerable to both passive and active attacks. Devices are varied and numerous. Some have very limited capabilities and physical protection.

Secure ZeroConf in UbiComp 10 February Security Issues (2) Central servers and user administration might not exist. Key generation, distribution and maintenance become very difficult. Ubiquitous computing environments can be highly dynamic and decentralised. Any security solution involving static configuration of a node is inappropriate because of the dynamic topology of the network.

Secure ZeroConf in UbiComp 10 February Possible Solutions Trust based zero configuration solutions in ubiquitous computing Application of distributed security architecture without central entities

Secure ZeroConf in UbiComp 10 February Ongoing and Future Work Secure Zero Configuration protocols for: –IP address autoconfiguration –Service discovery Trust modeling and management in UbiComp. Countermeasures to denial-of-service attacks. Distributed security architecture or framework for zero configuration.

11 Thank you very much!