Real Security Threats Ross Anderson Cambridge. Peer-to-peer networks (1) Early P2P proposals included the ‘Eternity Service’ (1996) – a widely distributed.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Networks By the end of this session, you will:
1 Security in Wireless Protocols Bluetooth, , ZigBee.
Trust relationships in sensor networks Ruben Torres October 2004.
DHP-W306AV is a new D-Link Powerline solution features n wireless speeds of up to 300 megabits per second and HomePlug AV data transmission speeds.
Key Infection (smart trust for smart dust) Ross Anderson (Cambridge) Haowen Chan (CMU) Adrian Perrig (CMU)
From the Eternity Service to Suicide Bombing – a Short History of Ad-hoc Network Security Ross Anderson Cambridge.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Computers Networks and Networking The Data Communications Channel Wireless communication Microwave signal – sent from one transmitter to another Radio.
ODISSEA Mehdi Kharrazi Kulesh Shanmugasundaram Security Issues.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
The Topology of Covert Conflict Shishir Nagaraja, Ross Anderson Cambridge University.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Conclusions in Peer-to-Peer Systems Παρουσίαση: Τάσος Καραγιάννης, Σπυριδούλα Μαργαρίτη, Κώστας Στεφανίδης, Θοδωρής Τσώτσος.
COMMUNICATIONS AND NETWORKS. -2 Competencies Discuss connectivity, the wireless revolution, and communication systems Describe physical and wireless communications.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Advanced Computer Networks - IAIK 1 Gsenger, Nindl, Pointner Graz, Secure Anycast Tunneling Protocol.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Wireless and Security CSCI 5857: Encoding and Encryption.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Networking Basics Lesson 1 Introduction to Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
D-Link Confidential WRPD, Jan, DHP-310AV is a new D-Link Powerline solution compliant HomePlugAV data transmission speeds of up to 200Mbps. This.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
Protocols. Protocol Set of rules that govern: Connection Communication data transfer Protocols regulate: access method allowed physical topologies types.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
1 Bogotá, EELA-2 1 st Conference, The OurGrid Approach for Opportunistic Grid Computing Francisco Brasileiro Universidade Federal.
Doc.: IEEE /063 Submission May 2000 Y. Kuchiki, M. Ikeda Seiko Epson Corp. Slide 1 Yutaku Kuchiki, Masayuki Ikeda Seiko Epson Corporation May.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Computer Networks An Introduction. Networks Network is defined as: A group of two or more computer systems linked together.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Lab 3-5 Debrief.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Networking Basics 8th Grade
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati F.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Game Theoretic Model of Censorship Resistance Andrei Serjantov University of Cambridge Computer Laboratory.
Introduction to Networking. What is a Network? Discuss in groups.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Protocols.
CAN (Campus Area Network)
Presentation transcript:

Real Security Threats Ross Anderson Cambridge

Peer-to-peer networks (1) Early P2P proposals included the ‘Eternity Service’ (1996) – a widely distributed file store for censorship resistance Attack (1) – ‘kiddie porn’ Attack (2) – lack of motivation for participants Attack (3) – break the ring, or go for high-order nodes in the courts Attack (4) – spam out the content with trash

Fixes (1) Fix the motivation with a federation of clubs: Danezis/Anderson, ‘Economics of censorship resistance’, WEIS 2004 Or revolutionary cells: Nagaraja/Anderson, ‘Topology of Covert Conflict’, WEIS 2006 Instead of initial authentication, concentrate on recovery (Anderson/Chan/Perrig ‘Key Infection’ ICNP 2004; Anderson/Bond ‘Initial costs and maintenance costs of protocols’, Protocols 2005)

Peer-to-peer networks (2) HomePlug AV – v2 powerline networking Real problem: people connect to wrong network, set up large networks Simple connect mode – push buttons to make it work and ‘send the key in the clear’ Secure mode – type in the device’s AES key (on its label) into a network controller Can a public-key protocol do any more?

Why Homeplug has no PK mode Patent attorney using HomePlug as home LAN Attacker knocks out STB using jammer Net controller says ‘admit Sony STB type ABC123, cert hash = 4CA7 239C 210A 337F?’ Only safe if cert hash checked against label So better off copying key from label directly! See Newman, Gavette, Yonge, Anderson, ‘Protecting Domestic Power-line Communications’, SOUPS 2006

Future P2P networks We already have plenty home and personal networks (HomePlug, Bluetooth, … ) Plenty P2P apps for PCs too (Skype, … ) Sensor network apps? (see our paper later) Phone-based apps? (Haggle?) What are … incentives? … scalability? (Could Khayelitsha cope with success?)