Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates.

Slides:



Advertisements
Similar presentations
Laptop Security in the current IT world W3 group.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Access Control Methodologies
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Proposal for an achievable, cost effective Security Concept for EOBRs C. Hardinge / A. Lindinger.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Concepts of Database Management Seventh Edition
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Security issues for mobile devices Cvetko Andreeski.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
New Data Regulation Law 201 CMR TJX Video.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Chapter 10: Authentication Guide to Computer Network Security.
Information Security Technological Security Implementation and Privacy Protection.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Concepts of Database Management Sixth Edition
3/31/121 Practicing Safe Computing Brian Cox 3/31/12.
Concepts of Database Management Eighth Edition
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Cryptography By, Anthony Lonigro & Valentine Mbah.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Storing Organizational Information - Databases
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
AUTHORS – X. NIE, D. FENG, J. CHE, X. WANG PRESENTED BY- PREOYATI KHAN KENT STATE UNIVERSITY Design and Implementation of Security Operating System based.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Ch 13 Trustworthiness Myungchul Kim
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Carrying Your Vital Signs With You Jonathan Otero Suárez Metropolitan University, San Juan, Puerto Rico NSF REU: “Creating Computer Applications for Medicine”
Page 1 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Retele de senzori Curs 1 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
Mobile Device Security Management Leyna Belinsky.
Professor Tzong-Chen Wu
Tim Carter Sales Director Sybase Confidential Propriety.
Deployment Planning Services
Tim Carter Sales Director Sybase Confidential Propriety.
A Novel Framework for Software Defined Wireless Body Area Network
Taewan kang, Kevin huangfu
Internet of Things (IoT)
12 STEPS TO A GDPR AWARE NETWORK
MicroToken Exchange Data Security Solutions
Presentation transcript:

Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates

Contents Motivation Patch Simulator State Diagram State Definitions Secure Mobile Computing in Action Future Work Special Thanks

Motivation Secure Mobile Computing is a way to protect data stored on mobile computing devices, such as PDA’s, laptops, as well as specialized Military equipment. Use biometric data to authenticate Heart beat, respiratory, body heat

Motivation What sort of data should be secured? Corporation Trade Secrets Sensitive Financial Information In-the-field troop movements, etc What could happen to the user? User goes unconscious, device becomes vulnerable User taken hostage, forced to access sensitive data User becomes deceased, device taken by enemies

How to determine user status Wearable biometric patch transmits heart beat data packets to mobile device Software interprets data and acts according to set of predefined events Event triggers Low heart rate for a given time Elevated heart rate for a given time Dramatic elevation of heart rate over short time Timeout Disconnection

Patch Simulator Developed to duplicate heart beat data in controllable manner Key features: Modular communication protocols to allow for simple addition of proprietary communication channel if necessary Displays summary of key information Scenario-based heart rate modification

State Diagram

State Definitions Locked State – Nothing done to data, but not currently available to user multiple authentication required to unlock device Safe State – Data is secure, cannot be easily recovered Delete Data Encrypt Data Secure Delete / Wipe Data Hard Reset – Device totally wiped, returned to factory settings

Secure Mobile Computing in Action! Demonstrate functionality of all elements of the system

Future Work Implement Secure Mobile software as background process Policy Controls in action unbeknownst to user Integrate additional biometrics Respiration Body Temperature Optimize and increase robustness of checkHRChange() algorithm

Special Thanks to… Dr. Alfred C. Weaver Andrew Jurik Paul Bui and Joel Coffman