Project Overview Flying Freedom Per Heselius & Martin Hedenfalk.

Slides:



Advertisements
Similar presentations
RadSec – A better RADIUS protocol
Advertisements

Example policy elements and their role in bandwidth management and optimisation.
Networking Problems in Cloud Computing Projects. 2 Kickass: Implementation PROJECT 1.
Tutorial 8 Team Assignment Group 4A. HD TV Changing channel, volume etc.. by PDA Getting information(Program Schedule) form TV Refrigerator Showing the.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
1 PERFORMANCE COMPARISON OF VERTICAL HANDOVER STRATEGIES FOR PSDR HETEROGENEOUS NETWORK 學生 : 鄭宗建 學號 :
Implementation I - demo. Schedule * Project status -achieving the goals of the iteration -project metrics * Used work practices * Work results -presenting.
Online School Registration System Solomon Ng Pei-Yu Wang Evan Chiu Curtis Wong.
Skills: none Concepts: log, IP address, URL, packet header and body, geo-location, anonymity, proxy server, advertising signals, hacking, social graph.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Project Planning Wentworth Institute of Technology Electronic Design I Prof. Tim Johnson Chapter 7.
Project Overview Project Name Company Name Presenter Name.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Secure Authentication System for Public WLAN Roaming Ana Sanz Merino Yasuhiko Matsunaga Manish Shah Takashi Suzuki Randy Katz.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Existing Network Study CPIT 375 Data Network Designing and Evaluation.
Intranet, Extranet, Firewall. Intranet and Extranet.
Module 8: Risk Management, Monitoring and Project Control We would like to acknowledge the support of the Project Management Institute and the International.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
10 Aug 2010 ECE/BENG-492 SENIOR ADVANCED DESIGN PROJECT Meeting #2.
Who am I? Mats Ohlin Swedish Defence Materiel Administration (FMV) IT Security area –International Standardisation: ISO/IEC JTC 1/SC 27/WG 3 (Security.
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Edinet EVO Meeting June 26, 2008 VSB-CZ, WP3 Interim Progress Report Prepared by: Petr Grygárek.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1. 2 Corollary 3 System Overview Second Key Idea: Specialization Think GoogleFS.
Introduction  Easy English, Inc. Chinese based company specializing in Language translation  Background Translations are currently done manually by.
Medical Call Center Project Name Company Name Presenter Name.
1 Some initial Design suggestions… Getting started… where to begin? Find out whether your design architecture will work… as soon as possible. If you need.
Project Dragon Small Business Website Content Management System.
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
E-Safety – Using ICT Safely and Responsibly Miss Pownall.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
KFC VIETNAM ORDER SYSTEM HTC TEAM. AGENDA 1.TEAM INTRODUCTION 2.PROJECT OVERVIEW 3.PLAN 4.PRODUCT ARCHITECTURE 5.DATABASE DESIGN 6.TEST PLAN & TEST REPORT.
Anonymous Digital Cash  Ashok Reddy  Madhu Tera  Laxminarayan Muktinutalapati (Lux)  Venkat Nagireddy.
Reinventing Digital Identity Design Goals Product Overview Technology & Cryptography Overview Question & Answer.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
T Iteration demo T Iteration Demo Team Balboa I1 - Iteration
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Project Name Company Name Presenter Name. High-level timing goals Relationship to other projects Ultimate goal of project.
CS 5150 Software Engineering Lecture 7 Requirements 1.
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
1 Cross Support Architecture (CSAWG) Overview, Status, Goals Takahiro Yamada JAXA.
Tiffanie Donovan CSC /27/12. Societal Topics-Weeks 7 & 8 Internet Regulation Internet regulation has the operation of keeping people from viewing.
Enhance Security of IP Network using New Architecture of Address Validation Xiaodong Duan China Mobile.
{ INTERNET  A GLOBAL SYSTEM OF INTERCONNECTED COMPUTERS  A NETWORK OF NETWORKS.  A PART OF EVERYDAY LIFE  VAST ARRAY OF INFORMATION RESOURCES AND SERVICES.
Project Overview Flying Freedom Per Heselius & Martin Hedenfalk.
Introduction Chapter 1. Business Applications of Networks A network with two clients and one server. Client-Server Model.
KistaOpen.Net KTH Communication Systems Design 2002.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Client XYZ Wide Area Network Design. INTRODUCTION CLIENT XYZ – Wide Area Network Project  Computer Sciences Corporation (CSC)  Network Engineering Services.
MAJOR SOFTWARE FAILURES, WHY THEY FAILED AND LESSONS LEARNED BY AKPABIO UWANA.
CS 389 Software Engineering MultiLib 2008 Final Presentation Adam Pitzer -Team Leader Paul Dumoulin - Quality Manager Miguel Vega - Wiki Master Steve Malko.
T Project Review X-tremeIT PP Iteration
FILE TRANSFER SPEEDS OVER HTTP AND FTP Yibiao Li 06/01/2009 Christmas Meeting 2008/09.
SmallMail, protect your from nosey Big Brothers Peter Roozemaal
EA C451 Vishal Gupta.
Multilevel Marketing Tree Viewer
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
Characteristics of an Effective Team
IS4550 Security Policies and Implementation
Unit 36: Internet Server Management
Project Change Control
Presentation transcript:

Project Overview Flying Freedom Per Heselius & Martin Hedenfalk

Project Goals Location privacy for mobile internet Anonymous Payment System

Location Privacy, constraints No one should be able to determine the users physical position. Roaming between different networks must be possible.

Payment system, constraints The user should be able to make anonymous payments for the roaming time. Anonymous in this case means that the foreign network should not know the identity of the user paying. The bank should not be able to identify users by the payments the bank receives from the foreign networks. Double spending should not be possible. Double charging should not be possible. Counterfeiting should not be possible. Theft should if possible be prevented.

Background Big Brother Traffic Group ”Sponsor” Zero-knowledge Systems, Inc.

Why? Politics Freedom to choose

Why not? Criminals Untraceable Convenience

Freedom System Provides anonymous internet usage through pseudonymous identities. AIP, Anonymous Internet Proxy Core Server Route Creation Location privacy / mobility

Improvements in functionality Mobile client location privacy with faster handover. Mobile server location privacy.

Current Status Progress against schedule – behind. - Architecture in progess, delayed - Protocol design to be done, delayed - Implementation cancelled - proof of concepts to be done - Payment system to be done

Unexpected issues Testbed hacked 33 Megabytes of complex code

Strengths with our project Small group - Easy communications - Easy scheduling Good competence mix: Linux, Crypto & Internetworking Good relationship with our team coach

Weaknesses with our project Small group - Much work - Fewer ideas Lack of support from our ”sponsor”

Three things that we can share with the other teams Use mailing lists Use CVS or other version management system Define roles clearly to avoid trouble

Three things that we need help with from the other teams 20 Programmers would be good, anyone?

Related Documents Project Plan & Lessons Learned 1 – Questions?