Bridging the UI Gap for Authentication in Smart Environments Sebastian Unger Prof. Dirk Timmermann University of Rostock, Germany MuSAMA DFG Graduate Program.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
By Md Emran Mazumder Ottawa University Student no:
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
A Survey of Key Management for Secure Group Communications Celia Li.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
Computer Security Key Management. Introduction We distinguish between a session key and a interchange key ( long term key ). The session key is associated.
Computer Security Key Management
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
IEEE Wireless Local Area Networks (WLAN’s).
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Science Public Key Management Lecture 5.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
SafeSlinger Easy-to-Use and Secure Public-Key Exchange Michael Farb (CMU), Yue-Hsun Lin (CMU), Tiffany Hyun-Jin Kim (CMU), Jonathan McCune (Google), Adrian.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
DPWSec: The Devices Profile for Web Services Security
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Chapter 21 Distributed System Security Copyright © 2008.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
King Mongkut’s University of Technology Network Security 8. Password Authentication Methods Prof. Reuven Aviv, Jan Password Authentication1.
Key Management Network Systems Security Mort Anvari.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Non-PKI Methods for Public Key Distribution
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Bridging the UI Gap for Authentication in Smart Environments Sebastian Unger Prof. Dirk Timmermann University of Rostock, Germany MuSAMA DFG Graduate Program

Problem statement What is it about? ? © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ How to mutually authenticate a light bulb and a switch?

Motivation Basic Principles Approach Prototype Implementation Conclusion & Future Work Agenda © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 3

Motivation Basic Principles Approach Prototype Implementation Conclusion & Future Work Agenda © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

What it is about Motivation AAL IoT WoT © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Confidentiality Security? Motivation Authorization Integrity Prerequisite: Authentication / Authenticity © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Authentication Motivation Authentication= Identification + Keying + Parameter negotiation AES-CBC-256 © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Motivation Basic Principles on Authentication Approach Prototype Implementation Conclusion & Future Work Agenda © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Delegated Basic Authentication Approaches Basic Principles vs. Direct Trust Authority (TA) implicit trust relationship  Usually hybrid approach How is trust established between endpoints and TA? © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Delegated authentication example: certificate hierarchies Basic Principles root CA CAs end points certificate hierarchies: authentication is delegated by certificate authorities (CA) with the root CA at the top of the tree © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

can reduce endpoint’s efforts easier to manage (one vendor) transparent to user requires (vendor-independent) infrastructure single point(s) of failure authentication in field cumbersome Delegated authentication: pros and cons Basic Principles © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Direct Authentication Basic Principles Direct Authentication: Exchange a PIN out-of-band (OOB) OOB channels can be 1234 e.g. challenge-response OOB:1234 © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Direct authentication: pros and cons Basic Principles no trusted 3 rd parties no infrastructure necessary no single point of failure authentication / connection establishment at runtime # of connections per device: n (instead of 1) OOB channel must be possible © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Motivation Basic Principles Approach to bridge UI gaps Prototype Implementation Conclusion & Future Work Agenda © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Problem statement Approach ? © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Common approach to bridge the gap Approach Supply every device with NFC capabilities (  NFC hype) Example: Is it possible to bridge the gap w/o supplying peripherals the device does not need? ? © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Our approach to bridge the gap Approach Approach: Incorporate user interface capabilities of omnipresent multimedia devices ? © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Multimedia device properties Approach Multimedia devices… … have plenty of user interface capabilities … are literally everywhere in today’s homes … are often carried with their users Example: Smartphone LG Nexus 4 © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

The complete protocol Approach ClientDevicephone discovery Metadata: Matching authentication mechanism? Metadata Request authentication w/ Device Request authentication w/ Client PIN oob-channel 1 PIN oob-channel 2 Remainder of authentication handshake © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

How to translate the OOB channel: ECDH Approach Elliptic Curve Diffie Hellman (ECDH) AliceBob pick SK A PK A = SK A ×G pick SK B PK B = SK B ×G PK A PK B S = S A = PK B × SK A S = S B = PK A × SK B Adversary cannot calculate S BUT Man-in-the-Middle (MITM) attack is possible © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 20 publicly agree on elliptic curve G

How to translate the OOB channel: ECDH Approach Elliptic Curve Diffie Hellman (ECDH): MITM AliceBob pick SK A PK A = SK A ×G pick SK B PK B = SK B ×G PK A PK M S 1 = S A = PK M × SK A S 2 = S B = PK M × SK B Alice an Bob are not aware of MITM’s presence © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 21 MITM PK M PK B S 1 = PK A × SK M S 2 = PK B × SK M

How to translate the OOB channel: authenticated ECDH Approach Authenticated Elliptic Curve Diffie Hellman (ECDH) by Ho AliceBob publicly agree on elliptic curve G, exchange PW OOB pick SK A PK A =SK A ×G PK‘ A =PK A -Q( PW ) pick SK B PK B =SK B ×G PK‘ A, nonce A,id A,id B PK B, nonce B, id A, id B, H B S=S A =PK B ×SK A verify H B H A =cmac(S,parm) verify H A PK A =PK‘ A +Q( PW ) S=S B =PK A ×SK B H B =cmac(S,parm) HAHA MK = cmac(S, nonce A | nonce B ) © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 22 Assume previously (OOB) exchanged PIN PW Distort Alice‘s PK with PW Use keyed hashes of IDs and parameters to authenticate handshake Derive master key MK from S Assume previously (OOB) exchanged PIN PW Distort Alice‘s PK with PW Use keyed hashes of IDs and parameters to authenticate handshake Derive master key MK from S

How to translate the OOB channel: authenticated ECDH Approach Authenticated Elliptic Curve Diffie Hellman (ECDH) by Ho AliceBob pick SK A PK A =SK A ×G PK‘ A =PK A -Q(PW) pick SK B PK B =SK B ×G PK‘ A, nonce A,id A,id B PK B, nonce B, id A, id B, H B S=S A =PK B ×SK A verify H B H A =cmac(S,parm) verify H A PK A =PK‘ A +Q(PW) S=S B =PK A ×SK B H B =cmac(S,parm) HAHA MK = cmac(S, nonce A | nonce B ) © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 23 MK = cmac(S, nonce A | nonce B ) phone PK‘ A, nonce A,id A,id B PK B, nonce B, id A, id B, H B HAHA PW Parameters contain the requested OOB authentication mechanism This must be changed to preserve transparency Phone cannot recompute H A/B as it has no knowledge of S Parameters contain the requested OOB authentication mechanism This must be changed to preserve transparency Phone cannot recompute H A/B as it has no knowledge of S

How to translate the OOB channel: authenticated ECDH Approach Authenticated Elliptic Curve Diffie Hellman (ECDH) by Ho variant AliceBob pick SK A PK A =SK A ×G PK‘ A =PK A -Q(PW) pick SK B PK B =SK B ×G S=S A =PK B ×SK A verify H B H A =cmac(S,parm) verify H A PK A =PK‘ A +Q(PW) S=S B =PK A ×SK B H B =cmac(S,parm) PW +PK B PW +PK A © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 24 PK‘ A, nonce A,id A,id B PK B, nonce B, id A, id B, H B HAHA PK‘ A, nonce A,id A,id B PK B, nonce B, id A, id B, H B HAHA PW phone H A/B = f(S(PW)) = f(PW) Use PW directly to compute hashes Add public keys to hashes to detect MITM as early as possible H A/B = f(S(PW)) = f(PW) Use PW directly to compute hashes Add public keys to hashes to detect MITM as early as possible MK = cmac(S, nonce A | nonce B )

Motivation Basic Principles Approach Prototype Implementation Conclusion & Future Work Agenda © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Hardware Setup Prototype Implementation Device: Light Bulb Client: Light Switch Multimedia device: Smart phone (LG Nexus 4) +App: WS4D Mobile Authenticator © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow I Prototype Implementation Discovery Request authentication © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow II Prototype Implementation Metadata © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow II Prototype Implementation Request Authentication Metadata Response to request © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow II Prototype Implementation OOB Pin Exchange Request Authentication Metadata Response to request © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow III Prototype Implementation Request Authentication Response to request © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow III Prototype Implementation Request Authentication Response to request OOB Pin Exchange © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Flow IV Prototype Implementation Request authentication Response © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Summary Prototype Implementation devices are authenticated in directly + keying + parameter negotiation completely transparent to Device mostly transparent to Client + less effort for Client no delegated authentication, phone remains unauthenticated © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Motivation Basic Principles Approach Prototype Implementation Conclusion & Future Work Agenda © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Conclusion solution for bridging possible UI Gaps increases usability of authentication transparent to user and device developed high-level protocol / flow developed cryptographic protocol for indirect authentication open-source prototype by means of hardware + Android app © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

The Big Picture Future Work © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 37 Indirect Authentication part of project to create security framework for distributed embedded systems based on WS Security suite Integrate message level security Combine with delegated authentication to increase transparency and usability Current communication: DPWS, future: REST

Additional mechanisms Future Work © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Thank you very much for your attention! Any questions? Questions? Thank you! Sebastian Unger Institute for Applied Microelectronics and Computer Engineering, University of Rostock, Germany © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“

Bridging Larger Gaps Backup ? © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 40 Completely transparent for Device and Client

Why public keys in hash? Backup Authenticated Elliptic Curve Diffie Hellman (ECDH) by Ho variant AliceBob © 2009 UNIVERSITÄT ROSTOCK | S.Unger: „Bridging the UI Gap for Authentication in Smart Environments“ 41 phoneMITM PW PK A ‘ PK M […] S 1 =PK‘ M x SK B S 2 =PK B x SK M S 4 =PK M x SK A S 3 =PK‘ A x SK M Man-in-the-Middle (MITM) attack is not detected. It’s simply not possible for Alice and Bob (via MITM) to communicate b/c different sessions keys S i are calculated. Including public keys in hashes however makes it possible to detect MITM