SECURE DEVICE ASSOCIATION: TRENDS AND ISSUES Presenter Gicheol Wang Yasir Arfat Malkani, Dan Chalmers, and Ian Wakeman.

Slides:



Advertisements
Similar presentations
Usable Bootstrapping of Secure Ad Hoc Communication Ersin Uzun PARC 1.
Advertisements

Daniel Bichler Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on
Lecture 6 User Authentication (cont)
1 Security in Wireless Protocols Bluetooth, , ZigBee.
NFC Devices: Security and Privacy
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Information Security of Embedded Systems : remote access, wireless networks Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
SOUPS July 24, 2008 Universal Device Pairing using an Auxiliary Device Nitesh Saxena, Md. Borhan Uddin and Jonathan Voris Polytechnic Institute of New.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Seeing-Is-Believing: Using Camera Phones for Human- Verifiable Authentication Jonathan M. McCune Adrian Perrig Michael K. Reiter Carnegie Mellon University.
Seeing-Is-Believing: using camera phones for human-verifiable authentication Jonathan M. McCune, Adrian Perrig and Michael K. Reiter Int. J. Security and.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Physical Contact in Ad-Hoc Wireless Network Nie Pin
Bridging the UI Gap for Authentication in Smart Environments Sebastian Unger Prof. Dirk Timmermann University of Rostock, Germany MuSAMA DFG Graduate Program.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
Lecture 12.1: User-Enabled Device Authentication - I CS 436/636/736 Spring 2012 Nitesh Saxena.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
1 Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup Cynthia KuoCarnegie Mellon University.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
July 24, 2008 SOUPS 2008 Universal Device Pairing using an Auxiliary Device Nitesh Saxena, Md. Borhan Uddin and Jonathan Voris Polytechnic Institute of.
Integrity-regions: Authentication Through Presence in Wireless Networks Srdjan Čapkun 1 and Mario Čagalj 2 1 Department of Computer Science, ETH Zurich.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Center for Cyber-Security and Privacy1 Loud And Clear Security Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Lecture 24 Wireless Network Security
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
NETWORKING & SYSTEM UPDATES
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
IEEE Wireless LAN Standard
1/18 Talking to Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz 외 2 명 in Xerox Palo Alto Research Center Presentation: Lee Youn-ho.
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
Lecture 36.
Lecture 36.
Presentation transcript:

SECURE DEVICE ASSOCIATION: TRENDS AND ISSUES Presenter Gicheol Wang Yasir Arfat Malkani, Dan Chalmers, and Ian Wakeman

presented by gcwang Outline  Introduction  Problem  Challenges  Background  Summary and Future Directions for Research

presented by gcwang Introduction – Mobile Ad Hoc Environments  More and more devices every day  Varying size and capabilities  Varying connection methods (e.g. Cable, Bluetooth, etc)  Varying user interface (rich, moderate and poor)  Spontaneous method of interaction  Increasing Mobility in devices  Use of wireless technology in some form  e.g ,Bluetooth, Infrared, Zigbee, Wibree, etc  Frequent associations and disassociations  e.g. pairing of Bluetooth enable headset with mobile phone or MP3 player, pairing IR remote with laptop, etc

presented by gcwang Problem Intended Communication ___________ Actual Communication Man-in-the-middle attacker A B E Solution Establishing secure channel between the pairing devices Eavesdropping Disclosure of sensitive information to 3 rd Party Manipulation Illegitimate analysis and modification of data Can cause Denial-of-Service (DoS) E can gain control over the device B

presented by gcwang Challenges  No prior context  Devices lack prior knowledge of each other due to ad hoc nature  No pre-shared secret key  Traditional key exchange/agreement approaches (e.g. Diffie- Hellman) are not secure against MiTM attack  Variations in device capabilities  Communication channels  User-interfaces  Power and computational resources  Sensing technology, etc

presented by gcwang Attack Types in Device Association Model  Eavesdropping and MiTM attack  Discussed in previous slides  Denial-of-Service (DoS) attack  Prevent communication between wirelessly connected nodes  Prevents pairing partners to establish a secure channel  Bidding-Down attack  It is possible, where a list of choices to establish a secure channel is available  The goal is to fool (bid-down) the devices to use weaker security than is possible  Compromised Devices  Difficult to prevent at the protocol level  Could suggest pairing with only the adversary’s device  Could run a weak pairing protocol

presented by gcwang Background  Resurrecting Duckling Security Model  Talking to Strangers  Visual Out-of-Band Channels  Audio Out-of-Band Channels  Accelerometer-Based Approaches  Radio-Signals Based Approaches  Biometrics-Based Approaches  Button Enabled Device Association (BEDA)  Industry and Standardization Bodies

presented by gcwang Resurrecting Duckling Security Model  Exchange encryption key in plain-text form using a physical medium, such as cable  No cryptography required  Cables are cumbersome  Not all the devices have similar physical interface

presented by gcwang Actual Communication Intended Communication Talking to Strangers  Extended Resurrecting Duckling security model  Two-phase authentication  Use infrared as an out-of-band (OOB) channel  Susceptible to eavesdropping  e.g. Two remotes and one projector  Rene Mayrhofer et al.  Use laser [4, (2007)] and Ultrasound [5, (2007)]  Requires interface and/or additional hardware, such as laser/ultrasound transceiver

presented by gcwang Visual Out-of-Band Channels  Seeing-is-Believing (SiB) by McCune et al.  Use camera phones and bar codes to create visual OOB channel  Secure Device Pairing Based on Visual Channel by Saxena et al.  Proposed an improvement to SiB through the use of LED and short authenticated integrity checksums  Not all devices are equipped with camera  Might not be enough light at some places to scan bar codes properly  Not all devices have big enough displays to show 2D bar codes  In some situations, camera equipped devices cannot be placed sufficiently near  Camera-equipped devices are not allowed in security- sensitive areas

presented by gcwang Audio Out-of-Band Channels  Loud and Clear (L&C)  Use audio as OOB channel for human-assisted authentication  Derive auditorially-robust, syntactically correct, but nonsensical (MadLib) sentence from hash of a public key  Compare the vocalized sentences  Human-Assisted Pure Audio Device Pairing (HAPADEP)  Pairing two devices that have no common standard wireless channel at the time of pairing  Use audio to exchange both cryptographic material and protocol messages  Not applicable to pairing scenarios where one of the devices does not have a display and/or a speaker (or microphone in case of HAPADEP)  Not suitable for hearing-impaired users  Not feasible in noisy environments  Places burden on user to compare the two Madlib sentences or Melodies

presented by gcwang Accelerometer-Based Approaches  Smart-its-Friend by Holmquist et al.  Use common readings from the embedded accelerometers in the devices  Security has not been the major concern  Are You With ME by Lester et al.  Use accelerometers’ data to show that a set of devices is being carried by the same person  Shake-Well-Before-Use by Mayrhofer et al.  Combine cryptographic primitives with accelerometer data analysis for secure device-to-device authentication  Require accelerometer in each device  Large variety of devices can not be shaken together

presented by gcwang Radio-Signals Based Approaches  Radio-Based approaches require no or minimal hardware and/or user involvement  Shake-Them-Up by Castelluccia et al.  Movement-based technique for pairing two resource-constrained devices, such as sensors.  Use the source indistinguishability property of radio signals  Susceptible to attack by an eavesdropper that exploits the differences in the base-band frequencies of the two radio sources  Amigo by Varshavsky et al.  Utilize commonality of radio signals from locally available wireless access points  Extended Diffie-Hellman key exchange protocol with the addition of a key verification stage  Not applicable in the scenarios where radio-date is not available  Hard to identify the intended device when many other devices surround it

presented by gcwang Biometrics-Based Approaches  Biometrics are a common technique for identifying human beings  Feeling-is-Believing (FiB) by Buhan et al.  Investigated grip pattern  Proposed to generate a shared secret key from biometric data using quantization and cryptanalysis  Secure Ad-hoc Pairing with Biometrics (SAfE) by Buhan et al.  Keys are extracted from images during the pre-authentication phase  Both of the techniques are based on Balfanz et al. model  Logic and calculations to accurately recognize the biometric- patterns are a heavy burden on its applications  Issue regarding the accuracy of recognition techniques still need more research and improvement  Require biometrics reader in both of the devices

presented by gcwang Button Enabled Device Association (BEDA)  Transfer the short secret key from one device to the other using ‘button-presses’  Then, the short secret key is used to authenticate the public keys of the devices  There are four variants of BEDA  Button-to-Button (B-to-B)  Involves the user simultaneously pressing buttons on both of the devices within certain random time-intervals  Each of these intervals are used to derive 3-bits of the short secret key  Display-to-Button (D-to-B)  Emits visual signals by showing a blinking square on its screen.  The user reacts to blinking square events by pressing the button on the other device.  Short-Vibration-to-Button (SV-to-B)  Transmits signals through short vibration events instead of blinking square  Long-Vibration-to-Button (LV-to-B)  Signals are emitted through either the start or the end of a long vibration

presented by gcwang Industry and Standardization Bodies Bluetooth Pairing

presented by gcwang Industry and Standardization Bodies  Near Field Communication (NFC) Technology  Short-range, high-frequency, low-bandwidth wireless connectivity standard  Use magnetic field induction  Operates on MHz freq. with data transfer rate of up to 424 kbps with a bandwidth of 14 KHz  Supports two modes of communication: active-mode and passive-mode  Applications: pairing two devices, smart posters, contactless-credit-cards, etc  Wireless USB Association (WUSB)  WUSB group was formed in 2004 to define the WUSB specifications  It is a short-range (up to 10 m), high-bandwidth wireless communication technology  Replace wired USB  Wi-Fi Protected Setup (WPS)  Wi-Fi Alliance officially launched Wi-Fi Protected Setup (WPS) in early 2007  Secure establishment and configuration of wireless home networks  Windows Connect now-Net  Goal is to provide a way to set up secure wireless networks  Works for both in-band wireless devices and out-of-band Ethernet devices

presented by gcwang Some Other Approaches  LoKey by Nicholson et al.,  Uses SMS messages to authenticate key exchanged over the internet  Drawbacks: Delay and substantial monetary cost  Manual Authentication for Wireless Devices by Gehrmann et al.  Enable handheld devices to authenticate their public keys by some kind of user interaction  User manually exchanges short message authentication codes between the devices  A Generic Framework for Secure Device Association by Malkani et al.  Device first register their capabilities with the directory service  Then, client queries the directory service to discover and acquire the required information to initiate the pairing process

presented by gcwang Co-location Server 1. Device Description 1. Device Description 1. Device Description 2. Client’s Query 3. Server Response Authentication Process Directory 1. Device Description 3. Server Response Resource (Target Device) Client Device Some Other Approaches

presented by gcwang Summary and Future Directions for Research  No single solution or standard for device pairing  Too many solutions  Entering pins (e.g. Bluetooth devices) and passwords (e.g. WEP/WPA)  Comparing two audible sequences  Exchanging cryptographic material through the use of pure audio  Verifying hashes of public keys  Moving around and/or shaking devices together  Comparing ‘Blinking’ pattern and ‘Beeping’ sequence  Using SMS messages  Button presses, etc

presented by gcwang Summary and Future Directions for Research  Pairing protocols vary in the:  Strength of their security  The level of required user intervention  Their susceptibility to environmental conditions  Required physical capabilities of the devices  Required proximity between the devices  Majority of the users are non-technical  Difficult to remember the different kinds of steps for establishing secure channel in varying situations and scenarios

presented by gcwang Summary and Future Directions for Research  We need to:  Investigate ways of integrating different pairing protocols within a general architecture for providing secure and usable pairing mechanisms for a large set of ad hoc scenarios  Integrate discovery mechanism into pairing schemes  Design and develop new tools that can be used to evaluate the existing as well as new pairing schemes