Team Daniel Scarlett Miles O’Keefe Cody Clark Samuel Pesek Network/authentication model for Flex Radio’s SDR over WAN.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
8.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
WSU A Symphony in Four Movements. A Century of Controlled Flight.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Tiago Rodrigues Antao. RIPE 45, May 2003, Barcelona. 1 Improved Secure Communication System for RIPE NCC Members Tiago Rodrigues Antao.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Telecommunication and Networks
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Public Key Infrastructure Ammar Hasayen ….
Page Copyright Giritech A/S an – Excitor company.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
SODA Archiving October 2013
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
D-Link Confidential Sales guide for 3G wireless router DWR-131.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Module 9: Fundamentals of Securing Network Communication.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
NetModule Cloud Solution Professional M2M Networking out of the Cloud © 2014 NetModule AG Slide 1.
NetModule Cloud Solution Professional M2M Networking out of the Cloud NetModule Cloud Router 1.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Network Access for Remote Networks
CLOUDENTIFY.
Key management issues in PGP
Contents Software components All users in one location:
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Remote Access Lecture 2.
Providing Teleworker Services
Welcome To : Group 1 VC Presentation
2018 Real Cisco Dumps IT-Dumps
Network Authentication - Flex Radio SDR
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Providing Teleworker Services
Providing Teleworker Services
Providing Teleworker Services
Presentation transcript:

Team Daniel Scarlett Miles O’Keefe Cody Clark Samuel Pesek Network/authentication model for Flex Radio’s SDR over WAN

Project Goals ●Develop a network/authentication model for accessing Flex Radio’s SDR over WAN via a linux based computer ●Identify various possible solutions for networking and security ●Analyze the resources, time, costs, and risks needed to obtain a working model of the solutions ●Prototype a working model of one of the solutions

System block diagram Existing Our Project

Network Solution Options Resources Time Cost RiskComment VPN / DDNS Service Provider of DDNS (3rd party or, VPN Client software & VPN compatible router) Minimal client-side setup Quick development & deployment Low/no cost to consumer Maintenance cost for operation via Flex Radio (0$ < DDNS < $500/yr) Low/medium depending on authentication method used Authentication based on username/password Most recommended method depending on authentication used as well Port Forwarding/ Static IP Dedicated router setup for use for client Minimal client-side setupOne time large fee for client to own IP address Low/medium depending on authentication scheme Not recommended because of non mobile use & fee for customer Web GUI Dedicated server for FlexRadio Medium to large setup to deploy Medium/high running the server Low/Medium - depending on server running & maintenance Not recommended because of the server and development cost Dedicated VPN Server Linux Platform Radio Side/Third Party Server (Cloud) Low/medium developmentMedium/high running the server Medium - using a 3rd party server Not recommended because of the 3rd party server

Security Solution Options ResourcesTimeCostRiskComments User/PW + One-Time-Pw Google Authenticator or Authy like software OTP Electronic Hardware Low/medium developer hours Low client-side setup Low implementation cost Low if no one gets a hold of the seed Recommended because everything needed is simple to implement Public Key Infrastructure (PKI) Use an existing PKI encryption scheme independent of a Certificate Authority (CA) Low developer hours Low client-side setup Low implementation cost Low if no one gets a hold of the private key Most recommended because of the use of advanced cryptography methods Web GUI SSL/TPL Protocols X.509 Certificates Low/medium developer hours Low client-side setup Medium/high maintenance cost of running server Medium if trusted 3rd party web server Not recommended because of difficult authentication approval Codec Codecs like.aac,.H.264/.mpeg Large - developing a complex compression - decompression algorithm Dependent on extensive development time High - may have unknown flaws Not recommended because time and risk high

Timeline 17/Sep/1408/Oct/1412/Nov/1405/Dec/1415/Jan/1511/Feb/1411/Mar/1415/Apr/14 Project Structuring & Conceptual Design Design Phase 1 Resource problem & potential methods to solve Design Phase 2 Develop several solutions for problem Present Potential Solutions Prototype a Solution Implement a Solution Test a Solution Deliver Finished Product Fall 2014 SemesterSpring 2015 Semester

Thank You!