MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.

Slides:



Advertisements
Similar presentations
Overview of Web Services
Advertisements

Mobile Agents Mouse House Creative Technologies Mike OBrien.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Secure Lync mobile Authentication
Secure SharePoint mobile connectivity
Secure Communication Architectures.
Public Key Infrastructure Ben Sangster February 23, 2006.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
SaaS Software Container By Brian Moore Paul Kopacz.
Web services security I
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Digital Object Architecture
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium July, 2006, Patras, Greece Security in Wireless Networks:
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
MagicNET: Security System for Protection of Mobile Agents.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Oracle Data Integrator Architecture Components.
Web Services Presented By : Noam Ben Haim. Agenda Introduction What is a web service Basic Architecture Extended Architecture WS Stacks.
Lecture 24 Wireless Network Security
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
MagicNET: XACML Authorization Policies for Mobile Agents Mr. Awais Shibli.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
Presented by Edith Ngai MPhil Term 3 Presentation
Cryptography: an overview
OGF PGI – EDGI Security Use Case and Requirements
SECURING NETWORK TRAFFIC WITH IPSEC
Module 8: Securing Network Traffic by Using IPSec and Certificates
Public Key Infrastructure (PKI)
Security in ebXML Messaging
NAAS 2.0 Features and Enhancements
Multi-party Authentication in Web Services
X-Road as a Platform to Exchange MyData
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli

Presentation Overview 1. Background 2. Mobile Agents 3. System Components 4. Roles in the Proposed System 5. Components of the System 6. Operations of the System 7. Conclusion

Mobile Agents Mobile agents are self-contained software modules with additional credentials and accumulated data. They roam a network, moving autonomously from one server to another, perform their designated tasks, and finally, eventually, return to their control station.

Background Wider Adoption of Mobile Agents Security Solutions –Platform –Agent

Still Problem !!!! Secure Adoption –Experimental envirnoment –Close Envirnoment

System Components MagicNET stands for Mobile Agents Intelligent Community Network, has developed at secLab at DSV Department at KTH. MagicNET provide complete infrastructural and functional component for secure mobile agent research and development. It provide support to build secure & trusted mobile agents, provide agents repository (agents’ store), Mobile Agents Servers (for their runtime execution), Mobile Agent Control Station, Infrastructural servers.

Roles in the Proposed System Mobile Agent Author Mobile Agent Registrar Mobile Agent Manager (User)

Components of the System Services Registration Station MagicNET Management Servers UDDI Server Agents Factory

UDDI Server The UDDI (Universal Description, Discovery and Integration) Server provides the standard role of UDDI, as specified by OASIS. UDDI Server --implemented using open source project JUDDI Integrated into the WSO2 WSAS secure application server, so that Mobile Agent Registrar (publisher) can use HTTPS SSL/TLS for authentication.

Apache Rampart Apache Rampart: Apache Rampart is the security module of Apache Axix2. It implements various Web services security specifications. Rampart eliminates security related threats at the message level. It provides protection against message alteration, confidentiality, man-in-the- middle attack, spoofing, DOS and reply attack.

Operations of the System Entities Authentication(FIPS-196) Agent Service Registration Agents Adoption

Agent Service Registration Mobile agent Registrar authentication with agent factory Fetches List of agents WSD from Agent Authors (current implementation) Publish with UDDI Server

Agents Adoption Mobile agent Manager authentication with Agent Factory (optional, using SA) Published agents & Select Agent WSD obtained, auto generate client, connect to the web Server and reteive the agent. Message level security(X509 Rampart default scenario 2)

Conclusion and Future Directions Agent Automatically publish services (Security issues.) Discovery by other agents and adoption dynamically.

Questions ???

Strong Authentication Step 1: SR send hello message to Agent Factory along with its certificate (Digital and Non Repudiation Certificate). Step 2: Agent Factory will calculate challenge ChAF concatenate with originator and receiver ID and send to SR. Step 3: SR then calculates challenge ChSR concatenate with ChAF, then create hash of it and sign it and finally send to Agent Factory. Agent Factory also concatenate two challenges received calculates hash and then compare with the hash received from SR. If both hashes are same Agent Factory, concatenate both challenges then calculate hash and sign it, attach its certificate (digital and non- repudiation) and send to SR. SR then send keyEnchipherment certificate to Agent Factory and then Agent Factory send its keyEnchipherment certificate to SA.