KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Brute Force Attack Against Wi-Fi Protected Setup
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
“Turn you Smart phone into Business phone “
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Wireless Networking 102.
1 Computer Maintenance Mobile Devices: How they Operate Copyright © Texas Education Agency, All rights reserved.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless and Security CSCI 5857: Encoding and Encryption.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
1/28/2010 Network Plus Wireless Protocols Wireless Printer Setup WPS Used to automatically configure printers for Wireless operation Requires WPS compatibility.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
An Analysis of Bluetooth Security
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Chapter 4 Application Level Security in Cellular Networks.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Lecture 24 Wireless Network Security
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
An Analysis of Bluetooth Security Team A: Padmaja Sriraman Padmapriya Gudipati Sreenivasulu Lekkala.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Doc: IEEE xxx Submission March 2015 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CSCE 201 Identification and Authentication Fall 2015.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Windows Vista Configuration MCTS : Advanced Networking.
A SEMINAR ON ROVER TECHNOLOGY
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Presented by: Jeffrey D. Bombell, American Computer Technologies
Three types of wireless technology
Wireless Universal Serial Bus
PREPARED BY: RIDDHI PATEL (09CE085)
Wireless networking Rytis Garbauskas.
Presentation transcript:

KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area Network (SWPAN)”, IEEE Transactions on Vehicular Technology, vol. 55, no3, MAY Seung Jae Shin

2/15 In-Vehicle Secure WPAN Contents Introduction Bluetooth Security In-Vehicular Secure WPAN (SWPAN) Performance and Cost Efficiency Conclusion

3/15 In-Vehicle Secure WPAN Introduction In-Vehicle WPAN WPAN (Wireless Personal Area Network) within a vehicle Mostly uses Bluetooth enabled devices cell-phone, PDA, laptop, headset, RKE (Remote Keyless Entry) Can be used in conjunction with wired In-vehicular network Uses AP (Access Point) connecting to CAN (Control Area Network) Figure 1 In-Vehicle WPAN with CAN

4/15 In-Vehicle Secure WPAN Introduction In-Vehicle WPAN (cont’d) Possible usage examples Access the Internet through the laptop within the vehicle Listen to music through the wireless headset in driving Turn on head-lights just by speaking through the voice activated headset Start the engine from the office by using RKE during the winter season

5/15 In-Vehicle Secure WPAN Bluetooth Security Security Mechanisms in Bluetooth Authentication Challenge-and-response process using 128-bit link (authentication) key Performs E1 algorithm to compute response value Link key is changed after each authentication Data Privacy Performs E0 algorithm using encryption key derived from link key 48-bit BD_ADDR 128-bit RAND E1 K link (BD_ADDR || RAND) Secure Communication Session Link Key (128 bit) Link Key Encryption Key (8 ~ 128bit) Figure 2 Authentication process supplicant authenticator

6/15 In-Vehicle Secure WPAN Bluetooth Security Security Mechanisms in Bluetooth (cont’d) Link key Generation Type of link key Initialization key (K init ): used during initialization only Unit key (K A ): derived from the information of a single unit A Combination key (K AB ): derived from the information in both units A and B Master key (K master ): only used during current session for broadcast K A, K AB and K master are derived from K init PIN plays a vital role in initialization key generation Figure 3 Generation of initialization key by Units A and B

7/15 In-Vehicle Secure WPAN Bluetooth Security Security Mechanisms in Bluetooth (cont’d) Problems with Bluetooth Security Importance of Initialization key If it is compromised, keys generated from it are also compromised Generation of Initialization key depends on RAND A, BD_ADDR B, PIN RAND A and BD_ADDR B is transmitted publicly So secrecy of PIN is required Problems with PIN management In most case, PIN is configured manually Possibility of the brute force key derivation: 4-digit PIN is generally used The PINs are “0000” as default value in 50% of the devices Considerable Solutions Long-size PIN: difficult and cumbersome to manually configure the device Certificate based PIN exchange: high cost Diffie-Hellman exchange: threat of man-in-the-middle attack

8/15 In-Vehicle Secure WPAN In-Vehicle Secure WPAN (SWPAN) NDM based Architecture NDM (Network Device Monitor) Bluetooth enabled AP attached to CAN Responsible for keeping track of Bluetooth devices within WPAN All communication is occurred via NDM Generates and transfers link key for each device By using user-triggered device registration Operated by user in same manner as car navigator system I/O devices installed (key pad, monitor, USB port, etc.) Password protected Figure 4 In-Vehicle SWPAN using NDM

9/15 In-Vehicle Secure WPAN In-Vehicle Secure WPAN (SWPAN) NDM based Architecture (cont’d) Registration and Key Transfer process User registers the device to NDM By entering some device information such as UID, serial number NDM generates a set of link keys (unit key or combination key) Link keys are generated automatically and randomly Key generation is transparent for user NDM transfers link keys to device through the local port USB port, IR (Infrared) link, VSRW (Very Short Range Wireless) link Almost handheld devices have at least one of above types Figure 5 Key Transfer through local port

10/15 In-Vehicle Secure WPAN In-Vehicle Secure WPAN (SWPAN) NDM based Architecture (cont’d) Establishing a secure session Figure 6 Secure Session Establishment Process

11/15 In-Vehicle Secure WPAN In-Vehicle Secure WPAN (SWPAN) NDM based Architecture (cont’d) Link key management Distribution of new link keys NDM uses secure channel established by last link key of previous set Registration by user required only once if he want to use it within a car continuously Device de-registration User can remove registered device in NDM User may do not want to use some device no more Device may be stolen or lost NDM delete key sets for the device from its memory

12/15 In-Vehicle Secure WPAN In-Vehicle Secure WPAN (SWPAN) NDM based Architecture (cont’d) Link key management (cont’d) Example NDM establishes and completes session with D1, D2, D3 respectively Then, it establishes another session with D1 again Figure 6 Changes of the memory contents during sequence of sessions

13/15 In-Vehicle Secure WPAN Performance and Cost Efficiency Performance and Cost Efficiency of SWPAN Rough Analysis of In-Vehicle SWPAN Easy to program devices using the NDM Key-transfer interface can be implemented at a marginal cost Easy to program a small device Scalable architecture 128-bit n link keys of N devices: 16nN bytes of memory is required (O(N)) Typical link establishment time is around 0.6s in Bluetooth network Secure against brute-force attack Link key is changed after each session establishment No threat caused in on-line key distribution Link key is transferred through local port such as usb, IR, VSRW link, etc. Inconvinience for device registration is not considerable Just once when user wants to use the device within a car first time

14/15 In-Vehicle Secure WPAN Conclusion Architecture for Secure WPAN within a vehicle Naïve and intuitive approach Based on practical usage of Bluetooth alliances NDM based Architecture Production cost could be reasonable Just consider the car navigation system! User-triggered registration process More secure compared with on-line link key distribution Can be designed to user-friendly form Required only once when user want to use new devices within a car

15/15 In-Vehicle Secure WPAN Q & A Any Questions? Comments?