Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Slide 1 Client / Server Paradigm. Slide 2 Outline: Client / Server Paradigm Client / Server Model of Interaction Server Design Issues C/ S Points of Interaction.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Using Digital Credentials On The World-Wide Web M. Winslett.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
A first Demonstrator for a CAHN infrastructure Bluetooth in CAHN.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
® The Bluetooth Architecture APIs, L2CAP, Link Management, Baseband, and the Radio.
Key Management in Cryptography
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Hacking the Bluetooth Pairing Authentication Process Graduate Operating System Mini Project Siyuan Jiang and Haipeng Cai.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Wireless and Security CSCI 5857: Encoding and Encryption.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
An Analysis of Bluetooth Security
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
© Synergetics Portfolio Security Aspecten.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Secure Active Network Prototypes Sandra Murphy TIS Labs at Network Associates March 16,1999.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Doc.: IEEE b Submission January 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Bluetooth on CE. Mid - Presentation Roman Zoltsman & Oren Haggai Group /2001 Instructor: Nir Borenshtein HSDSL Lab. Technion.
Lecture 24 Wireless Network Security
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Doc: IEEE xxx Submission March 2015 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Radius, LDAP, Radius used in Authenticating Users
“I don’t have to be careful, I’ve got a gun.”
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Preventing Privilege Escalation
Presentation transcript:

Distributed systems – Part 2  Bluetooth 4 Anila Mjeda

2 Bluetooth Profiles  In order to offer interoperability and to provide support for specific applications, the Bluetooth SIG has developed a set of Bluetooth profiles.  A profile defines an unambiguous description of the communication interface between two units for one particular service.

3 Bluetooth Profiles Fig 1: Bluetooth profiles  All other Bluetooth profiles make use of the Generic Access Profile

4 Generic Access Profile (GAP)  The Generic Access Profile defines the generic procedure related to the discovery of Bluetooth devices and the link management aspects of connecting to Bluetooth devices.  The GAP also defines the different basic security procedures of a Bluetooth device.

5 Need for Security in Bluetooth  Anyone with a Bluetooth device can potentially connect to your Bluetooth device, gaining access to data without your knowledge and permission  Security needs depend on the application being developed. Ultimately, the decision on how to implement security is up to the application developer. * Information on this slide comes from

6 Bluetooth Security Toolbox  The Bluetooth “security toolbox” is based on the three components: Authentication: used to verify the identity of a device Authorization: determines if a device is to be granted access to specific services offered by another device Encryption: protects data by encoding it prior to transmission

7 Pairing  Pairing -> procedure involving exchanging (link management) packets to establish a temporary key, called an initialization key (K init ), for use between two Bluetooth devices wishing to communicate for the first time The pairing procedure requires that an identical Personal Identification Number (PIN) be made available to both devices An application must ask the user for the PIN and deliver it to the Bluetooth stack * Information on this slide comes from

8 Authentication  During authentication a device determines whether or not it shares a common authentication key with another device. If two devices are new to one another, the pairing procedure is needed to create the initialization key K init This initialization key is then used to create a semi-permanent authentication key (K AB ) which is authenticated * Information on this slide comes from

9 Bonding  Bonding refers to the entire process of link- creating, pairing, creation of semi-permanent authentication key K AB, and authentication Once devices are bonded, pairing does not have to be done again and authentication can proceed (using K AB ) without the need for PIN entry If a device is requested to bond with another device that it already possesses an authentication key for, this key is erased. Pairing is then initiated, establishing another authentication K AB * Information on this slide comes from

10 Authorization  Authorization is needed before a device is given permission to access a particular service  Authorization requires that Requesting device is authenticated Service being requested is reported to device providing service Device determines whether or not to permit access to service * Information on this slide comes from

11 Trust  Trust is an attribute that links authorization permission to a particular device If a device is marked as Trusted, then the authorization process can completed successfully without user interaction Trust can be granted both temporarily and permanently Permanent Trust is usually granted during the initial authorization via A Man-Machine Interface (MMI)  A Man-Machine Interface (MMI) is often used to grant Trust * Information on this slide comes from

12 Encryption  Encryption relies upon a special encryption key (K c ) generated from the stored authentication key K AB  It is not possible to prevent the interception of data that is transmitted wirelessly * Information on this slide comes from

13 Security Modes  A Bluetooth connectable device can operate in three different security modes: Security mode 1: A Bluetooth unit in security mode 1 never initiates any security procedures; that is, it never demands authentication or encryption of the Bluetooth link. Security mode 2: When a Bluetooth unit is operating in security mode 2, it shall not initiate any security procedures, that is, demand authentication or encryption of the Bluetooth link, at link establishment. Instead, security is enforced at channel (L2CAP) or connection (e.g., Service Discovery Protocol, RFCOMM) establishment. Security mode 3: When a Bluetooth unit is in security mode 3, it shall initiate security procedures before the link setup is completed. * Information on this slide comes from

14 Security Mode 1  Security mode 1 is the “unsecured” mode in Bluetooth. A unit that offers its service to all connecting devices operates in security mode 1. This implies that the unit does not demand authentication or encryption at connection establishment.  For example, an access point that offers information services to anybody is a possible usage scenario for security mode 1.  Supporting authentication is mandatory and a unit in security mode 1 must respond to any authentication challenge. However, the unit will never send an authentication challenge itself and mutual authentication is never performed.  A unit in security mode 1 that does not support encryption will refuse any request for that. On the other hand, if encryption is supported, the unit should accept a request for switching encryption on. * Information on this slide comes from

15 Security Mode 2  Security mode 2 has been defined in order to provide better flexibility in the use of Bluetooth link-level security.  In security mode 2, no security procedures are initiated until a channel or connection request has been received. This means that it is up to the application or service to ask for security. Only when the application or service requires it will the authentication and/or encryption mechanisms be switched on.  A sophisticated authentication and encryption policy based on the baseband mechanisms can be implemented using this principle. Security mechanisms enforcement and policy handling must be taken care of by the unit. One possibility is to use a “security manager” to handle this.  Security mode 2 comes at the price of higher implementation complexity and the risk of faulty security policies that might compromise the security of the unit. * Information on this slide comes from

16 Security mode 3  In security mode 3, security procedures (authentication and/or encryption) are enforced at connection establishment.  Security mode 3 is a simple, always-on security policy.  The implementation is easy and that reduces the risks of any security implementation mistakes. The drawback is the lack of flexibility.  The unit will not be generally accessible. All connecting units need to be authenticated. * Information on this slide comes from

17 Important Note!  Note that in Security Mode 2 the device initiates security procedures after the channel is established (at the higher layers), while in Security Mode 3 the device initiates security procedures before the channel is established (at the lower layers). * Information on this slide comes from

18 Bibliography  Bluetooth tutorial: h/tutorial.asp h/tutorial.asp  Several tutorials on Bluetooth :