Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey

Slides:



Advertisements
Similar presentations
Communication Topics Jason Hill –
Advertisements

Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Project Byzantium Networking for the Zombie Apocalypse.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Internet Protocol Security (IPSec)
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
P2P Taxonomy and Security Concerns Ryan Lackey CTO, HavenCo, Ltd. RSA Conference 2002 San Jose
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 System Models. 2 Outline Introduction Architectural models Fundamental models Guideline.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
1 Secure Ad-Hoc Network Eunjin Jung
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Colin J. MacDougall.  Class of Systems and Applications  “Employ distributed resources to perform a critical function in a decentralized manner”  Distributed.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Certain security vulnerabilities exist in every mode of wireless communications.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
WEP Protocol Weaknesses and Vulnerabilities
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
Ad Hoc Network.
Security Vulnerabilities in A Virtual Environment
Wireless and Mobile Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
2/18/2016Fatimah AlAkeel - Network 11 Introduction to Networks.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Presented by Edith Ngai MPhil Term 3 Presentation
Communication Topics Jason Hill –
Chapter 2 Introduction Application Requirements VS. Transport Services
Introduction to Network Security
Introduction to Networks
Presentation transcript:

Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey

Ryan Lackey Who? Interest in “cypherpunk” technologies from 1992 to present, particularly anonymized communications, agents, and electronic cash Ultimate goal: anonymous secure infrastructure from end to end: clients, servers, networks, pro Founded HavenCo/ran metacolo: offshore colo in 9 markets, related projects, including secure mobile systems

Ryan Lackey Introduction Lots of work has been done to network fixed equipment, and to secure fixed network connections, but most mobile apps are just slightly modified versions of fixed applications Most mobile networked systems have simplified security models; some link security but little application specific security end to end Fundamentally new kinds of applications are possible with secure mobile systems

Ryan Lackey Fundamental Constraints Power and bandwidth limited Many nodes in continual motion and appear/disappear rapidly Much infrastructure is closed and long cycles to upgrade and deploy UI complicated by devices and use cases (user attention not dedicated)

Ryan Lackey Platform HP/Compaq iPaq running Linux Laptops running Linux and FreeBSD b and 1xRTT IP-based communications Open systems for easy development, python for rapid development

Ryan Lackey Applications of Interest “Matchmaking” – letting parties meet with similar interests meet up Secure messaging (communications and message-based low-overhead protocols, including payment systems) Secure streams (VoIP, VPN)

Ryan Lackey “Matchmaking” Demo app is letting people define a set of interests, then announce to the world, without risk of being “interrogated” by third parties Useful for service discovery too – announce that you’re running certain services to others in the set, but not to the public (RIAA, MPAA, Government, etc) Attestations, with optional protection from traffic analysis as well

Ryan Lackey Secure short messages Text messaging Much easier technically than streams Store/forward possibility Also useful for many protocols, either in two way or polled mode

Ryan Lackey Streams Voice over IP is key market – encrypted cellphone using low-bandwidth channel (1xRTT or HSCSD GSM) and anonymization of calls

Ryan Lackey Interaction models True peer to peer “Security proxy” or user selected/operated operational server Centralized client-server operated by application developers Centralized client-server operated by communications providers

Ryan Lackey Existing p2p systems Generally designed for high bandwidth media sharing with minimal anonymity layered over existing IP networks Not really designed for interactive communication

Ryan Lackey Existing mobile client-server systems Designed with link encryption to the wireless hub, or to the server Closed development environment controlled by mobile companies Hard for users and application developers to really trust the security model

Ryan Lackey Early mobile p2p systems “lovegety” – a system to use RF to share information about membership in certain groups Subject to “trawling”, direction finding attacks, and “corraling” small numbers of users to identify

Ryan Lackey Security Implications Confidentiality, Integrity, Authentication solvable through traditional systems Traffic analysis is the hard problem Complete undetectability of special traffic Of course, reliability, availability, etc. are still major concerns, and special mobile constraints

Ryan Lackey Policy Implications Centralized systems vulnerable to technical or legal attack Who to trust – communications provider, applications provider? Trust is essential to enabling certain applications

Ryan Lackey Central Mediation Servers trusted by some party to take all communications and retransmit Defeats firewalls/proxies/NAT as well as provides protection from traffic analysis Persistence; can buffer communications for users with intermittent connectivity

Ryan Lackey True Peer to Peer Cryptographic Systems Computationally intensive on client Bandwidth intensive; may only be able to send single bits! Generally can put user into a “collusion set” but unless set is large, elimination can identify user

Ryan Lackey Covert channels for mobile use Masking using pre-recorded traffic Sniffing and simulating MITM “Design for MITM” – Dining Cryptographer’s Networks, etc.

Ryan Lackey Dining Cryptographer’s Network Due to David Chaum, described at Multiple parties can communicate without revealing to one another which is initiating the communications

Ryan Lackey Anonymizing r ers as model Store and forward messaging with latency added Complicated due to node unreliability Send out multiple messages; tradeoff of bandwidth waste vs. latency vs. reliability

Ryan Lackey Current solution Communications with a trusted server using fixed-rate messaging (tuned for bandwidth) Inter-server communications, allowing users to select “security proxy servers” to act on their behalf, optionally running servers themselves

Ryan Lackey Conclusions Mobile-specific (more properly, dynamic) security is a very hard problem Key is finding applications which fit currently available technology – message based, with secure service discovery

Ryan Lackey Future work Develop an application developer’s toolkit with service discovery on top of secure message-passing and streams systems “Killer apps” of VoIP and mobile payment – good stream based systems