University of Bern A novel and flexible Architecture for CAHN Marc Danzeisen.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Application Server Based on SoftSwitch
Secure Mobile IP Communication
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Packet Based Multimedia Communication Systems H.323 & Voice Over IP Outline 1. H.323 Components 2. H.323 Zone 3. Protocols specified by H Terminal.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
A first Demonstrator for a CAHN infrastructure Bluetooth in CAHN.
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Protocols and the TCP/IP Suite
Computer Network Architecture and Programming
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
LECTURE 2 CT1303 LAN. STANDARD MODELS: OSI Model : Open system Interconnection. is a conceptual model that characterizes and standardizes the internal.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Communication Network Protocols ----Krishna Priyanka Chebrolu.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
PPP (Point to Point Protocol)
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Chapter 9.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Doc.: IEEE /751r0 Submission July 2004 Max Riegel, SiemensSlide 1 Selling network access Views from a business perspective Max Riegel Siemens.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Module 9: Fundamentals of Securing Network Communication.
Chapter 4 Application Level Security in Cellular Networks.
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS 通訊工程所 蔡名岳
Evolution towards the Next Generation Network
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Rehab AlFallaj.  OSI Model : Open system Interconnection.  is a conceptual model that characterizes and standardizes the internal functions of a communication.
MOBILITY Beyond Third Generation Cellular Feb
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Copyright © Genetic Computer School 2008 Computer Systems Architecture SA Lesson 12 The TCP/IP Protocol Suite.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Network Programming Chapter 1 Networking Concepts and Protocols.
OSI ARCHITECTURE IN OSI, ACTUAL INFORMATION IS OVERHEADED BY PROTOCOL LAYERS IF ALL SEVEN LAYERS ARE OVERHEADED, THEN AS LITTLE AS 15% OF THE TRANSMITTED.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
for SDN-based flow handover in wireless environments Daniel Corujo Carlos Guimarães Rui L. Aguiar
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-02 Ning Zong Yunfei Zhang Victor Pascual Carl Williams.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
1 Example security systems n Kerberos n Secure shell.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Integration of and Third-Generation Wireless Data Networks
TECHNOLOGY GUIDE THREE
Lecturer, Department of Computer Application
CT1303 LAN Rehab AlFallaj.
DEPARTMENT OF COMPUTER SCIENCE
IPSec VPN Chapter 13 of Malik.
Chapter 3: Open Systems Interconnection (OSI) Model
PREPARED BY: RIDDHI PATEL (09CE085)
OSI Model OSI MODEL.
AAA: A Survey and a Policy- Based Architecture and Framework
Computer Networking A Top-Down Approach Featuring the Internet
Presentation transcript:

University of Bern A novel and flexible Architecture for CAHN Marc Danzeisen

University of Bern 2 Marc Danzeisen Outline  CAHN with CANs only –The Building Blocs, features and responsibilities  CAHN with CANs and N-CANs –Distribution of the Building Blocs  CAHN Communication –Between Nodes –With CAHN Service Provider  Open Issues / Ongoing work

University of Bern 3 Marc Danzeisen CAHN with CANs only

University of Bern 4 Marc Danzeisen USSDSMS Building Blocs of CAHN Cellular CAHN Communication Module (CCM) Het. VPNFile Transfer GUI Key Management CAHN Communication Module (CCM) Het. VPNFile Transfer Key Management GUI WLANBLT Cellular Aware Node (CAN) USSDSMS CellularWLANBLT Physical Communication Devices CCM: CAHN Protocol Identity Management MSISDN MAC / IP Addr. CAHN Service Mgnt CAHN Adapters: Translation of CAHN PDUs (Messages) to the lower layers CAHN Services: Heterogeneous VPN Secure File Transfer, etc. Key Management: For CAHN Protocol For CAHN Services CAHN Connectors: Configuration of Physical Devices Secure Links CAHN GUI: For User Interaction with CAHN Services Inter Module Communication: Local or Remote

University of Bern 5 Marc Danzeisen CAHN Communication (I) WLANBLTCellular USSDSMS CAHN Communication Module (CCM) Het. VPNFile Transfer GUI Key Management WLANBLTCellular USSDSMS CAHN Communication Module (CCM) Het. VPNFile Transfer GUI Key Management 1) Start GUI of File Transfer Service, Invite Peer 3) Translation of the CAHN Request to fit the signaling channel (SMS / USSD / BLT / WLAN, etc.) 2) Create CAHN Request (Service, MSISDN (Own / Peer), Capabilities, Devices, etc.) 4) Pop-up of the File Transfer Service, GUI, accept of request 5) Negotiation of Config and Security Settings 6) Secured Link establishment

University of Bern 6 Marc Danzeisen CAHN Communication (II) WLAN BLTCellular USSDSMS CAHN Communication Module (CCM) Het. VPN File Transfer GUI Key Management 1) Connects to the File Transfer Service, Invite Peer 5) Calculation of Config and Security Settings 7) Secured Link establishment WLAN BLTCellular USSDSMS CAHN Communication Module (CCM) Het. VPN File Transfer GUI Key Management Cellular USSDSMS CAHN Communication Module (CCM) Het. VPN File Transfer Service Management Key Management User / Session DB Billing CAHN Service Provider 2) Create CAHN Service Request 4) Pop-up of the File Transfer Service, GUI, accept of request 6) Config & Key distribution 3) Invite Peer

University of Bern 7 Marc Danzeisen CAHN with CANs and N-CANs

University of Bern 8 Marc Danzeisen Distribution of the Building Blocs (CAN / N-CAN / CAHN Server) WLAN Cellular USSDSMS BLT CAHN Communication Module (CCM) GUI Het. VPNFile TransferKey Management Main requirement: CAHN should work, also if the N-CANs are not always on BLT GUI N-CANCAN CAHN Communication Module (CCM) Het. VPNFile TransferKey Management ? Protocols?

University of Bern 9 Marc Danzeisen Open Issues / Ongoing Work  Inter-module Communication (Protocol, Local / Remote)  CAHN Protocol Definition  CAHN Services: –Service Definition for Service Detection / Registration –Information to be exchanged –VPN / File Transfer: Heterogeneous Network design –Service monitoring

University of Bern 10 Marc Danzeisen Open Issues / Ongoing Work (II)  CAHN Security –Loosely coupled security –CAHN as a pure application on top of the cellular system –No direct interaction within the key generation (CAHN Key Management) –CAHN uses the secured communication channels of the cellular system (implicit authentication) –Tightly coupled security –Reuse of SIM Security for CAHN Key Generation (CAHN Messages and Data Channels) To consider: –Operator is always man-in-the-middle (like CA) –Cellular Systems are not designed to handle inter-node security (SA only between SIM and AuC)

University of Bern 11 Marc Danzeisen Questions? Thank you!