UNIT I PART II R.S.Ponmagal. Pervasive Architecture Architecture is an abstraction of the system. Architecture defines the system elements and how they.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Lecture 6 User Authentication (cont)
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
High Performance Computing Course Notes Grid Computing.
Security Challenges of Biometric Systems
Access Control Methodologies
ELECTRONIC PRESCRIPTIONS Basia Korel Kendra Wadsworth.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Chapter 1 – Introduction
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
02/12/00 E-Business Architecture
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
SECURITY IN MOBILE NETWORKS BY BHONGIRI ANAND RAJ VENKAT PAVAN RAVILISETTY NAGA MOHAN MADINENI.
Biometrics II CUBS, University at Buffalo
Biometric Authentication: Security Issues M. Fahim Zibran February 23, 2009.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Securing Pervasive Networks Using Biometrics
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Marjie Rodrigues
Security-Authentication
Karthiknathan Srinivasan Sanchit Aggarwal
Chapter 10: Authentication Guide to Computer Network Security.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
BUSINESS B1 Information Security.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
ARTIFICIAL INTELLIGENCE FOR SPEECH RECOGNITION. Introduction What is Speech Recognition?  also known as automatic speech recognition or computer speech.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Access control techniques
Challenge/Response Authentication
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Cryptography and Network Security
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
SharePoint Online Authentication Patterns
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

UNIT I PART II R.S.Ponmagal

Pervasive Architecture Architecture is an abstraction of the system. Architecture defines the system elements and how they interact. Architecture suppresses the local information about the elements. Defines the properties of the components Provided services, required services, performance characteristics, fault handling, resource usage

Pervasive Architecture Software components for pervasive computing Device heterogeneity Access control

Software Components The pervasive computing environment forces us to face the need for components and their boundaries more clearly. Pervasive services will have to be composed from individual “components” residing in the large number of heterogeneous computing elements. The hardware environment itself will force a natural boundary between components. This may be the most clear-cut definition of a component.

A component will be an independently deployable piece of software that resides on one hardware element and provides a service element. Of course, there may be more than one component on each hardware element. Example – WEB SERVICES

Moore's law: Capacity of microchips doubles in 18 months => capacity grows an order of magnitude (10x) in 5 years

Security What data do I wish to expose? To whom? Who can presently access my data? How can I retract data exposed? Who am I communicating with? How do can the privacy of my communication and communication patterns? Who do I trust as a source of information? How do I convince others that I am trustworthy? How to make systems simultaneously secure and usable?

1. Establish strong identity Goal: Cryptographically strong identity to devices (endpoints) Means: Host Identity Protocol (HIP) – Identify each communicating device with a cryptographic public key – Insert the key into the TCP/IP stack 2. Assign and manage trust and authority Goal: Decentralised means for managing authorisation Means: SPKI and KeyNote2 certificates Express delegation with signed statements Eventually integrate to the operating system 3. Enable build-up of trust and reputation based on experiences Goal: Creation of trustworthy behaviour Means: Micro economic mechanism design Design the rules for the game Make unsocial behaviour uneconomical

Device Heterogeneity The basic premise of pervasive computing—everything connected—guarantees heterogeneity at all levels: infrastructure, hardware, software, and people. All kinds of devices must be supported. Perhaps in some specific application scenarios it is possible to restrict the kinds of devices that are supported but, in general, the environment must anticipate the existence of a wide variety of devices. If we consider devices used by the user to interact with the system, they can range from standard ones such as laptops, PDAs, and phones, to emerging ones such as those embedded in clothing and eyeglasses.

The variety of available devices has several implications. One is the kind of input-output devices: textual and graphic input-output will not be the only forms of human-machine interaction. Audio, visual, and other sensory modes of communication will be prevalent. Another implication is the requirement that the environment must be prepared to adapt to the device currently used by the user. For example, if the user is requesting information and he is currently driving, the retrieved data should be relayed to him with an audio message through the car radio.

Access Control The wide availability of services and the high mobility of users among different environments require the provision of security mechanisms to ensure the safe usage of services by legitimate users and the protection of services from unauthorized uses. Because of the wide range of services, many diverse and flexible security models and mechanisms will be needed. Either standard security mechanisms will have to be embedded in the environment and used by all applications or each application will have to build its own security mechanisms. Most likely, a combination of the two will be needed.

One of the most important aspects of security is access control, to ensure that services are only available to authorized users and those authorized users are allowed appropriate privileges. For example, a guest at a hotel may be allowed to print on the hotel’s printer available in the lobby but not change the contents of the event display in the same lobby. Single-sign on policy

Securing Pervasive Networks Using Biometrics

Challenges in pervasive computing environments Computing devices are numerous and ubiquitous Traditional authentication including login schemes do not work well with so many devices Proposed Solution Use biometrics for authentication At the same time, ensure security of biometric templates in an open environment Contributions Propose a biometrics based framework for securing pervasive environment Implemented a novel scheme for securing biometric data in an open environment using symmetric hash functions

Aspects of a Pervasive Environment User Interaction User interacts with speech, gestures and movements The sensors and computing devices are ‘aware’ of the user and in the ideal case are also aware of his ‘intent’. Proactivity The computing devices should interact and query other devices on Transparency Technology has to be transparent. behalf of the user and his intent Device interaction Frequent Multiparty interactions No central authority or third party

Security and Privacy Consequences of a pervasive network Devices are numerous, ubiquitous and shared The network shares the context and preferences of the user Smart spaces are aware of the location and intent of the user Security Concerns Only authorized individuals need to be given access Authentication should be minimally intrusive Devices should be trustworthy Privacy issues User should be aware of when he is being observed The user context should be protected within the network Need to balance accessibility and security Should be scalable with multiple users operating in the network

Solution: Biometrics? Definition Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits. Examples Physical Biometrics Fingerprint Hand Geometry Iris patterns Behavioral Biometrics Handwriting Signature Speech Gait Chemical/Biological Biometrics Perspiration Skin composition(spectroscopy)

Why Biometrics? Advantages of biometrics Uniqueness No need to remember passwords or carry tokens Biometrics cannot be lost, stolen or forgotten More secure than a long password Solves repudiation problem Not susceptible to traditional dictionary attacks

General Biometric System Database Biometric Sensor Feature Extraction Biometric Sensor Feature Extraction Matching ID : 8809 Authentication Enrollment Result

Framework for Authentication/Interaction Speaker Recognition Speech Recognition parsing and arbitration S1 S2 SK SN

Framework for Authentication/Interaction Speaker Recognition Speech Recognition parsing and arbitration Switch on Channel 9 S1 S2 SK SN

Framework for Authentication/Interaction Speaker Recognition Speech Recognition parsing and arbitration Who is speaking? Annie David Cathy S1 S2 SK SN “Authentication”

Framework for Authentication/Interaction Speaker Recognition Speech Recognition parsing and arbitration What is he saying? On,Off,TV Fridge,Door S1 S2 SK SN “Understanding”

Framework for Authentication/Interaction Speaker Recognition Speech Recognition parsing and arbitration What is he talking about? Channel->TV Dim->Lamp On->TV,Lamp S1 S2 SK SN “Switch”,”to”,”channel”,”nine” “Inferring and execution”

Speaker Recognition Speech Production Mechanism Speech production Model Impulse Train Generator Glottal Pulse Model G(z) Vocal Tract Model V(z) Radiation Model R(z) Impulse Train Generator Pitch AvAv ANAN Vocal Tract Modeling

Framework is Generic Face Recognition Gesture Recognition parsing and arbitration S1 S2 SK SN “Authentication”“Understanding”“Inferring and execution”

Security of Biometric Data Issues in biometrics Biometrics is secure but not secret Permanently associated with user Used across multiple applications Can be covertly captured Types of circumvention Denial of service attacks(1) Fake biometrics attack(2) Replay and Spoof attacks(3,5) Trojan horse attacks(4,6,7) Back end attacks(8) Collusion Coercion Fake Biometrics Threats to a Biometric System

Types of circumvention Denial of service attacks(1) Fake biometrics attack(2) Replay and Spoof attacks(3,5) Trojan horse attacks(4,6,7) Back end attacks(8) Collusion Coercion

Hashing Instead of storing the original password P, a hashed values P’=H(P) is stored instead. The user is authenticated if H(password) = P’. It is computationally hard to recover P given H(P) H() – one way hashing function Problem with biometrics Biometric data has high uncertainty Matching is inexact/probabilistic Therefore, hashing function should be error tolerant

Biometric Hashing Hashing Schema Hashing Personalized Hashing

Fingerprints Minutiae: Local anomalies in the ridge flow Pattern of minutiae are unique to each individual

Conclusion Smart spaces and pervasive computing are moving from concepts to implementations Security has to be incorporated in the design stage Traditional authentication and access control paradigms cannot scale to numerous and ubiquitous devices Biometrics serves as a reliable alternative for minimally intrusive authentication Biometrics solves key management and repudiation problem Securing biometrics is a major challenge in an open environment Biometric hashing can be used to create revocable biometric templates