Credential Verification in Mobile Ad-hoc Networks Team Challenger 2/21/2005.

Slides:



Advertisements
Similar presentations
Security Issues of Peer-to-Peer Systems February 14, 2001 OReilly Peer-to-Peer Conference Nelson Minar, CTO POPULAR POWER.
Advertisements

IAEA Training in Emergency Preparedness and Response Module L-051 General Concepts of Exercises to Test Preparedness Lecture.
Configuration Management
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
S oftware- H ardware I nformation F low T racking + M ulticore Colleen Lewis & Cynthia Sturton SHIFT+M.
OHT 8.1 Galin, SQA from theory to implementation © Pearson Education Limited Review objectives Formal design reviews (FDRs) Participants Preparations.
OHT 8.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Review objectives Formal design reviews (FDRs) Participants Preparations.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
A Secure Network Access Protocol (SNAP) A. F. Al Shahri, D. G. Smith and J. M. Irvine Proceedings of the Eighth IEEE International Symposium on Computers.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
On the Correctness of Model Transformations Gabor Karsai ISIS/Vanderbilt University.
Distributed Firewall Policy Validation by Kyle Wheeler.
Tester’s Role in Software Development and Acquisition Best Practice By Gabriel Rodriguez.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
M&E FOR ACCOUNTABILITY: THE CASE OF NIGERIA’S VPF Presentation by the Office of the Senior Special Assistant to the President on MDGs, Nigeria.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Handling information 14 Standard.
Overview of Security Research in Ad Hoc Networks Melanie Agnew John Folkerts Cory Virok.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
MGS Testing A High Level Overview of Testing in Microsoft Games Studio Joe Djorgee – Test Lead.
Integration of DataGrid Software for Testbed 1 Goal: combine the DataGrid middleware and the Globus core services. Phases: Preparation for Integration.
The Strategic Moment Big Pharma spends heavily on R&D Big Pharma projects global sales out: >>> 2010 $600 billion >>> 2020 $1,200 billion Big Pharma net.
Privacy Issues in Vehicular Ad Hoc Networks.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli.
From Quality Control to Quality Assurance…and Beyond Alan Page Microsoft.
Software Configuration Management Lessons Learned Patrick Bong Safety Systems Group Stanford Linear Accelerator Center.
Unit 2 (task 28) In this PowerPoint I will tell you about 7 important IT job roles and if a candidate might want one what he would have to do to get one.
MSBO Voluntary Certification Program School Technology Management Certification October 6, 2006.
What is FLIP and why do I want it so badly? The average adult travels 32 miles in a day 1 Adolescent: 8 (4.6 to school and back) 2 College Student: (1.
Ensures project work is divided evenly and everyone has the necessary resources to keep the project on track as well as making sure all members contribute.
OTEPAD SDS PRESENTATION
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
CSC 4700 Software Engineering
Stroke Survey Review September 2012 Findings Reminders Observations.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Computer Science and Engineering 1 Mobile Computing and Security.
Phase One – Project Initiation and Set Up Project Name Your Area Health Service.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Bringing DoD Technologies to Law Enforcement Applications James Sim Drakontas LLC NIJ Demonstration Project: Situational Awareness Tools.
+ Game Design Careers. + Game Development Developing an interesting video game is a very challenging task. It usually takes many different people working.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Progile Automated Verification Engineer • PAVE •
Microsoft Education Better outcomes, proven results, trusted technology Name, title.
Agency for Science and Higher Education
Signing transactions anonymously with Identity Mixer in Hyperledger
Demystifying the Independent Test Authority (ITA)
Demystifying the Independent Test Authority (ITA)
Demystifying the Independent Test Authority (ITA)
CS 465 Certificates Last Updated: Oct 14, 2017.
Certificates An increasingly popular form of authentication
Signing transactions anonymously with Identity Mixer in Hyperledger
Presentation transcript:

Credential Verification in Mobile Ad-hoc Networks Team Challenger 2/21/2005

Overview Description Description Design Design Improvements Improvements System Analysis System Analysis Lessons Learned Lessons Learned

Description No Central Authority, so use your friends! No Central Authority, so use your friends! Use a friend to verify your credentials. Use a friend to verify your credentials. Friend gives you an assertion. Friend gives you an assertion. Use this assertion to prove that what you say is true. Use this assertion to prove that what you say is true. As long as there is a friend in common, you can perform transactions with nodes that are not your friends! As long as there is a friend in common, you can perform transactions with nodes that are not your friends!

Design Trust Object (Trust Tester) Trust Object (Trust Tester) Key Ring Key Ring Black List Black List Trust Simulator (Trust Sim) Trust Simulator (Trust Sim) Spawns Trust Object Threads Spawns Trust Object Threads Observes threads and dumps data to a “dot” file for viewing with GraphViz software. Observes threads and dumps data to a “dot” file for viewing with GraphViz software.

Improvements Certificate timestamps Certificate timestamps Policies can be established for certificate validation Policies can be established for certificate validation Blacklisting Blacklisting Revoking trust from malicious nodes Revoking trust from malicious nodes Junior trust timeouts Junior trust timeouts Truly temporary trust Truly temporary trust

System Analysis Temporary Trust Temporary Trust No blacklisting No blacklisting Full blacklisting Full blacklisting Partial blacklisting Partial blacklisting

Temporary Trust/No Blacklisting sammy 80 arnold helen sammy 80 arnold helen arnold 90 sammy brian charlie arnold 90 sammy brian charlie brian 50 arnold brian 50 arnold charlie 20 arnold helen charlie 20 arnold helen helen 30 sammy charlie helen 30 sammy charlie

Full Blacklisting Eventually everyone that doesn’t have 100% goodness get blacklisted

Partial Blacklisting Will take longer for a node that has a high goodness to be blacklisted

Lessons Learned Realistic goals very important Realistic goals very important Making deadlines and sticking to them Making deadlines and sticking to them Bug tracking system, a good development environment, and CVS are all essential tools for programmers Bug tracking system, a good development environment, and CVS are all essential tools for programmers Good communication between team members is necessary for higher productivity Good communication between team members is necessary for higher productivity Credential verification in ad-hoc networks Credential verification in ad-hoc networks