© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 MobiHealth Security Requirements and Proposal MobiHealth Security Requirements and Proposal Madrid 2002/11/12-13.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Telefónica Móviles España WP3 meeting G Communication Infrastructure.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 BAN Security Services MobiHealth Plenary Session Santorini 2003/05/26-27.
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
A Survey of WAP Security Architecture Neil Daswani
Lecture 22 Internet Security Protocols and Standards
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Internet Protocol Security (IPSec)
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Secure Sockets Layer 1 / 99  SSL is perhaps the widest used security protocol on the Internet today.  Together with DC enables secure communication.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Secure connections.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Secure Socket Layer (SSL)
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
1 TCP/IP Applications. 2 NNTP: Network News Transport Protocol NNTP is a TCP/IP protocol based upon text strings sent bidirectionally over 7 bit ASCII.
WSB / MobiHealth Hugo Geuverink MobiHealth WP3 meeting 12/13 November 2002, Madrid.
© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 WP2 UPF Contribution to MobiHealth Security in the MobiHealth BAN Enschede 2002/09/18-20.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
1/15 Chapter 5 Open Systems Interconnection Model.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Remote Access Lecture 2.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Unit 8 Network Security.
IS 4506 Configuring the FTP Service
Presentation transcript:

© Ramon Martí, DMAG, Universitat Pompeu Fabra 1 MobiHealth Security Requirements and Proposal MobiHealth Security Requirements and Proposal Madrid 2002/11/12-13

© Ramon Martí, DMAG, Universitat Pompeu Fabra Page 2 Security Issues GPRS/UMTS and Bluetooth [Zigbee]  Data Link Layer Hop-to-hop security  Data encryption and terminal authentication, with no user or application authentication  Link layer security independent from the node address  Security suitable for MobiHealth communications

© Ramon Martí, DMAG, Universitat Pompeu Fabra Page 3 Security Issues IPsec  Network Layer node-to-node security  node-to-node data encryption and node authentication, with no user or application authentication  The node-to-node protection can be host-to-host, end-to-end or end-to-host protection  Comm. security based on client and server node addresses  Not suitable for comm. security from MBU with dynamic IP  MBU WSB, MBU SH, etc  Suitable for comm. security between hosts with static IP  GPRS/UMTS Op. WSB, WSB SH and GPRS/UMTS Op SH, SH WS, etc.

© Ramon Martí, DMAG, Universitat Pompeu Fabra Page 4 Security Issues SSL and HTTPS  Transport Layer end-to-end application-to-application security  End-to-end data encryption and user authentication  Suitable for transport-level security from the MBU  Suitable for transport-level security between hosts with static IP S-HTTP  Extension to HTTP: HTTP superset  Application Layer application-to-application and application_user-to-application_user security  Cryptography to Application layer messages  Allows various messages encapsulation ways  Not particular key certification scheme. Support for RSA

© Ramon Martí, DMAG, Universitat Pompeu Fabra Page 5 Security Issues OpenSSL  Application Layer application-to-application and application_user-to-application_user security  Application data encryption or/and user authentication

© Ramon Martí, DMAG, Universitat Pompeu Fabra Page 6 Functionality of the WSB Central Authentication and Authorization Broker Management facilities:  Statistics  Services  Billing Data compression Proxy functionality WAP 2.0 Standard End to End security (HTTPS) Wireless TCP Push functionality

© Ramon Martí, DMAG, Universitat Pompeu Fabra Page 7 Security Proposal