György Kálmán, Josef Noll Mobile and Wireless Communications Summit,2007. 16th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.

Slides:



Advertisements
Similar presentations
Not Mobile Media But All My Media Is Now Mobile. Everything I can my PC, I can play everywhere, instantly The PC becomes a personal broadcasting.
Advertisements

IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
NFC Devices: Security and Privacy
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Aloaha protects Mobile M2M Communication with secureSIM.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
FIT3105 Smart card based authentication and identity management Lecture 4.
Reference: [1] TeamSpace paper
Wireless Application Protocol and i-Mode By Sridevi Madduri Swetha Kucherlapati Sharrmila Jeyachandran.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
DAKNET Presented By: rreema.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Mobile Databases: a Selection of Open Issues and Research Directions Authors: Rachid Guerraoui et al. Sources: SIGMOD Record, 33(2), pp.78-83, 2004 Adviser:
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
An Efficient Identity-based Cryptosystem for
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
1 Improving Response Time in Traffic Police Infraction Registration System H. Arasteh Rad, K. B. Samsudin, A. R. Ramli, A. Mohamad Bagher Tehrani, M. A.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
A Study of Wireless Virtual Network Computing Kiran Erra.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Hybrid Cellular-Ad hoc Data Network Shuai Zhang, Ziwen Zhang, Jikai Yin.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Figures for Telektronikk – Services – Noll
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Presented by: Sanketh Beerabbi University of Central Florida.
D. Buchs, A. Chen, D. Hurzeler, L. Lúcio, L. Pedro, M. Risoldi Software Modeling and Verification group Applications Discovered = Appear Save or Discard.
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
(Josef Noll) -> MasterThesis Masteroppgaver 2006 Josef Noll, Prof. stip. Univ. Graduate Center.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Josef Noll Payment and Access 1 Payment and Access through the Mobile Phone Josef Noll 1,2, Erzsébet Somogyi 3, Gyorgy Kalman 1, Ola Høiby 1 1.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
1 MSCS 237 Introduction to Distributed Systems. 2 Outline Distributed computing (DC) Distributed Systems (DS) Motivation Architecture of a DS Advantages.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy, Yang-Fang Li, Pei-Jia Yang,
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Wifi Based Menu Ordering By Samiksha Patil Shalini Yethendran Anitta Eaphen.
An AV Control Method Using Natural Language Understanding Author : M. Matsuda, T. Nonaka, and T. Hase Date : Speaker : Sian-Lin Hong IEEE Transactions.
A SEMINAR ON ROVER TECHNOLOGY
A Study of Wireless Virtual Network Computing
WELCOME TO SEMINAR.
Presentation transcript:

György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home Content

Outline Introduction & Motivation Devices in the home network Rights management Authentication and Encryption Service Architecture Prototyping key exchange Evaluation Conclusion 2

Introduction & Motivation Tradition user and provider roles are not separated any more. The end user is creating his content and sharing it over the network. Social life over the net is becoming more important, enforcing the need to share information with different user groups. User can decide to grant access or not remotely and nearly instantly. 3

Devices in the home network The phone is becoming a permanent part of the user’s personal area. And it is a always online device. The architecture consists of a home server, a mobile device and various media players. These technologies free content creators from the problems associated with content adaptation. 4

Rights management The use of group authentication can help to overcome the problems associated with content adaptation and personal content sharing. In this scenario, a device has only to prove, that it is part of a group, which can be done by simple hash calculations. It can not be assumed, that all devices have cryptographic hardware and tamper resistant hardware. This can be solved by adding a smartcard into the system. 5

Authentication and Encryption Compatibility issues and additional battery powered devices for certain hardware will make the smartcard solution difficult. Use the mobile phone’s SIM to calculate and the phone hardware to distribute keys for devices. Correct selection of the identifier to be used in a transaction. 6

Service Architecture If a new device is added to the domain, a request is shown on the display of the phone and requires response from the user. If the intruder wants to generate a new key, then they have to connect to the network. 7

Home network with Access Control and out of band key distribution 8

License redistribution with NFC enabled phone 9

Prototyping key exchange Two ways of distributing keys, through (1) the mobile network or (2) the NFC interface. The guest’s mobile phone can use NFC to achieve access to a property. 10

Admittance Service with NFC 11

Evaluation NFC readers are not usual in the home environment. Mobile providers usually do not allow access to the SIM in order to ensure correct functionality of the network. Since an encryption key can be quite short, well under one kilobyte, even current SIM capacities seem to be enough, but also, high capacity SIMs are already on the horizon. 12

Conclusion This solution supports both an I-centric and a community centric approach. Key generation and distribution are the main functions of the phone, supported by the capability to interconnect devices in the home network. 13