Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Key Management for Secure Group Communications Celia Li.
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Reliability on Web Services Presented by Pat Chan 17/10/2005.
8.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Group Key Distribution Chih-Hao Huang
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Multimedia Broadcast/Multicast Service (MBMS)
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
VLAN Trunking Protocol (VTP)
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Bootstrap and Autoconfiguration Chapter 23. Introduction Each computer attached to a TCP/IP internet needs to know: –its IP address –the address of a.
Secure Group Communication: Key Management by Robert Chirwa.
Authentication Applications Unit 6. Kerberos In Greek and Roman mythology, is a multi-headed (usually three-headed) dog, or "hellhound” with a serpent's.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Scalable and Reliable Key Distribution 1/ Ryuzou NISHI † † Institute of Systems & Information Technologies (ISIT)
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Group Key Distribution Xiuzhen Cheng The George Washington University.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Exploration 3 Chapter 4. What is VTP? VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Introduction Wireless devices offering IP connectivity
Computer Communication & Networks
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
Video Multicast over the Internet (IEEE Network, March/April 1999)
Virtual LANs.
Design and Implementation of SUPnP Networks
Design and Implementation of a Secure UPnP Environment
Presentation transcript:

Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei

07/20/2007 Outline Introduction Related researches SUPnP system design Applications Discussions Conclusions and future works

07/20/2007 Introduction As home network technology has been developed rapidly, integrating modern technologies into people’s daily life becomes an inevitable trend. Universal Plug and Play (UPnP) is an outstanding standard for personal/home network environment. UPnP is designed to support easy-to-use, flexible, automatic- discovery and zero-configuration.

07/20/2007 Figure 1. A digital home of UPnP devices

07/20/2007 Motivation UPnP does not provide secure communication channels. To build a secure large-scale information system, the secure communication channels are required. To construct secure communication channels, we introduce key management mechanisms into the system.

07/20/2007 Secure Group Communications Why we need group key management?  Limit the access to authorized group members only  Forward/backward secrecy Three classifications of key management mechanisms  Centralized  Decentralized  Distributed

07/20/2007 Secure Group Communications (cont.) Secure communication channels over UPnP  Central control points  The ability to transform messages between unicast and multicast communication  Should not break the zero-configuration property of UPnP architecture

07/20/2007 Secure Group Communications (cont.) We suggest centralized key management protocols  Centralized controllers  The number of members varies dynamically  Simple to implement and also efficient  Make Logical Key Hierarchy (LKH) as an example

07/20/2007 Logical Key Hierarchy (LKH) {x}k, means x has been encrypted with k An example of LKH tree KEKs affected when a member joins the tree Rekey as member joins Modified keys  k  k’  k14  k’14  k34  k’34 Key distribution  {k’}k’14, k58  {k’14}k12, k’34  {k’34}k3, k4  {k3}S-KEY Broadcast once to update all KEKs Rekey as member leaves Modified keys  k  k’  k14  k’14  k34  k’34 Key distribution  {k’}k’14, k58  {k’14}k12, k’34  {k’34}k3 Broadcast once to update all KEKs

07/20/2007 Concepts of System Design The design of the UPnP network is a layered design. Based on the UPnP architecture, we attempt to build a secure layer on the top of UPnP network. The majority of the devices are built on the top of SUPnP layer and divided into client devices and server devices.

07/20/2007 Figure 2. The protocol architecture of the secure UPnP environment

07/20/2007 System Components Client devices  To interact with the environments and make requests to server devices Server devices  In charge of answering requests from clients Key manager  Run as a server device  To maintain the relationship of devices in the SUPnP network Forwarder  Also run as a server cooperating with the UPnP controller  The bridge between clients and servers

07/20/2007 System Architecture A centralized control point device Client devices Server devices

07/20/2007 The Node Registration Protocol Important design ideas  Simplicity  Security Member device knowledge  Device ID  Password (PWD)  SALT Key server knowledge  SALT  H(SALT, PWD)  User-type of each ID

07/20/2007 Secure Client Channels Only unicast communication is required. Auto-constructed with symmetric key S-KEY  Kept on both the client and the controller Messages are encrypted/decrypted using S-KEY.

07/20/2007 Secure Server Channels Support both unicast and multicast/broadcast communication The required secure group keys of new server device are delivered with the REG DONE message. Most kinds of secure group communication mechanisms work with SUPnP framework.  Although we suggest to use centralized key management mechanisms in the UPnP network. We adopt LKH in our proposed scheme.

07/20/2007 Secure Server Channels (cont.) To minimize the re-key overheads  One time multicast/broadcast The cost of LKH for a group containing N members  Key distribution center (KDC) maintains (2N-1) KEKs.  Each member only stores log(N) KEKs.  When a re-key happens Only log(N) KEKs are affected. Key updates are done in one shoot with a log(N) key size.

07/20/2007 Message Relaying The forwarder is bound with the UPnP controller. The forwarder must have the same knowledge to key manager.  Include all the S-KEYs and all the KEKs For a request message sent from a client device  Encrypted with the shared S-KEY between the client and the key manager  The forwarder can decrypt the request and broadcast the request securely using the group secret key.

07/20/2007 Message Relaying (cont.) On replying a request message  A server can encrypt the response by using either its S-KEY or the group key.  In either way, the forwarder is able to decrypt the response and re- encrypt the message using the S-KEY of the receiver.

07/20/2007 Applications Figure 3. The system architecture of an intelligent bulletin board system

07/20/2007 Figure 4. The system architecture layer and communication channels

07/20/2007 Figure 5. A screenshot of user interface on the panel device

07/20/2007 Discussions The choice of centralized group key management Fault-tolerant and scalability Co-existence of SUPnP and UPnP networks Extension of the SUPnP network

07/20/2007 Group Key Management The original UPnP network already has a (centralized) controller. The server devices in the SUPnP network join or leave dynamically. Distributed key management mechanisms  Require members to know each other  Require members to cooperate to compute the shared secret key  May be not suitable

07/20/2007 Group Key Management (cont.) Decentralized mechanisms  Dynamically changed memberships  Subgroup leaders may not work well. Centralized key management mechanisms  Easier to implement and maintain  Problems are the ability for fault-tolerant and the scalability.

07/20/2007 Fault-Tolerant and Scalability Setup multiple controllers and make them all on-line at the same time Load can be shared by dispatching or migrating members to different controllers.

07/20/2007 Co-Existence of SUPnP and UPnP The SUPnP is built on top of and UPnP basic device.  Devices should be able to send unencrypted messages to each other without SUPnP support. Encapsulate the SUPnP message with a dedicated protocol header  All the first six fields are in 16-bit length.  Values should be stored in big-endian.  The data are placed right after the sixth field.

07/20/2007 The SUPnP Message Header The “magic” field stores a constant number.  All the SUPnP data should begin with this magic number. The “flag” field indicates how to process this message.  Control message or data message, encrypted or not, sent by a client or by a server, unicast channel or broadcast channel The “keyid” field indicates the key used to encrypt.

07/20/2007 The SUPnP Message Header (cont.) The “nounce” field is to make encrypted message indistinguishable. The “length” field stores the total length including data. Determine a valid SUPnP message  Check constant magic number  Verify the checksum value XORed result of all the first six fields should be ZERO.

07/20/2007 Extension of SUPnP Network The UPnP architecture is originally proposed for personal/home environment. Because the SUPnP layer is built on the top of UPnP architecture, the SUPnP network is also bound inside a local area network.

07/20/2007 Extension of SUPnP Network (cont.) To extend the SUPnP network across the network boundaries  Construct a virtual private network (VPN) over the Internet  Devices need to have more network configurations beforehand. VLAN (Virtual local area network)  Each device does not need to be capable of VPN access abilities.  Formed with cooperated subnetworks  When VLANs are constructed at the network level, it’s unnecessary to touch all the devices.

07/20/2007 Conclusions The UPnP technique was developed to simplify the configuration of personal/home networks, but had no secure mechanisms to ensure the secrecy of the data transferred in the network. We successfully extend the UPnP technologies with key management mechanism and build an intelligent secure network. The proposed protocol is suitable for the construction of a flexible and easy-to-use secure information system.

07/20/2007 Future Works Our future works will be focused on further analyses on the proposed protocols, extending the scalability of the proposed architecture. To simplify the deployment of the SUPnP network, we also prepare to construct the SUPnP network over wireless environments.