Presentation is loading. Please wait.

Presentation is loading. Please wait.

25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Security and Privacy Concern.

Similar presentations


Presentation on theme: "25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Security and Privacy Concern."— Presentation transcript:

1 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei H.Mei@tue.nl Security and Privacy Concern in Remote Personal Device Management Framework

2 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 2 Outline Background of RPDM – Why RPDM is important Security threat – Attack tree model and threat analysis Examining current RDM systems – SNMP, VNC, MRDP, Web-based Design of RPDM framework – Based on SyncML DM Conclusion and future work

3 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 3 Background of RPDM Remote server can be within local network or at service provider’s site Self observes problem + Remote diagnosis + Remote Repair

4 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 4 Why RPDM is Important? Recent studies show that there are at least 4 times as many electronic machines in the world as there are people. – This gap is still increasing fast – New devices require maintenance, but personnel are expensive An online survey shows 57% users feel befuddled by their computer, mobile phone, home security system, etc.

5 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 5 Outline Background of RPDM – Why RPDM is important Security threat – Attack tree model and threat analysis Examining current RDM systems – SNMP, VNC, MRDP, Web-based Design of RPDM framework – Based on SyncML DM Conclusion and future work

6 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 6 Attack Tree Model We are going to prevent

7 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 7 Threat Analysis (one example) Security requirement Attack TechniquesConfidentia lity IntegrityAvailabilityNon- repudiation VR R.1 (Impersonation, dictionary attack) Fabricate the operator account YD R.2 (Modification) Modifying data in the diagnosis message YYB R.3 (Modification, repudiation) Misusing visualization tool YYC R.4 (Impersonation) IP spoofing YA R.5 (Repudiation) Deny the executed diagnosis by end user or operator YB Vulnerability Rating (VR): A Probable; B Highly Possible; C Possible; D Unlikely; E Impossible.

8 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 8 Outline Background of RPDM – Why RPDM is important Security threat – Attack tree model and threat analysis Examining current RDM systems – SNMP, VNC, MRDP, Web-based Design of RPDM framework – Based on SyncML DM Conclusion and future work

9 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 9 Evaluation Factors System load & Network load – criteria related to performance Expressive power – indicates the generalization of the technique Device IQ – defines how intelligent the target device is when it is being managed Security – the most important concern

10 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 10 Simple Network Management Protocol

11 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 11 Virtual Network Computing

12 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 12 Virtual Network Computing

13 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 13 Web Server The device runs a small web server application A service runs on the device to generate run- time HTML file The remote terminal manager access the device via the web browser and execute scripts on the device

14 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 14 Web Server (example)

15 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 15 SyncML DM (OMA) OMA DM Inside client Server DM protocol root VendorSyncML … X* …… client Data Synch protocol Add Get Replace Exec Logical tree for addressing purposes. In scope of DM standard! proprietary WAP client proprietary upgrade client Over the air

16 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 16 SyncML DM (OMA) OMA DM Server 4 Vendor/Ring_signals/Default_ring Client 4 7 MyOwnRing

17 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 17 Comparison of RDM Systems OMA DM Evaluation factor WeightSNMP v3 VNCWeb- based RDPSyncML DM System load20% +/---- Network load20% +-+/- Expressive power 25% -++/-++ Security25% +-++/-+ Device IQ10% +-+/--+ Equal weight score 20% each0.4-0.60-0.20.6 Weighted score 0.3-0.50.05-0.050.6 *We define “+”=1, “+/-”=0 and “-”=-1 to calculate the overall performance score

18 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 18 Outline Background of RPDM – Why RPDM is important Security threat – Attack tree model and threat analysis Examining current RDM systems – SNMP, VNC, MRDP, Web-based Design of RPDM framework – Based on SyncML DM Conclusion and future work

19 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 19 RPDM Overview Security Privacy Performance

20 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 20 Internal Architecture of RPDM Client

21 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 21 Connection Manager

22 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 22 Authentication Manager PKI based authentication MD5 digest authentication – Digest = H(B64(H(serverrname:password)):nonce) PKs database itself is a Mobj, and it can be managed as well if the access right is granted. E.g. a trusted management server can introduce a new management server by adding its public key or its hashed name string into the PKs database.

23 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 23 Access Control List Tree Each node (object) is identified by an URI Each node has a set of properties This tree can be extended by “add” message or a new installations on the device Leaf node can be either a value or a pointer to an executable command

24 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 24 View of Prototype

25 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 25 Conclusion SyncML DM based system offers good system performance and security protection Our C prototype is one of the first open implementations based on the SyncML DM specifications. But, the network load is a bit heavy – A “Get” SyncML message is 709 bytes v.s. 81 bytes in SNMP – However, it becomes better for a more realistic and complex management session

26 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 26 Future Work Complete implementation Think about management server? ?

27 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 27 Thanks for your attention!

28 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 28

29 25 July, 2014 Hailiang Mei, H.Mei@tue.nl TU/e Computer Science, System Architecture and Networking 29


Download ppt "25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Security and Privacy Concern."

Similar presentations


Ads by Google