SlideShare une entreprise Scribd logo
1  sur  47
A Comprehensive Approach to Secure Group Communication in Wireless Networks David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - Secure Device Pairing Secure Group Communication Initial key exchange Secure communication Our goal
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless technologies -   - Complexity (transmission rate, network topology, protocol stack…)  Distance range Security needs
Bluetooth technology ,[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Bluetooth security ,[object Object],[object Object],[object Object],[object Object],[object Object],-   - ,[object Object],[object Object],123456 ? OOB channel
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Device Pairing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Public key cryptography ,[object Object],[object Object],[object Object],-   - Alice Message Bob Communication channel Encrypted message Encryption Bob’s public key Encrypted message Encrypted message Decryption Bob’s private key Message
Diffie-Hellman Key Exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - a, g, p A = g a  mod p K =  B a  mod p Alice b B = g a  mod p K= A b  mod p Bob g, p, A B
Digital signatures -   - Alice Message Hash  function Alice’s private key Digital Signature Algorithm – sign operation Digital Signature Digitally signed message (message + digital signature) Hash  function Digital signature Digital Signature Algorithm – verify operation Bob Digitally signed message Digital signature verified / signature verification failed Alice’s public key
Public key schemes ,[object Object],-   -
Human-Assisted solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Seeing is Believing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - visual channel Public key B A
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Group Communication -   - ,[object Object],[object Object],[object Object],[object Object]
Resurrecting Duckling -   - ,[object Object],[object Object],[object Object],[object Object],Imprintable device Master device Trusted channel Key exchange Imprinted device Master device ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Attacker? Master device Imprinted device Imprintable device Master device Trusted channel Key exchange Message
Identity Based Encryption ,[object Object],[object Object],[object Object],[object Object],-   - PKG Bob Alice Authentication Private key Message encrypted with Bob’s public key
Entity recognition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Conclusion WIRELESS SECURITY -   - User-managed Technological needs Transparent to the user SSP Ad hoc Certification-authority-dependent DH ECC Digital signature Public Key ? TtS SiB L&C HAPADEP Human-Assisted Resurrecting Duckling policy  Entity Recognition IBE Secure Group Communication
-   -
Annex 1: other wireless technologies studied David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN: Wireless Local Area Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
ZigBee ,[object Object],[object Object],[object Object],[object Object],-   - Applications and Profiles Application  Support  (ASP) Layer  IEEE  802.15.4  Medium Access Control (MAC) Layer IEEE  802.15.4  Physical (PHY) Layer Network Layer Defined by IEEE 802.15.4 Defined by ZigBee specification Defined by application developer
Wireless USB ,[object Object],[object Object],[object Object],-   -
Near Field Communication (NFC) ,[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Annex 2: other human-assisted device pairing solutions David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Talking to Strangers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - infrared channel (invisible) Attacker
[object Object],[object Object],[object Object],Loud and Clear  ,[object Object],[object Object],[object Object],[object Object],-   - Public key exchange Public key exchange Public key exchange Public key exchange
Annex 3: other discarded slides David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - Applications and Profiles L2CAP (Logical Link Control and Adaptation ) HCI (Host Controller Interface) Link Manager Protocol (LMP) Baseband [Link controller (LC)] Bluetooth Radio SDP (Service Discovery) Radio Frequency Communication (RFCOMM) OBEX PPP TCP Host stack Controller stack TCS BIN UDP IP
Bluetooth network topology -   - P2 P1 P3 M1 S1 S1 S1/S2 M2 S2 M3/S2 S3
Bluetooth security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Man-in-the-Middle Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Elliptic Curve Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Key agreement in peer-to-peer wireless networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Proposed device pairing solutions -   -
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Group authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Identity Based Encryption (II) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Annex 4: selected references David González Romero Chicago, August  2009
Selected references ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -

Contenu connexe

Tendances

A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
Mohit Goel
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
Antony Law
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
iaemedu
 

Tendances (20)

Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
seminar
seminarseminar
seminar
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
G43053847
G43053847G43053847
G43053847
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 

En vedette

HospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujicaHospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujica
Jennifer Mujica
 
Reglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOLReglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOL
Adib Manssur
 
Культура Японії
Культура ЯпоніїКультура Японії
Культура Японії
M S
 

En vedette (20)

"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem..."La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
 
tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015 tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015
 
Neumotorax
NeumotoraxNeumotorax
Neumotorax
 
HospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujicaHospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujica
 
Wanderkarte Pillerseetal
Wanderkarte PillerseetalWanderkarte Pillerseetal
Wanderkarte Pillerseetal
 
10. unidad 1
10.  unidad 110.  unidad 1
10. unidad 1
 
About The BSH Group, LLC
About The BSH Group, LLCAbout The BSH Group, LLC
About The BSH Group, LLC
 
Biogeomon 2009 72
Biogeomon 2009 72Biogeomon 2009 72
Biogeomon 2009 72
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
Understanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing AgeUnderstanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing Age
 
Abrazo Salvador
Abrazo SalvadorAbrazo Salvador
Abrazo Salvador
 
Reglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOLReglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOL
 
tango 2013 escuela
tango 2013 escuelatango 2013 escuela
tango 2013 escuela
 
Catalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 EspañolCatalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 Español
 
Культура Японії
Культура ЯпоніїКультура Японії
Культура Японії
 
Curriculum EspañolAP
Curriculum EspañolAPCurriculum EspañolAP
Curriculum EspañolAP
 
REVISTA INSTITUCIONAL
REVISTA INSTITUCIONALREVISTA INSTITUCIONAL
REVISTA INSTITUCIONAL
 
Boletín 2013 ii ucv
Boletín 2013 ii ucvBoletín 2013 ii ucv
Boletín 2013 ii ucv
 
El Arte de Comer Sano
El Arte de Comer SanoEl Arte de Comer Sano
El Arte de Comer Sano
 
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusNavaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
 

Similaire à A Comprehensive Approach to Secure Group Communication in Wireless Networks

Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon Berlin
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
mashiur
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
IOSR Journals
 

Similaire à A Comprehensive Approach to Secure Group Communication in Wireless Networks (20)

IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Download
DownloadDownload
Download
 
Download
DownloadDownload
Download
 

Dernier

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Dernier (20)

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

A Comprehensive Approach to Secure Group Communication in Wireless Networks

  • 1. A Comprehensive Approach to Secure Group Communication in Wireless Networks David González Romero Chicago, August 2009
  • 2.
  • 3.
  • 4.
  • 5. Wireless technologies - - Complexity (transmission rate, network topology, protocol stack…) Distance range Security needs
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Digital signatures - - Alice Message Hash function Alice’s private key Digital Signature Algorithm – sign operation Digital Signature Digitally signed message (message + digital signature) Hash function Digital signature Digital Signature Algorithm – verify operation Bob Digitally signed message Digital signature verified / signature verification failed Alice’s public key
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Conclusion WIRELESS SECURITY - - User-managed Technological needs Transparent to the user SSP Ad hoc Certification-authority-dependent DH ECC Digital signature Public Key ? TtS SiB L&C HAPADEP Human-Assisted Resurrecting Duckling policy Entity Recognition IBE Secure Group Communication
  • 22. - -
  • 23. Annex 1: other wireless technologies studied David González Romero Chicago, August 2009
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Annex 2: other human-assisted device pairing solutions David González Romero Chicago, August 2009
  • 30.
  • 31.
  • 32.
  • 33. Annex 3: other discarded slides David González Romero Chicago, August 2009
  • 34.
  • 35.
  • 36. Bluetooth network topology - - P2 P1 P3 M1 S1 S1 S1/S2 M2 S2 M3/S2 S3
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Proposed device pairing solutions - -
  • 43.
  • 44.
  • 45.
  • 46. Annex 4: selected references David González Romero Chicago, August 2009
  • 47.