SlideShare uma empresa Scribd logo
1 de 47
A Comprehensive Approach to Secure Group Communication in Wireless Networks David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - Secure Device Pairing Secure Group Communication Initial key exchange Secure communication Our goal
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless technologies -   - Complexity (transmission rate, network topology, protocol stack…)  Distance range Security needs
Bluetooth technology ,[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Bluetooth security ,[object Object],[object Object],[object Object],[object Object],[object Object],-   - ,[object Object],[object Object],123456 ? OOB channel
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Device Pairing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Public key cryptography ,[object Object],[object Object],[object Object],-   - Alice Message Bob Communication channel Encrypted message Encryption Bob’s public key Encrypted message Encrypted message Decryption Bob’s private key Message
Diffie-Hellman Key Exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - a, g, p A = g a  mod p K =  B a  mod p Alice b B = g a  mod p K= A b  mod p Bob g, p, A B
Digital signatures -   - Alice Message Hash  function Alice’s private key Digital Signature Algorithm – sign operation Digital Signature Digitally signed message (message + digital signature) Hash  function Digital signature Digital Signature Algorithm – verify operation Bob Digitally signed message Digital signature verified / signature verification failed Alice’s public key
Public key schemes ,[object Object],-   -
Human-Assisted solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Seeing is Believing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - visual channel Public key B A
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Group Communication -   - ,[object Object],[object Object],[object Object],[object Object]
Resurrecting Duckling -   - ,[object Object],[object Object],[object Object],[object Object],Imprintable device Master device Trusted channel Key exchange Imprinted device Master device ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Attacker? Master device Imprinted device Imprintable device Master device Trusted channel Key exchange Message
Identity Based Encryption ,[object Object],[object Object],[object Object],[object Object],-   - PKG Bob Alice Authentication Private key Message encrypted with Bob’s public key
Entity recognition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Conclusion WIRELESS SECURITY -   - User-managed Technological needs Transparent to the user SSP Ad hoc Certification-authority-dependent DH ECC Digital signature Public Key ? TtS SiB L&C HAPADEP Human-Assisted Resurrecting Duckling policy  Entity Recognition IBE Secure Group Communication
-   -
Annex 1: other wireless technologies studied David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WLAN: Wireless Local Area Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
ZigBee ,[object Object],[object Object],[object Object],[object Object],-   - Applications and Profiles Application  Support  (ASP) Layer  IEEE  802.15.4  Medium Access Control (MAC) Layer IEEE  802.15.4  Physical (PHY) Layer Network Layer Defined by IEEE 802.15.4 Defined by ZigBee specification Defined by application developer
Wireless USB ,[object Object],[object Object],[object Object],-   -
Near Field Communication (NFC) ,[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Annex 2: other human-assisted device pairing solutions David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Talking to Strangers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - infrared channel (invisible) Attacker
[object Object],[object Object],[object Object],Loud and Clear  ,[object Object],[object Object],[object Object],[object Object],-   - Public key exchange Public key exchange Public key exchange Public key exchange
Annex 3: other discarded slides David González Romero Chicago, August  2009
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bluetooth basics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   - Applications and Profiles L2CAP (Logical Link Control and Adaptation ) HCI (Host Controller Interface) Link Manager Protocol (LMP) Baseband [Link controller (LC)] Bluetooth Radio SDP (Service Discovery) Radio Frequency Communication (RFCOMM) OBEX PPP TCP Host stack Controller stack TCS BIN UDP IP
Bluetooth network topology -   - P2 P1 P3 M1 S1 S1 S1/S2 M2 S2 M3/S2 S3
Bluetooth security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Man-in-the-Middle Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Elliptic Curve Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Key agreement in peer-to-peer wireless networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Proposed device pairing solutions -   -
Agenda Chapter 1: Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Group authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Identity Based Encryption (II) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -
Annex 4: selected references David González Romero Chicago, August  2009
Selected references ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-   -

Mais conteúdo relacionado

Mais procurados

Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymitylokijaja
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the ArtBiagio Botticelli
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelMohit Goel
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7Antony Law
 
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...Gerard Fuguet
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowiaemedu
 

Mais procurados (20)

Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
seminar
seminarseminar
seminar
 
IoT Honeypots: State of the Art
IoT Honeypots: State of the ArtIoT Honeypots: State of the Art
IoT Honeypots: State of the Art
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
BluedIoT: When a mature and immature technology mixes, becomes an “idiot” sit...
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...Confidentiality & Authentication Mechanism for Biometric Information Transmit...
Confidentiality & Authentication Mechanism for Biometric Information Transmit...
 
G43053847
G43053847G43053847
G43053847
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 

Destaque

"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem..."La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...Gustavo Martin
 
tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015 tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015 Saijo George
 
HospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujicaHospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujicaJennifer Mujica
 
Wanderkarte Pillerseetal
Wanderkarte PillerseetalWanderkarte Pillerseetal
Wanderkarte PillerseetalTirolerAdler
 
About The BSH Group, LLC
About The BSH Group, LLCAbout The BSH Group, LLC
About The BSH Group, LLCMaisha B. Hoye
 
Biogeomon 2009 72
Biogeomon 2009 72Biogeomon 2009 72
Biogeomon 2009 72Rustan Gleb
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Roberto Suggi Liverani
 
Understanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing AgeUnderstanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing AgeSherman Mohr Jr.
 
Reglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOLReglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOLAdib Manssur
 
Catalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 EspañolCatalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 EspañolDavid Rodriguez
 
Культура Японії
Культура ЯпоніїКультура Японії
Культура ЯпоніїM S
 
Boletín 2013 ii ucv
Boletín 2013 ii ucvBoletín 2013 ii ucv
Boletín 2013 ii ucvNancy Soto
 
El Arte de Comer Sano
El Arte de Comer SanoEl Arte de Comer Sano
El Arte de Comer SanoBamboga art
 
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusNavaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusINCIDE
 

Destaque (20)

"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem..."La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
"La Cocina de las Ideas", conferencia sobre creatividad dada el 10 de septiem...
 
tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015 tl;dr Marketing Aug 2015
tl;dr Marketing Aug 2015
 
Neumotorax
NeumotoraxNeumotorax
Neumotorax
 
HospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujicaHospitalMergersMAIN_JMujica
HospitalMergersMAIN_JMujica
 
Wanderkarte Pillerseetal
Wanderkarte PillerseetalWanderkarte Pillerseetal
Wanderkarte Pillerseetal
 
10. unidad 1
10.  unidad 110.  unidad 1
10. unidad 1
 
About The BSH Group, LLC
About The BSH Group, LLCAbout The BSH Group, LLC
About The BSH Group, LLC
 
Biogeomon 2009 72
Biogeomon 2009 72Biogeomon 2009 72
Biogeomon 2009 72
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
Understanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing AgeUnderstanding Data Mining in the Social Media Marketing Age
Understanding Data Mining in the Social Media Marketing Age
 
Abrazo Salvador
Abrazo SalvadorAbrazo Salvador
Abrazo Salvador
 
Reglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOLReglamento unificado de elecciones estudiantiles - ESPOL
Reglamento unificado de elecciones estudiantiles - ESPOL
 
tango 2013 escuela
tango 2013 escuelatango 2013 escuela
tango 2013 escuela
 
Catalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 EspañolCatalogo tokyoto luggage 2011 Español
Catalogo tokyoto luggage 2011 Español
 
Культура Японії
Культура ЯпоніїКультура Японії
Культура Японії
 
Curriculum EspañolAP
Curriculum EspañolAPCurriculum EspañolAP
Curriculum EspañolAP
 
REVISTA INSTITUCIONAL
REVISTA INSTITUCIONALREVISTA INSTITUCIONAL
REVISTA INSTITUCIONAL
 
Boletín 2013 ii ucv
Boletín 2013 ii ucvBoletín 2013 ii ucv
Boletín 2013 ii ucv
 
El Arte de Comer Sano
El Arte de Comer SanoEl Arte de Comer Sano
El Arte de Comer Sano
 
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virusNavaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
Navaja negra 2014_nn4ed_abraham_pasamar-desmitificando_el_anti_virus
 

Semelhante a A Comprehensive Approach to Secure Group Communication in Wireless Networks

Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon Berlin
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfFelipe Prado
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxJayaLakshmi277
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxJayaLakshmi277
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...IRJET Journal
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 

Semelhante a A Comprehensive Approach to Secure Group Communication in Wireless Networks (20)

IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painfDEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
DEFCON 23 - Matteo Becarro Matteo Collura - extracting the painf
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptxIntroduction-to-Diffie-Hellman-Key-Exchange.pptx
Introduction-to-Diffie-Hellman-Key-Exchange.pptx
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Download
DownloadDownload
Download
 
Download
DownloadDownload
Download
 

Último

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

A Comprehensive Approach to Secure Group Communication in Wireless Networks

  • 1. A Comprehensive Approach to Secure Group Communication in Wireless Networks David González Romero Chicago, August 2009
  • 2.
  • 3.
  • 4.
  • 5. Wireless technologies - - Complexity (transmission rate, network topology, protocol stack…) Distance range Security needs
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Digital signatures - - Alice Message Hash function Alice’s private key Digital Signature Algorithm – sign operation Digital Signature Digitally signed message (message + digital signature) Hash function Digital signature Digital Signature Algorithm – verify operation Bob Digitally signed message Digital signature verified / signature verification failed Alice’s public key
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Conclusion WIRELESS SECURITY - - User-managed Technological needs Transparent to the user SSP Ad hoc Certification-authority-dependent DH ECC Digital signature Public Key ? TtS SiB L&C HAPADEP Human-Assisted Resurrecting Duckling policy Entity Recognition IBE Secure Group Communication
  • 22. - -
  • 23. Annex 1: other wireless technologies studied David González Romero Chicago, August 2009
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Annex 2: other human-assisted device pairing solutions David González Romero Chicago, August 2009
  • 30.
  • 31.
  • 32.
  • 33. Annex 3: other discarded slides David González Romero Chicago, August 2009
  • 34.
  • 35.
  • 36. Bluetooth network topology - - P2 P1 P3 M1 S1 S1 S1/S2 M2 S2 M3/S2 S3
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Proposed device pairing solutions - -
  • 43.
  • 44.
  • 45.
  • 46. Annex 4: selected references David González Romero Chicago, August 2009
  • 47.