SlideShare uma empresa Scribd logo
1 de 30
Smart Card Based Protocol for Secure and Controlled Access Of Mobile Host in IPv6 Compatible Foreign Network 954203020 郭啟揚 954203039 鄭志瑋 954203057 蔡繼正
Outline(1/1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(1/4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(3/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(4/4)
Java  Card(1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Java Card(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AAA architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RADIUS(1/2)
RADIUS(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diameter(1/4)
Diameter(2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diameter(3/4) ,[object Object],[object Object],[object Object],[object Object]
Diameter(4/4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network layer security using  IPv6 ,[object Object],[object Object]
IP Source Address Filtering  User identity IP Share key  Share key
IPsec(2/5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPsec(3/5)
IPsec(4/5)
IPsec(5/5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User registration protocol(1/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Registration Protocol(2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MH  AR  AAAh
User registration protocol(3/4) LSA IPsec TSK TSK TSK
Local challenge VN_ID Care of address AUTH=HMAC-MD5(LC,user_id,VN_ID,SAmh) User Name AVP:user_id Extract LC , user_id , AUTH,VN_ID, MH_Ipaddr EAP AVP:AUTH Care of IP:MH_Ipaddr AAA Registration Request Challenge AVP:LC AUTH==HMAC-MD5(LC,user_id,VN_ID,SAmh ) HC,AUTHNET,Randtsk AUTHNET=HMAC-MD5(HC,user_id,VN_ID,SAmh) TSK=3DES(Randtsk,SAmh) ARA (Randtsk,HC,TSK,VN_ID,user_id,Authnet) EAP format AUTH=HMAC-MD5(HC,user_id,VN_ID,SAmh) AUTH==AUTHNET EAP format
Implementation detail Extensible Authentication Protocol AAA Registration Request
Comment(1/2) 3 6+3=9 訊息數 其他 技術 本名 縮寫 Mobile Authentication  Protocol Internet key Exchange IPsec +IPv6+ Smart card PKI+IKE Temporary share key Two phase MAP IKE
Comment(2/2) 低 高 成本 不易 容易 key 竊取 易 難 建置 key 定時更新 Key 不能失去 Key 安全性 本名 縮寫 Mobile Authentication  Protocol Public key infrastructure 高 低 MAP PKI
所以 MAP 將會是未來的趨勢 你認為呢? Thank you for attention Q&A

Mais conteúdo relacionado

Destaque (20)

Virtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelVirtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate Travel
 
Mobile charging
Mobile chargingMobile charging
Mobile charging
 
Smart cart
Smart cartSmart cart
Smart cart
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
smart card
smart cardsmart card
smart card
 
Electronic paper
Electronic paperElectronic paper
Electronic paper
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card system for buses
Smart card system for buses  Smart card system for buses
Smart card system for buses
 
E paper
E paper E paper
E paper
 
E Paper
E PaperE Paper
E Paper
 
Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentation
 
E-Paper Display
E-Paper DisplayE-Paper Display
E-Paper Display
 
E paper technology ppt
E paper technology pptE paper technology ppt
E paper technology ppt
 
E paper slides
E paper slidesE paper slides
E paper slides
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
E paper
E paperE paper
E paper
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 

Semelhante a Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In Foreign Network

Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)Jeff Green
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
huawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdfhuawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdfHi-Network.com
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase
 
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdfhuawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdfHi-Network.com
 
huawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdfhuawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdfHi-Network.com
 
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdfhuawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdfHi-Network.com
 
huawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdfhuawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdfHi-Network.com
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future KingKapil Sachdeva
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java CardJulien SIMON
 
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdfhuawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdfHi-Network.com
 
How to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsHow to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsShain Singh
 
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdfhuawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdfHi-Network.com
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdfhuawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdfHi-Network.com
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...Tom Diederich
 

Semelhante a Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In Foreign Network (20)

Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
huawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdfhuawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdf
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
 
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdfhuawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
 
huawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdfhuawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdf
 
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdfhuawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
 
huawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdfhuawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdf
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future King
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java Card
 
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdfhuawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
 
How to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsHow to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted Threats
 
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdfhuawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdfhuawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
 

Mais de flyingsheep

Motivators Of Contribution To Wikipedia
Motivators Of Contribution To WikipediaMotivators Of Contribution To Wikipedia
Motivators Of Contribution To Wikipediaflyingsheep
 
Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge flyingsheep
 
Creative Commons License In Taiwan
Creative Commons License In TaiwanCreative Commons License In Taiwan
Creative Commons License In Taiwanflyingsheep
 
Collaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia WayCollaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia Wayflyingsheep
 
wikinomics- peer pioneers
wikinomics- peer pioneerswikinomics- peer pioneers
wikinomics- peer pioneersflyingsheep
 
wikinomics-perfect storm
wikinomics-perfect stormwikinomics-perfect storm
wikinomics-perfect stormflyingsheep
 
Search Economic
Search Economic Search Economic
Search Economic flyingsheep
 

Mais de flyingsheep (9)

Motivators Of Contribution To Wikipedia
Motivators Of Contribution To WikipediaMotivators Of Contribution To Wikipedia
Motivators Of Contribution To Wikipedia
 
Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge
 
What is web2.0
What is web2.0What is web2.0
What is web2.0
 
Creative Commons License In Taiwan
Creative Commons License In TaiwanCreative Commons License In Taiwan
Creative Commons License In Taiwan
 
Collaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia WayCollaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia Way
 
wikinomics- peer pioneers
wikinomics- peer pioneerswikinomics- peer pioneers
wikinomics- peer pioneers
 
wikinomics-perfect storm
wikinomics-perfect stormwikinomics-perfect storm
wikinomics-perfect storm
 
Media wiki
Media wikiMedia wiki
Media wiki
 
Search Economic
Search Economic Search Economic
Search Economic
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In Foreign Network

  • 1. Smart Card Based Protocol for Secure and Controlled Access Of Mobile Host in IPv6 Compatible Foreign Network 954203020 郭啟揚 954203039 鄭志瑋 954203057 蔡繼正
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. IP Source Address Filtering User identity IP Share key Share key
  • 19.
  • 22.
  • 23.
  • 24.
  • 25. User registration protocol(3/4) LSA IPsec TSK TSK TSK
  • 26. Local challenge VN_ID Care of address AUTH=HMAC-MD5(LC,user_id,VN_ID,SAmh) User Name AVP:user_id Extract LC , user_id , AUTH,VN_ID, MH_Ipaddr EAP AVP:AUTH Care of IP:MH_Ipaddr AAA Registration Request Challenge AVP:LC AUTH==HMAC-MD5(LC,user_id,VN_ID,SAmh ) HC,AUTHNET,Randtsk AUTHNET=HMAC-MD5(HC,user_id,VN_ID,SAmh) TSK=3DES(Randtsk,SAmh) ARA (Randtsk,HC,TSK,VN_ID,user_id,Authnet) EAP format AUTH=HMAC-MD5(HC,user_id,VN_ID,SAmh) AUTH==AUTHNET EAP format
  • 27. Implementation detail Extensible Authentication Protocol AAA Registration Request
  • 28. Comment(1/2) 3 6+3=9 訊息數 其他 技術 本名 縮寫 Mobile Authentication Protocol Internet key Exchange IPsec +IPv6+ Smart card PKI+IKE Temporary share key Two phase MAP IKE
  • 29. Comment(2/2) 低 高 成本 不易 容易 key 竊取 易 難 建置 key 定時更新 Key 不能失去 Key 安全性 本名 縮寫 Mobile Authentication Protocol Public key infrastructure 高 低 MAP PKI
  • 30. 所以 MAP 將會是未來的趨勢 你認為呢? Thank you for attention Q&A