Embedded Security: From Sensor Networks to Internet of Things (IoT)
|
|
|
- Amice Grant
- 10 years ago
- Views:
Transcription
1 Embedded Security: From Sensor Networks to Internet of Things (IoT) Dr. Wen Hu, Michael Bruenig, Thomas Kothmayr (TUM), Corinna Schmitt (U Zurich) Principal Research Scientist/Research Project Leader CSIRO Digital Productivity Flagship, Australia DIGITAL PRODUCTIVITY FLAGSHIP
2 Wireless Sensor Networks Homogenous devices Resource, energy and form factor limited
3 Cryptography challenges in sensor networks Very limited resources 8-bit/16-bit microcontrollers Less than 10KB RAM AA batteries Security algorithms are computational and memory intensives
4 SKC vs. PKC Symmetric Key Cryptography (SKC) Low computation cost Smaller key sizes Public Key Cryptography It provides more security than SKC but it requires a nontrivial amount of processing power and memory Past Imposible to use PKC Doubt in using PKC Possible to use PKC Future
5 Cryptography engines Symmetric cryptography engine AES 128-bit, new transceivers such as Atmel AT86RF212 and AT86RF230 Asymmetric cryptography engine SHA-1, 1024/2048-bit RSA
6 secfleck CSIRO ICT Centre Marine Robotics & Sensor Networks
7 Evaluation (I)
8 Evaluation (II) CSIRO ICT Centre Marine Robotics & Sensor Networks
9 Examples --- secure communications Node A Base Generates a random number N a ( b y fos_tpm_rand) Decrypt with SkA, (fos_tpm_decryption) E(Pkbase, Na, Req) fos_tpm_encryption E(PkA, Na, KBA) (fos_tpm_encryption) Decrypt with Skbase, Generate a new session key (KBA), (fos_tpm_decryption fos_tpm_rand) Secure communication using SKC with K BA CSIRO ICT Centre Marine Robotics & Sensor Networks
10 Examples --- remote attestation Attestator A During boot time, update PCR I (Pi) (fos_tpm_pcrextend) Challenger C Generates a random number N a ( b y fos_tpm_rand) Obtain Pi and generate a signature (fos_tpm_pcrquote) Issue PCR challenge (index = i, Na) Ask for A s public key Base A s public key (Pka) Challenge response S(Pi, Na, Ska) Verify the value Pi and the signature (fos_tpm_verifypcrquote)
11 Summary Strong (2048-bit) asymmetric key cryptography for message authenticity and integrity, strong symmetric key cryptography for message confidentiality Affordable (financially, form factor, and energy consumption) Remote (platform and data) attestation for content trustworthiness 11
12 Internet of Things Heterogeneous devices (cortex M*) Standard approach ( , RPL/6LoWPAN, COAP )
13 Motivation Current situa2on: Many different use cases exist: Building system, medical apps, acquisi2on of resources. Main task of sensor networks is the collec2on and transmission of different data. Problem: Data can include sensi2ve informa2on. Trend: Integra2on of wireless sensor networks into the Internet (Internet of Things). Trustworthiness of par2cipants can differ. Requests for the security solu2on: Confiden2ality Data Integrity Data authen2city A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 13
14 Usage of standards Wireless Sensor Networks are comparable to Peer- to- Peer networks: Self- organizing network of sensor nodes Basic tasks of a node: Collect data, simple data processing, and forward data Constrained memory, barery and compua2onal power IPv6 Connec2vity à Nodes connected to Internet Different standardized security solu2ons exist: Technologies and implementa2ons (e.g. OpenSSL) exist and are well proven Exis2ng infrastructures (e.g. cer2ficate authori2es) can be used again. Different standards for network stack in WSNs already exist: Physical & MAC Layer: IEEE Rou2ng & Transport Layer: 6LoWPAN, RPL Applica2on Layer: CoAP A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 14
15 Benefits of a standards based approach Reuse of: Implementa2ons (OpenSSL, etc..) Engineering techniques Infrastructure (Cer2ficate Authori2es, etc..) Exper2se and Experience à Easier security uptake Application Security Transport Network Medium Access / Physical CoAP, XML,... DTLS UDP IPv6 BLIP, RPL IEEE Hardware used: TelosB / IRIS OPAL- Mote 50kbyte SRAM 48 MHz Microcontroller Trusted Plaaorm Module A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 15
16 Opal node (front) Microcontroller (32-bit) LED Radio
17 Opal node (back) Radio Micro SD card slot TPM CSIRO ICT Centre Marine Robotics & Sensor Networks
18 DTLS Ultra short introduction Flight 1 Flight 3 Flight 5 Client ClientHello* ClientHelloVerify* ClientHello ServerHello Certificate [CertificateRequest] ServerHelloDone [Certificate] ClientKeyExchange [CertificateVerify] ChangeCipherSpec Finished ChangeCipherSpec Finished Server Flight 2 Flight 4 Flight 6 DTLS: Adap2on of TLS for datagram transport Server and Client nego2ate Hash algorithm and Cipher in Handshake Different authen2ca2on methods RSA, DAS, DH, ECC, PSK, For us: RSA and later PSK [ ] Omission during server authenticated handshake. * Optional messages Encrypted up now A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 18
19 Connecting to data sink A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 19
20 P2P Connection A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 20
21 Evaluation - DTLS Handshake Least understood component in IoT context Previous work evaluated other components Sizzle: A standards- based end- to- end security architecture for the embedded internet à Server authen2cated handshake with RSA and ECC Securing Communica2on in 6LoWPAN with Compressed IPSec à Compression techniques for IPSec header during applica2on data transfer Challenge: IoT embedded nodes are limited to their resources! System s performance Packet handling DTLS handshake performance Energy consump2on Memory consump2on A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 21
22 Evaluation - System s performance (packet handling) Linear increase of round trip 2me Jumps approximately every 100 bytes à 128 bytes maximum MTU in layer 2 by IEEE à Including header and tailer Jumps occur earlier when sending DTLS protected packets à Addi2onal DTLS header, HMAC size, Ini2aliza2on Vector Round- Trip- Time (ms) Data packets per Template packet AES- 128 Multihop (4) AES- 128 Single Hop SHA- 1 Multihop (4) SHA- 1 Single Hop Ping Multihop (4) Ping Single Hop à Increasing packet size and processing overhead lead to an increased end-to-end transmission latency for DTLS packets compared to plaintext packets. à The decreased performance for transmission latency is mostly due to the large packet overhead of up to 64 bytes. à Calculation times DOES NOT contribute significantly: - SHA-1 hash of 255 bytes plain text message: 9 ms - Encryption with AES-128: 12 ms A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 22
23 Evaluation - System s performance (DTLS handshake) Measurement duration: Beginning of the handshake establishment Client received a FINISHED message 15 measurements for each type of handshake Timeout: 5 sec Average latency for a fully authenticated and a server authenticated DTLS handshake à Large standard deviation is caused by implementation behavior when messages lost. - DTLS states that an implementation should wait for an answer for a set amount of time after sending a flight. - Retransmission if no answer is received during this period. à Time to execute a handshale is shorter for smaller RSA-keys and reduced by almost 2 sec when client authentication is omitted in the handshake. à Packet loss mainly in multi-hop environment and larger DTLS messages are sent. à Total energy consumption of client does not increase significantly - All TPM operations are only executed after successful receipt of all relevant server messages. A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 23
24 Evaluation - Energy consumption Energy draw for a fully authenticated DTLS handshake on OPAL node Energy cost = A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 24
25 Evaluation - Memory consumption Fully authenticates handshake with 2048-bit RSA keys OPAL resources: 48 kb RAM / 256 kb ROM RAM consumption (byte) à Total: 17,839 byte RAM ROM consumption (byte) à Total: 63,383 byte ROM A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 25
26 Established WSN at Department T 2270 T 1104 S T S S S S S X S S S S Gateway Nodes with data collection purpose: S T IRIS with mts300 or mts400 TelosB with activated sensors Gateway (TelosB) TelosB with aggregation purpose X Opal DTLS handshake messages Data transmission via secure connection Wireshark recording on tun0 (only UDP packets) Recording of received TinyIPFIX messages in Listerner provided by TinyOS A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 26
27 Summary Today s challenge: Connec2on of different infrastructures on base of IP- communica2on Internet of Things Adop2on of powerful and well known protocols is suitable! A standard based security architecture with two- way authen2ca2on for the Internet of Things was developed. The authen2ca2on is performed during a fully authen2cated DTLS handshake. Exchange of X.509 cer2ficates containing RSA keys Secure provisioning: Message integrity Confiden2ality Authen2city Solu2on has affordable energy, end- to- end latency, and memory overhead Interoperability can be ensured with different vendors Applica2on scenarios exchangeable A DTLS Based End-To-End Security Architecture for the Internet of Things with Two-Way Authentication 27
28 On- going work Opal on a chip (TI CC2538) Cortex M3 (32KB RAM and 512KB ROM) IEEE radio RSA, ECC in hardware ~$6 OpenMote Has the dominated factor moved back to wireless transmissions? More advanced crypto approaches? Bluetooth LE security?
29 References 1. "secfleck: A Public Key Technology Plaaorm for Wireless Sensor Networks", Wen Hu, Peter Corke, Wen Chan Shih, Leslie Overs. In Proceedings of 6th European Conference on Wireless Sensor Networks (EWSN 09), February 11th- 13th, Cork, Ireland. 2. "Towards Trusted Wireless Sensor Networks". Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, Sanjay Jha. ACM Transac2ons on Sensor Networks (TOSN), Volume 7, Issue 1, August "DTLS based Security and Two- Way Authen2ca2on for the Internet of Things", Thomas Kothmayr, Corinna SchmiR, Wen Hu, Michael Bruenig and Georg Carle. Ad Hoc Networks (Elsevier), Vol. 11 Issue 8, Page Nov TLS- based Security with two- way Authen2ca2on for IoT, C. SchmiR, B. S2ller, T. Kothmayr and Wen Hu, IETF Internet Drav, July "Towards Trustworthy Par2cipatory Sensing, Akshay Dua, Nirupama Bulusu, Wuchang Feng, Wen Hu. In Proceedings of 4th USENIX Workshop on Hot Topics in Security (HotSec '09), August, 2009, Montreal, Canada. 29
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Internet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Secure data aggregation in mobile sink wireless sensor networks
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2927-2933 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Secure data aggregation in mobile sink wireless
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System DANIELE TRABALZA
Implementation and Evaluation of Datagram Transport Layer Security (DTLS) for the Android Operating System DANIELE TRABALZA Master s Degree Project Stockholm, Sweden June 2012 Abstract Smartphones are
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Using IPv6 and 6LoWPAN for Home Automation Networks
Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture
Information Security
SE 4472 / ECE 9064 Information Security Week 11: Transport Layer Security (TLS): Putting it all together Fall 2015 Prof. Aleksander Essex Security at the Transport Layer Where we started in this course:
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Security Protocols and Infrastructures. h_da, Winter Term 2011/2012
Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher
Master Thesis: Access Control in the Internet of Things
Master Thesis: Access Control in the Internet of Things Author Denis Sitenkov Supervisors Ludwig Seitz, Shahid Raza, Göran Selander Abstract The new generation of Wireless Sensor Networks, that is known
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Lecture 4: Transport Layer Security (secure Socket Layer)
Lecture 4: Transport Layer Security (secure Socket Layer) Recommended reading: Thomas, SSS and TLS essentials (old but very well written) SSL/TLS: layered view HTTP SMTP TCP/UDP IPsec Network layer security
Constrained Application Protocol for Internet of
Page 1 of 12 Constrained Application Protocol for Internet of Things Xi Chen, chen857 (at) wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download Abstract: Internet of things (IoT) is
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306
Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project
Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Securing the Internet of Things: A Standardization Perspective Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 3, JUNE 2014 265 Securing the Internet of Things: A Standardization Perspective Sye Loong Keoh, Sandeep S. Kumar, and Hannes Tschofenig Abstract The Internet
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
IoT for surveillance applications!
! IoT for surveillance applications!! (and how to connect & schedule them)! EU-SEA workshop and cooperation on IoT and open platforms! January 25th, 2015!! IEEE RIVF 2015, Can Tho, Vietnam! Prof. Congduc
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
The Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015
The Future of IoT Zach Shelby VP Marketing, IoT Feb 3 rd, 2015 1 Internet of (really nerdy) People 1980s 2 Internet of (content silo) People 1990s 3 Internet of (Web) People 2000s 4 Internet of (really
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
SECURE SOCKETS LAYER (SSL)
INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS
TLS-RSA-PSK. Channel Binding using Transport Layer Security with Pre Shared Keys
TLS-RSA-PSK Channel Binding using Transport Layer Security with Pre Shared Keys Christian J. Dietrich dietrich [at] internet-sicherheit. de Institut für Internet-Sicherheit https://www.internet-sicherheit.de
6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt [email protected] 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
Smart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
IPv6 Based Sensor Home Networking
KRNET 2005 IPv6 Based Sensor Home Networking KRNET 2005 Soohong Daniel Park Mobile Platform Laboratory, SAMSUNG Electronics. [email protected] KRNET 2005 2/29 Trend of Home Networking Digital World
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities
SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels Secure Sockets Layer Secure Sockets Layer
Robust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
Binding Security Tokens to TLS Channels. A. Langley, Google Inc. D. Balfanz, Google Inc. A. Popov, Microsoft Corp.
Binding Security Tokens to TLS Channels A. Langley, Google Inc. D. Balfanz, Google Inc. A. Popov, Microsoft Corp. The Problem: Bearer Tokens Web services generate various security tokens (HTTP cookies,
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015
Performance Investigations Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015 1 Motivation In we tried to provide guidance for the use of DTLS (TLS) when used in
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Mobile and Embedded/IoT market Overview and Trends. June 2014
Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Computer and Network Security
Computer and Network Security c Copyright 2000 R E Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@ciseufledu Network Security Protocols
Making Sense of Internet of Things Protocols and Implementations
Making Sense of Internet of Things Protocols and Implementations Author: Kim Rowe, RoweBots Higher level protocols for Internet of Things have various features and offer different capabilities. Most of
Internet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
How To Understand The Concept Of Internet Of Things (Iot)
Privacy and Security Challenges in Internet of Things Manik Lal Das DA-IICT, Gandhinagar Disclaimer Many third party copyrighted material is reused within this talk under the 'fair use' approach, for sake
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Key requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
Wireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
Cryptography and Network Security IPSEC
Cryptography and Network Security IPSEC Security architecture and protocol stack Applicaz. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP, SFTP, or Security down in the protocol stack -SSL
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
TUM & Siemens Corporate Technology. The "Internet of Things" for industrial applications
The "Internet of Things" for industrial applications IoT Technologies: Semantics Challenges in the Future of Embedded Networks Growing number of interconnected heterogeneous devices in different kind of
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
