PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
|
|
|
- Sibyl Henderson
- 10 years ago
- Views:
Transcription
1 PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS Yasir Arfat Malkani and Lachhman Das Dhomeja Department of Informatics, University of Sussex, Brighton, UK {y.a.malkani, l.d.dhomeja}@ s usse x. ac. uk ABSTRACT Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security risks, such as eavesdropping and require different techniques as compared to traditional security mechanisms. Recently, secure device pairing in wireless environments has got substantial attention from many researchers. As a result, a significant set of techniques and protocols have been proposed to deal with this issue. Some of these techniques consider devices equipped with infrared, laser, ultrasound transceivers or network interface cards; while others require embedded accelerometers, cameras and/or LEDs, displays, microphones and/or speakers. However, many of the proposed techniques or protocols have not been implemented at all; while others are implemented and evaluated in a stand-alone manner without being compared with other related work [1]. We believe that it is because of the lack of specialized tools that provide a common platform to test the pairing methods. As a consequence, we designed such a tool. In this paper, we are presenting design and development of the Pairing Simulator (PSim) that can be used to perform the analysis of device pairing methods. KEYWORDS Security, Usability, Device Association, Simulation, Standard Measures 1. INTRODUCTION More and more computing devices are coming into existence everyday, which may vary in size, capabilities, mode of interaction and so on. As a result, we are moving towards a world in which computing is omnipresent. Most of the modern devices support multiple communication channels and almost all of them use wireless technology in some form, such as Bluetooth, Infrared, Wibree, Zigbee, Ultrasound or Having wireless technology in these devices does not guarantee that all of these devices can also take advantage of internet technology. However, those wireless enabled devices that can not be connected to internet, can still take advantage of other co-located devices in the vicinity by forming short-term or long-term associations on ad hoc basis. For example pairing a Bluetooth enabled headset with a mobile phone or MP3 player (short-term) and pairing of a PDA with home devices in order to control them wirelessly (long-term). Since wireless communication is susceptible to eavesdropping, thus one can easily launch well known man-in-the-middle (MITM) attack, Denial-of-Service (DoS) attack or can perform bidding-down attack to fail the secure pairing process. The solution to this problem is establishing a secure channel between the pairing devices by some kind of mechanisms, such as authentication and encryption. Establishing a secure channel is trivial, when there existed an off-line or on-line global infrastructure, such as PKI. However, such a global infrastructure is hard to implement in mobile ad hoc and ubiquitous computing environments that makes it a 39
2 challenging real-world problem. Due to the ad hoc and dynamic nature of these environments, devices do not know each other a priori, so the idea of pre-shared secret key is failed. Further, traditional key exchange or key agreement approaches, such as Diffie-Hellman [2] in their actual form are not applicable in wireless environments due to their vulnerability to MiTM attack. Moreover, devices heterogeneity in terms of their communication channels, user interfaces, power requirements and sensing technology, make it hard to give a single solution for secure pairing of devices. As a result, wide community of researchers has proposed a large set of protocols and techniques to deal with this issue. However, these protocols vary in the strength of their security, their susceptibility to environmental conditions and in the required physical capabilities of the devices. Currently, there may existed many options for an ordinary user to establish a secure channel between the devices from entering pins and passwords to verifying hashes of public keys and pressing buttons simultaneously on the two devices. In this paper, we are presenting the design, development and evaluation of a simulation tool for pairing methods followed by a brief discussion on existing pairing methods. Remaining part of this paper is organized as follows: section 2 is background that describes various existing device pairing methods, section 3 presents the design and development of the simulator, section 4 discusses a case study that is carried out to evaluate the simulator, and finally section 5 concludes the paper. 2. BACKGROUND The problem of secure device association (pairing) continues to be a very active area of research in wireless environments. The issue got significant attention from many researchers, after Stajano et al. [3-4] highlighted the challenges inherent in secure device association. They proposed a mother-duckling (master-slave) model, which maps the relationship between devices. The pairing process is done by agreeing on a secret key over the physical connection (such as using a cable). Though the secret key is transferred in plain-text and cryptographic methods are not used, it is susceptible to dictionary attacks. In reality, it is also difficult to have common physical interfaces in both of the devices, and carrying cables all of the time might not be possible for owners of the devices. Balfanz et al. [5] extended Stanjano and Anderson s work and proposed a two-phase authentication method for pairing of co-located devices using infrared as a location limited side channel. In their proposed solution, pre-authentication information is exchanged over the infrared channel and then the user switches to the common wireless channel. Slightly different variations of Balfanz et al [5] approach are proposed in [6-9], which also use location limited side channel to transfer the pre-authentication data. The common problem with these approaches is twofold: first, they need some kind of interface (e.g. IrDA, laser, ultrasound, etc) for pre-authentication phase and are vulnerable to passive eavesdropping attack in the location limited side channels, e.g. two remotes and one projector. Some other pairing schemes including Bluetooth require the human operator to put the communicating partners into discovery mode. After discovery and selection of a device, the channel is secured by entering the same PIN or password into both devices. Although it is a general approach, it gives rise to a number of usability and security issues [10, 11]. For example, a short password or PIN number makes it vulnerable to dictionary or exhaustive search attacks. Further, in Bluetooth pairing an adversary can eavesdrop to break the security from a long distance using powerful antennas. Based on the pairing protocol of Balfanz et al. [5], some other schemes are proposed through the use of audio and visual out-of-band channels. One such system is Seeing-is-Believing (SiB) [12]. SiB uses two dimensional bar codes for exchanging pre-authentication data between the devices. In the proposed approach, device A encodes cryptographic material into a twodimensional barcode and displays it on the screen, then device B reads it through a camera to setup an authenticated channel. To reduce the camera requirement in one of the pairing device 40
3 in SiB, Saxena et al. [13] extended the work of McCune et al. [12] and proposed an improvement to it through the use of simple light source, such as LEDs, and short authenticated integrity checksums. In the proposed scheme, device A needs to be equipped with a camera and device B with a single LED. When the LED on device B blinks, device A takes a video clip. Then, video clip is parsed to extract an authentication string. Loud and Clear (L&C) [14] and Human-Assisted Pure Audio Device Pairing (HAPADEP) [15] use audio as an out-of-band channel to securely pair the devices. The main idea of L&C [14] scheme is to encode the hash of first device s public key into a MadLib sentence (i.e. grammatically correct but nonsensical sentence) and transmit it over a device-to-human channel using a speaker or a display. Then, second device also encodes the hash of the received public key from first device into the MadLib sentence and transmit it over a device-to-human channel using a speaker or a display. Then user is responsible to compare the two sentences and to accept or reject the pairing. There are two variants of this approach: speaker-to-speaker and display-to-speaker. In first method user is required to compare and verify the two sentences vocalized by the pairing candidate devices. In the second method, user is required to compare the displayed MadLib sentence on one device with the vocalized MadLib sentence from the other device. Finally, user is responsible for accepting or rejecting the pairing based on the results of comparison. In HAPADEP [15], Soriente et al. consider the problem of pairing two devices that have no common wireless communication channel, such as Bluetooth or WiFi, at the time of pairing. The proposed scheme uses pure audio to exchange both public keys and hashes of public keys. The pairing schemes that use audio and/or visual out of band channels [12-14] are also inapplicable in some of the scenarios. For example, SiB [12] requires that devices must be equipped with camera; while in L&C [14] a speaker and/or display is required, and HAPADEP [15] is applicable in those scenarios where both devices have a microphone and a speaker. Camera equipped devices are usually prohibited in high security areas; while the latter is not suitable for hearing-impaired users. Further, bar code scanning requires sufficient proximity and light in SiB; while L&C and HAPADEP places some burden on the user for comparison of audible sequences. An adversary can easily subvert bar code stickers on devices in SiB; while ambient noise makes authentication either weak or difficult in L&C as well as in HAPADEP. While [13] is a variation of SiB, so this scheme has few of the same limitations as SiB, such as requiring close proximity and a camera in at least one of the device. Unlike previously described approaches, the idea of shaking devices together to pair them has become more common. Smart-its-Friends [16] is the first effort that proposed pairing of two devices using a common movement pattern and used accelerometers as an out-of-band channel. In this approach, two devices are held and shaken together simultaneously. Then, common readings from the embedded accelerometers in the devices are exploited to establish the communication channel between the two devices. However, security has not been the major concern of Smart-its-Friends. The follow-on method to Smart-its-Friends is Shake Well Before Use [17]. Mayrhofer and Gellersen extended the Holmquist et al. [16] approach and proposed two protocols to securely pair the devices. Both of the proposed protocols exploit the cryptographic primitives with accelerometer data analysis for secure device-to-device authentication. First protocol uses public key cryptography and is more secure as compared to the second protocol, which is more efficient and computes secret key directly from accelerometer s data. Another approach that requires shaking or moving patterns is Shake Them Up [18]. Authors suggest a manual technique for pairing two resource-constrained devices that involves shaking and twirling them in very close proximity to each other. Unlike Smart-its- Friends and Shake Well Before Use, this approach exploits the source indinguishability property of radio signals and does not require embedded accelerometers. While being shaken, two devices exchange radio packets and agree on a key one bit at a time, relying on the adversary s inability to determine the source of radio packet (sending device). Secure pairing of devices by shaking devices together is an interesting approach. However, these schemes require 2D accelerometers in both of the devices. Further, shaking devices together is always not possible, 41
4 since there is large variety of devices, such as printers, projectors and laptops that can not be hold and shaken together simultaneously. While Shake Them Up is susceptible to attack by an eavesdropper that exploits the differences in the baseband frequencies of the two radio sources. Recently, Varshavsky et al. [19] proposed Amigo a proximity-based technique for secure pairing of co-located devices. Authors extended Diffie-Hellman key exchange protocol with the addition of key verification stage. The proposed approach exploits the common radio signals from locally available wireless access points to establish the secure channel between the devices. Since, AMIGO uses the common radio signals from the located access points; it is not applicable in the scenarios, where the radio data is not available to process or where the wireless network is easy to eavesdrop on while remaining hidden. It is also a fact that in many under developing countries based wireless technology is less popular as compared to Bluetooth technology that is more popular and common due to the mobile phones. Some other efforts towards secure device pairing include Button-Enabled Device Association (BEDA) [20], LoKey [21], Are You With Me? [22] and Malkani et al. s work [23, 24]. BEDA is proposed by Soriente et al., and it has four variants. The main idea is to transfer the short secret key from one device to the other using button-presses and then use that key to authenticate the public keys of the devices. Short secret key is agreed upon between the two devices via one of the four variants of BEDA. These are called button-to-button (B-to-B), display-to-button (D-to-B), short vibration-to-button (SV-to-B) and long vibration-to-button (LV-to-B). The first and basic variant (i.e. B-to-B) involves the user simultaneously pressing buttons on both of the devices within certain random time-intervals and each of these intervals are used to derive 3-bits of the short secret key. LoKey uses SMS messages to authenticate key exchanged over the internet. However, this approach incurs substantial monetary cost and delay. While, Are You With Me? again requires accelerometers and is not applicable in the scenarios as Shake Well Before Use or Smart-its-Friends. Malkani et al. [23, 24] have proposed a generic framework for secure device association. In the proposed system devices first register their capabilities with the directory service. Then, whenever two devices need to create an association, the client (device A) queries the directory service to discover and acquire the required information to initiate a secure pairing with the target device (device B). Based on the information from directory service, both the client (device A) and resource (device B) mutually execute a common pairing protocol. This protocol involves the generation of a key from interaction with the environment. The selected interactions generate an appropriate key for the nature of the intended association, and a successful pairing arises when matching keys are generated on both of the devices. In summary, there is an immense literature on secure device association. However, some of the proposed techniques or protocols are not implemented at all; while others are implemented and evaluated in a stand-alone manner without being compared with other related work [1, 25]. Examples of these include Resurrecting Duckling Security Model [4], Talking to Strangers [5], AMIGO [19], Shake Well Before Use [17], some of the Saxena et al. s proposed methods [26] and four variants of BEDA [20] approach. Since the motivation for this work is [25] that presents state-of-the-art in the area of secure device pairing along with some future research directions, therefore, one can refer it for further details. 3. DESIGN AND DEVELOPMENT An extensive set of comparative usability tests can play a vital role in the process of standardizing pairing methods. However, conducting such a detailed case study is not an easy task due to several reasons. For example, it is very tedious and laborious job to implement all of the existing (more than two dozens) pairing methods using a common platform. Even it becomes more difficult when implementing network functionality since these schemes use numerous wireless channels, such as Bluetooth, WiFi, Ultrasound, Infrared, etc. We believe that 42
5 our designed simulator reduces the development and implementation efforts for pairing protocols and makes it easy to conduct several usability tests to evaluate them. Figure 1: Screen shot of the simulator showing simulated devices (Alice and Bob) Figure 2: Screen shot of the simulator showing some of the test results Figure 1 and figure 2 shows the screen shots of the simulator. Our simulator supports automated test sessions, automatic test data collection, logging errors, and also facilitates to simulate several attack scenarios, such as MiTM. Test organizer/developer does not need to develop new device interfaces for pairing methods each time, since the simulator supports simulation of devices having combinations of eight installed capabilities. Therefore, existing and new pairing methods can easily be implemented and tested with minimum development efforts. Figure 1 illustrates a typical test session, while figure 2 illustrates how does test organizer can see the results at the end of the test without taking any extra efforts. The designed simulator is capable of showing final results in tabular as well as in graphical/charts form. We have used java to write the code of simulator. Eclipse is used as an IDE. Some of the third party libraries used in 43
6 the development of this simulator include Bouncy Castle Cryptographic library [27] and Chart2D library [28]. Bouncy Castle is a lightweight collection of APIs used in cryptography. These APIs can work with J2ME, J2SE and there are also APIs for C# programming language. While Chart2D is a Java class library for drawing 2D charts or graphs. Some of the features of the designed simulator are summarized below: 1. Simulator can be used either locally running on one computer, or remotely running on two different computers (i.e. one for Alice and other for Bob) 2. It facilitates logging of test date and time, pairing method s parameters (such as pairing scheme name, total pairing time, false ves, false +ves), and devices capabilities information. 3. It is capable of auto-generating results in tabular form as well as in charts or graphical form. 5. It also provides the entire test log information as a raw-result-set in form of a text file. 5. It facilitates the test organizers to create and store the batch of test-scenarios prior to the experiment/tests. 6. Currently it has support for Bluetooth and networks. 4. EVALUATION OF SIMULATOR We conducted a case study of some of the existing pairing methods using the designed simulator for evaluation purposes. Results of the study have proved to be positive. The objective of the study was to evaluate the usability of four pairing methods as well as the simulator itself. These four methods are Button-to-Button, Display-to-Button, LED-to-Button and Beep-to- Button. First two methods are described in [20], while other two are variations of second method (i.e. Display-to-Button). A brief description of each of the implemented method is given below. (i) Button-to-Button (B-to-B) In this method user is required to press and release the button on both of the devices (i.e. device A and device B) simultaneously with random time-intervals. Both of the simulated devices are programmed to start a timer with the first button press. Then, the elapsed time between subsequent button-presses is exploited to calculate the key. From each time-interval 3-bits of the secret are generated. (ii) Display-to-Button (D-to-B) In this method target device (device B) selects a key, encode and transmit it through random flashes of the display. Whenever the display of device B flashes user is required to press and release button on device A. Likewise previous approach, the elapsed time between each buttonpress is used to calculate the bits of shared key on device A. (iii) LED-to-Button (LED-to-B) This scheme is similar to Display-to-Button approach. The only difference is that instead of a display, an LED is used to transmit the bits of shared secret. This scheme is suitable in the situations where one of the devices has only a button and the other has only a single LED (e.g. wireless access point). This scheme works in the same way as the previous one. Device B chooses a key and transmits it through LED-blinks with random time-intervals. To obtain same 44
7 shared secret on device A, user is responsible to press and release button on the device whenever an LED blinks on device B. (iv) Beep-to-Button (Beep-to-B) This scheme is also a variation of Display-to-Button method. In this scheme, device B selects a key and transmits it through random beeps. User is required to press and release button on first device whenever he/she hears a beep sound from the other device. This method is useful in the scenarios where first device has only a single button and the other device has only a speaker Test Procedure A total of 15 volunteers were recruited. All of the participants were chosen on first-come firstserve basis. All of the participants are students and most of them are PhD students. They all are good computer users. The background profile information of the participants is summarized in table 1. Table 1. Test Participants Profile Information Gender Male: 86.66% Female: 13.33% Age 25 30: 40% 31 36: 40% 37 42: 20% Last academic qualification achieved Bachelor: 26.66% Masters 73.33% Having experience of pairing two devices Yes: 93.33% No: 6.33% The tests were conducted in two environments; a lab-based environment using desktop computers, running Windows XP operating system, and a home-based environment using laptops, running Windows Vista operating system. Before the start of each experiment, we have explained briefly the goals of the experiment along with the description of each pairing method to the participant. Then, a pre-test questionnaire is filled by the participant before starting the test cases. Each experiment consists of three parts. In first part, three methods LED-to-Button, Display-to- Button and Beep-to-Button are tested. Since, the simulator facilitates to generate and store the batch of test scenarios that can be executed later on demand; so, we created a batch of six tests scenarios (two for each method) a priori. This facilitates each participant to perform all of the six tests in one-go without any interruption. In second part of the experiment, each participant performed two repetitions of Button-to-Button method. Left-button of the mouse is used as a button of the simulated device. Participant is required to click on Push-Button simultaneously with random time-intervals on both of the simulated devices. This test requires two machines, one for simulating Alice (button-capable device A) and other for simulating Bob (buttoncapable device B). In third part, we asked the user to build any of the preferred method using the simulator and execute it. It gave the user an opportunity to examine the usability of the designed simulator. Finally, at the end of experiment every participant filled a post-test questionnaire that contains questions regarding the usability (from very easy to not usable at all) of each of the method and the simulator. 45
8 4.2. Results and Discussion Table 2. Results generated by the simulator based on logged data Figure 3: Mean and standard deviation (sd) of pairing time Results presented in this section are obtained from the collected data by means of questionnaire and as well as by the generated log file of the simulator. Table 2 above shows the results that are auto-generated by the simulator. The graphs shown in figures 3 and 4 are also auto-generated by the simulator using logged data. Other graphs shown in figures 5, 6 and 7 are drawn from the data obtained through post-test questionnaire. Microsoft Excel is used to draw these graphs. Figure 4: False negatives (safe error) rate of pairing methods According to the graph shown in figure-3, using a button on both devices is faster than all of the other schemes. Figure 4 shows that B-to-B has the minimum number of false negatives, while 46
9 LED-to-B has the maximum number of false negatives. Figure 5 shows that majority of the participants considered B-to-B and D-to-B methods very easy to use; while none considered B- to-b method as hard to use. Figure 6 shows that most of the users preferred B-to-B and D-to-B methods over LED-to-B and Beep-to-B methods in the case if their devices support all of the four methods. Graph in figure 7 presents the evaluation results for the designed simulator itself. 33% users considered it very easy to use; while 67% considered it as easy to use and none of them considered it as hard, very hard or not usable at all. These results show that the designed simulator is applicable for testing usability of pairing methods from both developer and users point of view. Since the data presented in table 2 and graphs shown in figures 3 7 are selfexplanatory, so instead of describing them in more detail, we would like to discuss how this simulator can be helpful in the research of generalizing or standardizing the secure device pairing mechanism %age of Participants 40 very easy to use 30 easy to use hard to use very hard to use 20 not usabled at all 10 0 B-to-B LED-to-B D-to-B Beep-to-B Schemes Figure 5: Participants response for the usability of pairing methods Par ticipants Pr e fe r e nce s Paricipants Pereference rate (%) Button-to- Button LED-to- Button Display-to- Button Beep-to- Button Sche m e Figure 6: Participants preference of the pairing method 47
10 70 60 %age of Participants very easy to use easy to use hard to use very hard to use not usable at all Difficulty le ve l in us ing s im ulator Figure 7: Level of difficulty in using the simulator As motivation, let s consider a device pairing scenario where device A is only button-capable and device B has display, LED and as well as a speaker. Note that in this scenario we are considering only the four pairing methods along with results obtained as a consequence of our case study. So, in the scenario possible pairing methods are Display-to-Button, LED-to-Button and Beep-to-Button. The questions is how does user (or a system such as [24]) decide the best pairing scheme among three of these possible methods. In this and other similar situations, user or system needs to have the knowledge of priority-level (or some specific measures) of each of the candidate method, so that the best possible pairing method can be selected. This prioritylevel can be set based on the level of security provided by the method and as well as the usability of that method. We believe that the results of this and other more detailed usability studies using the designed simulator can be helpful to prioritize or set weights for each of the pairing method based on their usability and the level of provided security. For example, based on the obtained results of our case study, Display-to-Button has the highest priority in the scenario presented above. So, user/system should select this protocol to initiate the pairing. Further, this simulator can be helpful to rapidly implement and test a large set of pairing schemes in order to specify certain common or standard measures for up-coming pairing protocols. 5. CONCLUSIONS There has been done an immense work in the field of secure device pairing from both academic research and industrial research points of view. However, no one has yet devised the perfect pairing scheme that could be feasible for all kind of or large set of scenarios. Pairing schemes vary in the strength of their security, the level of required user intervention, their susceptibility to environmental conditions and in the required physical capabilities of the devices as well as the required proximity between the devices. So, we still need other mechanisms, infrastructures, tools and techniques that integrate several pairing techniques within a general architecture for providing secure as well as usable pairing mechanisms (such as [24]). One of the reasons for lack of a general, standardized or universal pairing mechanism is an uneven comparative evaluation of the several existing methods. It might be because of unavailability of specialized tools that provide a common platform to test the usability or security of these methods against some common set of measures. This creates the need to design new tools, such as simulators, benchmarks and usability testing frameworks, that can be used to evaluate the existing as well as new pairing schemes [25]. This motivated us towards the design and development of the pairing simulator. Our designed simulator is capable of generating and saving test scenarios a priori, logging test information and generating textual, tabular as well as
11 graphical results from the logged data at the completion of each test case. We believe that it will be very helpful for both the researchers and other less technical persons working in the area of device pairing to rapidly implement and test new pairing protocols without writing extensive piece of code. ACKNOWLEDGEMENTS This research is sponsored/funded by University of Sindh, Jamshoro, Pakistan under Mega Project Phase-I: No.SU/PLAN/F.SCH/650 and the work presented in this paper is part of authors earlier published work [24, 25]. REFERENCES [1] Kumar, A., et al. Caveat eptor: A comparative study of secure device pairing methods. in IEEE International Conference on Pervasive Computing and Communications (PerCom-09) [2] Diffie, W. and M.E. Hellman, New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6): p [3] Stajano, F., The Resurrecting Duckling - What Next?, in Revised Papers from the 8th International Workshop on Security Protocols. 2001, Springer-Verlag. [4] Stajano, F. and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, in Security Protocols p [5] Balfanz, D., et al. Talking to strangers: Authentication in adhoc wireless networks. in Symposium on Network and Distributed Systems Security (NDSS '02) San Diego, California. [6] Mayrhofer, R. and M. Welch. A Human-Verifiable Authentication Protocol Using Visible Laser Light. in Availability, Reliability and Security, ARES The Second International Conference on [7] Mayrhofer, R., M. Hazas, and H. Gellersen, An authentication protocol using ultrasonic ranging: Technical Report. 2006, Lancaster University. [8] Mayrhofer, R. and H. Gellersen. On the Security of Ultrasound as Out-of-band Channel. in Parallel and Distributed Processing Symposium, IPDPS IEEE International [9] Spahic, A., et al., Pre-Authentication using Infrared Privacy, Security, and Trust Within the Context of Pervasive Computing, [10] Shaked, Y. and A. Wool. Cracking the Bluetooth PIN. in MobiSys '05: Proceedings of the 3rd international conference on Mobile systems, applications, and services Seattle, Washington: ACM. [11] Jakobsson, M. and S. Wetzel, Security Weaknesses in Bluetooth, Lecture Notes in Computer Science, : p [12] McCune, J.M., A. Perrig, and M.K. Reiter, Seeing-is-believing: using camera phones for humanverifiable authentication. Security and Privacy, 2005 IEEE Symposium on, 2005: p [13] Saxena, N., et al., Secure Device Pairing based on a Visual Channel. sp, : p [14] Goodrich, M.T., et al. Loud and Clear: Human-Verifiable Authentication Based on Audio. in Distributed Computing Systems, ICDCS th IEEE International Conference [15] Soriente, C., G. Tsudik, and E. Uzun (2007) HAPADEP: Human Asisted Pure Audio Device Pairing. Cryptology eprint Archive, Report 2007/093. [16] Holmquist, L.E., et al., Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts, in Proceedings of the 3rd international conference on Ubiquitous Computing. 2001, Springer-Verlag: Atlanta, Georgia, USA.
12 [17] Mayrhofer, R. and H. Gellersen, Shake Well Before Use: Authentication Based on Accelerometer Data, in 5th International Conference on Pervasive Computing (Pervasive 2007) [18] Castelluccia, C. and P. Mutaf, Shake them up!: a movement-based pairing protocol for CPUconstrained devices, in Proceedings of the 3rd international conference on Mobile systems, applications, and services. 2005, ACM: Seattle, Washington. [19] Varshavsky, A., et al., Amigo: Proximity-Based Authentication of Mobile Devices, in UbiComp 2007: Ubiquitous Computing p [20] Soriente, C., G. Tsudik, and E. Uzun. BEDA: Button-Enabled Device Association, in Internation Workshop on Security and Spontaneous Interaction (IWSSI 2007) [21] Nicholson, A., et al., LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust Establishment, in Pervasive Computing p [22] Lester, J., B. Hannaford, and G. Borriello. Are You with Me? - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person. in Pervasive Computing. 2004: Springer-Verlag (2004) pg [23] Malkani, Y.A., D. Chalmers, and I. Wakeman. Towards a General System for Secure Device Pairing by Demonstration of Physical Proximity (Poster). in UBICOMP Grand Challenge: Workshop on Ubiquitous Computing at a Crossroads: Art, Science, Politics and Design. 6th and 7th January, Huxley Building, Imperial College, London. [24] Malkani, Y.A., et al., Towards a General System for Secure Device Pairing by Demonstration of Physical Proximity, in MWNS-09 co-located with IFIP Networking 2009 Conference, Shaker Verlag: Aachen, Germany. ISBN: p [25] Malkani, Y.A. and L.D. Dhomeja. Secure Device Association for Ad Hoc and Ubiquitous Computing Environments. in 5th IEEE International Conference on Emerging Technologies (ICET-09), [26] Saxena, N. and J. Voris. Pairing Devices with Good Quality Output Interfaces. in International Workshop on Wireless Security and Privacy (WISP) (co-located with ICDCS) [27] The Legion of the Bouncy Castle, Url:ht tp:// bounc yc a stl e. or g/ ja va. ht ml. [28] The Chart2D Tutorial, URL: htt p:/ /c ha r t 2d. s ou rce f or ge. net/ C har t2d_ /Tutorial/Tutorial.htm. Authors Mr. Yasir Arfat Malkani is Lecturer at the Institute of Mathematics and Computer Science (IMCS), University of Sindh, Jamshoro, Pakistan. Currently, he is a DPhil student and Associate Tutor at University of Sussex, UK. He was awarded Vice Chancellor's silver medal for obtaining first position in M.Sc Computer Science at the University of Sindh, Jamshoro (Pakistan) in year He was appointed as a Research Associate in University of Sindh in 2004, and then as a Lecturer in July He was awarded PhD Scholarship from University of Sindh in year 2006 to pursue his DPhil studies at University of Sussex, Brighton, UK. His main area of research is Pervasive Computing, and his research is focused on context awareness and security issues in pervasive and ubiquitous computing environments. Currently, he is working on the design and development of a generic framework for secure pairing of pervasive devices by demonstration of physical proximity. Mr. Lachhman Das Dhomeja is Assistant Professor at the Institute of Information Technology (IIT), University of Sindh, Jamshoro, Pakistan. Currently, he is a DPhil student at University of Sussex, Brighton, UK. He got his Master s degree in Computer Technology from University of Sindh, Jamshoro (Pakistan). He was awarded PhD Scholarship from University of Sindh in year 2006 to pursue his DPhil studies at University of Sussex, Brighton, UK. His main research interest is in the area of Pervasive Computing. Currently, he is working on policy-based adaptive systems for Pervasive Computing environments.
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
How To Verify A Bluetooth Device Pairing With A Human Eye Oracle
Formal Analysis of Authentication in Bluetooth Device Pairing Richard Chang and Vitaly Shmatikov The University of Texas at Austin Abstract. Bluetooth is a popular standard for short-range wireless communications.
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Reading with Mobile Phone & Large Display
Reading with Mobile Phone & Large Display Roswitha Gostner Computing Department Lancaster University, [email protected] Hans Gellersen Computing Department Lancaster University Lancaster, LA1 4WY, UK
Attacks on the Pairing Protocol of Bluetooth v2.1
Attacks on the Pairing Protocol of Bluetooth v2.1 Andrew Y. Lindell June 25, 2008 Abstract The Bluetooth protocol for close-range wireless communication has been a huge success. It is a widely adopted
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
PERFORMANCE ANALYSIS OF WLAN STANDARDS FOR VIDEO CONFERENCING APPLICATIONS
PERFORMANCE ANALYSIS OF WLAN STANDARDS FOR VIDEO CONFERENCING APPLICATIONS Lachhman Das Dhomeja 1, Shazia Abbasi 1, Asad Ali Shaikh 1, Yasir Arfat Malkani 2 1 Institute of Information and Communication
Fig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM
QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:
Shake Them Up! A movement-based pairing protocol for CPU-constrained devices
Shake Them Up! A movement-based pairing protocol for CPU-constrained devices Claude Castelluccia INRIA and University of California, Irvine [email protected] Pars Mutaf INRIA [email protected]
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled
SECURE COMMUNICATIONS Crypto products
FIG 1 The TopSec Mobile is an easy-to-use encryption device that is independent of the mobile phone. It can be connected to virtually any modern mobile phone via its Bluetooth interface. The mobile phone
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Localization System for Roulette and other Table Games
Localization System for Roulette and other Table Games Christoph Ruland 1 1 University of Siegen, Hoelderlinstrasse 3, D-57076 Siegen/Germany; E-Mail: [email protected] Tel.: +49-271-740-2522;
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
GROUPTALK FOR ANDROID VERSION 3.0.0. for Android
for Android Requirements Android version 2.3 or later. Wi-Fi or mobile data connection of at least 20kbit/s network bandwidth. Optional: Bluetooth audio requires Android version 4.0.3 or later. Optional:
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing Jun Rekimoto, Takashi Miyaki, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc. 3-14-13 Higashigotanda,
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Bluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org
IST STREP Project Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer http://www.ist-plastic.org Project Number : IST-26955 Project Title : PLASTIC Deliverable Type : Report
SyncTap: An Interaction Technique for Mobile Networking
SyncTap: An Interaction Technique for Mobile Networking Jun Rekimoto, Yuji Ayatsuka, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc. 3-14-13 Higashigotanda, Shinagawa-ku,
Bootstrapping Secure Channels of Communication Over Public Networks
Bootstrapping Secure Channels of Communication Over Public Networks Human Interaction Security Protocols (HISPs) offer an entirely new way of authenticating teams to create robust security where none exists.
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Honor T1 8.0 FAQ. Issue 01. Date 06/30
Honor T1 8.0 FAQ Issue 01 Date 06/30 1 System and update... 1-1 1.1 Why does my Honor T1 8.0 constantly crash?... 1-1 1.2 Will data be erased if I update my Honor T1 8.0?... 1-1 1.3 Why can't I power
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
Vampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
HUAWEI MediaPad T1 8.0 FAQ HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 06/30
HUAWEI MediaPad T1 8.0 FAQ Issue 01 Date 06/30 HUAWEI TECHNOLOGIES CO., LTD. 1 System and update... 1-1 1.1 Why does my HUAWEI MediaPad T1 8.0 constantly crash?... 1-1 1.2 Will data be erased if I update
Getting Started with Microsoft Office Live Meeting. Published October 2007
Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless
Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009
Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Network Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Logitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
AirStation One-Touch Secure System (AOSS ) A Description of WLAN Security Challenges and Potential Solutions
AirStation One-Touch Secure System (AOSS ) A Description of WLAN Security Challenges and Potential Solutions Buffalo Technology (USA), Inc. October 2004 1 Summary The Wireless Security Problem With the
TELE 301 Network Management. Lecture 16: Remote Terminal Services
TELE 301 Network Management Lecture 16: Remote Terminal Services Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus Remote Terminal Services
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
True False questions (25 points + 5 points extra credit)
Student Name: ISA 656: Network Security Midterm Examination GENERAL INSTRUCTIONS The midterm is worth 110 points (including 10 extra credit points): 25 points of True/False and 75 points of short answer.
Using Lync on a Mac. Before you start. Which version of Lync? Using Lync for impromptu calls. Starting Lync 2011
Using Lync on a Mac Before you start Please read our instructions on how to set up your Lync account and your audio and video devices. Which version of Lync? Because of the features available, we recommend
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
