friendly authentication and communication experience (face) for ubiquitous authentication on mobile...

14
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏魏魏

Post on 21-Dec-2015

224 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on

Mobile Devices

Author: Benjamin Halpert

Presented by: 魏聲尊

Page 2: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Outline

• Introduction

• FACE

• Ad-hoc authentication

Page 3: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Introduction

• Current wireless personal area network (WPAN) standers provide no method for two previously unacquainted parties to authenticate to one another in a trusted manner upon first encounter.

• The target environment for FACE is wirelessly enabled mobile devices that form ad-hoc network.

Page 4: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

FACE• Motivation

– reducing the passage of malicious code from one wireless enabled device to another

– bring people in contact with others they may not typically associate

– the proposed ubiquitous authentication method can assist in reducing identity theft occurrences

• Requirement– Low resource consumption– To include battery life – Processing power– Application footprint

Page 5: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

FACE

• Assumption– all devices within the ad-hoc network have

already agreed on a given routing to communicate

– at lease one device has access to the internet– the user has already been authenticated to the

actual in-hand

• Environment– wirelessly enabled mobile devices

Page 6: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Ad-hoc authentication

• Towards Flexible Credential Verification in Mobile Ad-hoc Network

• SHAD:A Human Centered Security Architecture for Partitionable, Dynamic and Heterogeneous Distributed System

• Talking To Strangers: Authentication in Ad-hoc Wireless Network

Page 7: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Towards Flexible Credential Verification in Mobile Ad-hoc Network

• It improves the likelihood that participants in an ad-hoc network can verify each others credentials despite the lack of access certification and attribute authorities.

• It combines aspect in PGP, XML Signature and SMAL and comprise four architecture.– the XML credential generator

• Create the readable credential assertion statement (CAS)

– the security assertion module• Issue assertion to other users (ASS)

– the verification and validation module • Determinate whether a CAS is authentic

– the key management module• Provide key

Page 8: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Towards Flexible Credential Verification in Mobile Ad-hoc Network

Page 9: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

SHAD:A Human Centered Security Architecture for Partitionable, Dynamic and Heterogeneous Distributed System

• SHAD avoids the use of centralized entities and it is designed to be agile in a peer-to peer environment.

• SHAD will meet the following requirements:– 1.Independence of centralized services or authentication servers.

– 2.Ease of use and the non-obtrusiveness.

– 3.Supporting of disconnections and delegation.

– 4.Minimizing of power consumption and the processing limitations of mobile devices

– Ease of deployment

Page 10: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊
Page 11: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊

Talking To Strangers: Authentication in Ad-hoc Wireless Network

• They provide secure authentication using almost any established public-key-based key exchange protocol.

• A few concepts:– Demonstrative identification– Location-limited channels– Pre-authentication

Page 12: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊
Page 13: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊
Page 14: Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊