ram's ppt

16
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks Under the esteemed guidance of Assoc.Prof.Veeresh.P Dept of CSE, St. Johns College of Engineering, Yemmiganur-518002 . By MadhuK (M.Tech) JNTU,CSE.

Upload: kuppalama

Post on 07-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 1/16

Optimal Jamming Attack Strategies and NetworkDefense Policies in Wireless Sensor Networks

Under the esteemed guidance of 

Assoc.Prof.Veeresh.PDept of CSE,

St. Johns College of Engineering,

Yemmiganur-518002.

By

MadhuK

(M.Tech)

JNTU,CSE.

Page 2: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 2/16

Contents

Introduction

Output Screens (O/P’s) 

Conclusion

SMC (Smart Multimedia Card) 

References

Page 3: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 3/16

SMC O/P’s ConclusionContents:

Introduction References

Mobile devices

Smartcards

Authentication

Page 4: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 4/16

Authentication

Security Feature

Ensures the Origin of msg 

How it can be ?

SMC O/P’s  ConclusionContents:

Introduction

References

Page 5: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 5/16

Problems

Mobile devices lack in security features

(user authentication, content encryption, organizational

policy controls, etc.)

How does the smart card suitable for mobile devices ?

(Size, Card Reader, Interface)

SMC BSC ConclusionContents:

Introduction

References

Page 6: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 6/16

Solutions

Smart Multimedia Card (SMC)

Bluetooth Smart Card (BSC)

SMC BSC ConclusionContents:

Introduction

References

Page 7: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 7/16

MAF-Based Mechanism

Components

• Authentication Handler

•User interface

 MAF: Multimode Authentication Framework 

SMC BSC ConclusionContents:

Introduction

References

Page 8: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 8/16

• Multimedia card format

• Postage stamp  – size

• Security Service token

• Software handler

• Modes –  Polling Handler

 –  Authenticator (PIN , APDUs )

SMC BSC ConclusionContents:

References

Introduction

Page 9: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 9/16

Certificate(User)

RandomNumber

PIN

(User)

Certificate(User)

Response

Challenge

Public key(User)

Private key(User)

RandomNumber

Enroll

Verify

Respond

Challenge

Device

Enrollment

Certificate

(CA)

Verification

Smart Card

Base Secret

Challenge-Response Protocol

A BA||B

EKR(A||B):B=sign :B

KR

KU

DKU (Sign) :B=A||B:B 

C

Page 10: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 10/16

PIN(User)

Device

Enrollment

Verification

Smart Card

Challenge-Response Protocol

A=15

challengeB=25

EKR(A||B=15:25) =1233

(signature)

A||B=15:25

Signature:25Response

DKU (Signature):25=15:25:25 

KU

compareA

Illustrative Example:

Page 11: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 11/16

BSC ConclusionContents:

Introduction References

Generates an RSA private/public key pair

Stores an RSA public or private key

Retrieves the RSA Public key

Stores or retrieves an X.509 certificate

Sets a host challenge with the private RSA key

Functionalities

SMC

Page 12: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 12/16

SMC O/P’s ConclusionContents:

Introduction References

BSC Token

Similarities with SMC

 – Depends on the smart card chip

 – Platform environment (MAF based)

 – User Authentication (C-R protocol)

Differences

 – Bluetooth channel is used

 – PIN entry done at BSC Token

Page 13: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 13/16

SMC BSCContents:

Introduction References

Many mobile devices such as are being in the today’s 

market. Still they are providing important contentencryption , virus protection , etc. which increases theeffort required to compromise a device. With the help of this approach user can able to select different levels of security to make the information as secure as possible.

Conclusion

• Heavily Used PDAs lack in security features suchas user authentication, etc

•  MAF provides multiple mode of authentication

Page 14: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 14/16

1.Smart Card Authentication for Mobile Devices,

Australian Information Security Management Conference,

September 2005. Wayne Jansen, Serban Gavrila, Clément Séveillac.

2.Lanjun Dang, Weidong Kou, Yuxia xiao,” 

An Improved Scheme for Unilateral Asymmetric Smart Card

Authentication1”,

Proceedings of the 19th International Conference onAdvanced Information Networking and Applications (AINA’05) 

3.Mohan Atreya, Password Based Encryption, <URL:

http://www.rsasecurity.com/products/bsafe/whitepapers/Article3-

PBE.pdf>.

SMC BSCContents:

Introduction ReferencesConclusion

Page 15: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 15/16

Thank You !

Presented by :

Ramanjaneyulu K

(M.Tech)

JNTU,CSE.

Page 16: Ram's ppt

8/4/2019 Ram's ppt

http://slidepdf.com/reader/full/rams-ppt 16/16

Any Queries ?