ram's ppt
TRANSCRIPT
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 1/16
Optimal Jamming Attack Strategies and NetworkDefense Policies in Wireless Sensor Networks
Under the esteemed guidance of
Assoc.Prof.Veeresh.PDept of CSE,
St. Johns College of Engineering,
Yemmiganur-518002.
By
MadhuK
(M.Tech)
JNTU,CSE.
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 2/16
Contents
Introduction
Output Screens (O/P’s)
Conclusion
SMC (Smart Multimedia Card)
References
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 3/16
SMC O/P’s ConclusionContents:
Introduction References
Mobile devices
Smartcards
Authentication
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 4/16
Authentication
Security Feature
Ensures the Origin of msg
How it can be ?
SMC O/P’s ConclusionContents:
Introduction
References
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 5/16
Problems
Mobile devices lack in security features
(user authentication, content encryption, organizational
policy controls, etc.)
How does the smart card suitable for mobile devices ?
(Size, Card Reader, Interface)
SMC BSC ConclusionContents:
Introduction
References
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 6/16
Solutions
Smart Multimedia Card (SMC)
Bluetooth Smart Card (BSC)
SMC BSC ConclusionContents:
Introduction
References
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 7/16
MAF-Based Mechanism
Components
• Authentication Handler
•User interface
MAF: Multimode Authentication Framework
SMC BSC ConclusionContents:
Introduction
References
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 8/16
• Multimedia card format
• Postage stamp – size
• Security Service token
• Software handler
• Modes – Polling Handler
– Authenticator (PIN , APDUs )
SMC BSC ConclusionContents:
References
Introduction
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 9/16
Certificate(User)
RandomNumber
PIN
(User)
Certificate(User)
Response
Challenge
Public key(User)
Private key(User)
RandomNumber
Enroll
Verify
Respond
Challenge
Device
Enrollment
Certificate
(CA)
Verification
Smart Card
Base Secret
Challenge-Response Protocol
A BA||B
EKR(A||B):B=sign :B
KR
KU
DKU (Sign) :B=A||B:B
C
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 10/16
PIN(User)
Device
Enrollment
Verification
Smart Card
Challenge-Response Protocol
A=15
challengeB=25
EKR(A||B=15:25) =1233
(signature)
A||B=15:25
Signature:25Response
DKU (Signature):25=15:25:25
KU
compareA
Illustrative Example:
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 11/16
BSC ConclusionContents:
Introduction References
Generates an RSA private/public key pair
Stores an RSA public or private key
Retrieves the RSA Public key
Stores or retrieves an X.509 certificate
Sets a host challenge with the private RSA key
Functionalities
SMC
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 12/16
SMC O/P’s ConclusionContents:
Introduction References
BSC Token
Similarities with SMC
– Depends on the smart card chip
– Platform environment (MAF based)
– User Authentication (C-R protocol)
Differences
– Bluetooth channel is used
– PIN entry done at BSC Token
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 13/16
SMC BSCContents:
Introduction References
Many mobile devices such as are being in the today’s
market. Still they are providing important contentencryption , virus protection , etc. which increases theeffort required to compromise a device. With the help of this approach user can able to select different levels of security to make the information as secure as possible.
Conclusion
• Heavily Used PDAs lack in security features suchas user authentication, etc
• MAF provides multiple mode of authentication
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 14/16
1.Smart Card Authentication for Mobile Devices,
Australian Information Security Management Conference,
September 2005. Wayne Jansen, Serban Gavrila, Clément Séveillac.
2.Lanjun Dang, Weidong Kou, Yuxia xiao,”
An Improved Scheme for Unilateral Asymmetric Smart Card
Authentication1”,
Proceedings of the 19th International Conference onAdvanced Information Networking and Applications (AINA’05)
3.Mohan Atreya, Password Based Encryption, <URL:
http://www.rsasecurity.com/products/bsafe/whitepapers/Article3-
PBE.pdf>.
SMC BSCContents:
Introduction ReferencesConclusion
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 15/16
Thank You !
Presented by :
Ramanjaneyulu K
(M.Tech)
JNTU,CSE.
8/4/2019 Ram's ppt
http://slidepdf.com/reader/full/rams-ppt 16/16
Any Queries ?