AAA and PKI in Ad Hoc Networks

Size: px
Start display at page:

Download "AAA and PKI in Ad Hoc Networks"

Transcription

1 AAA and PKI in Ad Hoc Networks Pradip Lamsal Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Abstract Both AAA and PKI are frameworks that address security concerns in a network. AAA provides a mechanism for authentication, authorization and accounting whereas PKI provides a mechanism for managing cryptographic keys. The use of these frameworks is limited mainly to networks with fixed infrastructure. Their use in networks with no fixed infrastructure (or ad hoc networks) is still a research topic. In this paper we propose some ideas for using these technologies in ad hoc networking environment. The ideas that we propose here are still at the conceptual level and require more work to make them feasible. KEYWORDS: ad hoc networks, PKI, AAA 1 Introduction For the most of the twentieth century the telcommunications technology was limited to wire line telephony system. Since the start of the 90s mobile phones have become widespread and this started changing the telecommunications network topology. In this mobile communications only the terminal devices are mobile, the infrastructure remains fixed. An ad hoc netwok [3] employs a different networking topology, where both the terminal devices and the infrastructure are mobile. In order words, all the devices involved in an ad hoc network have to work both as a terminal device and a part of the infrastructure. The ad hoc network can be formed randomly by two or more devices and any device can enter and leave the network at their own will. With the advancement of telecommunications technology the issues associated with it have also advanced. One of the fundamental issues in telecommunications domain is security: security of both the infrastructure (including terminal devices) and information it carries. With the potential merger of telecommunications and networking technologies the issue of security becomes even more important. The same network can now potentially carry notso-important chat between friends to highly sensitive financial data and military secrets, in some cases. The security issues that exist in wire line telecommunications are hightened in the wireless telecommunications (only terminal devices mobile) because of the vulnerability of wireless links between the terminal devices and the fixed infrastructure. In ad hoc networks, this vulnerability of wireless links becomes more serious due to the nature of ad 1

2 hoc network topology. All devices are wirelessly linked to each other and each of them are equally prone to all the wireless security threats, including physical theft of the devices. There have been a lot of work done to solve a wide variety of security problems. A lot of research have resulted in several security solutions, which address different security problems. There are two solutions that we would like to mention here: Authentication, Authorization and Accounting (AAA) [5] and Public Key Infrastructure (PKI) [4]. AAA is a framework which enables collection of authentication, authorization and accounting data to a centralized server. PKI, on the other hand is a framework, which allows proper management of cryptographic keys. At the moment the widespread use of these two security solutions is limited to networks with fixed infrastructure, where a centralized device is readily available or can be allocated to act as an AAA or a PKI server. It is still unsure whether these frameworks can be ported to ad hoc networks with no fixed infrastructure. In this paper, we present some design proposals to use AAA and PKI in ad hoc networks. The rest of the paper is organized as follows: Section 2 contains our perception of network topologies, seciton 3 contains a short introduction to AAA and PKI, section 4 and section 5 have short description of these technologies in different types of networks and in section 6 we propose our solution. 2 Network Topologies In order to understand why ad hoc networks pose difficulties in using AAA and PKI we need to understand the topology of ad hoc networks and how ad hoc networks differ from other networks. In this section we look at the network topologies. We divide networks into three different categories. 1 Fixed Infrastructure Network: In a fixed infrastructure network topology, the infrastructure is fixed and the terminal device can be either fixed or mobile. The wireline telephony system, mobile telecommunications such as GSM, UMTS, and mobile IP are some examples of fixed infrastructure networks. 2 Ad Hoc Network: In an ad hoc network, there is no fixed infrastructure at all. All the devices are mobile and they can all be terminal devices. A nework is formed when two or more devices form a connection. 3 Semi Ad Hoc Network: A semi ad hoc network consists of two subnetworks: an ad hoc subnetwork and a fixed subnetwork. The ad hoc subnetwork is connected to the edge of the fixed subnetwork. For instance, Wi-Fi [2] is an example of semi ad hoc network because it consists of an ad hoc subnetwork and a fixed subnetwork. The ad hoc subnetwork accessess the fixed subnetwork via an access point. 3 AAA and PKI In this section we describe the fundamental principles of AAA and PKI and explain how these technologies are used in conventional wireline communications. 2

3 3.1 AAA AAA is a framework that enables authentication and authorization of a user accessing a network and also allows for collection of accounting information. When a user wants to access a network, it sends a request for access to the AAA client. AAA protocol does not specify the protocol between the user and the AAA client. Once the AAA client receives such a request it sends an AAA request to the AAA server on behalf of the user. The AAA server authenticates the user by evaluating the request and responds the AAA client with proper authorization. The AAA server is also capable of querying the AAA client for accounting information. AAA framework consists of three fundamental compoments: AAA server, Application Specific Modules (ASMs) and Repository. This is shown in figure 1. Client AAA Server AAA server ASM Repository Figure 1: AAA Architecture The generic AAA server has rules to evaluate the request and to make decisions about authentication and authorization. However, this server is generic and the requests are so application specific that the server delegates these requests to the ASMs. All the events are logged in the policy and event repository. This repository can be used to evaluate further requests and to access accounting information for a specfic user. An exmaple of AAA framework is diameter [9] base protocol. This base protocol provides the basic framework and is supplemented by AAA Transport Profile [1] and AAA Applications [7, 8]. The transport profile addresses the transport issues whereas the applications address the application specific issues. The base protocol, as it is, can only be used for accounting whereas for authentication and authorization the base protocol must be extended for a particular application. A diameter client must support the base protocol and any one application specific protocol whereas any diameter server must support both the base protocol and all the application specific protocols. Without supporting all the application specific protocols the server is unable to provide services for those applications. 3.2 PKI PKI is a framework that is aimed at supporting the management of public keys. A public key and its corresponding private key are used to encrypt and decrypt messages. The public 3

4 key is generally available in public whereas the private key is owned (or at least assumed to be owned) only by the real owner. PKI uses certificates to distribute public keys. A certificate maps a person s identity to his public key. Trust is a very important aspect of PKI. When someone uses a public key they have to trust the Certificate Agency (CA) issuing that public key or the certificate containing that public key. There are two types of trust models used in PKI frameworks: hierarchical trust model and web-of-trust trust model. ITU s X.509 [4] is based on hierarchical trust model and Pretty Good Privacy (PGP) [11] is based on web-of-trust trust model. Detailed information on the PKI trust models can be found in [6]. 4 AAA and PKI in Fixed Infrastructure Networks Both in AAA and PKI, it is assumed that a centralized server handles the core functionality. In networks with fixed infrastructure it is feasible to dedicate a seperate server to handle this functionality. A lot of networks already have PKI framework in place. Adding AAA framework is not that technically challenging. 5 AAA and PKI in Semi Ad Hoc Networks From the perspective of AAA and PKI semi ad hoc networks are more or less very similar to the networks with fixed infrastructure. This is because both AAA and PKI functionality can be handled in the fixed subnetwork of the network. Both servers can reside at the access point and the nodes in the as hoc subnetwork can use their services via the access point. After being authenticated to the whole network the mobile nodes can be a part of the ad hoc subnetwork and enjoy the services. 6 AAA and PKI in Ad Hoc Networks In this section we look at how AAA and PKI can be used in ad hoc domain. 6.1 Issues with Centralized Server As mentioned earlier, there is no fixed infrastructure at all in an ad hoc network. Since any mobile terminal can come and go at any time, the idea of a teminal which is available all the time does not fit in the paradigm. Also, the terminals in the network are very mobile. In fact, they can be so mobile that they can easily go beyond the boundary of the network. For this reason the concept of a centralized server poses a major issue in ad hoc networks. 4

5 6.2 Proposals There have not been a lot of implementations of AAA and PKI in ad hoc networks. There are still a lot of research conducted on different aspects of ad hoc networks. Although PKI has been used in other networking topologies its use in ad hoc domain still raises several issues. In this section we consider a few options for porting AAA and PKI in ad hoc networks and some concerns about those technologies. These options are at the conceptual level and they do not describe any implementation level details. For each of the options we list its advantages and disadvantages. Elected Server Model This model borrows the concept of centralized server where the participants elect one of them to act as the main server for the session. The network also consists of a standby server and this standby server takes over if the main server suddenly disappears from the network. The participants can employ any mechanism to elect the main server. One simple mechanism is to elect the oldest participant to be the main server and the second oldest to be the stanby server. This is shown in figure 2. One request for the whole network Main Server New Participant Standby Server Ad Hoc Network Figure 2: Elected Server Model: Conceptual View In this model, both AAA and PKI functionality must exist in all the participants. The main server is responsible for authentication, authorization and also needs to collect and store the accounting information. It has to poll other participants for accounting information. The trust model employed in this proposal is two-level hierarchical model. The main server behaves as a gateway for trust meaning that if a participant is trusted by the main server then the network (all other participants included) automatically trusts that participant. Inside the network all participants have complete trust among each other. The lifecycle of a participant inside the network can be divided into three categories. First phase is when a participant enters the network. In this phase this new participant is authenticated by the main server. The main server authorizes this new participant to use the resources in the network. This authorization is based on the authorization rules of the main server, which in fact is the AAA server. In the second phase of the lifecycle, this participant become a part of the network. In this phase it has equal trust relationship with other participants in the network, meaning no further authentication is required. Of course, what 5

6 this new participant can do inside the network is determined by what it is authorized to do by the main server. The last phase is involves leaving the network. A participant can either leave gracefully when it informs the main server that it is leaving the network or quit accidently without informing the network (or without informing any other participant). When a participant leaves the network, its previous existance disappears. If it wants to rejoin the network, it has to start from the first phase. The lifecycle for the main and standby servers is a bit different because of the fact that they do a lot more than the other participants. When the main server leaves the network gracefully, it has to handover its reponsibility to the standby server. The standby server, in turn, organises an election to select a new standby server. However, if the main server quits accidently then the standby server needs to take over as the main server and the network can then elect a standby server. For this, the standby server has to constantly monitor the main server and be prepared to be the main server at any time. Protocol The protocol, which is used by the client to access the network, consists of request and response messages. This is shown in figure 3. Client Request Response Server Server2 Accept Session key Session key accepted Trust cache Broadcast client info Figure 3: Elected Server Model: Protocol Overview The client requests the main server for the access. The client specifies what resources it would like to access and what kind of access it would like. The main server does the evaluation and sends response to the client. This response indicates the client what kind of access the server can give to that client on behalf of the network. The client can either accept or reject the response. If the client decides to accept what ther main server offers then the client and the main server can exchange a session key. This session key then becomes a token of trust between the new participant and the network. This trust is then stored in the trust cache for further use, if necessary. The trust cache is local to all the participants. Once the client becomes is accepted in the network, the main server sends the client s information to all other participants so that those participants have the up to date information of the network. Next we discuss some advantages and disadvantages of this model. Advantages i Everything is centralized and accounting information can be easily obtained by 6

7 querying the main server. Disadvantages i Each mobile terminal node must act as an AAA and PKI server. This is quite demanding considering the fact that the mobile devices have limited computational power, limited memory, limited battery life etc. This makes all the terminals very bulky in terms of the extra functionality they are expected to support for the network. Most of the time and for most of the terminals this extra functionality is hardly used for a given session. ii From the trust point of view, this is a very dangerous model. Once a mobile terminal enters the network there is nothing stopping it to become the server at a later stage given that it enters the network at the right time. Once it becomes the server, it has equal authority and the rest of the participants are expected to trust it completely. Now, if this terminal happens to be an advarsary and somehow enters the network, the advarsary terminal can have the control of the entire network. iii The handover mechanism is very weak. All the participants have to constantly monitor if the server is still in the network or not. Not only that, they all have to be aware when standby server takes over and when that happens, they have to elect another participant as the new standby server. This makes all the participants a potential server. iv The exit from the network is very difficult to track. Since the main server cannot keep track of all the participants they should all have some kind of session specific information which expires once a participant loses connection with its last contact. All Server Model This model does not have the concept of "the server" but all the participants become a server of their own. Each of them is responsible of taking care of itself and they are all independent of each other. This is illustrated in figure 4. One request per mobile device New Participant Ad Hoc Network Figure 4: All Server Model: Conceptual View 7

8 In this model both AAA and PKI functionality must exist in all the participants. All the participants act as both the server and the client. When acting as the server, each participant must authenticate its clients, which are requesting access. The server gives adequate authorization indicating what each client is allowed to do. The server also records the accounting information for each of the clients. When acting as a client, each participant should request for authentication and authorization from the server. This model employes the web-of-trust trust model. The trust is per device and trust between any two participants does not extend beyond those participants. The access of a participant is limited only to those servers with which it has established trust. The lifecycle of a participant can be divided into three phases. The first phase is when the participant enters the network. Entering the network here refers to having connection to at least one of the participants of the network. In this phase, the new participant is authenticated by the server it is trying to access. The server authenticates this participant. After a successful authentication the participant is granted authorization and it can access the server. The second phase is after the participant enters the network. In this phase the participant can access the servers with which it established connection earlier. The last phase of the lifecycle involves leaving the network. It is not important whether a participant leaves the network gracefully or quits accidently. As soon as the the connection is cut off, rejoining the network requires starting from the first phase. Protocol The protocol, which is used by the client to access the network, consists of request and response messages. This is illustrated in figure 5. Client Server Request Response Accept Session key Session key accepted Trust cache Figure 5: All Server Model: Protocol Overview The client requests each of the servers for the access. The basic mechanism is quite similar to the electer server model. A session key is established for each server and that session key is valid only for that server. This trust is stored on each server for each client and can be used in the future, if required. Advantages i This model has a better security model than the previous one. This is because if a device is compromised, this does not compromise the whole network as access to a device does not give access to other devices automatically. 8

9 ii The last phase of the lifecycle can be desgined to allow for better caching. It is possible to make the server remember its clients for a certain amount of time if the clients leave gracefully. This can help the server establish stronger trust relationship with the same client next time. Disadvantages i This model is more like peer-to-peer computing model rather than a network. ii If a network contains a lot of participants, the overhead of authentication and authorization is quite big. iii This model contains all the issues related to the limited power of mobile terminal devices such as computational power, memory, battery life etc. iv Accounting information of a device is distributed across the network. If an external entity wants to collect this accounting information, it has to poll all the devices. This can be quite a waste of the bandwidth. Group Server Model This model has the concept of server but the functionality of the server is shared among a set of devices in the network. This model is based on the theory behind threshold cryptography [10]. Out of M (=m+n) mobile device any m devices, as a group, can act as the server for the network. This is illustrated in figure 6. One request for the whole network New Participant Group of devices making the server Ad Hoc Network Figure 6: Group Server Model: Conceptual View Both the AAA and PKI functionalities are distributed among the mobile devices. When the network receives a request from a new participant to join the network, that request is distributed over the m devices, which are acting as a server. Different devices are responsible for different aspects of the functionality and the the final decision is based on the combined result of the server. A client can send its request to join the network to any mobile device in the network. The mobile device which receives such a request from the client becomes the interface device for that client. This interface device delegates the requests to those mobile devices, which constitute the server in the network. The interface device collects the responses from other devices, which received the requests and responds to the client 9

10 with the result. The way how and where the accounting information is stored is still an open issue. The trust model in this group server model is more like hierarchical. However, this hierarchical model is a bit different from the hierarchical model of the Elected Server Model or the one described in X.509. From a participant s point of view, the trust is established between the participant and the mobile device it comes in contact with first. So, the participant perceives that mobile device as the trusted third party. However, for the devices, collectively acting as the server, the trust is between the collection of the devices and the new participant. So, in reality, there is no single trusted third party. And, the trust established this way is the trust between the new participant and the network irrespective of how many devices worked together to make the server. The lifecycle of a participant in this model is exactly the same as the one in the Elected Server Model. The only difference here is that instead of one device acting as the server there is a group of devices that act as the server. Because of this distinction, this model does not have the concept of main server and standby server. This model requires each terminal device to have some functionality of AAA and PKI server. Here, the AAA and PKI functionality is distributed over several terminal devices and the result is a collective work of those devices. For instance, the authentication of a new participant can be distrubuted over three different devices and their collective result can determine the result of authentication. This can be made more robust by delegating the task to any m+n devices and taking the result from any m devices. This can accomodate any possible disagreement among devices or even the possibility of n devices being taken out of the network. Storing accounting information, however, needs careful thought. Once a terminal device is authenticated, it has access to the whole network. Afterwards, it can become one of the devices providing a part of AAA and PKI services to other terminal devices. When the device leaves the network, it does not have a big impact to the AAA and PKI services of the network. Protocol The protocol, which is used by the client to access the network, consists of request and response messages. This is illustrated in figure 7 Client Request Response Accept Session key Accept session key S1 Work1 Work2 Work3 S2 Reply1 Reply2 Reply3 Store trust S3 S4 Figure 7: Group Server Model: Protocol Overview 10

11 The client sends a request to any server in the network. The server which received the request becomes the point of contact of the client to the network. Once this server receives the request it distributes the task of evaluating the request to those m servers and receives the responses. It then examines the responses and evaluates the final response and sends it to the client. Like in the previous protocols the client can either accept or reject the response. If accepted, the session key is established and trust is cached. Advantages i If a terminal device quits the network accidently, the impact of this incident to the overall AAA and PKI functionality is minimal since this functionality can be redelegated to another device. ii Distributing the functionality over several terminal devices also reduces the overall impact of up to n devices being compromised. iii The trust model is reasonably straightforward and is not on a per device basis. Disadvantages i The distribution of services becomes a significant issue if there are less participants in the network. ii Storing accounting information is an issue. This issue can be resolved by making each terminal device record its resource used by other devices. 6.3 Open Issues and Future Work All the proposed models have some common issues. These issues have less to do with the models but more to do with the characteristics of the mobile devices. Due to the limited capability of mobile devices in terms of processing power, memory and power requirements, these devices are not capable of having all the heavy functionalities on them. These devices have to work as routers as well in addition to being terminal devices. Expecting these mobile devices such as a mobile phone or a PDA (Personal Digital Assistant) to have the additional functionalities can be beyond what they are designed for. If these mobile devices start to become more powerful like laptops, such expectation seems feasible. Having said that we believe that further studies are needed in the following areas: 1 Work can be done to slim down the diameter protocol so that it is more suitable for less powered devices. 2 Since mobile devices have to work as routers in ad hoc networks, work can be done to combine routing and authentication. 3 In all the models that are propsed in this paper, authentication and authorization do not require that much of storage unlike accounting information. One important reason for storing accounting is for payment. One area where investigation can occur is some form of pre paid system where a participant has to pay the network during 11

12 authentication and then use that credit to use the services or resources. Depending on the model used, pre-payment can be done either to the network or individual devices. 4 The lifecycle of a mobile device should be investigated in more details for all the models. 5 The implementation details are missing. To consider the details some commonly available devices can be investigated in terms of memory available, computational power of the processor and the possibility of having trust cache. 7 Concluding Remarks Although AAA and PKI are used in fixed infrastructure networks their use in mobile ad hoc networks is still more into research domain. The three proposals that we have presented in this paper are not meant provide the complete solution but they are a good starting point for further research. These models are still more at conceptual level. All models need more and detailed work and attention should be paid to the implementation details. References [1] BERNARD ABOBA, JONATHAN WOOD; AAA transport profile, RFC 3539; IETF Internet Working Group [2] WI-FI ALLIANCE; [3] SCOTT CORSON, JOSEPH MACKER; Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations, RFC 2501; IETF Internet Working Group [4] ITU-T; Information technology - open systems interconnection - the directory: Public key and attribute certificate frameworks; ITU-T Recommendation X.509 ISO/IEC [5] LEON GOMMANS JOHN R. VOLLBRECHT CEES T.A.M. DE LAAT, GEORGE M. GROSS, DAVID W. SPENCE; Generic AAA architecture, RFC 2903; IETF Internet Working Group [6] PRADIP LAMSAL; Understanding public key cryptography and PKI; [7] DAVID SPENCE PAT R. CALHOUN, GLEN ZORN, DAVID MITTON; Diameter network access server application, IETF draft; IETF Internet Working Group [8] JARI ARKKO ERIC GUTTMAN PAT R. CALHOUN, JOHN LOUGHNEY, GLEN ZORN; Diameter base protocol, RFC 2903; IETF Internet Working Group [9] TONY JOHANSSON PAT R. CALHOUN, CHARLES PERKINS; Diameter mobile IP application, IETF draft; IETF Internet Working Group

13 [10] LIDONG ZHOU, ZYGMUNT J. HAAS; Security ad hoc networks; IEEE Networks 13(6):24 30; [11] PHIL ZIMMERMAN; The Official PGP User s Guide; MIT Press;

Distributed AAA: Proposals for Ad Hoc Networks

Distributed AAA: Proposals for Ad Hoc Networks Distributed AAA: Proposals for Ad Hoc Networks Pradip Lamsal Department of Computer Science University of Helsinki, Finland pradip.lamsal@helsinki.fi ABSTRACT AAA frameworks such as diameter protocol allows

More information

Considerations about the Architecture Solutions for PKI in Ad-hoc-Networks

Considerations about the Architecture Solutions for PKI in Ad-hoc-Networks Considerations about the Architecture Solutions for PKI in Ad-hoc-Networks MIHAI-LICĂ PURA, VICTOR-VALERIU PATRICIU Military Electronic and Informatics Systems Faculty Military Technical Academy 81-83

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

Securing Route Optimisation in NEMO

Securing Route Optimisation in NEMO Securing Route Optimisation in NEMO María Calderón, Carlos J. Bernardos, Marcelo Bagnulo and Ignacio Soto University Carlos III of Madrid Avda. Universidad 30, 28911 Leganés, Madrid, SPAIN E-mail: {maria,

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

An Analysis of The Fast Handovers for Mobile IPv6 Protocol

An Analysis of The Fast Handovers for Mobile IPv6 Protocol An Analysis of The Fast Handovers for Mobile IPv6 Protocol Janne Lundberg Helsinki University of Technology Laboratory for Theoretical Computer Science May 28, 2003 Abstract Fast Handovers for Mobile IPv6

More information

Network-centric Security Design for Mobile Ad Hoc Networks

Network-centric Security Design for Mobile Ad Hoc Networks Network-centric Security Design for Mobile Ad Hoc Networks Songwu Lu Students: Hao Yang, Garry Zhong, Haiyun Luo UCLA Computer Science Outline Problem: Network security in MANET 4 key challenges Current

More information

Network Working Group Request for Comments: 1984 Category: Informational August 1996

Network Working Group Request for Comments: 1984 Category: Informational August 1996 Network Working Group IAB Request for Comments: 1984 IESG Category: Informational August 1996 IAB and IESG Statement on Cryptographic Technology and the Internet Status of This Memo This memo provides

More information

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution

Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution Introduction to Network Security Missouri S&T University CPE 5420 Key Management and Distribution Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University

More information

Firmware Updates for Internet of Things Devices

Firmware Updates for Internet of Things Devices Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware

More information

SIP-Based Multimedia Services Provision in Ad Hoc Networks

SIP-Based Multimedia Services Provision in Ad Hoc Networks SIP-Based Multimedia Services Provision in Ad Hoc Networks Y. Rebahi, D. Sisalem, U. Depirianto Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 31 10589 Berlin, Germany {rebahi, sisalem, depirianto}@fokus.fraunhofer.de

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Quality of service issues for world-wide mobile telephony

Quality of service issues for world-wide mobile telephony Quality of service issues for world-wide mobile telephony Gregor v. Bochmann e-mail: bochmann@site.uottawa.ca School of Information Technology and Engineering (SITE) University of Ottawa This presentation

More information

Mobile WiMAX Security

Mobile WiMAX Security WHITE PAPER WHITE PAPER Makes Mobile WiMAX Simple Mobile WiMAX Security Glossary 3 Abstract 5 Introduction to Security in Wireless Networks 6 Data Link Layer Security 8 Authentication 8 Security Association

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 8: Protocols for public-key management Ion Petre Department of IT, Åbo Akademi University 1 Key management two problems

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Trust in Ad hoc Networks A Novel Approach based on Clustering

Trust in Ad hoc Networks A Novel Approach based on Clustering Trust in Ad hoc Networks A Novel Approach based on Clustering J. Boodnah and E.M. Scharf Department of Electronic Engineering, Queen Mary, University of London Abstract Ad hoc Networks by virtue of their

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

WLAN Security Overview

WLAN Security Overview WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith

More information

An OPNET Modeler Simulation Study of the VISA Protocol for Multi-Network Authentication

An OPNET Modeler Simulation Study of the VISA Protocol for Multi-Network Authentication An OPNET Modeler Simulation Study of the VISA Protocol for Multi-Network Authentication Aarti Bharathan, Janise McNair Wireless & Mobile Systems Laboratory Electrical & Computer Engineering University

More information

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

More information

Send documentation comments to

Send documentation comments to CHAPTER 6 Configuring Certificate Authorities and Digital Certificates This chapter includes the following topics: Information About Certificate Authorities and Digital Certificates, page 6-1 Default Settings,

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL RESEARCH REPORT A Scalable Extension of Group Key Management Protocol by R. Poovendran, S. Ahmed, S. Corson, J. Baras CSHCN T.R. 98-5 (ISR T.R. 98-14) The Center for Satellite and Hybrid Communication

More information

Roaming, Accounting and Seamless Handover in EAP-TLS Authenticated Networks

Roaming, Accounting and Seamless Handover in EAP-TLS Authenticated Networks Roaming, Accounting and Seamless Handover in EAP-TLS Authenticated Networks Carolin Latze and Ulrich Ultes-Nitsche University of Fribourg, DIUF Fribourg, Switzerland E-Mail: {carolin.latze uun}@unifr.ch

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Network Encryption Methods

Network Encryption Methods Network Encryption Network Encryption Methods CSC362, Information Security Objectives understanding the impact of employing encryption at different protocol layers application layer encryption transport

More information

Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World

Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World Pekka Nikander Ericsson Research Pekka.Nikander@nomadiclab.com Abstract. In the IPv6 world, the IP protocol itself, i.e.,

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Internet Engineering Task Force (IETF) Huawei Technologies November 2013

Internet Engineering Task Force (IETF) Huawei Technologies November 2013 Internet Engineering Task Force (IETF) Request for Comments: 7075 Updates: 6733 Category: Standards Track ISSN: 2070-1721 T. Tsou Huawei Technologies (USA) R. Hao Comcast Cable T. Taylor, Ed. Huawei Technologies

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Security and Anonymity

Security and Anonymity Security and Anonymity Distributed Systems need a network to send messages. Any message you send in a network can be looked at by any router or machine it goes through. Further if your machine is on the

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Internet Engineering Task Force (IETF) Request for Comments: 5749 Category: Standards Track. Toshiba March 2010

Internet Engineering Task Force (IETF) Request for Comments: 5749 Category: Standards Track. Toshiba March 2010 Internet Engineering Task Force (IETF) Request for Comments: 5749 Category: Standards Track ISSN: 2070-1721 K. Hoeper, Ed. M. Nakhjiri Motorola Y. Ohba, Ed. Toshiba March 2010 Distribution of EAP-Based

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

Token-based authorization of Connection Oriented Network resources.

Token-based authorization of Connection Oriented Network resources. Token-based authorization of Connection Oriented Network resources. Leon Gommans, Franco Travostino, John Vollbrecht, Cees de Laat, Robert Meijer. Abstract. Authentication, Authorization and Accounting

More information

Configuring Certificate Authorities and Digital Certificates

Configuring Certificate Authorities and Digital Certificates CHAPTER 43 Configuring Certificate Authorities and Digital Certificates Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to obtain and use digital certificates

More information

Jaringan Komputer (CCNA-1)

Jaringan Komputer (CCNA-1) Jaringan Komputer (CCNA-1) #2 Configuring a Network Operating System Susmini I. Lestariningati, M.T Introduction (1) Home networks typically interconnect a wide variety of end devices including PCs, laptops,

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Secure Communications on VoIP Networks

Secure Communications on VoIP Networks Mediatrix Multi-service Gateways v. 2.0.41.762 2017-12-21 Table of Contents Table of Contents Internet Telephony Network Security 4 Authentication 4 X-509 Certificates 4 Transport Layer Security (TLS)

More information

Data Handling Security Policy

Data Handling Security Policy Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,

More information

Internet Engineering Task Force (IETF) Request for Comments: 5904 Category: Informational June 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5904 Category: Informational June 2010 ISSN: Internet Engineering Task Force (IETF) G. Zorn Request for Comments: 5904 Network Zen Category: Informational June 2010 ISSN: 2070-1721 Abstract RADIUS Attributes for IEEE 802.16 Privacy Key Management

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

WPA-GPG: Wireless authentication using GPG Key

WPA-GPG: Wireless authentication using GPG Key Università degli Studi di Bologna DEIS WPA-GPG: Wireless authentication using GPG Key Gabriele Monti December 9, 2009 DEIS Technical Report no. DEIS-LIA-007-09 LIA Series no. 97 WPA-GPG: Wireless authentication

More information

Application Firewalls

Application Firewalls Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

HA b. HA a. FW b. FW a. MN b GW 22 GW 12

HA b. HA a. FW b. FW a. MN b GW 22 GW 12 Complexity of route optimization and mobility management Catharina Candolin Catharina.Candolin@hut.fi Hannu H. Kari Hannu.Kari@hut.fi Laboratory for Theoretical Computer Science Helsinki University of

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos Kerberos and Public-Key Infrastructure Key Points Kerberos is an authentication service designed for use in a distributed environment. Kerberos makes use of a thrusted third-part authentication service

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Request for Comments: Ericsson February 2004

Request for Comments: Ericsson February 2004 Network Working Group Request for Comments: 3702 Category: Informational J. Loughney Nokia G. Camarillo Ericsson February 2004 Authentication, Authorization, and Accounting Requirements for the Session

More information

Signature schemes variations

Signature schemes variations Signature schemes variations Multisignatures: several signers create a signature on a single message, that is shorter and faster to verify than when a standard signature scheme is used in a straightforward

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

Keywords Social Networks, Mobile presence services, PGP, PresenceCloud, Distributed presence servers

Keywords Social Networks, Mobile presence services, PGP, PresenceCloud, Distributed presence servers Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Scalable Mobile

More information

5. Authentication Contents

5. Authentication Contents Contents 1 / 47 Introduction Password-based Authentication Address-based Authentication Cryptographic Authentication Protocols Eavesdropping and Server Database Reading Trusted Intermediaries Session Key

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Category: Informational

Category: Informational Network Working Group Request for Comments: 2905 Category: Informational J. Vollbrecht Interlink Networks, Inc. P. Calhoun Sun Microsystems, Inc. S. Farrell Baltimore Technologies L. Gommans Enterasys

More information

Server-based Certificate Validation Protocol

Server-based Certificate Validation Protocol Server-based Certificate Validation Protocol Digital Certificate and PKI a public-key certificate is a digital certificate that binds a system entity's identity to a public key value, and possibly to additional

More information

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Authentication Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 Kerberos History: from UNIX to Networks (late

More information

Security of Wireless Networks in Intelligent Vehicle Systems

Security of Wireless Networks in Intelligent Vehicle Systems Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu

More information

March 26, Abstract

March 26, Abstract Public-key Cryptography Extensions into Kerberos Ian Downard University of Missouri Rolla Department of Electrical and Computer Engineering 1870 Miner Circle Rolla, MO 65409 Phone: 573-341-8422 Fax: 573-341-4532

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

IPsec Dead Peer Detection Periodic Message Option

IPsec Dead Peer Detection Periodic Message Option IPsec Dead Peer Detection Periodic Message The IPsec Dead Peer Detection Periodic Message feature is used to configure the router to query the liveliness of its Internet Key Exchange (IKE) peer at regular

More information

Lecture Note 6 KEY MANAGEMENT. Sourav Mukhopadhyay

Lecture Note 6 KEY MANAGEMENT. Sourav Mukhopadhyay Lecture Note 6 KEY MANAGEMENT Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Key Management There are actually two distinct aspects to the use of public-key encryption in this regard:

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Authentication Professor Trent Jaeger 1 Kerberos History: from UNIX to Networks (late 80s) Solves: password eavesdropping Also mutual authentication

More information

Identity-Based Decryption

Identity-Based Decryption Identity-Based Decryption Daniel R. L. Brown May 30, 2011 Abstract Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted

More information

Merit Network, Incorporated Bernard Aboba Microsoft March 1997

Merit Network, Incorporated Bernard Aboba Microsoft March 1997 Internet Draft Category: Experimental expires in six months Pat R. Calhoun US Robotics Access Corp. Allan Rubens Merit Network, Incorporated Bernard Aboba Microsoft March 1997 DIAMETER Extensible Authentication

More information

Providing Security to the Architecture of Presence Servers

Providing Security to the Architecture of Presence Servers Providing Security to the Architecture of Presence Servers Vimitha R Vidhya Lakshmi PG Scholar TKM Institute of Technology Kollam, Kerala, India Anju J Assistant Professor TKM Institute of Technology Kollam,

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

More information

OSI Network Layer. Chapter 5

OSI Network Layer. Chapter 5 OSI Network Layer Network Fundamentals Chapter 5 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most common Network

More information

Lecture Notes 14 : Public-Key Infrastructure

Lecture Notes 14 : Public-Key Infrastructure 6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These

More information

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14 Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename 6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename Certificate formats (DER, PEM, PKCS #12) 6.2 Certificate Authorities

More information

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003 Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information