Authenticated Wireless Roaming via Tunnels

Size: px
Start display at page:

Download "Authenticated Wireless Roaming via Tunnels"

Transcription

1

2 Supported by the Belgian Walloon Region Authenticated Wireless Roaming via Tunnels M. MANULIS, D. LEROY, F. KOEUNE, O. BONAVENTURE, J-J. QUISQUATER UCLouvain - Belgium UCL Crypto Group - IP Networking Lab ASIACCS 09 - March 10-12, 2009

3 Context : Open WiFi Roaming H Internet F 3

4 Context : Open WiFi Roaming H Internet F 4

5 Context : Open WiFi Roaming Internet H ILLEGAL ACTIVITIES F 5

6 Context : Open WiFi Roaming H Internet? F 6

7 Context : Authenticated WiFi Roaming H Internet temp user name + F 7

8 Context : Authenticated WiFi Roaming Internet H user: smith@h-network passwd : in H F 8

9 The Eduroam Project eduroam Europe RHnet eduroam APAN UNINETT CSC NET EENet LANET UNI!C HEAnet UKERNA LITNET TERENA UESTC PIONIER DFN RFnet BELNET RESTENA CESNET RENATER SWITCH GARR NCHC ACOnet HUNGARNET ARNES RoEduNet CARNet NII BREN FCCN PolyU RedIRIS GRNET CSC CYNET European Root AARNet APAN Root NRENs that have joined NRENs that are in the process of joining

10 Roaming with Eduroam Stockholms universitet Swedish Authority Internet Belgian Authority IEEE802.1X TTLS+PAP user: UCL 10

11 Roaming with Eduroam Stockholms universitet Internet user: UCL 11

12 Eduroam - Client abuse scenario Stockholms universitet Internet ILLEGAL ACTIVITIES user: Beck@.se UCL 12

13 Eduroam - Client abuse scenario Stockholms universitet Swedish Authority Internet!!!!!!!!!!!! Belgian Authority UCL 13

14 Eduroam - Client abuse scenario Stockholms universitet Internet SPAM SPAM SPAM SPAM SPAM In PYZOR database : add *.* (=UCL) user: Beck@.se UCL 14

15 Eduroam - Client abuse scenario Internet Stockholms universitet PYZOR database : *.* (=UCL) UCL UCL UCL UCL... 15

16 Potential Security Risks Malicious F (Foreign network) DNS manipulations (i.e., pharming) Stealing credentials Sniffing Claim higher cost 16

17 Potential Security Risks Malicious M (Mobile node) Misbehavior on the Internet using IP of F Risk for infrastructure of F (attack easier from the inside) Access control based on IP (intranet, digital libraries,...) 17

18 Wireless Roaming via Tunnels (WRT) Internet Stockholms universitet responds to Stockolm Un. First proposed in [SKC07] for home networks in a citywide context UCL 18

19 Wireless Roaming via Tunnels (WRT) Advantages If the user sends spam, is blamed (and blacklisted), not UCL UCL does not care about user activities! Traffic from Beck to can be encrypted (= hidden from UCL) Cost based on traffic can be measured by H 19

20 AWRT = Authentication and Key Establishment Protocol for Wireless Roaming via Tunnels Formal security model (in the paper) A protocol (in the next slides) + proofs (on authors website) 20

21 Security Goals Authentication H H must authenticate M as one of the registered mobile devices M must authenticate H as its home network M S F F must authenticate H as a roaming partner H must authenticate F as a roaming partner F trusts H to correctly authenticate M M trusts H to correctly authenticate F 21

22 Security Goals KM,H; KT Key establishment H Protection of communication between M, H and F M S F KT KT (tunnel key) KM,H; KT End-to-end protection KM,H (end-to-end key) 22

23 Building Blocks PRF (pseudo-random function) Used for key derivation {0,1} κ x {0,1}* {0,1} n Asymmetric encryption scheme (with IND-CCA2 property) (functions Enc and Dec) Digital signature scheme (with EUF-CMA property) (functions Sig and Ver) MAC (Message Authentication Code) (with WUF-CMA property) 23

24 AWRT - Initialization F is in possession of : (dkf,ekf), (skf,vkf) (H,vkH)j for each roaming partner j H is in possession of : (skm,vkm) (M,kM,αM)i for each mobile i user of H (F,vkF,dkF)j for each roaming partner j M is in possession of : km,αm 24

25 AWRT - The protocol (simplified) M F rf F Internet H kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) M rm H rh μh μm kt=decdkf(x) KT = PRFkt(1,sid) F rf M rm rh X μh σh( ) μm,σf( ) sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 25

26 AWRT - The protocol (simplified) M F rf F Internet H kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) M rm H rh μh μm kt=decdkf(x) KT = PRFkt(1,sid) F rf M rm rh X μh σh( ) μm,σf( ) sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 26

27 AWRT - The protocol (simplified) M F rf F Internet H kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) M rm H Session ID rh μh μm kt=decdkf(x) KT = PRFkt(1,sid) F rf M rm rh X μh σh( ) μm,σf( ) sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 27

28 Security Goals Authentication H H must authenticate M as one of the registered mobile devices M must authenticate H as home network M S F F must authenticate H as a roaming partner H must authenticate F as a roaming parter F trusts H to correctly authenticate M M trusts H to correctly authenticate F 28

29 AWRT - The protocol (simplified) M F rf F Internet H Permit H to auth M kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) M rm H rh μh μm Permit M to auth H kt=decdkf(x) KT = PRFkt(1,sid) F rf M rm rh X μh σh( ) μm,σf( ) sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 29

30 Security Goals Authentication H H must authenticate M as one of the registered mobile devices M must authenticate H as home network M S F F must authenticate H as a roaming partner H must authenticate F as a roaming parter F trusts H to correctly authenticate M M trusts H to correctly authenticate F 30

31 AWRT - The protocol (simplified) M kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) F rf M rm H rh μh Permit H to auth F μm F Permit F to auth H kt=decdkf(x) KT = PRFkt(1,sid) Internet F rf M rm rh X μh σh( ) μm,σf( ) H sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 31

32 Security Goals KM,H; KT Key establishment H End-to-end protection KM,H (end-to-end key) M S KM,H; KT F KT Protection of communication between M, H and F KT (tunnel key) 32

33 AWRT - The protocol (simplified) M F rf M rm H KT is derived from kt (PRF) kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) rh μh μm F kt is computed from SID & km kt=decdkf(x) KT = PRFkt(1,sid) Internet F rf M rm rh X μh σh( ) μm,σf( ) H sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) kt is sent (encrypted) to F KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 33

34 AWRT - The protocol (simplified) M kt=prfkm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) μm=macαm(1,sid) F rf M rm H F KM,H is computed from SID & km rh μh μm kt=decdkf(x) KT = PRFkt(1,sid) Internet F rf M rm rh X μh σh( ) μm,σf( ) H sid=f rf M rm H rh kt=prfkm(0,sid) X=EncekF(kt) μh=macαm(0,sid) KT =PRFkt(1,sid) KM,H = PRFkM(2,sid) 34

35 Remarks on efficiency The number of messages exchanged between F and H is the key point for protocol duration The mobile can already send data packet after one RTT M can be a light mobile device (e.g., a smart phone) No asymmetric key crypto computation in M 35

36 Practical Realizations of the Mechanism Proposals AWRT : In IEEE802.1X as a new EAP method The tunnel between F and H A Layer-2 tunnel End-to-End security ESP (Encapsultating Security Payload) (within IPsec) 36

37 Optional Protocol Extensions (discussed in the paper) Forward Secrecy Using DH techniques Denial-of-Service and Hijacking protection Confidentiality for M Accounting for Roaming 37

38 Conclusion Summary of security advantages Tunnels permits : For F: No harm to its network and reputation For M: have the same services as at home Force M to use the tunnel (and to H!) F is authenticated by H! (not by M that can be subjected to phishing/spoofing) 38

39 Conclusion Contributions WRT is not really new but it is the first time it is used for a such use AWRT permits 3-party-authentication & - key agreement in WRT Based on a formal security model A protocol has been designed 39

40 Questions? Mark Manulis Damien Leroy UCL Crypto Group (former member) IP Networking Lab

Using tunnels and three party authentication to improve roaming security

Using tunnels and three party authentication to improve roaming security Supported by the Walloon Region Using tunnels and three party authentication to improve roaming security Damien LEROY UCLouvain - Belgium IP Networking Lab - http://inl.info.ucl.ac.be BELNET Security Conference

More information

A Profile of European NREN s. Marko Bonač ARNES, Slovenia

A Profile of European NREN s. Marko Bonač ARNES, Slovenia A Profile of European NREN s Marko Bonač ARNES, Slovenia bonac@arnes.si Content Mission statement and objective User communities Activities Operating a special network Providing services Development Staff

More information

Network. 3.1 Core Capacity on the network. TERENA Compendium of Research and Education Networks in Europe / Network. Page 27

Network. 3.1 Core Capacity on the network. TERENA Compendium of Research and Education Networks in Europe / Network. Page 27 3 Network 3.1 Core Capacity on the network We have asked NRENs how they would describe their network in bandwidth terms. In other words, we have asked for the current typical core usable backbone capacity

More information

GN4-2 SA2 Kick-Off Meeting Amsterdam/NL 30/

GN4-2 SA2 Kick-Off Meeting Amsterdam/NL 30/ GÉANT edupki Serving GÉANT Services GN4-2 SA2 Kick-Off Meeting Amsterdam/NL 30/31.05.2016 Reimer Karlsen-Masur, DFN-CERT Services GmbH Slides & Related Materials @ https://www.edupki.org Outline The 3

More information

GN2 JRA5: Roaming and Authorisation

GN2 JRA5: Roaming and Authorisation GN2 JRA5: Roaming and Authorisation Jürgen Rauschenbach, DFN TF-NGN Athens 03/11/05 Introduction JRA5 builds a European Roaming Infrastructure (eduroamng) taking into account existing experience from the

More information

RESEARCH NETWORKS & THEIR ROLE IN e-infrastructures

RESEARCH NETWORKS & THEIR ROLE IN e-infrastructures RESEARCH NETWORKS & THEIR ROLE IN e-infrastructures Vasilis Maglaris maglaris@mail.ntua.gr Chairman, NREN Policy Committee - GÉANT Consortium Professor, National Technical University of Athens - NTUA A

More information

JRA5: Roaming and Authorisation

JRA5: Roaming and Authorisation JRA5: Roaming and Authorisation Jürgen Rauschenbach, DFN-Verein 7 th TF-EMC2 Meeting, Malaga 16 17 October 2006 Introduction JRA5 will build a European Roaming Infrastructure based on eduroam JRA5 will

More information

GN2 JRA5: Roaming and Authorisation - recent results

GN2 JRA5: Roaming and Authorisation - recent results GN2 JRA5: Roaming and Authorisation - recent results Jürgen Rauschenbach (DFN), Klaas Wierenga (SURFnet), Diego Lopez (RedIRIS), Content Overview Roaming infrastructure AAI Structure and Partners JRA5

More information

Enhanced Wireless Roaming Security using Three-Party Authentication and Tunnels

Enhanced Wireless Roaming Security using Three-Party Authentication and Tunnels Enhanced Wireless Roaming Security using Three-Party Authentication and Tunnels Damien Leroy 1, Mark Manulis 2, and Olivier Bonaventure 1 1 Universite catholique de Louvain, 1348 Louvain-la-Neuve, Belgium

More information

Introduction to FEDERICA

Introduction to FEDERICA Introduction to FEDERICA Mauro Campanella GARR Mauro.campanella@garr.it FEDERICA tutorial, June 7 th 2009 - Malaga, Spain Agenda 15.00-15.15 Introduction to FEDERICA, Mauro Campanella (GARR) 15.15-16.00

More information

NORDUnet GN3. Next Generation Network in Europe. Click to edit Master subtitle style. Lars Fischer SUNET TREFFpunkt

NORDUnet GN3. Next Generation Network in Europe. Click to edit Master subtitle style. Lars Fischer SUNET TREFFpunkt Nordic Nordic infrastructure Infrastructure for for Research Research & & Education Education GN3 Next Generation Network in Europe Click to edit Master subtitle style Lars Fischer SUNET TREFFpunkt 15

More information

perfsonar Update Jason Zurawski Internet2 March 5, 2009 The 27th APAN Meeting, Kaohsiung, Taiwan

perfsonar Update Jason Zurawski Internet2 March 5, 2009 The 27th APAN Meeting, Kaohsiung, Taiwan perfsonar Update Jason Zurawski Internet2 March 5, 2009 The 27th APAN Meeting, Kaohsiung, Taiwan perfsonar Update Introduction & Overview Development Status Authentication & Authorization GUI Status Deployment

More information

Net Edu Romanian Education Network

Net Edu Romanian Education Network R O M A N I A N E D U C A T I O N N E T W O R K Ro Organizational Status Goals History Data Traffic Evolution Ro Layered Structure Most Important Services Ro in Research and Development Future Plans 2003

More information

CSCE 813 Internet Security Final Exam Preview

CSCE 813 Internet Security Final Exam Preview CSCE 813 Internet Security Final Exam Preview Professor Lisa Luo Fall 2017 Coverage All contents! Week1 ~ Week 15 The nature of the exam: 12 questions: 3 multiple choices questions 1 true or false question

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Network Security - ISA 656 Review

Network Security - ISA 656 Review Network Security - ISA 656 Review Material Test Conditions 7:20pm - 9:30pm, Thursday, Dec 11th, in the Lab (STI-128) Same style of questions as the midterm I m not asking you to write programs Angelos

More information

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec CIS 6930/4930 Computer and Network Security Topic 8.1 IPsec 1 IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP spoofing Payload could be changed without detection. IP V4 has no confidentiality

More information

ilight/gigapop eduroam Discussion Campus Network Engineering

ilight/gigapop eduroam Discussion Campus Network Engineering ilight/gigapop eduroam Discussion Campus Network Engineering By: James W. Dickerson Jr. May 10, 2017 What is eduroam?» eduroam (education roaming) is an international roaming service for users in research,

More information

eduroam und andere Themen in GN2-JRA5

eduroam und andere Themen in GN2-JRA5 eduroam und andere Themen in GN2-JRA5 DFNRoaming Workshop Stuttgart 30 November 2006 Jürgen Rauschenbach, DFN-Verein, jrau@dfn.de Inhalt Das GÉANT2 Projekt JRA5 Visionen Was sind Föderationen? eduroam

More information

EUMEDCONNECT3 and European R&E Developments

EUMEDCONNECT3 and European R&E Developments EUMEDCONNECT3 and European R&E Developments David West DANTE 17 September 2012 INTERNET2 Middle SIG, Abu Dhabi The Research and Education Network for the Mediterranean Covering GEANT Other regional network

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

IP Security II. Overview

IP Security II. Overview IP Security II Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State University

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course

More information

GÉANT Strategy 2020 Over the Horizon. connect communicate collaborate

GÉANT Strategy 2020 Over the Horizon. connect communicate collaborate GÉANT Strategy 2020 Over the Horizon connect communicate collaborate Foreword This document is the result of the work in the Strategy and Innovation Committee (SIC). This GN3plus working group was set

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

MACSec Security Service FIPS Validation. Richard Wang May 19, 2017 International Crypto Module Conference

MACSec Security Service FIPS Validation. Richard Wang May 19, 2017 International Crypto Module Conference MACSec Security Service FIPS Validation Richard Wang May 19, 2017 International Crypto Module Conference Topics! MACSec Overview! MACSec Authentication Mechanisms! MACSec with FIPS! Draft IG A.5! References!

More information

TERENA, the NRENs, GÉANT & promoting Campus Best Practice

TERENA, the NRENs, GÉANT & promoting Campus Best Practice Networkshop 42 Leeds, UK 2 April 2014 John Dyer dyer@terena.org www.terena.org TERENA, the NRENs, GÉANT & promoting Campus Best Practice About TERENA A not-for-profit association of NRENs. 1986 RARE:

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

NRENs Collaborations towards Success

NRENs Collaborations towards Success 30 November / 1 December 2010 John Chapman Coordinator, Internet2 Middle East Regional Interest Group Chief Information Officer, Georgetown University in Qatar NRENs Collaborations towards Success Special

More information

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from Lecture 15 PKI & Authenticated Key Exchange COSC-260 Codes and Ciphers Adam O Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Today We will see how signatures are used to create public-key infrastructures

More information

Network Virtualization for Future Internet Research

Network Virtualization for Future Internet Research Network Virtualization for Future Internet Research Mauro Campanella - GARR On behalf of the FEDERICA project Internet2 Fall Meeting New Orleans, October 14th, 2008 Agenda FEDERICA at a glance, vision

More information

nrenum.net An Update SIP.edu Call

nrenum.net An Update SIP.edu Call nrenum.net An Update SIP.edu Call 2007-05-03 What is ENUM? E.164 Number Mapping RFC3761, and many other RFC's The common denominator A number ONE single number for multiple voice, video and data services

More information

Home Computer and Internet User Security

Home Computer and Internet User Security Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,

More information

education federation CUC 2005, Dubrovnik High-quality Internet for higher education and research

education federation CUC 2005, Dubrovnik High-quality Internet for higher education and research eduroam: towards a pan-european research and education federation CUC 2005, Dubrovnik Klaas.Wierenga@surfnet.nl Contents Introduction to federations Federations for education Network access: eduroam Application

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Homework 3: Solution

Homework 3: Solution Homework 3: Solution March 28, 2013 Thanks to Sachin Vasant and Xianrui Meng for contributing their solutions. Exercise 1 We construct an adversary A + that does the following to win the CPA game: 1. Select

More information

Next Generation Networking in and FEDERICA

Next Generation Networking in and FEDERICA Next Generation Networking in Europe: GÉANT3 G and FEDERICA Vasilis Maglaris maglaris@netmode.ntua.gr Chairman, European NREN Policy Committee - GÉANT Consortium Professor, National Technical University

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

CS System Security Mid-Semester Review

CS System Security Mid-Semester Review CS 356 - System Security Mid-Semester Review Fall 2013 Mid-Term Exam Thursday, 9:30-10:45 you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This is to

More information

Moonshot. Workshop on Federated Identity and (OpenStack) Cloud Services - SWITCH

Moonshot. Workshop on Federated Identity and (OpenStack) Cloud Services - SWITCH Moonshot Workshop on Federated Identity and (OpenStack) Cloud Services - SWITCH 2 ABFAB - Federated access beyond web Why?» You ve heard of eduroam Federated network access» You ve heard of Shibboleth,

More information

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.

More information

1.3 More information about eduroam is available at the relevant eduroam Service Provider (ESP) website detailed in Schedule 1 of this document.

1.3 More information about eduroam is available at the relevant eduroam Service Provider (ESP) website detailed in Schedule 1 of this document. 1.0 Background to this document 1.1 This document sets out guidelines that cover the control of the supply and receipt of Internet access for educational purposes, that is primarily (but not exclusively)

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Table of contents. Welcome to the Compendium A Guide to the GÉANT Compendium of NRENs About GÉANT Defining Topics...

Table of contents. Welcome to the Compendium A Guide to the GÉANT Compendium of NRENs About GÉANT Defining Topics... GÉANT Compendium of National Research and Education Networks in Europe 206 Edition Table of contents Welcome to the Compendium......................3 A Guide to the GÉANT Compendium of NRENs......4 2 About

More information

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks Thilo Sauter Albert Treytl Wireless Sensor Network Vision High-level company functions

More information

FileSender Update. blog.filesender.org. Jan Meijer

FileSender Update.  blog.filesender.org. Jan Meijer FileSender Update www.filesender.org blog.filesender.org Jan Meijer 12 th TF-Storage 6 March 2013 screenshot FileSender = File Transport!= File Storage value proposition? painless sharing arbitrarily large

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES ii iv v vi vii xiii xiv xvi 1 OVERVIEW 1 1.1 Introducation

More information

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN Alberto Compagno 1,3, Mauro Conti 2 and Ralph Droms 3 1 Sapienza University of Rome 2 University of Padua 3 Cisco Systems 3rd ACM Conference

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Lecture 8 - Message Authentication Codes

Lecture 8 - Message Authentication Codes Lecture 8 - Message Authentication Codes Benny Applebaum, Boaz Barak October 12, 2007 Data integrity Until now we ve only been interested in protecting secrecy of data. However, in many cases what we care

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

The New Infrastructure Virtualization Paradigm, What Does it Mean for Campus?

The New Infrastructure Virtualization Paradigm, What Does it Mean for Campus? The New Infrastructure Virtualization Paradigm, What Does it Mean for Campus? Jean-Marc Uzé Juniper Networks juze@juniper.net Networkshop 36, Glasgow, April 8 th 2008 Copyright 2008 Juniper Networks, Inc.

More information

Deliverable DJ Inter-NREN roaming technical specification document

Deliverable DJ Inter-NREN roaming technical specification document 22.06.06 Deliverable DJ5.1.4: Inter-NREN roaming technical specification document Deliverable DJ5.1.4 Contractual Date: 31/01/06 Actual Date: 22/06/06 Contract Number: 511082 Instrument type: Integrated

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Multi-Domain Management:

Multi-Domain Management: Multi-Domain Management: Results Achieved & Future Challenges Using the Example of GÉANTG Vasilis Maglaris maglaris@netmode.ntua.gr Chairman, European NREN Policy Committee - GÉANT Consortium Professor,

More information

Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures

Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures Federated E-infrastructure Dedicated to European Researchers Innovating in Computing network Architectures Mauro Campanella - GARR FP7 Future Networks Concertation Meeting Brussels, March 11th, 2008 FEDERICA

More information

6DEPLOY: IPv6 Deployment Support

6DEPLOY: IPv6 Deployment Support 6DEPLOY: IPv6 Deployment Support Why IPv6? IP has to support more services than it was Music Environment originally designed for Subscription 30 years Sensors ago... Telephony Wireless (Wi-Fi, GSM, GPRS)

More information

Introduction to eduroam

Introduction to eduroam SLIDE 1 - COPYRIGHT 2015 Introduction to eduroam LEARN eduroam Workshop 6 th May 2016 2 SLIDE 2 - COPYRIGHT 2015 Introduction Paul Hii Australia s National Research and Education Network (NREN) UC & Video

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Deliverable D3.1 NREN Satisfaction Survey

Deliverable D3.1 NREN Satisfaction Survey 01-06-2017 Contractual Date: 30-04-2017 Actual Date: 01-06-2017 Grant Agreement No.: 731122 Work Package/Activity: 3/NA3 Task Item: Task 1 Nature of Deliverable: R (Report) Dissemination Level: PU (Public)

More information

Introduction to eduroam

Introduction to eduroam Introduction to eduroam eduroam (education roaming) is the secure, world-wide roaming access service developed for the international research and education community. Poll Brief History eduroam initiative

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G.

Network Security. Security of Mobile Internet Communications. Chapter 17. Network Security (WS 2002): 17 Mobile Internet Security 1 Dr.-Ing G. Network Security Chapter 17 Security of Mobile Internet Communications Network Security (WS 2002): 17 Mobile Internet Security 1 Motivation for Mobile IP Routing in the Internet: Based on IP destination

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #7 WiFi Security 1 Announcements Please do HW#2 in using the stable OMNET++ 4.6, not the beta version. Porting has proven difficult... Form project

More information

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure

More information

COLLABORATION OPPORTUNITIES. Ann Doyle, Internet2! Science and CI in Africa! Boulder, August 2011!

COLLABORATION OPPORTUNITIES. Ann Doyle, Internet2! Science and CI in Africa! Boulder, August 2011! COLLABORATION OPPORTUNITIES Ann Doyle, Internet2! Science and CI in Africa! Boulder, August 2011! Planned 100G Internet2 Network in support of U.S. UCAN 15,500 miles fiber IRU for Internet2 Network! 2,500

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

FAST RE-AUTHENTICATION PROTOCOL FOR INTER-DOMAIN ROAMING

FAST RE-AUTHENTICATION PROTOCOL FOR INTER-DOMAIN ROAMING FAST RE-AUTHENTICATION PROTOCOL FOR INTER-DOMAIN ROAMING Maryna Komarova Michel Riguidel Artur Hecker ENST 46 rue Barrault, Paris 13, France ABSTRACT In this paper we introduce the Fast re-authentication

More information

Configuration Summary

Configuration Summary POWER ACT NETWORK PIX Firewall SERIES How to configure dynamic IPSec tunneling Configuration Summary This document describes configuring an NSE initiated IPSec tunnel from behind a NAT device to a VPN

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Lecture 13 Page 1. Lecture 13 Page 3

Lecture 13 Page 1. Lecture 13 Page 3 IPsec Network Security: IPsec CS 239 Computer Software March 2, 2005 Until recently, the IP protocol had no standards for how to apply security Encryption and authentication layered on top Or provided

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

How to connect your device using eduroam

How to connect your device using eduroam How to connect your device using eduroam Banaras Hindu University is now fully covered under eduroam, a service with more than 70,000 member academic institutions worldwide. This service allows authorized

More information

CIS 6930/4930 Computer and Network Security. Topic 8.2 Internet Key Management

CIS 6930/4930 Computer and Network Security. Topic 8.2 Internet Key Management CIS 6930/4930 Computer and Network Security Topic 8.2 Internet Key Management 1 Key Management Why do we need Internet key management AH and ESP require encryption and authentication keys Process to negotiate

More information

Phishing Read Behind The Lines

Phishing Read Behind The Lines Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and

More information

Summary on Crypto Primitives and Protocols

Summary on Crypto Primitives and Protocols Summary on Crypto Primitives and Protocols Levente Buttyán CrySyS Lab, BME www.crysys.hu 2015 Levente Buttyán Basic model of cryptography sender key data ENCODING attacker e.g.: message spatial distance

More information

Swift Migration of IKEv1 to IKEv2 L2L Tunnel Configuration on ASA 8.4 Code

Swift Migration of IKEv1 to IKEv2 L2L Tunnel Configuration on ASA 8.4 Code Swift Migration of IKEv1 to IKEv2 L2L Tunnel Configuration on ASA 8.4 Code Contents Introduction Prerequisites Requirements Components Used Conventions Why Migrate to IKEv2? Migration Overview Migration

More information

AutoBAHN Provisioning guaranteed capacity circuits across networks

AutoBAHN Provisioning guaranteed capacity circuits across networks AutoBAHN Provisioning guaranteed capacity circuits across networks Afrodite Sevasti, GRNET 1 st End-to-end workshop: Establishing lightpaths 1-2 December 2008, TERENA, Amsterdam AutoBAHN is a research

More information

OPTLS and TLS 1.3. Hugo Krawczyk, Hoeteck Wee. TRON Workshop 2/21/2016

OPTLS and TLS 1.3. Hugo Krawczyk, Hoeteck Wee. TRON Workshop 2/21/2016 OPTLS and TLS 1.3 Hugo Krawczyk, Hoeteck Wee TRON Workshop 2/21/2016 1 Plan Explain OPTLS approach and modes (handshake only) Highlight protocol concept and simplicity Common logic to all protocol modes

More information

10/4/2016. Advanced Windows Services. IPv6. IPv6 header. IPv6. IPv6 Address. Optimizing 0 s

10/4/2016. Advanced Windows Services. IPv6. IPv6 header. IPv6. IPv6 Address. Optimizing 0 s Advanced Windows Services IPv6 IPv6 FSRM, FCI, DAC and RMS PKI IPv6 IP is the foundation of nearly all communication The number of addresses is limited Technologies like NAT help in addition to enhancements

More information

IP Security IK2218/EP2120

IP Security IK2218/EP2120 IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous

More information

GÉANT : e-infrastructure connectivity for the data deluge

GÉANT : e-infrastructure connectivity for the data deluge GÉANT : e-infrastructure connectivity for the data deluge Richard Hughes-Jones, Maria Minaricova & Vincenzo Capone DANTE BioMedBridges Workshop, Hinxton, 15-16 May 2014 What is GÉANT? High-bandwidth, high-performance

More information

Service Delivery and Operations Report

Service Delivery and Operations Report 25-05-2017 Deliverable 5.2 Contractual Date: 30-04-2017 Actual Date: 25-05-2017 Grant Agreement No.: 731122 Work Package/Activity: 5/SA2 Task Item: Task 2 and Task 3 Nature of Deliverable: R Dissemination

More information

Future Internet Experiments over National Research & Education Networks: The Use Cases of FEDERICA & NOVI over European NRENs - GÉANT

Future Internet Experiments over National Research & Education Networks: The Use Cases of FEDERICA & NOVI over European NRENs - GÉANT Future Internet Experiments over National Research & Education Networks: The Use Cases of FEDERICA & NOVI over European NRENs - GÉANT Vasilis Maglaris Professor of Electrical & Computer Engineering, NTUA

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

CSE443 - Introduction to Computer and Network Security Network Security

CSE443 - Introduction to Computer and Network Security Network Security CSE443 - Introduction to Computer and Network Security Network Security Professor Kevin Butler Winter 2011 Computer and Information Science Networking Fundamentally about transmitting information between

More information

Internetworking Lecture 10. Communications and network security

Internetworking Lecture 10. Communications and network security Internetworking Lecture 10 Communications and network security Communication and network security: Threat model Passive attacks: Eavesdropping, Wiretapping, Sniffing, and Traffic analysis Alice Bob Eve

More information

Virtual Tunnel Interface

Virtual Tunnel Interface This chapter describes how to configure a VTI tunnel. About s, on page 1 Guidelines for s, on page 1 Create a VTI Tunnel, on page 2 About s The ASA supports a logical interface called (VTI). As an alternative

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #7 More WiFi Security 2015 Patrick Tague 1 Class #7 Continuation of WiFi security 2015 Patrick Tague 2 Device Private WiFi Networks AP Local AAA

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Photuris and SKIP PHASE 1 IKE PHASE 2 IKE How is SA established? How do parties negotiate

More information

FAQ about Communication

FAQ about Communication FAQ about Communication Establishing a VPN Tunnel between PC Station and SCALANCE S 61x via the Internet Using the Microsoft Management Console FAQ Entry ID: 26098354 Table of Contents Table of Contents...

More information

VPN Auto Provisioning

VPN Auto Provisioning VPN Auto Provisioning You can configure various types of IPsec VPN policies, such as site-to-site policies, including GroupVPN, and route-based policies. For specific details on the setting for these kinds

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

IPv6 Deployment in European National Research and Education Networks (NRENs)

IPv6 Deployment in European National Research and Education Networks (NRENs) IPv6 Deployment in European National Research and Education Networks (NRENs) Tim Chown University of Southampton, UK tjc@ecs.soton.ac.uk SAINT2003 Workshop, 27 January 2003 IPv6 rationale IP is fundamental

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

Authentication in the Smart Grids

Authentication in the Smart Grids Authentication in the Smart Grids Mario H. F. Latuf Universidade Federal de Itajubá UNIFEI July 17, 2013 1 Reference Soohyun, Kwak Jin, Mutual authentication and key establishment mechanism using DCU certificate

More information

A. Verify that the IKE gateway proposals on the initiator and responder are the same.

A. Verify that the IKE gateway proposals on the initiator and responder are the same. Volume: 64 Questions Question: 1 You need to configure an IPsec tunnel between a remote site and a hub site. The SRX Series device at the remote site receives a dynamic IP address on the external interface

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information