A Flexible Security Architecture for Ubiquitous Mobile - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

A Flexible Security Architecture for Ubiquitous Mobile

Description:

Additional elements for inclusion in mobile user database. Patent Pending. Passphrase ... Hash 3 enables validation of this user with mobile DB. Mobile Wearable System ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 15
Provided by: johnm397
Category:

less

Transcript and Presenter's Notes

Title: A Flexible Security Architecture for Ubiquitous Mobile


1
A Flexible Security Architecture for Ubiquitous
Mobile Wearable Systems
John Murray PhD CEng PEMSTAR Pacific
Consultants, San Jose CA 1-408-282-4805
jxm_at_pacificconsultants.com
2
Overview
  • Ubiquitous Computing
  • Mobile Ad-Hoc Networks (MANET)
  • User Interactions with Wearable Systems
  • Security Role-Based Access Control
  • Wearable Systems Security Issues
  • Intrusion Detection in Wireless Networks
  • Questions Comments

3
Ubiquitous Computing

4
Contextual Cross-Links
5
Flexible Interactional Architecture
6
Mobile Ad-hoc Networks (MANET)
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
7
Wearable Systems Individual Architecture
Security Administration System
Smart Card
Smart Card Rdr
Comms Unit
Mobile Computer
Mobile Database
MANET
Personal Network Devices
User Interface
Wearable System
Other Mobile Wearable Systems
8
Security Issues on Wearable Systems
System User
Verify user is authorized to use access card
User shares secret with Mobile Application
MobCS
Smart Card
Card access only by auth. MobComm
Trusted link between MobCS and MobComm
MobComm
MobOS
Access card data defines MobOS privilege level
Verify user is authorized to use access card
MobApp
Access card linked to matching MobDB
Trusted link between MobApp MobDB
MobDB
Patent Pending
9
User Passphrase Management
User Passphrase
Hash 2
Hash 3
Hash 1
Hash 1 generates entry key to write smart card
Hash 2 encrypts data written to smart card
Hash 3 code added to mobile user DB
Smart Card
MobDB
  • Security Administration System
  • User provides personal secret data
    (passphrase)
  • Derive two elements to generate card write
    encrypt keys
  • Additional elements for inclusion in mobile
    user database

Patent Pending
10
Passphrase Usage Process
User Passphrase
Hash 2
Hash 3
Hash 1
Hash 1 generates entry key to read smart card
Hash 2 decrypts card data for role-based OS access
Hash 3 enables validation of this user with
mobile DB
MobComm
MobDB
MobOS/CS
Smart Card
  • Mobile Wearable System
  • User provides passphrase and presents smart
    card
  • Role-based card data provides access to MobOS
    MobCS
  • Secret shared with mobile application and
    database

Patent Pending
11
MANET Security
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
Node
12
Intrusion Detection System (IDA) Agent
Local Response Procedures
Global Response Procedures
Local Intrusion Detection Engine
Global Intrusion Detection Engine
Local Data Collection
Secure Communications
Local System Calls, Comms Activity, Traces, etc.
Neighboring IDS Agents
13
For Additional Information.....
  • Weiser M The Computer for the Twenty-First
    Century, Scientific American, v265-3, Sept.
    1991.
  • Kindberg T Fox A, System Software for
    Ubiquitous Computing, IEEE Pervasive Computing,
    Jan-Mar 2002.
  • Murray J, Leftwich J Munro P A
    Contextually-Integrated Human Interface
    Architecture For Mobile Wearable Systems, Land
    Warfare Conference, Brisbane Australia, 2002.
  • Pemstar Pacific Consultants, A Flexible
    Security Architecture for Ubiquitous Mobile
    Wearable computers, US Patent Application
    Documentation, 2004.
  • Zhang Y, Lee W Huang Y Intrusion Detection
    Techniques for Mobile Wireless Networks, ACM
    Wireless Networks, 9, 2003.

14
A Flexible Security Architecture for Ubiquitous
Mobile Wearable Systems
John Murray PhD CEng PEMSTAR Pacific
Consultants, San Jose CA 1-408-282-4805
jxm_at_pacificconsultants.com
Write a Comment
User Comments (0)
About PowerShow.com