90 likes | 197 Views
Security in Social Wireless Networks. Omer Nawaz. Introduction. Studies Masters in Computer Science from IIU Islamabad , Pakistan Masters in EE (Internet Systems) from BTH Karlskrona , Sweden (2009-2011) PhD (ongoing BTH) Working Experience
E N D
Security in Social Wireless Networks Omer Nawaz
Introduction • Studies • Masters in Computer Science from IIU Islamabad, Pakistan • Masters in EE (Internet Systems) from BTH Karlskrona, Sweden (2009-2011) • PhD (ongoing BTH) • Working Experience • Software developer at AIS Technologies, STP Islamabad for about 2 years • Lecturer at University of the Punjab, Lahore Pakistan (involved with courses related to Network Programming) • Research at Swedish Institute of Computer Science (SICS)
Social Wireless Networks Secure Identification (SWiN) • Swedish Institute of Computer Science (SICS) in Collaboration with Sony Ericsson and Ericsson AB • Three Target Areas: • Authentication • Privacy in Social Networks • Android security
Mobile Social Networks Potential • Growth at an astounding rate • According to a survey conducted in US in 2011 about internet access [1], 72% of the total share is wireless from just 17% three years ago • WHY • Nominal subscribing charges especially in North America • Mid range smart phones • Ease of personalization i.e. change of language, themes, settings etc. • Exclusive applications (camera) and gaming designed for users on the go • Future Trends • Demand for professional business networking • Decentralization of social networks • Offline Synchronization
Security Challenges • Secure Registration and Authentication • Strong authentication procedures eradicating both active and passive threats • Authorized client should register new members in offline mode • Support for online, gateway and offline mode • Confidentiality and Integrity on non-trusted media and collaboration with open compromised network • Profiles • Unlike traditional online networks, profile support with ease of setup • Support for explicit security settings for high flexibility
Secure Design Basics • Online Mode • Authentication (AuthCert), Signing(SignCert) and Social (SocialCert) certificates • User Profile Management • Offline Mode (Users of different social groups) • Secure Device Pairing • Sharing of Signing Certificate and Authentication Vector • Offline Mode (Users of same social groups) • Sharing of Signing and Social Certificates • Data encryption using shared public key
Current and future work • Performance evaluation of virtualized networks • Safe Virtualization
References [1] GIGaom, http://gigaom.com/2011/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/ [2] Social Media Trends, http://takemetoyourleader.com/2010/04/07/social-media-2012-11-trends-you-should-watch/