130 likes | 266 Views
Securing Wireless Data: System Architecture Challenges. Authors: Srivaths Ravi, Anand Raghunathan, and Nachiketh Potlapally Presented by Chris Jensen. Role of Security Mechanisms and Protocols. Ensure privacy and integrity of data Authenticity of parties involved in transactions
E N D
Securing Wireless Data:System Architecture Challenges Authors: Srivaths Ravi, Anand Raghunathan, and Nachiketh Potlapally Presented by Chris Jensen
Role of Security Mechanismsand Protocols • Ensure privacy and integrity of data • Authenticity of parties involved in transactions • Provide nonrepudiation • Prevent usage for denial of service attacks, filter viruses • Provide anonymous communication
Security Domains • Appliance domain security • User authentication • Network access domain security • Device authentication • Data privacy and integrity • Network domain security • Network infrastructure • Application domain • Authentication of applications on an appliance • Security of transactions between applications
Motivation • Wireless security can only be considered if it is accounted for during design of • Network architecture • Security protocols • Cryptographic algorithms • Software and Hardware architecture
Background • Many protocols address only one network access domain security. • Studies show security level provided by many protocols (802.11b, WLAN, CDPD, Bluetooth) are insufficient • The move from wired Internet to wireless appliances is bringing a push for increased wireless security by placing wired protocols on top of “bearer” technologies.
Challenges • Security processing gap • Security protocols greatly increase computational requirements of appliances • Ex: Palm IIIx- 3.4min for 512bit RSA key generation • Battery gap • Battery growth cannot keep up with processing requirements
Challenges II • Flexibility • Need to support a multitude of security protocols • Need for upgradability to newer protocols and enhancements • Tamper-proof implementation • Need to prevent malicious users from compromising system security
Processing Requirements ofCryptographic Algorithms atDifferent Data Rates
Processing Requirements of RSA-based SSL Handshake for Different Connection Latenciesand Module Sizes
Bridging the Gap • Embedded processors with enhanced security processing capabilities • Lightweight protocols and algorithms • The MOSES project