180 likes | 190 Views
Explore the security issues in Ubiquitous Computing (UbiComp), covering concepts like pervasive computing, sentient computing, threat identification, and safeguard methods. Discover the importance of privacy, location privacy, RFIDs, and authentication practices in UbiComp environments. Delve into multi-factor access control, device pairing, and usability concerns related to security measures. The text provides insights into user perspectives, market dynamics, and the evolving landscape of security features in modern computing systems.
E N D
Security Issues in Ubiquitous Computing (UbiComp) Frank Stajano Presented by Patrick Davis
UbiComp • Ubiquitous Computing • Exact concept inception date is unknown • Basically background computing in life • Pervasive Computing • Invisible / Disappearing Computing • Sentient Computing • Ambient Intelligence • Calm computing • Different things to different people • Security • A virus broke my toaster and now my freezer won’t work!
Security • Security is Risk Management • Defender thinks about • I have gold in my house - Asset • Someone can steal my gold - Threats • I leave the front door unlocked - Vulnerabilities • A thief can walk into the front door - Attacks • It costs a lot of money to replace the gold -Risks • Get a few dogs – Safeguards • Release the hounds - Countermeasure
Threats to Information Systems • Not a complete list but traditionally… • Confidentiality • Integrity • Availability • To mitigate these risks • Authentication • Identification • Verification • Authorization
Extend to UbiComp • Mobile Phone • What do you lose if some one steals the device • Cost of the device • Information On the device • Availability of the device • Your Identification (if the phone is used as a credit card) • What if the phone is hacked. (How do you know it isn’t) • Information on the phone is compromised • Components on the phone are compromised • Microphone • Your current location • Your current soundings
Privacy • How important does it seem to be? • How important is it? • Think like the enemy…
Privacy and Wearable Computing • What happens when you record every aspect of your life. • What if I wore one? • What kind of things would you be ok with sharing • How much do you want protect these • From your own memory loss • From hackers • How close are we to this already
Location Privacy • Phones are sending location back almost 24 hours a day • One of the ways to get maintain privacy is to make each location marker anonymous • Another way is to have the interested parties broad cast their services and the users pickup or disregard those services as needed • The author disregards the situation where the location of any user (anonymous or not) is a security risk
RFIDs • Basically barcodes that can remotely identify themselves • Can be powered by the request to read the tag • Economics of scale should bring down the price of RFIDs • Can be used as machine vision where as the vision is basically viewed as positions of the RFIDs • Are limited in processing ability meaning cryptology is limited
RFID Safeguards • Some Safe Guards are • Killing the Tag • Hash-based access control • Randomized Access Control • Silent tree walking • Blocker-tag • Anti-Counterfeiting using PUFs • Distance bounding protocols • Multi-Factor Access Control in e-passports
Authentication and Device Pairing • In UbiComp the server authenticates the client and if it is allowed does the requested actions. • A couple principles in authentication • Big Stick • Resurrecting Duckling • Multi Channel Protocols
Resurrecting Duckling • The mother duck is the master and the duckling is the slave • Based on a set of four principles • Two State principle • Imprinting Principle • Death Principle • Assassination Principle
Multi Channel Protocols • Data Origin Authenticity • DiffieHellman key exchange • Man in the middle attack • Have two channels • A high capacity Channel for “long” messages • A low capacity Channel for Data-Origin authentication
Beyond Passwords • Do you really like entering your password for every site? • Why do we have single sign on or Identity Management (Face book sign on) • How do we get around password • Tokens • Biometrics
Usability • Security is only to prevent dishonest people from performing bad Actions • This often gets in the way of honest user’s activities • Tax on the honest
People • We must view though someone else's eyes • The attacker • The user • Quote: • Security cannot depend upon the user’s ability to read a message from the computer and act in an informed and sensible manner […] a machine must be secure out of the factory if given to a user who cannot read • Meaning the security glove must fit the user comfortably but still stop the attacker
The Market • Systems are sold on the basis of features. • Customers really only care about security in terms of particular scenarios • Security features cost money to implement clients see security as an extra or just another feature that they never see. • Again how important is privacy… • Client must have a bad experience with security in order to see the importance of good security