170 likes | 349 Views
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Environments. PART : Security II Byung C. Lee Dept of Software Engineering Korea University. Index. Introduction Brief Explain of Gaia Project and Mist Basic Knowledge Authentication Devices, Confidence Value
E N D
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Environments PART : Security II Byung C. Lee Dept of Software Engineering Korea University
Index • Introduction • Brief Explain of Gaia Project and Mist • Basic Knowledge • Authentication Devices, Confidence Value • What is Kerberos • Mist Communication Protocol • Proposed Authentication Protocol • Summery & Future Development • Problem • Gaia Sample (Session Control)
Introduction • Object of this paper is that new security enhanced Authentication frame work for Active Information Space • Two ideas proposed • 1. Multiple Confidence Value • 2. New Authentication protocol • (Security enhanced Kerberos + Mist) • Secured Authentication Framework is also part of Gaia Project.
Gaia & Mist • Gaia Project • Component based Middleware System for Pervasive Computing Environments • Gaia > Mist Communication Protocol Gaia MiddleWare
Gaia & Mist • Mist • Privacy Protocol that allow user to freely communicate while preserving their privacy • Privacy Protocol that can not detect user’s physical location • Conditions • PKI (Public Key infrastructure) • Improved solution than “Cricket : location support System”
Basic Knowledge (1) • Authentication Devices • Active Badges • Smart Jewelry • Smart Watches • PDA • Password • Biometrics ibutton fingerprint Active Badges AT&T Research, UK PDA Smart Watches
Basic Knowledge (2) • Multiple Levels of Authentication with “Confidence” values • Net Confidence Value • Highly-Secure Service require high confidence value from user • Entering Room = Smart Badge • Computer in Room = Smart Badge + Fingerprint
Kerberos (1) Kerberos • What is Kerberos • Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography • Developed by MIT in early 1990 • Example of Use • Active Domain (Windows 2000 ~ ) • Supported single sign-on within Active Domain
Kerberos (2) Kerberos
Kerberos (3) Kerberos • Problems to use Kerberos in Active Space Environment • Authentication method for distributed systems • Limitation for using Ubiquitous Computing Environments • Based on Password • User only access from designated workstation • No user privacy considered
Mist Communication Protocol (1) • Portals • Gateway and bridge between physical devices and active information spaces • Sensor, wireless devices, RF transceiver • Detect user’s physical presence of active information spaces • Mist Routers (light house) • Identify and authenticate user • No information about physical location of user • Mist Circuits • Hop-to-hop, handle based routing to send data packets back and forth between source and destination • Conceal the identify and location information
Mist Communication Protocol (2) • How it works 1. Alice enter Active Space 3 2. She detected by one of portal in Active Space 3 - Portal only detect her Badge ID - Provided information is insufficient to notify Alice 3. secure channel is established between her device and her light house in CS building - Secure Channels (Node1 – Node 2 – Node 3 ) - Hop by Hop (can not trace back her location and destination )
Proposed Authentication Protocol • Extend ideas of Kerberos with security enhanced • No limitations and scales to physical spaces • Condition • Need SAP (Space Authentication Portals) for entrance of active space • Active Security Server exist every Active Domain • AS (Authentication Server) • TGS (Ticket Granting Server) • DB (DataBase) • TGT (ticket Granting ticket issued by TGS)
Proposed Authentication Protocol • How it works • 1. Alice enter space active room • -> her active badge authenticate with active space • 2. She use SAP for authenticate using other Devices. • -> (Badge + I button) = net confidence value • 3. SAP connect Active Space Security Server using SAP’s light house • 4. ASSS issues a TGT (ticket granting ticket) for User • -> (TGT stored Alice’s lighthouse) • -> (TGT calculate Confidence level based on Net Confidence Value from user) • 5.She can access service • If she access secure service then her light-house contacted by service • -> (service can not know her location)
Summery & Future Development • Two ideas proposed from this paper • 1. Multiple Confidence Value • 2. New Authentication protocol • (Security enhanced Kerberos + Mist) • Not implemented yet. • This Secure framework will be developed for part of Gaia research project. [Improved Security]
Problems ? • Q1 How can improved Authentication Speed ? • If Bob choose his lighthouse for root of Mist hierarchy and then he accessed most down level leaf as his Portal, Authentication Speed is very slow; however Security is much improved. • Q2 Is there any algorithm for that control proper lighthouse for him ?
Gaia Sample Gaia Session control