DOC PREVIEW
UCF EEL 6788 - Survey - The Urban Security and Privacy challenges

This preview shows page 1-2-3-18-19-37-38-39 out of 39 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1IntroductionIntroductionSolutions availableIn depth classificationIn depth classificationContext privacyContext privacy Virtual WallAnonymous Tasking Mist RoutingAnonymous Tasking Mist RoutingAnonymous Tasking Mist RoutingAnonymous Tasking Mist RoutingAnonymous Tasking Onion Router mechanismAnonymous Tasking Onion Router mechanismAnonymous Tasking Onion Router mechanismAnonymous Tasking Onion Router mechanismAnonymous Tasking Onion Router mechanismAnonymous Tasking Hidden credentials methodAnonymous Tasking Hidden credentials methodAnonymous Tasking Hidden credentials MethodAnonymous Tasking Hidden credentials MethodAnonymous Data ReportingSlide 23Slide 24Data Integrity Reliable Data ReadingsSlide 26Slide 27Slide 28Slide 29Slide 30Data Integrity Data Authenticity LeapData Integrity Data Authenticity LeapData Availability FairnessData Availability FairnessData Availability participationConclusionMistakes done so far During first few weeksReferencesReferencesSurvey: The Urban Security and Privacy challengesPresented ByVignesh SaravanaperumalEEL 6788IntroductionUrban sensing: Risk Possessed:•Confidentiality and Privacy•Integrity•AvailabilityTraffic pattern Observed:•Continuous Monitoring – Health care application•Event Driven - Environmental apps •Query Driven - Context aware queriesGeneral Architecture observed• Server Tier• SAP Tier• Sensor TierIntroductionDifference between wireless sensor network and urban sensingSensor Networks W/O Urban sensingSensor Networks with Urban sensingSolutions available•Virtual Wall •Onion Routing Mechanism•Mist Routing•Hidden credentials method•Hot-Potato-Privacy-Protection Algorithm•Mixed-behavior models in multi-party computation•Multicast Authentication Scheme Confidentiality and PrivacyIntegrityIn depth classificationConfidentiality and Privacy•Context Privacy•Anonymous Tasking•Anonymous Data ReportingQSSQVirtual Wall Hot-Potato-Privacy-Protection Algorithm•Task specific users without knowing their current location•Trust Negotiation• Mist , Onion Routing•Hidden credential MethodIn depth classificationIntegrityReliable Data readingData authenticityAvailability:Fairness and Participation Mixed-behavior models in multi-party computationMulticast Authentication SchemeFree Rider ProblemContext privacyDigital footprintsTypes of Footprints:•Personal•General•Empty Information about users derived from sensorsTransparent wall Translucent wall Opaque wallContext privacyVirtual WallAnonymous Tasking Mist RoutingObjective: •Location privacy•Anonymous connections•ConfidentialityThis privacy protocol prevents insiders, system administrators and even the system itself from tracking users and detecting their physical locationThey do this by conceal the identity and location of communicating parties by rerouting packets among themselves using hop-to-hop handle-based routing.Anonymous Tasking Mist RoutingMist:Mist Routers are Hierarchical Structure based•Portal:•Mist Router – leaf node•Knowledge of user’s positions but not user’s ID•Lighthouse:•Mist Router – Portal’s ancestor •Knowledge of user’s ID but not user’s physical positionAnonymous Tasking Mist RoutingMist Circuit establishmentLocating Users•Web ServersAnonymous Tasking Mist RoutingMist communication setupAnonymous TaskingOnion Router mechanism•Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes. •Each onion router removes a layer of encryption with its symmetric key to reveal routing instructions, and sends the message to the next router where this is process is repeated. •“onion router” - It prevents these intermediary nodes from knowing the origin, destination, and contents of the message. It knows only know the successor or predecessor but not any other Onion Router.•Tor is a distributed overlay network which anonymizes TCP-based applications (e.g. web browsing, secure shell, instant messaging applications.)•Message are put in cells and unwrapped at each node or onion router with a symmetric key.Anonymous Tasking Onion Router mechanism•The sender picks nodes from a list provided by a special node called the directory . The chosen nodes are ordered to provide a path through which the message may be transmitted; this ordering of the nodes is called a chain or a circuit.•Using a symmetric key cryptography, the sender uses the public key of each chosen node to wrap the plaintext message in the necessary layers of encryption: The public keys are retrieved from an advertised list or by on-the-spot negotiation for temporary use, and the layers are applied in reverse order of the message's path from sender to receiver; with each layer, the client includes information for the corresponding node regarding the next node to which the onion should be transmitted.•As the onion passes to each node in the chain, a layer of encryption is peeled away by the receiving node (using the private key that corresponds to the public key with which the layer was encrypted), and then the newly diminished onion is transmitted to then next node in the chain.•The last node in the chain peels off the last layer and transmits the original message to the intended recipient.Anonymous TaskingOnion Router mechanism•Client proxy establish a symmetric session key and circuit with Onion Router #1Anonymous TaskingOnion Router mechanism•Client proxy extends the circuit by establishing a symmetric session key with Onion Router #2•Tunnel through Onion Router #1Anonymous TaskingOnion Router mechanism•Client proxy extends the circuit by establishing a symmetric session key with Onion Router #3–Tunnel through Onion Routers #1 and #2Anonymous TaskingHidden credentials method•A complex policy is an expression of one or more simple policies which must be satisfiedto decrypt a resource.•A simple policy is the pair (attr; Pub) where attr is a set of one or more attributes (notincluding identity) and Pub is the public key of the credential authority (CA) needed to verify those attributes.•Credential is a tuple (nym; attr; Pub; sig) where nym is the (pseudo-)identity of the credential holder. (attr; Pub) form a simple policy, and sig is the signature on both attr and nym made with the secret key corresponding to the public key Pub.•Based on Identity Based EncryptionIBE is a public-key encryption system in which an arbitrary


View Full Document

UCF EEL 6788 - Survey - The Urban Security and Privacy challenges

Documents in this Course
Load more
Download Survey - The Urban Security and Privacy challenges
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Survey - The Urban Security and Privacy challenges and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Survey - The Urban Security and Privacy challenges 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?