Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments

advertisement
多媒體網路安全實驗室
Routing Through the Mist:
Privacy Preserving Communication
in Ubiquitous Computing
Environments
Date:2011/05/05
報告人:向峻霈
出處: Jalal Al-Muhtadi , Roy Campbell , Apu Kapadia , M. Dennis Mickunas
Seung Yi : Distributed Computing Systems,
pp. 74-83 ,2002
多媒體網路安全實驗室
Outline
1
Introduction
2
Problem statement
3
The Mist Hierarchy
4
Implementation
5
3
Conclusion
2
多媒體網路安全實驗室
Introduction
Distributed systems and mobile computing
have converged to enhance global
interconnectivity
Users can access services
 Run programs
 Utilize resources
 Harvest computing power anytime and anywhere
3
多媒體網路安全實驗室
Problem statement
Physical spaces augmented with sensors
and actuators that can locate users
收集網絡地址
物理位置
竊聽者
User
4
多媒體網路安全實驗室
Problem statement
We aim to design and implement a privacy
protocol
 User能在任意環境自由交流並保留隱私
 防止內部人員的隱私協議
Sensors that can detect the presence of
users in a room
 但沒有能力積極辨識user
Mist Routers
 Preserve privacy
 Hide information
5
多媒體網路安全實驗室
Problem statement
Our goal is to achieve the following
 Location privacy
 Anonymous connections
 Confidentiality
We assume




Public Key Infrastructure (PKI) exists
Ubiquitous computing environment
Mist Routers
Third party that can’t be trusted
6
多媒體網路安全實驗室
The Mist Hierarchy
7
多媒體網路安全實驗室
The Mist Hierarchy
Portals are viewed as the gateways that
bridge the virtual world to the physical one




Workstation
A sensor
An access point for wireless devices
RF transceiver
8
多媒體網路安全實驗室
The Mist Hierarchy
 “Smart” rooms
 Detect the physical presence of one or more users
 The users are anonymous and not authenticated
as of yet
 Location and discovery services that are available
in Gaia OS
 不包含
• 監控攝像機
• 語音識別裝置
9
多媒體網路安全實驗室
Registering in the system
10
多媒體網路安全實驗室
Mist Circuits
Mist Circuits employ hop-to-hop
 handle-based routing to send data packets
back and forth between the source and
destination through the mist
 Combining this routing with limited publickey encryption
11
多媒體網路安全實驗室
General format for Mist packets
12
多媒體網路安全實驗室
Mist Circuit setup
13
多媒體網路安全實驗室
Mist Circuits
14
多媒體網路安全實驗室
Mist Circuits
 Alice: Alice’s unique ID in the active information space
 TS: A timestamp to prevent replay attacks
 Ksession: A random session key to encrypt further communication
between the user and her or his Lighthouse
 TKN: A token to be presented to the user’s lookup service
 Ek : Means encrypt using the key ‘k’
 PP: A predetermined “fixed” phrase
15
多媒體網路安全實驗室
Locating Users
Once the Mist Circuit-Setup has been
completed
 LDAP Servers
 Web Servers
 Security issues
16
多媒體網路安全實驗室
LDAP Servers
Lightweight Directory Access Protocol
(LDAP)
 users can register attributes with LDAP servers
 unique LDAP Distinguished Name(DN)
17
多媒體網路安全實驗室
Web Servers
Users to maintain their own webpages
 These webpages can be updated by a CGI
script
18
多媒體網路安全實驗室
Security issues
We would like to prevent malicious
Lighthouses or attackers
 Constructs a special token (TKN) signed by
the user’s private key
 TKN
• Timestamp
• Unique ID of the chosen Lighthouse
TKN contents do not need to be encrypted
19
多媒體網路安全實驗室
Mist Communication Setup
20
多媒體網路安全實驗室
Mist Communication Setup
21
多媒體網路安全實驗室
Conclusion
There is a fair possibility of creating a
ubiquitous ‘surveillance’ system instead
We would like to “short circuit” their
communication to take the shortest path
possible
22
多媒體網路安全實驗室
Download