pervasive computing and its security issues

26
Pervasive Computing SOK Phearin Department of Computer Science MBC Lab., Konkuk University 1

Upload: phearin-sok

Post on 06-May-2015

4.165 views

Category:

Technology


2 download

DESCRIPTION

Describe the concepts and architectures of Pervasive Computing and its current security issues regarding the wireless connectivity

TRANSCRIPT

Page 1: Pervasive computing and its Security Issues

1

Pervasive Computing

SOK PhearinDepartment of Computer Science

MBC Lab., Konkuk University

Page 2: Pervasive computing and its Security Issues

2

Outline

I. Overview of Pervasive Computing

II. Architecture

III. Wireless Communication Technologies in Pervasive Computing and Security Issues

IV. Wireless Vulnerabilities

V. Conclusion

Page 3: Pervasive computing and its Security Issues

3

Pervasive Computing Overview

Mark D. Weiser (July 23, 1952 – April 27, 1999)

“Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives.”

“The Computer for the 21st Century” - September, 1991

Page 4: Pervasive computing and its Security Issues

4

Pervasive Computing Overview

Development of computing technologies:

1st wave : Mainframe computing era

2nd wave : Personal computing era

3rd wave : Pervasive computing era(initially called ubiquitous computing)

Page 5: Pervasive computing and its Security Issues

5

Integration of Information and Communications Technology (ICT) into people’s lives and environments, made possible by the growing availability of microprocessors with inbuilt communication facilities.

Goals:People OrientedImplicitly use of computersPeople will focus on task, not tool

What is Pervasive Computing

Page 6: Pervasive computing and its Security Issues

6

Three converging areas of ICT components:Computing devices: communicate with each other and

act intelligently Sensors: input devices Processors: interpret and analyze data Actuators: output devices

Communications: serve pervasive computing applications

Ex. Zigbee, Bluetooth, WiFi, Wimax /LTE /3G /4G …

User Interfaces: point of contact between ICT and human Active: Users overtly control PC technologies and devices Passive: PC covertly control in the background Coercive: both Active and Passive

Pervasive Computing Components

Page 7: Pervasive computing and its Security Issues

7

ArchitectureApplication

Middleware and Security Interface

Mobile Computing

Context-Aware

Affective Computing

Inte

llig

en

t C

om

pu

tin

g

Embedded Operating System

Hardware

Various applications such as Smart Room, Intelligent Navigation… can be built and used

Page 8: Pervasive computing and its Security Issues

8

Not only: Heterogeneity Scalability Programming

interface

But also: Service Discovery Context-aware

ArchitectureApplication

Middleware and Security Interface

Mobile Computing

Context-Aware

Affective Computing

Inte

llig

en

t C

om

pu

tin

g

Embedded Operating System

Hardware

Page 9: Pervasive computing and its Security Issues

9

ArchitectureStructure of Middleware and Security Interface

Security Mechanism

……

Extend Module

Service Description

Context-aware service

API

Page 10: Pervasive computing and its Security Issues

10

Application

Middleware and Security Interface

Mobile Computing

Context-Aware

Affective Computing

Inte

llig

en

t C

om

pu

tin

g

Embedded Operating System

Hardware

Architecture

An important aspect of the difference between pervasive computing and desktop computing

Page 11: Pervasive computing and its Security Issues

11

ArchitectureMobile Computing: • Automatic configuration, dynamic addressing and

tracking system• Free switch between heterogeneous networksAffective Computing is the computing that relates to,

arises from, or deliberately influences emotions. – Rosalind W. Picard

• computer science, sensor technology, psychology, physiology

• Key technologies: face recognitions, emotional signal measurements and analysisContext-aware Computing: senses environment

context and human context changes.Key technologies: Location awareness, activities

recognition

Page 12: Pervasive computing and its Security Issues

12

Application

Middleware and Security Interface

Mobile Computing

Context-Aware

Affective Computing

Inte

llig

en

t C

om

pu

tin

g

Embedded Operating System

Hardware

ArchitectureHardware:

Fast processing speed Small size

Embedded Operating System: Real-time services Rational allocation

memories

Page 13: Pervasive computing and its Security Issues

13

Architecture

Network Interface

I/O DeviceSensors

Real-time Embedded Operating System

Pervasive Computing Hardware

Structure of Embedded Operating System and Hardware

Page 14: Pervasive computing and its Security Issues

14

Wireless CommunicationMany existing and emerging wireless

technologies serve in Pervasive Computing:

•Zigbee and Bluetooth - sensors and actuators - low energy consumption, short distances (up to 10

meters)

•Wi-Fi - devices - middle ranges (several hundreds of meters)

•Wimax /LTE /3G /4G - a home gateway to Internet - long ranges (several to tens of kilometres)

Page 15: Pervasive computing and its Security Issues

15

Common vulnerabilities existing in wireless technologies:

Physical jamming

Passive eavesdropping and traffic analysis

Message injection and active eavesdropping

Message deletion and interception

Insider attacks to breach data confidentiality

Denial of service (DoS) attacks

Security Issues

Page 16: Pervasive computing and its Security Issues

16

Various types of Attack to a Pervasive

Computing can:

Compromise users’ data,

Crash an entire system

Render services unavailable

Potentially lead to the loss of property

Harm users and even lives

Security Issues

Page 17: Pervasive computing and its Security Issues

17

Carrier Sense Multiple Access with Collision

Avoidance (CSMA/CA)

DoS attack: Clear Channel Assessment-Jamming

Virtual carrier sense

DoS attack: Repeat forged RTS/CTS messages with

large NAV leading network slowdown

Wireless VulnerabilitiesWi-Fi MAC Protocol Attacks

Page 18: Pervasive computing and its Security Issues

18

802.11 state machine

DoS attack: forge deauthentication or disassociation frames

Wireless Vulnerabilities

Page 19: Pervasive computing and its Security Issues

19

Wireless VulnerabilitiesWi-Fi Security Protocol Attacks

Page 20: Pervasive computing and its Security Issues

20

Wireless VulnerabilitiesWi-Fi Security Protocol Attacks

Pre-Robust Security Network Association (Pre-RSNA): security mechanisms in the IEEE 802.11-1997

Attacks on Wired Equivalent Privacy(WEP):Shared Key management – key can be easily obtained

from the attackersWeak RC4 encryption implementation – key can be

easily broken by the brute force attack

Page 21: Pervasive computing and its Security Issues

21

Wireless Vulnerabilities

Robust Security Network Association (RSNA):

security mechanisms in the IEEE 802.11-2007,

consisting of 3 security algorithms:

Data confidentiality and integrity protocols

RSNA security association management

key management procedures

Page 22: Pervasive computing and its Security Issues

22

Wireless VulnerabilitiesAttacks on RSNA

• Security level rollback attack: “Pre-RSNA only”

beacons to force the network to use WEP

• EAP attack: forged association requests - disconnect

legitimate users.

• Four-way handshake DoS attack: forged first

unauthenticated message - parallel incomplete

Handshakes - exhaust queue space

Page 23: Pervasive computing and its Security Issues

23

Wireless VulnerabilitiesAttacks on RSNA (Cont.)

• RSN IE poisoning: fake beacons - fail at stage 3

• Reflection attack against four-way handshake:

transmitted data sent back to originator .

• Dos attack against TKIP: intercepted and modified

packet - AP and the client suspend their

communication

Page 24: Pervasive computing and its Security Issues

24

Confidentiality, Integrity, and Availability (CIA)

are essential to pervasive computing applications

since sensitive and real-time information may

flow over any type of wireless links

Many challenges and attacks have been proved.

Each operation and policy should be carefully

examined against any possible attacks.

Conclusion

Page 25: Pervasive computing and its Security Issues

25

Liu, Y. & Li, F., PCA: A Reference Architecture for Pervasive Computing, 2006 1 st International Symposium on Pervasive Computing and Applications, IEEE 04079121

Zhou, B, Marshall, A. & Lee, T. H., Wireless Security Issues in pervasive computing, 2010 Fourth International Conference on Genetic and Evolutionary Computing, IEEE 05715481

2006, Pervasive Computing, Parliamentary Office of Science and Technology

Reference

Page 26: Pervasive computing and its Security Issues

26

Thank You