bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article913066.html 1 st WS4D-Workshop Towards a comprehensive.

Slides:



Advertisements
Ähnliche Präsentationen
What is E-Lit?What is E-Lit?. Michael Joyce, afternoon: a story (1990)
Advertisements

Service Oriented Architectures for Remote Instrumentation
Finding the Pattern You Need: The Design Pattern Intent Ontology
R. Zankl – Ch. Oelschlegel – M. Schüler – M. Karg – H. Obermayer R. Gottanka – F. Rösch – P. Keidler – A. Spangler th Expert Meeting Business.
Art der Arbeit (Projekt-/Studien-/Diplomarbeit/
Institut AIFB, Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 Towards Automatic Composition of Processes based on Semantic.
You need to use your mouse to see this presentation © Heidi Behrens.
INTAKT- Interkulturelle Berufsfelderkundungen als ausbildungsbezogene Lerneinheiten in berufsqualifizierenden Auslandspraktika DE/10/LLP-LdV/TOI/
Ein Projekt des Technischen Jugendfreizeit- und Bildungsvereins (tjfbv) e.V. kommunizieren.de Blended Learning for people with disabilities.
1 Intern | ST-IN/PRM-EU | | © Robert Bosch GmbH Alle Rechte vorbehalten, auch bzgl. jeder Verfügung, Verwertung, Reproduktion, Bearbeitung,
Guten Morgen oder Guten Tag, Deutsch II! Dieses Jahr werde ich viel mehr Deutsch sprechen. So, passt auf und hört zu! Ich habe Klassinformation dass ihr.
23 von 23 Olaf Eigenbrodt 10/08 Standardisation Standards are reliable basics for library design and construction IFLA Library Building Guidelines German.
Institut für Angewandte Mikroelektronik und Datentechnik Course and contest Results of Phase Selected Topics in VLSI Design (Module 24513) ©
Filmtechnische Geräte in dem Film Farben (colours) Humor (humour) Musik (music) Symbole und Leitmotive (symbols and themes)
Research-guided Teaching Representation in the Biology Curriculum.
Präsentiert von Riccardo Fuda.  Klassische (symmetrische) Kryptographie  Der weg zur modernen Kryptographie  Message Authentification Codes  Asymmetrische.
Institut für Angewandte Mikroelektronik und Datentechnik Phase 5 Architectural impact on ASIC and FPGA Nils Büscher Selected Topics in VLSI Design (Module.
Die Fragen Wörter Wer? Was? Wann?.
Seite 1 Rashtriya Swasthya Bima Yojana (RSBY) New Complaint and Grievance Redressal Web Page Dr. Nishant Jain.
SiPass standalone.
Ralf M. Schnell Technical Evangelist Microsoft Deutschland GmbH
Welcome to Web Services & Grid Computing Jens Mache
DEUTSCHE INITIATIVE FÜR NETZWERKINFORMATION E.V. Regine Tobias & Dr. Barbara Ebert CRIS in German universities and research institutions - position paper.
Physik multimedial Lehr- und Lernmodule für das Studium der Physik als Nebenfach Julika Mimkes: Links to e-learning content for.
Gregor Graf Oracle Portal (Part of the Oracle Application Server 9i) Gregor Graf (2001,2002)
Lecture slides for Training Curriculum TIA Portal
COST working group 2 – EMM Erreichbarkeitsatlas
EUROPÄISCHE GEMEINSCHAFT Europäischer Sozialfonds EUROPÄISCHE GEMEINSCHAFT Europäischer Fonds für Regionale Entwicklung Workpackage 5 – guidelines Tasks.
Berliner Elektronenspeicherring-Gesellschaft für Synchrotronstrahlung m.b.H., Albert-Einstein-Straße 15, Berlin frontend control at BESSY R. Fleischhauer.
Kapitel 2 Grammar INDEX 1.Subjects & Verbs 2.Conjugation of Verbs 3.Subject Verb Agreement 4.Person and Number 5.Present Tense 6.Word Order: Position of.
Universität StuttgartInstitut für Wasserbau, Lehrstuhl für Hydrologie und Geohydrologie Numerical Modelling – Policy Interface Workshop 12. March 2007.
Memorisation techniques
Caroline Euringer Hamburg University LEO.-App: Mobile phone application for self-testing in reading and writing Peer Learning Activity on the use of digital.
Das Wetter Lernziele: Heute: The „Wenn“ clause! - To describe and report the weather - To discuss activities done in different types of weather - To compare.
Sven Koerber-Abe, 2015 Grammatik: können, wollen, möchten Grammatik: können, wollen, möchten.
Sven Koerber-Abe, 2015 Grammatik: müssen, dürfen Grammatik: müssen, dürfen.
Position Sven Koerber-Abe, 2015 ▪ ▪. in Der PC ist in ___ Box.
Dativ Sven Koerber-Abe, 2015.
Sven Koerber-Abe, 2016 Grammatik: Artikel (Zusammenfassung) Grammatik: Artikel (Zusammenfassung)
Technische Universität München Alexander Neidhardt Forschungseinrichtung Satellitengeodäsie 1 Concepts for remote control of VLBI-telescopes: on the way.
Essay structure Example: Die fetten Jahre sind vorbei: Was passiert auf der Almhütte? Welche Bedeutung hat sie für jede der vier Personen? Intro: One or.
LLP DE-COMENIUS-CMP Dieses Projekt wurde mit Unterstützung der Europäischen Kommission finanziert. Die Verantwortung für den Inhalt dieser.
Kanton Basel-Stadt Howto crash a sequencer …and a path to get a difficult package to work APP-V Swissgroup / Daniel Müller.
Workshop 1 Getting Started 2016 Boris Wylutzki
Premiere Conferencing GmbH
Agenda Eröffnung und Begrüßung durch Mag.a Elisabeth Rosenberger
Azure Countdown Wenn der Freund und Helfer Freunde und Helfer braucht: Sichere Content-Upload-Plattform für Bürger.
Investitionen sichern - wachse mit Forms in die neue Welt
Aspect-Oriented Programming: Fad or the Future
Process and Impact of Re-Inspection in NRW
Grammatik: Perfekt Sven Koerber-Abe, 2014.
IETF 80 Prague DISPATCH WG
Grammatik: waren / hatten
Get your Project started
Dethroning TLS in the Embedded World
CERN – TUD – GSI Webmeeting
Arbeitsfeld Lehrerausbildung im LfS Edwin Stiller
Impact of Digitalization for Engineers and Engineering Education
Grammatik: Perfekt Sven Koerber-Abe, 2014.
„Förderwolke“ A Cloud-based exchange platform for the qualitative enhancement and improvement of inclusive education Dipl. Reha-Päd. Hanna Linke scientific.
Official Statistics Web Cartography in Germany − Regional Statistics, Federal and European Elections, Future Activities − Joint Working Party meeting.
OFFICE 365 FOCUS SESSION SHAREPOINT ONLINE 101:LERNE DIE BASICS 19. März 2018 Höhr-Grenzhausen.
Integrating Knowledge Discovery into Knowledge Management
Practical Exercises and Theory
Area of Specialization
- moodle – a internet based learning platform
Grammatik: Position Sven Koerber-Abe, 2013.
 Präsentation transkript:

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html 1 st WS4D-Workshop Towards a comprehensive Security Framework for Embedded Distributed Systems Sebastian Unger 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems1

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html  Motivation  State of the art  Approach  First results  Next steps Agenda 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems2

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Motivation AAL IoT WoT 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems3

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Ambient Assisted Living Internet of Things Web of Things Ambient Intelligence Pervasive Computing Motivation 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems4

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Existing basic security mechanisms How is security dealt with in … … existing standards? … existing industry projects? … existing academic research projects? State of the art 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems5

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Basic security mechanisms subnet Same key for everyone - or - Individual keys MAC Layer Security ≙ router MAC Layer Security PHY MAC Internet Transport Application 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems6

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Basic security mechanisms IP Sec Transport ModeTunnel Mode subnet IPSec is complex! Vendor AVendor B PHY MAC Internet Transport Application 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems7

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Basic security mechanisms Transport Layer Security (TLS) TLS PHY MAC Internet Transport Application TCP! 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems8

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Existing basic security mechanisms not ideal for embedded devices Solve single aspects only and are not suitable for embedded devices How is security covered in existing technologies? State of the art – Existing basic security concepts Conclusion 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems9

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Standards DPWS (no logo available) Universal Plug and Play Digital Living Network Alliance Devices Profile for Web Services Security optional, rarely implemented [14] Only security feature protects DRM streams Security relies on TLS Only truly free technology 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems10

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Industry projects 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems11

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Industry projects Literally no concrete, official information available Rumors: devices should run Android functionality can be enhanced by means of an app store 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems12

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Industry projects similar idea proprietary communication protocol e.g. sensor get integrated by ‚drivers‘ in central instance security: sophisticated access control (but nothing else) 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems13

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Academic research projects Cooltown[1] Amigo[2] Hydra/ Linksmart[3] PEIS[4] SM4ALL[5] ubiSOAP (PLASTIC)[6] PECES[7] MundoCore[9] GREEN[8] Gaia[10] MobiPADS[11] iCOCOA[12] PACE[13] Cooltown[1] PEIS[4] SM4ALL[5] MundoCore[9] GREEN[8] Gaia[10] MobiPADS[11] iCOCOA[12] PACE[13] 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems14

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Academic research projects Amigo Hydra/ Linksmart ubiSOAP (PLASTIC) PECES Certificate hierarchies (see TLS) Role-based access restriction Centralized security approach (Kerberos) Authentication via password, no details on encryption/signatures, security as a service Sophisticated approaches integrated (genetic algorithms, secure flow) no details on basics (encryption, signatures, …) Based on Web Services Offers limited LW WS Security, nothing else 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems15

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Existing standards / projects Security often not considered at all If considered, then… … employed technologies not suitable for embedded devices … only single issues solved  No interoperability between approaches Conclusion S. Unger, S.Pfeiffer, D. Timmermann: How much Security for Switching a Light Bulb - The SOA Way. In IWCMC’12 Security, Trust and Privacy Symposium (IWCMC2012-Security), Cyprus, August Accepted 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems16

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html State of the art – Existing standards / projects Conclusion 2: What do we need? DPWS Interoperability Comprehensive security architecture Featuring Message and connection security Authentication Trust brokering Authorization brokering Heterogeneity; Embedded distributed systems 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems17

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Approach Web Services WS-Security Suite Do not reinvent the wheel Instead: Find existing solution from different domain isolate core concepts develop methodology to transport core concepts to domain of embedded devices 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems18

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Approach Web ServicesDevices Profile for WS-Security Suite Devices Profile for Do not reinvent the wheel 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems19

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Approach in detail Communication technology for distributed systems Base technology (Web Services) already adapted to embedded devices (DPWS) WS Security suite offers all requested core features (message and connection level security, trust and authorization brokering, …) Open technology fosters interoperability S. Unger, G. Moritz: A comprehensive Security Framework for Distributed Systems of Resource-constrained Devices. In IETF Workshop on Smart Object Security, Paris, March (Position paper) 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems20

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Approach in detail The Web Service Security suite WS-Federation WS-Trust WS-SecureConversation WS-Security WS-Policy Trust brokering Centralized authentication Authorization brokering WS-Security ∈ WS Security Suite 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems21

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Approach in detail Methodology Restrict generalityOffload resource-intensive tasks Potentially offloadable tasks: Policy processing Parameter negotiation Connection establishment Authentication / trust establishment Verification of trust and authorization 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems22

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html First results: WS-CompactSecurity WS-Federation WS-Trust WS-SecureConversation WS-Security WS-Policy WS-CompactSecurity TLS transform compare Goals: Demonstrate feasibility Figure out possible drawbacks compared to state of the art 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems23

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html XML-Signature XML-Encryption WS-Security WS CompactSecurity Compact Signature Compact Encryption goal Existed Defined combined & implemented First results: WS-CompactSecurity 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems24

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html First results: WS-CompactSecurity Factor 1.5 – 2 S. Unger, S. Pfeiffer, D. Timmermann: Dethroning TLS in the Embedded World. In 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2012, Istanbul, May /30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems25

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html First results: WS-CompactSecurity S. Unger, S. Pfeiffer, D. Timmermann: Dethroning TLS in the Embedded World. In 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2012, Istanbul, May WS Compact Security … … is equally fast as TLS? … eliminates dependency on TCP? … eliminates dependency on X.509 certificates? … offers opportunity to freely choose authentication method? 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems26

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Future steps Transform remaining specifications WS-Federation WS-Trust WS-SecureConversation WS-Security WS-Policy WS-CompactFederation WS-CompactTrust WS-CompactSecureConversation WS-CompactSecurity Result: Devices Profile for Web Service Security 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems27

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Future steps Transport results Hypothesis: “Results are applicable to every service-oriented base technology” Devices Profile for Web Service Security – Web Services = Devices Profile for Security = Security architecture for distributed embedded systems 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems28

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Future steps Transport results Result: Prove that approach is technology independent SOAPvs.REST Web Services (DPWS)CoAP „Binary HTTP“ for embedded devices Devices Profile for Web Service Security CoAP Security port 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems29

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Bibliography (1) [1] Barton, John; Kindberg, Tim: The Cooltown User Experience / Hewlett Packard Laboratories Palo Alto Technical Report [2] IST Amigo Project: Ambient Intelligence for the networked home environment (Project Description). September 2004 [3] Eisenhauer, M.; Rosengren, P.; Antolin, P.: A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems. SECON Workshops 2009 [4] Saffiotti, A. et al.: The PEIS-Ecology Project: vision and results. In: IEEE/RSJ Int. Conf. on Intelligent Robots and Systems (IROS) [5] Baldoni, R.: An Embedded Middleware Platform for Pervasive and Immersive Environments for-All. SECON Workshops 2009 [6] PLASTIC Consortium: A B3G Service Platform: The IST PLASTIC Projects. Technical Report [7] Handte, M. et al.: D4.1 Secure Middleware Specification - Version 1.4 / Peces - Pervasive computing in embedded systems Technical Report 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems30

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Bibliography (2) [8] Sivaharan, T et al.: GREEN: A Configurable and Re-Configurable Publish-Subscribe Middleware for Pervasive Computing. In: Building 3760 LNCS (2005) [9] Aitenbichler, M. et al.: MundoCore: A Light-weight Infrastructure for Pervasive Computing. In: Pervasive and Mobile Computing (2007) [10] Román, M. et al.: Gaia: a middleware platform for active spaces. In: SIG-MOBILE Mob. Comput. Commun. Rev. 6 (2002) [11] Chan, A.; Chuang, S.-N.: MobiPADS: A Reflective Middleware for Context-Aware Mobile Computing. In: IEEE Trans. Softw. Eng. 29 (2003) [12] Ben Mokhtar, S et al.: COCOA: COnversation-based service COmposition in pervAsive computing environments with QoS support. In: Journal of Systems and Software 80 (2007) [13] Henricksen, K. et al.: Middleware for Distributed Context-Aware Systems. In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE [14] Ellison, C.: UPnP Security Ceremonies Design Document. 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems31

bonn.de/bonn/bonn/suedstadt/Streit- Apple-gegen-Apfelkind-geht-weiter- article html Thank you! Any questions? Thank you very much for your attention! 11/30/12Sebastian Unger: Towards a comprehensive Security Framework for Embedded Distributed Systems32