Security Technologies on Communication Networks and Their Applications

  • Slides: 30
Download presentation
Security Technologies on Communication Networks and Their Applications to Electronic Business Chair Professor Chin-Chen

Security Technologies on Communication Networks and Their Applications to Electronic Business Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http: //msn. iecs. fcu. edu. tw/~ccc MSN lab

Outline n n n n Mobile services Radio Frequency Identification (RFID) Roaming between cellular

Outline n n n n Mobile services Radio Frequency Identification (RFID) Roaming between cellular network and WLAN Watermarking Image authentication Visual cryptography Secret sharing Steganography MSN lab 2

Mobile services (1/4) MSN lab 3

Mobile services (1/4) MSN lab 3

Mobile services (2/4) MSN lab 4

Mobile services (2/4) MSN lab 4

Mobile services (3/4) MSN lab 5

Mobile services (3/4) MSN lab 5

Treats ? (4/4) n User perspective n n Spoofing Framing Denial-of-service Network perspective n

Treats ? (4/4) n User perspective n n Spoofing Framing Denial-of-service Network perspective n n Passive Active 1. Eavesdropping 2. Traffic analysis 1. Masquerading 2. Replay 3. Message modification MSN lab 6

Spoofing MSN lab 7

Spoofing MSN lab 7

Framing Legitimate? Bogus? MSN lab 8

Framing Legitimate? Bogus? MSN lab 8

Denial-of-service MSN lab 9

Denial-of-service MSN lab 9

RFID (1/4) Tag Reader Database Antenna MSN lab 10

RFID (1/4) Tag Reader Database Antenna MSN lab 10

RFID (2/4) n n n Shopping Library Transportation Household appliance … MSN lab 11

RFID (2/4) n n n Shopping Library Transportation Household appliance … MSN lab 11

Risk? (3/4) n n n Eavesdropping Traffic analysis Replay attack Position detection Physical attack

Risk? (3/4) n n n Eavesdropping Traffic analysis Replay attack Position detection Physical attack MSN lab 12

Issue? (4/4) n n Anonymity -> Privacy Synchronization Authentication Efficiency MSN lab 13

Issue? (4/4) n n Anonymity -> Privacy Synchronization Authentication Efficiency MSN lab 13

Roaming (1/3) n Access to the Internet anywhere & anytime Cellular network Base station

Roaming (1/3) n Access to the Internet anywhere & anytime Cellular network Base station Internet t Mobile device AP AS AS: Authentication server AP: Access point ISP WLAN MSN lab 14

Roaming (2/3) n n n Cellular networks : wide service areas and continuous pervasive

Roaming (2/3) n n n Cellular networks : wide service areas and continuous pervasive access WLAN : high-speed pervasive communications How to integrate? MSN lab 15

Issues? (3/3) n n n Mutual authentication Anonymous service Charging MSN lab 16

Issues? (3/3) n n n Mutual authentication Anonymous service Charging MSN lab 16

Watermarking n Visible watermarking n n Easy to embed Clear to see watermark MSN

Watermarking n Visible watermarking n n Easy to embed Clear to see watermark MSN lab 17

Watermarking (Cont. ) n Invisible watermarking n Requirements: n n Good visual quality of

Watermarking (Cont. ) n Invisible watermarking n Requirements: n n Good visual quality of watermarked image Robustness Watermarking Original image Watermark MSN lab Watermarked image 18

Image authentication n Requirements: n n Image Detect the tampered area Try to restore

Image authentication n Requirements: n n Image Detect the tampered area Try to restore the tampered area Tampered image Detected image MSN lab Restored image 19

Secret sharing n Classification: n Meaningless shadows n Meaningful shadows MSN lab 20

Secret sharing n Classification: n Meaningless shadows n Meaningful shadows MSN lab 20

Secret sharing (Cont. ) Sharing Shadow size: 256 Image size: 512 Reconstructing (2, 4)-threshold

Secret sharing (Cont. ) Sharing Shadow size: 256 Image size: 512 Reconstructing (2, 4)-threshold secret sharing scheme MSN lab PSNR=24 d. B 21

Secret sharing (Cont. ) Reconstructing Hiding Stego-image Secret image Reconstructed secret image Stego-image (2,

Secret sharing (Cont. ) Reconstructing Hiding Stego-image Secret image Reconstructed secret image Stego-image (2, n)-threshold secret sharing scheme Stego-image MSN lab 22

Visual cryptography Stacking Shadow 1 Shadow 2 Secret MSN lab 23

Visual cryptography Stacking Shadow 1 Shadow 2 Secret MSN lab 23

Visual cryptography (Cont. ) Stacking Shadow 1 Shadow 2 Secret MSN lab 24

Visual cryptography (Cont. ) Stacking Shadow 1 Shadow 2 Secret MSN lab 24

Visual cryptography (Cont. ) Rotating 40 o Stacking Share 2 Share 1 Secret 1

Visual cryptography (Cont. ) Rotating 40 o Stacking Share 2 Share 1 Secret 1 “VISUAL” MSN lab Secret 2 “SECRET” 25

Steganography n The targets n n n Frequency domain (e. g. DCT, DWT, DFT)

Steganography n The targets n n n Frequency domain (e. g. DCT, DWT, DFT) Spatial domain (e. g. pixel values) Compression domain (e. g. VQ) Text Restoration n n Irreversible Reversible MSN lab 26

Steganography (Cont. ) n Image Hiding system Stego image Cover image 10101 00101 11100

Steganography (Cont. ) n Image Hiding system Stego image Cover image 10101 00101 11100 Secret message MSN lab 27

Conclusions n n The biggest risk: eavesdropping & copy The limitation: n n Power

Conclusions n n The biggest risk: eavesdropping & copy The limitation: n n Power Computing capability Robustness Image quality MSN lab 29

Security Technologies on Communication Networks and Their Applications to Electronic Business MSN lab 30

Security Technologies on Communication Networks and Their Applications to Electronic Business MSN lab 30