Enabling Secure Ad-hoc Group Collaboration over Bluetooth - - PowerPoint PPT Presentation

enabling secure ad hoc group collaboration over bluetooth
SMART_READER_LITE
LIVE PREVIEW

Enabling Secure Ad-hoc Group Collaboration over Bluetooth - - PowerPoint PPT Presentation

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( asthana@cse.buffalo.edu ) Dimitris Kalfonos ( dimitris.kalofonos@nokia.com ) Outline Introduction Related Work Motivating User Scenario


slide-1
SLIDE 1

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( asthana@cse.buffalo.edu ) Dimitris Kalfonos ( dimitris.kalofonos@nokia.com )

slide-2
SLIDE 2

Outline

  • Introduction
  • Related Work
  • Motivating User Scenario
  • Design Goals
  • Secure Scatternet Topology Formation Protocol
  • Secure Scatternet Topology Update Protocol
  • Experimental Setup
  • Performance Results
  • Conclusions and Future Work
slide-3
SLIDE 3

Introduction

An application-driven framework to enable

secure ad-hoc group collaboration using Bluetooth scatternet.

Our scatternet protocol is designed for scenarios

like secure group meeting, where individuals can participate with their private piconets.

During scatternet formation existing sessions and

security associations are maintained.

Our scatternet protocol creates loop free

compact tree topology.

We describe a prototype implementation and

provide some initial experimental and simulation results.

slide-4
SLIDE 4

Related Work

BTH Network Formation Protocol can be divided

into following categories:

Resulting Topology:

Mesh

  • C. Petrioli and S. Basagni. “Degree-constraint multihop scatternet

formation for Bluetooth networks”. In IEEE Globecom,2002.

Tree

  • G. Tan, A. Miu, J. Guttag, and H. Balakrishnan. “An efficient scatternet

formation algorithm for dynamic environments”. In IASTED Comm. and

  • Comp. Networks (CCN'02), 2002.

Variant of mesh

  • C. C. Foo and K. C. Chua. “Bluerings - bluetooth scatternets with ring

structures”. In IASTED International Conference on Wireless and Optical Communication (WOC'02), 2002.

Adaptation Capabilities:

Static

  • T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaira. “Distributed

topology construction of bluetooth personal area networks”. In IEEE INFOCOM, 2001.

slide-5
SLIDE 5

Dynamic

  • F. Cuomo, G. Di Bacco, and T. Melodia. “SHAPER: a self-healing

algorithm producing multi-hop Bluetooth scatternets”. In IEEE Globecom, 2003.

Centralized / Decentralized approach:

Centralized

  • T. Salonidis, P. Bhagwat, L. Tassiulas, and R. LaMaira. “Distributed

topology construction of bluetooth personal area networks”. In IEEE INFOCOM, 2001.

Decentralized

  • G. Zaruba, S. Basagni, and I. Chlamtac. “Bluetrees - scatternet

formation to enable Bluetooth-based ad hoc networks”. In IEEE Int.

  • Conf. on Comm. (ICC'01), 2001.

None of the above protocols consider the

impact of security except

Karl E. Persson and D. Manivannan. “Secure connections in Bluetooth scatternets”. In Proceedings of 36th Hawaii International conference on System science, 2003.

Related Work contd…

slide-6
SLIDE 6

User Scenario:

John decides to organize a secure meeting with his teammates. Everyone except Mary bring their BTH-enabled devices in the meeting. Frank comes with his laptop paired with his mobile phone. John initiates the meeting, passes the meeting name and the password. During scatternet formation Frank continues synchronizing his phone. All of them connect and start exchanging presentations and files. Eventually, Mary turns up and requests Frank to let her in the meeting. Frank passes the meeting name and the password and

  • pens the door for her.

Motivating User Scenario

slide-7
SLIDE 7

Design Goals

Design goals :

Scatternet formation involves pre-configured private piconets with existing security associations. Devices should be properly authenticated before associating with the scatternet, new devices can join

  • nly by invitation.

All scatternet traffic is encrypted. The scatternet formation should involve minimal (if any) user interactions. Once scatternet formation completes the devices dedicate all their energy in communication. Create a topology which simplify routing. BTH 1.1 compliant.

slide-8
SLIDE 8

Secure Scatternet Topology Formation Protocol

Our scatternet protocol only allows a master of the piconet

called as Pico-Head (PH), to participate.

A particular user chooses its PH as ROOT, takes an action

like “hosting” a meeting and enters the scatternet PIN.

Other users wanting to participate take an action like “joining”

a meeting and enter their scatternet PIN.

Root PH starts scanning (both inquiry and page scanning)

and other PH start inquiring.

On successful inquiry, the PH pages the discovered PH,

which authenticates using the scatternet PIN.

If authentication succeeds, devices connect and perform a

role-switch.

Each PH on attachment starts scanning inviting other free

PHs.

Once scatternet is formed, all devices stop scanning.

slide-9
SLIDE 9

Secure Scatternet Topology Formation Protocol contd…

inq inq scan inq inq inq inq inq inq inq S M S M S M S M S M S M S M S M S M scan scan scan scan inq scan scan S M S M S M S M S M S M S M M S M S M inq scan inq S M S M S M S M S M S M S M M S M S M

Scatternet formation starts Scatternet formation in progress Scatternet formation completes

M M M

slide-10
SLIDE 10

Secure Scatternet Topology Formation Protocol contd…

(KEY1) (KEY1) (KEY1)

USER B camera laptop phone mp3player

(KEY2) (KEY4) (KEY2)

USER A phone laptop mp3player

(KEY3) (KEY3) (KEY3)

USER C camera laptop phone mp3player USER D USER E phone phone

(KEY4) (KEY4) (KEY4) Meeting Name : Password

: Creating Meeting… DONE project PIN USER A

Meeting Name : Password

: Joining Meeting… DONE project PIN USERS B-E

S M S S M S M S M S S M S S S S S (KEY1) (KEY1) (KEY1)

USER B camera laptop phone mp3player

(KEY2) (KEY4) (KEY2)

USER A phone laptop mp3player

(KEY3) (KEY3) (KEY3)

USER C camera laptop phone mp3player USER D USER E phone phone

(KEY4) (KEY4) (KEY4) Meeting Name : Password

: Creating Meeting… DONE project PIN USER A

Meeting Name : Password

: Joining Meeting… DONE project PIN USERS B-E

S M S M S S M S M S M S M S M S M S S M S S S S S

slide-11
SLIDE 11

Secure Scatternet Topology Update Protocol

Our protocol allows new users to join the scatternet by

invitation.

Participating user takes an action like “updating” a meeting

  • n any PH.

That PH broadcasts an UPDATE scatternet message to all

PH in the scatternet and starts scanning.

On receiving the UPDATE message each PH starts scanning

and becomes a potential attachment point.

New user take an action like “joining” the meeting and enters

the scatternet PIN, PH starts inquiring. On successful inquiry, the PH connects to the discovered PH after proper authentication.

Once the scatternet updates all devices stop scanning.

slide-12
SLIDE 12

(KEY1) (KEY1) (KEY1)

USER B camera laptop phone mp3player

(KEY2) (KEY4) (KEY2)

USER A phone laptop mp3player

(KEY3) (KEY3) (KEY3)

USER C camera laptop phone mp3player USER D USER E phone phone

(KEY4) Meeting Name

:

Password

: DONE project PIN

Meeting Name

:

Password

: Joining Meeting… DONE project PIN USERS D

  • E

S M S S M S M S M S S M S S S S S (KEY1) (KEY1) (KEY1)

USER B camera laptop phone mp3player

(KEY2) (KEY4) (KEY2)

USER A phone laptop mp3player

(KEY3) (KEY3) (KEY3)

USER C camera laptop phone mp3player USER D phone phone

(KEY4) (KEY4) (KEY4) Meeting Name

:

Password

: Update Meeting… DONE project PIN USER B

Meeting Name

:

Password

: DONE project PIN

  • E

S M S M S S M S M S M S M S M S M S S M S S S S S

Secure Scatternet Topology Update Protocol contd…

slide-13
SLIDE 13

Experimental Setup

Prototyped our scatternet formation protocol using BTH

v1.1 compliant hardware, running Linux kernel 2.4.18 with Bluez stack v2.2.

We equipped nodes with dual-radios, since no off-the-self

BTH hardware supported master/slave (or slave/slave) scatternet operation at that time.

Simulated our protocol over modified Blueware ns-

simulator.

Modified Blueware by introducing important features like

periodic page scan mode, randomized inquiry/paging start time and fine tuned BTH parameters like page-timeout value, randomized selection of Inquiry Train.

slide-14
SLIDE 14

Performance Results

Scatternet Formation Time for Incremental Arrivals

10 20 30 40 50 60 70 80 2 3 4 5 6 7 Number of Pico-Heads Scatternet Formation Time (sec) Instantaneous connection upon arrival TSF (Blueware) Simulation Experiment

Scatternet Formation Time for Incremental Arrivals

10 20 30 40 50 60 70 80 2 3 4 5 6 7 Number of Pico-Heads Scatternet Formation Time (sec) Instantaneous connection upon arrival TSF (Blueware) Simulation Experiment Instantaneous connection upon arrival TSF (Blueware) TSF (Blueware) Simulation Simulation Experiment Experiment

slide-15
SLIDE 15

Performance Results (contd…)

Average path length

0.5 1 1.5 2 2.5 3 3.5 4 2 4 6 8 10 12 14 16 18 20 Number of Pico-Heads Average Path Length (hops) TSF Our Protocol

Average path length

0.5 1 1.5 2 2.5 3 3.5 4 2 4 6 8 10 12 14 16 18 20 Number of Pico-Heads Average Path Length (hops) TSF Our Protocol

slide-16
SLIDE 16

Conclusions

Simple scatternet formation protocol to enable secure

group collaboration using Bluetooth.

Our protocol requires BTH authentication before allowing

devices to join the scatternet.

Our protocol allows encryption of the inter-(private)

piconet and intra-(private) piconet with separate keys.

Once scatternet formation completes no device is

scanning making scatternet undiscoverable and unconnectable to the intruders.

slide-17
SLIDE 17

Future work will include solving problem where the

intruder compromise the network by discovering the scatternet PIN and joining the scatternet.

Another challenge is dealing with dynamic environment

enhancing existing protocol to provide secure healing protocol.

Finally developing access control framework to provide

selective and dynamic access to specific scatternet devices.

Future Work

slide-18
SLIDE 18

Thank You