Secure and Usable Out-Of-Band Channels for Ad hoc Mobile Device - - PowerPoint PPT Presentation

secure and usable out of band channels for ad hoc mobile
SMART_READER_LITE
LIVE PREVIEW

Secure and Usable Out-Of-Band Channels for Ad hoc Mobile Device - - PowerPoint PPT Presentation

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion Secure and Usable Out-Of-Band Channels for Ad hoc Mobile Device Interactions Ronald Kainda, Ivan Flechais, A.W. Roscoe Workshop in


slide-1
SLIDE 1

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Secure and Usable Out-Of-Band Channels for Ad hoc Mobile Device Interactions

Ronald Kainda, Ivan Flechais, A.W. Roscoe

Workshop in Information Security Theory and Practices (WISTP) University of Passau, Germany

14 April, 2010

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-2
SLIDE 2

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Outline

1

Introduction

2

HISP

3

OOB Channels

4

Problem definition

5

Proposed methods

6

Security and usability study

7

Conclusion

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-3
SLIDE 3

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Ad hoc mobile device interactions

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-4
SLIDE 4

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Human-Interactive Security Protocols (HISP)

N OOB

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-5
SLIDE 5

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Human-Interactive Security Protocols (HISP)

1 ∀A −

→N ∀A′ : A, INFOA, longhash(A, kA)

2 ∀A −

→N ∀A′ : kA

3 ∀A −

→OOB ∀A′ :users compare Digest(k*,INFOs) where k* is the XOR of all the k′

As for A ∈ G1

Security is 2b Increasing b cost usability

1Roscoe et al. 2007 Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-6
SLIDE 6

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Existing OOB methods

Manual comparison Devices generate fingerprints Fingerprints displayed in appropriate format Users compare fingerprints and indicate on the device a match or lack of it Devices require display and some form of input method Security failures compare

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-7
SLIDE 7

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Existing OOB methods

Manual copying and entering One device displays a fingerprint User copies and types the fingerprint into one or more devices Requires display and keypad Efficiency of entry depends

  • n affordances of devices

involved Scalability, usability Bluetooth

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-8
SLIDE 8

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Existing OOB methods

Auxiliary devices Rely on secondary devices to transfer/compare information Proposed devices include

camera phone external storage devices data cable etc

May require users to carry extra hardware Uniform interfaces, usability 2D–Barcode

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-9
SLIDE 9

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Existing OOB Methods

Timing methods Rely on specialised hardware Proposed devices include

Shaking devices Pressing buttons

Scalability, usability 2D–Barcode

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-10
SLIDE 10

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Existing OOB methods

Short range directed channels Rely on wireless transmission technologies Proposed methods include

Infra-red Light

May require specialised hardware Security, scalability 2D–Barcode

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-11
SLIDE 11

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Problems with current OOB Channels

Context specific Requirement for specialised hardware Security and usability Scalability 2D– Barcode

Security Usability

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-12
SLIDE 12

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Proposed OOB —Word-matching and number-typing

Locally stored dictionary

proposed two 1024 word dictionaries Phonetically distant less than 40kb file

Display and button Scalable, usable, secure whatever

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-13
SLIDE 13

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Proposed OOB —Word-matching and number-typing

Potential problems Prediction failures Word collisions Similar sounding words Scalable, usable, secure

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-14
SLIDE 14

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Proposed OOB —Repeated numeric comparison

Similar to manual comparison Not subject to security failures Display and button Correct response is 2n

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-15
SLIDE 15

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Summary of usability study results

No statistical significance between the two methods in completion times (12.7 and 13.4s mean) (t(55) = .53, p = .598) Ease-of-use: 93% for WMNT, 89% RC Preferences: 57% WMNT, 25%RC Ratings: no statistical significance (Z = -0.275 and p(2-tailed) = .78) 13.4s for RC compared to 16.4s reported by Uzun et al. for compare and confirm 12.7s for WMNT compared to 13s reported by Uzun et al. for copy and enter Both methods ranked higher than compare and confirm and copy and enter

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-16
SLIDE 16

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Applications of proposed methods

Close/distant devices Input/output constrained devices Group scenarios Larger fingerprints

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-17
SLIDE 17

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

Conclusion

Security and usability should both be embedded in OOB channels OOB methods are either secure or usable. Neither are they scalable word-matching and number-typing and repeated numeric comparison achieve all three Aplicable to a range of scenarios that other methods may not

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP

slide-18
SLIDE 18

Introduction HISP OOB Channels Problem definition Proposed methods Security and usability study Conclusion

THANK YOU

Ronald Kainda, Ivan Flechais, A.W. Roscoe Secure and Usable Out-Of-Band Channels for HISP