Abstract

The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst personal devices. One such paradigm which utilizes pervasive and ubiquitous computing to create a network of personal devices, both in the local vicinity and those at remote locations, is called a Personal Network (PN). The aim of a Personal Network is to provide its users with new and improved services. As Personal Networks edge closer to reality, security becomes an important con- cern since any vulnerability in the system will limit its practical use. However the mobile and constrained nature of its constituting devices places unique requirements on the design of Personal Networks, such as the need for low power consumption and the ability to self organize in the face of intermittent connectivity. One of our conclusions in this regard was that the new characteristics and possibilities offered by Personal Networks mean that old solutions are often not suitable in their current form. Therefore in this thesis we introduce a novel security architecture especially designed for Personal Networks. As people with a network background, our aim was not to develop new PN specific cryptographic protocols, but to develop a model for secure network archi- tecture. In this regard our focus is more on defining mechanisms for access control, rather than the security properties of specific protocols. For instance, we propose mechanisms for device personalization, key management, resource discovery, authen- tication and secure network formation/communication. Our proposals are then ana- lyzed analytically based on the main drivers for our design choices, with some parts evaluated using the Ns-2 network simulator. Where possible we have attempted to reuse existing and well established security protocols, knowing that proposing a novel protocol specific to PNs only introduces the possibility of security flaws common to new protocols. Given the infancy of the PN concept, our first contribution is in promoting the development of this concept as related to security. In this regard we have identified the different architectural components which play a part in enabling security and specified their functional roles. This required an understanding of typical user behavior as well as development of scenarios which highlight the challenges and requirements in connecting heterogeneous personal devices in a self organizing manner. The second main contribution is in designing a secure architecture around these entities which meets the rather unique requirements identified earlier. In this regard we have specified mechanisms for the secure formation and communication in Personal Networks as well as communication between different Personal Networks.
Original languageUndefined
Awarding Institution
  • University of Twente
Supervisors/Advisors
  • Haverkort, Boudewijn R.H.M., Supervisor
  • Supervisor
Sponsors
Date of Award9 Apr 2009
Place of PublicationEnschede
Print ISBNs978-90-365-2818-4
DOIs
StatePublished - 9 Apr 2009

Fingerprint

Ubiquitous computing
Personal communication systems
Mobile computing
Communication
Digital computers
Network architecture
Mobile phones
Access control
Authentication
Wireless networks
Electric power utilization
Simulators
Defects
Sensors

Keywords

  • IR-61059
  • METIS-263925
  • EWI-15717

Cite this

Jehangir, A.. / A Security Architecture for Personal Networks. Enschede, 2009. 166 p.
@misc{2c6c33b3f1504ceaabb7b0fdfaaf203e,
title = "A Security Architecture for Personal Networks",
abstract = "The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst personal devices. One such paradigm which utilizes pervasive and ubiquitous computing to create a network of personal devices, both in the local vicinity and those at remote locations, is called a Personal Network (PN). The aim of a Personal Network is to provide its users with new and improved services. As Personal Networks edge closer to reality, security becomes an important con- cern since any vulnerability in the system will limit its practical use. However the mobile and constrained nature of its constituting devices places unique requirements on the design of Personal Networks, such as the need for low power consumption and the ability to self organize in the face of intermittent connectivity. One of our conclusions in this regard was that the new characteristics and possibilities offered by Personal Networks mean that old solutions are often not suitable in their current form. Therefore in this thesis we introduce a novel security architecture especially designed for Personal Networks. As people with a network background, our aim was not to develop new PN specific cryptographic protocols, but to develop a model for secure network archi- tecture. In this regard our focus is more on defining mechanisms for access control, rather than the security properties of specific protocols. For instance, we propose mechanisms for device personalization, key management, resource discovery, authen- tication and secure network formation/communication. Our proposals are then ana- lyzed analytically based on the main drivers for our design choices, with some parts evaluated using the Ns-2 network simulator. Where possible we have attempted to reuse existing and well established security protocols, knowing that proposing a novel protocol specific to PNs only introduces the possibility of security flaws common to new protocols. Given the infancy of the PN concept, our first contribution is in promoting the development of this concept as related to security. In this regard we have identified the different architectural components which play a part in enabling security and specified their functional roles. This required an understanding of typical user behavior as well as development of scenarios which highlight the challenges and requirements in connecting heterogeneous personal devices in a self organizing manner. The second main contribution is in designing a secure architecture around these entities which meets the rather unique requirements identified earlier. In this regard we have specified mechanisms for the secure formation and communication in Personal Networks as well as communication between different Personal Networks.",
keywords = "IR-61059, METIS-263925, EWI-15717",
author = "A. Jehangir",
note = "10.3990/1.9789036528184",
year = "2009",
month = "4",
doi = "10.3990/1.9789036528184",
isbn = "978-90-365-2818-4",
school = "University of Twente",

}

Jehangir, A 2009, 'A Security Architecture for Personal Networks', University of Twente, Enschede. DOI: 10.3990/1.9789036528184

A Security Architecture for Personal Networks. / Jehangir, A.

Enschede, 2009. 166 p.

Research output: ScientificPhD Thesis - Research UT, graduation UT

TY - THES

T1 - A Security Architecture for Personal Networks

AU - Jehangir,A.

N1 - 10.3990/1.9789036528184

PY - 2009/4/9

Y1 - 2009/4/9

N2 - The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst personal devices. One such paradigm which utilizes pervasive and ubiquitous computing to create a network of personal devices, both in the local vicinity and those at remote locations, is called a Personal Network (PN). The aim of a Personal Network is to provide its users with new and improved services. As Personal Networks edge closer to reality, security becomes an important con- cern since any vulnerability in the system will limit its practical use. However the mobile and constrained nature of its constituting devices places unique requirements on the design of Personal Networks, such as the need for low power consumption and the ability to self organize in the face of intermittent connectivity. One of our conclusions in this regard was that the new characteristics and possibilities offered by Personal Networks mean that old solutions are often not suitable in their current form. Therefore in this thesis we introduce a novel security architecture especially designed for Personal Networks. As people with a network background, our aim was not to develop new PN specific cryptographic protocols, but to develop a model for secure network archi- tecture. In this regard our focus is more on defining mechanisms for access control, rather than the security properties of specific protocols. For instance, we propose mechanisms for device personalization, key management, resource discovery, authen- tication and secure network formation/communication. Our proposals are then ana- lyzed analytically based on the main drivers for our design choices, with some parts evaluated using the Ns-2 network simulator. Where possible we have attempted to reuse existing and well established security protocols, knowing that proposing a novel protocol specific to PNs only introduces the possibility of security flaws common to new protocols. Given the infancy of the PN concept, our first contribution is in promoting the development of this concept as related to security. In this regard we have identified the different architectural components which play a part in enabling security and specified their functional roles. This required an understanding of typical user behavior as well as development of scenarios which highlight the challenges and requirements in connecting heterogeneous personal devices in a self organizing manner. The second main contribution is in designing a secure architecture around these entities which meets the rather unique requirements identified earlier. In this regard we have specified mechanisms for the secure formation and communication in Personal Networks as well as communication between different Personal Networks.

AB - The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst personal devices. One such paradigm which utilizes pervasive and ubiquitous computing to create a network of personal devices, both in the local vicinity and those at remote locations, is called a Personal Network (PN). The aim of a Personal Network is to provide its users with new and improved services. As Personal Networks edge closer to reality, security becomes an important con- cern since any vulnerability in the system will limit its practical use. However the mobile and constrained nature of its constituting devices places unique requirements on the design of Personal Networks, such as the need for low power consumption and the ability to self organize in the face of intermittent connectivity. One of our conclusions in this regard was that the new characteristics and possibilities offered by Personal Networks mean that old solutions are often not suitable in their current form. Therefore in this thesis we introduce a novel security architecture especially designed for Personal Networks. As people with a network background, our aim was not to develop new PN specific cryptographic protocols, but to develop a model for secure network archi- tecture. In this regard our focus is more on defining mechanisms for access control, rather than the security properties of specific protocols. For instance, we propose mechanisms for device personalization, key management, resource discovery, authen- tication and secure network formation/communication. Our proposals are then ana- lyzed analytically based on the main drivers for our design choices, with some parts evaluated using the Ns-2 network simulator. Where possible we have attempted to reuse existing and well established security protocols, knowing that proposing a novel protocol specific to PNs only introduces the possibility of security flaws common to new protocols. Given the infancy of the PN concept, our first contribution is in promoting the development of this concept as related to security. In this regard we have identified the different architectural components which play a part in enabling security and specified their functional roles. This required an understanding of typical user behavior as well as development of scenarios which highlight the challenges and requirements in connecting heterogeneous personal devices in a self organizing manner. The second main contribution is in designing a secure architecture around these entities which meets the rather unique requirements identified earlier. In this regard we have specified mechanisms for the secure formation and communication in Personal Networks as well as communication between different Personal Networks.

KW - IR-61059

KW - METIS-263925

KW - EWI-15717

U2 - 10.3990/1.9789036528184

DO - 10.3990/1.9789036528184

M3 - PhD Thesis - Research UT, graduation UT

SN - 978-90-365-2818-4

ER -

Jehangir A. A Security Architecture for Personal Networks. Enschede, 2009. 166 p. Available from, DOI: 10.3990/1.9789036528184