Wireless PKI and Distributed IDS for Securing Intranets and M-Commerce
نویسنده
چکیده
Recent R/D advances are presented in this keynote address on wireless and security technologies. To access Internet from mobile devices, the existing public key infrastructure (PKI) must be modified to work with limited wireless network bandwidth and low computing and memory capacity of handheld devices. A complete security chain is needed from smart cards to mobile clients, wireless PKI (WPKI) platform, and web servers. A trust model for wireless Internet must be highly scalable, fault-tolerant, and cost-effective in trust-path discovery and in mapping the security policy. At USC, a new WPKI architecture was proposed using a bridge CA cluster to achieve the security goals. Another advance lies in distributed intrusion detection system (DIDS) for protecting exposed Intranets or clusters of computers from malicious attacks. We developed the DIDS with dynamic policy update against changing threat patterns or varying network conditions. Distributed security can effectively counteract both external intruders and insider attacks. XML, IDS, mobile agents, RMI, and CORBA are assessed as policyupdate mechanisms to achieve dynamic security. The optimal choice of the mechanism depends on the tradeoffs among operating speed, Intranet scalability, host robustness, and the security level demanded. The WPKI and DIDS technologies benefit not only M-Commerce (mobile E-Commerce), but also pervasive computing applications in general.
منابع مشابه
Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملClient Security in the Enterprise Network: Dell's Perspective
Client computer security is a broad subject that includes securing access to network resources, securing data transfers over private and public networks, and protecting client computers and local data from theft. Security is increasingly important as portable computers, vulnerable to theft, proliferate and the Internet revolutionizes communications and commerce. Applications such as e-commerce,...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملPKI in B2C E-Commerce
General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilising these PKI categories for securing e-commerce transactions. While the former protocol categorised as a general purpose PKI has been playing an important role ...
متن کاملDesign and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone...
متن کامل