Security in social wireless networks
1 / 9

Security in Social Wireless Networks - PowerPoint PPT Presentation

  • Uploaded on

Security in Social Wireless Networks. Omer Nawaz. Introduction. Studies Masters in Computer Science from IIU Islamabad , Pakistan Masters in EE (Internet Systems) from BTH Karlskrona , Sweden (2009-2011) PhD (ongoing BTH) Working Experience

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Security in Social Wireless Networks' - fifi

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript


  • Studies

    • Masters in Computer Science from IIU Islamabad, Pakistan

    • Masters in EE (Internet Systems) from BTH Karlskrona, Sweden (2009-2011)

    • PhD (ongoing BTH)

  • Working Experience

    • Software developer at AIS Technologies, STP Islamabad for about 2 years

    • Lecturer at University of the Punjab, Lahore Pakistan (involved with courses related to Network Programming)

    • Research at Swedish Institute of Computer Science (SICS)

Social wireless networks secure identification swin
Social Wireless Networks Secure Identification (SWiN)

  • Swedish Institute of Computer Science (SICS) in Collaboration with Sony Ericsson and Ericsson AB

  • Three Target Areas:

    • Authentication

    • Privacy in Social Networks

    • Android security

Mobile social networks potential
Mobile Social Networks Potential

  • Growth at an astounding rate

  • According to a survey conducted in US in 2011 about internet access [1], 72% of the total share is wireless from just 17% three years ago

  • WHY

    • Nominal subscribing charges especially in North America

    • Mid range smart phones

    • Ease of personalization i.e. change of language, themes, settings etc.

    • Exclusive applications (camera) and gaming designed for users on the go

  • Future Trends

    • Demand for professional business networking

    • Decentralization of social networks

    • Offline Synchronization

Security challenges
Security Challenges

  • Secure Registration and Authentication

    • Strong authentication procedures eradicating both active and passive threats

    • Authorized client should register new members in offline mode

    • Support for online, gateway and offline mode

    • Confidentiality and Integrity on non-trusted media and collaboration with open compromised network

      • Profiles

    • Unlike traditional online networks, profile support with ease of setup

    • Support for explicit security settings for high flexibility

Secure design basics
Secure Design Basics

  • Online Mode

    • Authentication (AuthCert), Signing(SignCert) and Social (SocialCert) certificates

    • User Profile Management

  • Offline Mode (Users of different social groups)

    • Secure Device Pairing

    • Sharing of Signing Certificate and Authentication Vector

  • Offline Mode (Users of same social groups)

    • Sharing of Signing and Social Certificates

    • Data encryption using shared public key

Current and future work
Current and future work

  • Performance evaluation of virtualized networks

  • Safe Virtualization


[1] GIGaom,

[2] Social Media Trends,