security in social wireless networks
Download
Skip this Video
Download Presentation
Security in Social Wireless Networks

Loading in 2 Seconds...

play fullscreen
1 / 9

Security in Social Wireless Networks - PowerPoint PPT Presentation


  • 83 Views
  • Uploaded on

Security in Social Wireless Networks. Omer Nawaz. Introduction. Studies Masters in Computer Science from IIU Islamabad , Pakistan Masters in EE (Internet Systems) from BTH Karlskrona , Sweden (2009-2011) PhD (ongoing BTH) Working Experience

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Security in Social Wireless Networks' - fifi


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
introduction
Introduction
  • Studies
    • Masters in Computer Science from IIU Islamabad, Pakistan
    • Masters in EE (Internet Systems) from BTH Karlskrona, Sweden (2009-2011)
    • PhD (ongoing BTH)
  • Working Experience
    • Software developer at AIS Technologies, STP Islamabad for about 2 years
    • Lecturer at University of the Punjab, Lahore Pakistan (involved with courses related to Network Programming)
    • Research at Swedish Institute of Computer Science (SICS)
social wireless networks secure identification swin
Social Wireless Networks Secure Identification (SWiN)
  • Swedish Institute of Computer Science (SICS) in Collaboration with Sony Ericsson and Ericsson AB
  • Three Target Areas:
    • Authentication
    • Privacy in Social Networks
    • Android security
mobile social networks potential
Mobile Social Networks Potential
  • Growth at an astounding rate
  • According to a survey conducted in US in 2011 about internet access [1], 72% of the total share is wireless from just 17% three years ago
  • WHY
    • Nominal subscribing charges especially in North America
    • Mid range smart phones
    • Ease of personalization i.e. change of language, themes, settings etc.
    • Exclusive applications (camera) and gaming designed for users on the go
  • Future Trends
    • Demand for professional business networking
    • Decentralization of social networks
    • Offline Synchronization
security challenges
Security Challenges
  • Secure Registration and Authentication
    • Strong authentication procedures eradicating both active and passive threats
    • Authorized client should register new members in offline mode
    • Support for online, gateway and offline mode
    • Confidentiality and Integrity on non-trusted media and collaboration with open compromised network
      • Profiles
    • Unlike traditional online networks, profile support with ease of setup
    • Support for explicit security settings for high flexibility
secure design basics
Secure Design Basics
  • Online Mode
    • Authentication (AuthCert), Signing(SignCert) and Social (SocialCert) certificates
    • User Profile Management
  • Offline Mode (Users of different social groups)
    • Secure Device Pairing
    • Sharing of Signing Certificate and Authentication Vector
  • Offline Mode (Users of same social groups)
    • Sharing of Signing and Social Certificates
    • Data encryption using shared public key
current and future work
Current and future work
  • Performance evaluation of virtualized networks
  • Safe Virtualization
references
References

[1] GIGaom, http://gigaom.com/2011/04/12/mary-meeker-mobile-internet-will-soon-overtake-fixed-internet/

[2] Social Media Trends, http://takemetoyourleader.com/2010/04/07/social-media-2012-11-trends-you-should-watch/

ad