Title: Threats, Risk Assessment, and Policy Management in UbiComp
1Threats, Risk Assessment, and Policy Management
in UbiComp
- Workshop on Security in UbiComp
- UBICOMP 2002, 29th Sept. Göteborg, Sweden
- Philip Robinson, SAP Corporate Research
Telecooperation Office
2Management Access Scope of UbiComp Environments
and Applications
Closed/ Embedded
Personal
Static Groups
Ad Hoc Groups
Public
3Point of Alert
Static Threat Unsolicited interactive access to
system by non-group member
Closed Threat Unsolicited access to system
location
Personal Threat Unsolicited possession of
system (tangible access)
Ad Hoc Threat Unsolicited use of special
services access beyond role and rights
Public Threat unsolicited modification/ misuse
of system
Access to a system or its resources/ information
is the first line of attack
4Risk all about Context
- Information and Resources have no value without a
particular Context. - Context information changes the awareness and
evaluation of risks - Awareness of risks changes the utility of and
contribution to the Context information
4999 910 876 1234
Credit Card
5When is the risk pending?
Data
6Attack Profile
Attacker listens in on communications channel.
Attacks on confidentiality privacy!
Attack by embedding false sensor and actuator
devices into environment attack on context
derivation integrity
Attack by falsifying the physical environments
signals attack on context reading integrity
Attack by abusing lack or excess of computational
capacity denial of service or malicious code
attacks
R E S O U R C E S
C O N T E X T
Interactive (Stimuli Response)
ATTACK
ATTACK
Perceptive (Sensors Actuators)
Computational (Memory, Power Processing)
ATTACK
Communicational (Reception Transmission)
ATTACK
7Policy ManagementAdministrative Distribution
- Definition
- Document encoded
- Application encoded
- Entity encoded
- Enforcement
- Security Mechanism selection
- Physical vs. Logical
- Modification Dissolution
- Static vs. Dynamic
- Consistency notification
- Auditing
- Centralized vs. Distributed
Behavioral policy, relational policy
Authorization policies
Signal integrity policy
Communication policies
Context-based policies
Computational policies
8Summary
- Identify access scope of UbiComp application
- Determine point-of-alert based on access scope
- Determine when the context creates a manageable
risk - Perform a Threat Analysis
- Define policy model to circumvent threats
- Implement mechanisms to enforce policy
- Establish methodology for managing policy
information
9Policy Enforcement
10Policy Dissolution
11Policy Modification