a mobile single sign-on system master thesis 2006 mats byfuglien
TRANSCRIPT
A mobile single sign-on system
Master thesis 2006
Mats Byfuglien
Outline
Problem description Project description Research questions Methods Related work The prototype Results Further work
Conclusion
Problem description
Most users today have a large number of passwords to manage
This often results in: The passwords are written down Easily guessable passwords are used One password used on multiple accounts
This reduces the security passwords provide Secure passwords is still a good authentication mechanism SSO proposed as a way to improve password security
Project description
Today there are no mobile SSO solutions on the market supporting automated sign-ins.
Develop a functional prototype of a mobile SSO system that handles passwords and supports automatic sign in. A mobile phone with a Java MIDlet handles the management of
usernames and passwords Bluetooth/USB unit connected to the PC
Conduct a user test Security analysis to find what security measures should be
implemented
Research questions
1. What types of single sign-on solutions are available? 2. How secure is the Bluetooth protocol for transferring
sensitive data? 3. Is it possible to implement the proposed single sign-on
concept? 4. What security mechanisms need to be in place to assure
the security of this system? 5. How will this SSO concept be received by the users? 6. Will this SSO concept increase the users’ security level?
Methods
Literature study Technical feasibility study
Develop the prototype User test
Scenario Survey Interview
Security analysis Adversary modeling
Other SSO solutions A taxonomy lists 4 main categories:
Local pseudo SSO SSO component is on the user's computer
Proxy based pseudo SSO The user authenticates once to the proxy and the proxy handles
authentication to the services Do not require any changes to the authentication systems
True SSO User authenticates to Authentication Service Provider (ASP) once. True SSO solutions are expensive and difficult to configure correctly All systems must support the SSO solution
Local true SSO Trused component
Proxy based true SSO Kerberos
The prototype
Adversary modeling
Results from the security analysis
Four main issues were discovered: Secure the Bluetooth channel
Secure protocol on top of Bluetooth protocol
Properly authenticate the devices Digital certificates
Protect data stored on the mobile phone Encryption Split data on two devices
Confirm the integrity of software packages Digitally sign the packages
Results from the user test
28 users participated 26 rated the system above average 19 would like to use the system daily
7 did not have an opinion, 2 would not use it
24 believes the system will improve their password management
Everyone wanted a backup solution
Further work
Implement the proposed security measures Port the code to a smaller device Implement a backup solution Conduct a detailed security analysis when the security
measures are implemented Conduct a large scale user test
Allow users to test the system over time Include a largerer number of participants
Conclusion
It is possible to implement the SSO concept The system was well received by the users The system will not provide better security then other SSO solutions Mobility and easy to use functionality (no software or drivers
needed) makes the system stand out The solution might apeal to a different group then other SSO
solutions Will increase the security level of users who manages passwords
manually Enables the user to use more secure passwords
Questions?