Design and explain a protocol

Assignment Help Computer Networking
Reference no: EM131371909

Problem -

An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerprints registered with a server operated by the service provider that manages the user's billing account. To purchase a drink, the mobile user uses his/her mobile phone to dial the number associated with the vending machine, and the machine then displays a request for the selection of a drink and provision of data related to the user's fingerprint. Having received the user's valid drink selection and user's fingerprint related data, the vending machine uses the fingerprint related data to request the server of the user's service provider to pay for the drink selected. Here assume that the vending machine can obtain the user's phone number and identify the server of his/her service provider based on the number.

Upon receipt of the vending machines payment request, the server checks that it has a billing account associated with the fingerprint data received and the amount of money in the account is sufficient to pay for the drink. The server grants the payment by debiting the user's billing account and crediting the designated account of the vending machine, only if the checking is positive, and informs the vending machine of its decision. If the server grants the payment, the vending machine delivers a selected drink; Otherwise, the vending machine terminates the purchase and informs the user by a displayed message.

The drinks vending machine is mainly designed for a mobile user using an advanced mobile phone with a built-in fingerprint scanner. However, sometimes the mobile user can only get hold of an ordinary mobile phone with no built-in fingerprint scanner. In this case, the user is allowed to download his/her fingerprint related data from the server of the user's service provider. This coursework only considers the latter case.

It is assumed that:

  • Each user's mobile phone offers a DES-based symmetric cryptosystem including a secure hash function;
  • The user has a password registered with the server of his/her service provider but does not share any extra DES key with the server,
  • The user has a password registered with the server of his/her service provider but does not share any extra DES key with the server;
  • The user does not share any DES key with the vending machine;
  • The user's mobile phone cannot run any asymmetric cryptosystem such as RSA;
  • For the sake of cost-saving, the use of Kerberos has been ruled out.

Questions:

You are required to perform the following tasks (you can make necessary assumptions):

1. Secure downloading of a mobile user's fingerprint related data. This includes:

(a) Design and explain (with diagrammatical illustration) a protocol to allow the mobile user to securely download his/her fingerprint related data from the server of the user's service provider to his/her mobile phone.

Note that the design of this protocol must meet the following requirements:

(i) The server transfers the fingerprint related data to the mobile user only when the server is convinced that the user is the legitimate owner of the fingerprint related data and that the request is indeed from the claimed user.

(ii) The confidentiality of the fingerprint related data transferred from the server to the user must be protected.

(iii) Measures should be taken to reduce the risk of Denial of Service (DoS) attacks on the server.

(b) Analyse the designed protocol to justify how the protocol satisfies the above requirements 1 (a) (i), (ii) and (iii).

2. Authorised purchase of a drink by a mobile user. This includes:

(a) Design and explain a protocol (with diagrammatical illustration) to allow the mobile user to purchase a drink based on his/her fingerprint related data already downloaded from the server of the user's service provider to his/her mobile phone.

Note that the design of this protocol can omit the details of the drink purchase (e.g. the drink price and account details of the drink vending machine), and that the design must meet the following requirements:

(i) The mobile user authorises the drink purchase using his/her fingerprint related data, the drink vending machine receives the authorisation but cannot obtain any information on the user's fingerprint data, and the service provider's server can verify the authenticity of the user's authorisation and the vending machines payment request.

(ii) The drink purchase authorisation of the mobile user cannot be re-used for deceptive charging by the vending machine if it misbehaves.

(b) Analyse the designed protocol to justify how the protocol satisfies the above requirements 2 (a) (i) and (ii).

Reference no: EM131371909

Questions Cloud

Compute an estimate of mean amount of accounts receivable : Compute an estimate of the mean amount of all accounts receivable. Give an estimate of the variance of all the amounts.
What is the ball total displacement : (a) How much distance is covered by the ball, in metres? (b) What is the ball's total displacement, in metres?
Discuss about the case given below : The research paper should include an introduction of the topic, a body in which the topic is developed and references cited, and a well-defined conclusion.Your paper must have a strong thesis statement. Your thesis is a statement (not a question o..
Compute point estimates of mean and the standard deviation : Compute point estimates of the mean and the standard deviation of the population monthly salaries of small business owners.
Design and explain a protocol : Design and explain a protocol (with diagrammatical illustration) to allow the mobile user to purchase a drink based on his/her fingerprint related data already downloaded from the server of the user's service provider to his/her mobile phone
How far away did the lightning bolt strike : If you hear thunder 13 seconds after seeing the lightning, how far away did the lightning bolt strike? Take the speed of sound in air to be 343 m/s. Answer in metres.
Describe how well the author addressed the topic : In third person, describe how well the author addressed the topic. Does the article offer a clear, thorough and useful explanation of the subject?
Direction of the car average acceleration : It takes the car 8.3 seconds to stop. (a) What is the car's average acceleration? (b) What is the direction of the car's average acceleration? west south north
Compute the sample estimators of the population mean : Starbucks regularly introduces new coffee drinks and attempts to evaluate how these drinks fare by estimating the price its franchises can charge for them and sell enough cups to justify marketing the drink.

Reviews

len1371909

1/25/2017 7:30:06 AM

Written report on results of all the tasks specified in the above section "The Questions", in which all descriptions and diagrams must be word-processed. This is an individual coursework, so it must be completed independently. This coursework should be carried out with reference to relevant textbooks and published articles. The length of the report should not exceed four A4 sides (i.e. approximately no more than 2000 words). Correct protocol design, clear explanation, and convincing analysis against the specified requirements Report clarity and quality (clear justifications, protocol efficiency considerations, conciseness and accuracy, evidence of research).

Write a Review

Computer Networking Questions & Answers

  How to update network diagram and a conclusion

XUMUC is has the WAN links in place to the new locations in the Houston Region. XUMUC currently has 2 other Regions San Francisco and Denver. Originally, XUMUC was only in one region (San Francisco).

  Nternet access methods are the dsl modem and the cable modem

In not less than 300 words, discuss in a comparative sense the broadband access solutions, with particular attention to FTTH as an ultimate contender.

  Describe the network management software components side

describe the network management software components. side server components middleware components and northbound

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Explain the basics of networking and security issues

The project text needs to be grammatically correct with correct spelling and sentence structure when applicable. Remember to cite ideas that are not your own - Explain the basics of networking and security issues to other people.

  Small internet works

Prepare a network simulation

  Discuss the concept of nos in lans

Discuss the concept of NOS in LANs, and its evolution in the LAN market from its inception by Novell, and market shift from Novell's dominance (for two decades) to the ongoing Microsoft's dominance.

  Write a paper on virtual private network

Write a paper on Virtual Private Network. In your paper, you need to discuss: VPN, Aadvantages and disadvantages of VPN and Protocols such as IPsec, PPTP, and PP2TP.

  Developing network schedule

Develop a network schedule for your project using either the arrow diagramming method or the precedence method.

  Discuss the difference between multicast and unicast routing

Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life

  Does vc or datagram architecture have more traffic overhead

Suppose that the links and routers in the network never fail and that routing paths used between all source/destination pairs remains constant. In this scenario, does a VC or datagram architecture have more traffic overhead. Why?

  Compare and contrast the design process of a cell phone

Compare and contrast the design process of a cell phone interface using paper prototyping versus a tool such as Microsoft Visio, open source wireframing or mockup tools. Identify which method you would prefer to use, and why

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd