A Presentation on a theme of Secured backup communication during the emergency loss of general communications breakdown situation. A possible Complex Security design during the time of communication and message relay.
Index
• Introduction
• UserAuthentication via JSON Web Token (JWT)
• Assigning user rights through user data
• Registration of user devices through multifactor Authentication
• Finding user’s location and supporting frequency
• Relaying an emergency note/message
• Authenticate the communication lines
• Communication among the users
• User Rights
• Security concerns
• Conclusion
3.
Introduction
• A backupfor communication and
relaying messages, aside from the
main API.
• Initiates desperate
measures/protocols to establish
communication among users and the
system.
• Uses a Token based authentication
system.
• Understanding which users require
the emergency service.
3
4.
User Authentication viaJSON Web Token (JWT)
4
API 1
Database with the user
information
API 2
Main Server Robust Communication Prototype (RCP) Server
Gets
Communication Portal
Database storing the
user information
Authe-
nticator
Token Decoder
Login Form
Stores
Proceeds
Accessed
Retrieve
Password
Email Id
Token
Generator
Authorization
Name
Transmitted
Header
Signature
Payload
5.
Assigning user rightsthrough user data
• The user rights are decided by the admin based on the type of users.
• If general users, they have the rights to receive message and communicate with one
another.
• If Organizers, they have special rights.
• All these users have a time limit to avail the service of this system.
5
6.
Registration of userdevices through 2 Factor
Authentication: Factor-1
6
Login Form
Password
Email Id
Name
Email Server
Inbox code
Code Confirmation
Enter the code below
User’s
Device
User
Proceeds
Projection
Confirm
7.
Registration of userdevices through 2 Factor
Authentication: Factor-2
7
Device Conformation
Please Authenticate
your device!
Email Server
Inbox code
Code Confirmation
Enter the code below
Proceeds
Proceed
User User’s
Device
Projection
Confirm
Communication
among the users
•Communication from one to one (or) many to many are possible.
• A limited message size is permissible for each relay.
• The communication channels/rooms are temporary.
11
Security concerns
• Apossible Token hijack during
transmission
• Sabotaging the connection requests,
reveals the key and addresses of the
users
• Live relay of user’s location to the API
13
14.
Conclusion
• Developed apossible way to securely pass user details.
• Understood how a multi factor authentication works and its importance.
• Found a cheap and reliable way to relay messages.
• The complexity and necessity of securing communication channels.
14
15.
References
• Kofler, M.,Gebeshuber, K., Kloep, P., Neugebauer, F., Zingsheim, A., Hackner, T., Widl, M., Scheible, T., Aigner, R., Wübbeling, M., & Kania, S.
(2023). Hacking and security: The Com-prehensive Guide to Penetration Testing and Cybersecurity. SAP Press.
• Bellovin, S. M. (2015). Thinking security: Stopping Next Year’s Hackers. Addison-Wesley Pro-fessional.
• Fanti, M. (2023). Implementing Multifactor Authentication. Packt Publishing.
• Gough, J., Bryant, D., & Auburn, M. (2023). Mastering API architecture: Defining, Connecting, and Securing Distributed Systems and
Microservices.
• Heidelberg: Cyber-Attacke auf SRH – Gestohlene Daten im Darknet aufgetaucht, https://www.heidelberg24.de/heidelberg/heidelberg-srh-
hacker-angriff-attacke-klinik-hochschule-computer-darknet-90997701.html, 01.12.2023
• Using waves to communicate, https://radio-waves.orange.com/en/using-waves-to-com-municate/, 04.02.2024
• What is LoRaWAN® Specification, https://lora-alliance.org/about-lorawan/, 20.03.2024
• Introduction to JSON Web Tokens, https://jwt.io/introduction, 01.03.2024
• General Data Protection Regulation (GDPR), https://gdpr-info.eu/, 12.04.2024
• DATA PROTECTION DECLARATION, https://www.uni-heidelberg.de/en/data-protection-declaration, 05.02.2024
• What Is Internet Communication & How Can We Communicate Over The Internet? https://www.fonada.com/blog/what-is-internet-
communication/, 10.06.2024
• Draw.io, https://app.diagrams.net/, 19.06.2024
15