l-ppt. By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks.

Slides:



Advertisements
Similar presentations
Secure Mobile IP Communication
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
Architecting for Innovation ACM SIGCOMM Computer Communication Review 2011 July Presenter :許耀中
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Csci5233 computer security & integrity 1 Cryptography: an overview.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
m-Privacy for Collaborative Data Publishing
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Databases and Database User ch1 Define Database? A database is a collection of related data.1 By data, we mean known facts that can be recorded and that.
Key management issues in PGP
Presented by Edith Ngai MPhil Term 3 Presentation
Sensors Journal, IEEE, Issue Date: May 2013,
Authentication and handoff protocols for wireless mesh networks
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Cryptography: an overview
Cryptography: an overview
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Information System and Network Security
Internet and Intranet.
Information Security.
Internet and Intranet Fundamentals
e-Health Platform End 2 End encryption
CS480 Cryptography and Information Security
Introduction to Information Security
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Introduction Of Information Security
Information and Network Security
Security in Networking
Internet and Intranet.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Data Base System Lecture : Database Environment
Security in ebXML Messaging
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Digital Certificates and X.509
Cryptography and Network Security
Cryptography: an overview
Internet and Intranet.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Computer Security CIS326 Dr Rachel Shipsey.
Chinese wall model in the internet Environment
ONLINE SECURE DATA SERVICE
Computer Networks Presentation
Module 4 System and Application Security
Internet and Intranet.
Cryptography and Network Security
Computer Security CIS326 Dr Rachel Shipsey.
Presentation transcript:

l-ppt

By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks

Index Terms:  Anonymity.  Traceability.  Pseudonym.  Misbehavior.  Revocation.  Wireless mesh network (WMN).

 Objectives.  Methodologies.  Implementation.  Resultant. Agenda:

Abstract: Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems.

Introduction Wireless Mesh Network (WMN) is a promising technology and is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users.

Existing System In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Thus, routing anonymity is indispensable, which conceals the confidential communication relationship of two parties by building an anonymous path between them.

Proposed System We are motivated by resolving the above security conflicts, namely anonymity and traceability, in the emerging WMN communication systems. We have proposed the initial design of our security architecture, where the feasibility and applicability of the architecture were not fully understood. As a result, we provide detailed efficiency analysis in terms of storage, communication, and computation.

ARCHITECTURE

Modules:  Wireless mesh networks.  Blind Signature.  Ticket Issuance.  Fraud Detection.  Fundamental security objectives.

Wireless Mesh Networks: The wireless mesh backbone consists of mesh routers(MRs) and gateways (GWs)interconnected by ordinary wireless links.Mesh routers and gateways serve as the access points of the WMN and the last resorts to the Internet.

Blind Signature: A blind signature scheme allows a receiver to obtain a signature on a message such that both the message and the resulting signature remain unknown to the signer.

Ticket Issuance: In order to maintain security of the network against attacks and the fairness among clients, the home server manager may control the access of each client by issuing tickets based on the misbehavior history of the client.

Fraud Detection: Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack. Ticket reuse generally results from the client’s inability to obtain tickets from the TA when network access is desired.

Fundamental Security Objectives: It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality,which follows directly from the employment of the standard cryptographic primitives.

anonymity (noun) a state of being unknown; namelessness; lacking individuality. If a person likes to remain unknown, they like anonymity. Anonymity is a situation in which a person's name, either on their request, or for any other reason, is kept a secret. A large number of people living in a group in which none of them are extraordinary in any way, live in anonymity. No one among them has individuality. The famous writer of satires Jonathan Swift, of Gulliver's Travels fame, had his earlier books published in anonymity. Only later did people come to know that he was the author of those highly imaginative works. Today, even in affluent countries, a large number of people live in anonymity, at subsistence levels, in slums.

Traceability refers to the completeness of the information about every step in a process chain. process chain The formal definition of traceability is the ability to chronologically interrelate uniquely identifiable entities in a way that is verifiable. Traceability is the ability to verify the history, location, or application of an item by means of documented recorded identification. [1] [1]

Traceability Server is provided by the security component which allows secure access to the event and master data that is stored in the IBM InfoSphere Traceability Server. Security policies define the types of queries that can be run and the data that can be accessed when those queries are run. A security policy is associated with a user group that is defined in the IBM WebSphere Application Server. Only users in that user group are allowed to run the queries and access the data that is specified in the policy. When queries are run, the security component intercepts the query, and, if necessary, modifies it so that some of the resultant data is either discarded or changed to NULL values

Uml Diagrams Use case Admin Login view misuses view blind message client4make transaction send and receive messages Start server client1 client2 client3

Sequence Diagram: Admin Enter data to insert and delete Enter username and password view misuses view blind messages LOGIN client2client1start server client3client4 Start start start start

Activity Diagram Adminloginview blind messageview misuses Start serverclient2client4Client1client3Make transaction

Component Diagram View blind message view misuses Admin Login enter user name and password start server client1client2client3client4Make transaction send and receive messages.

Conclusion: we propose SAT, a security architecture mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users. By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity-based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency.