28 th TF-Mobility and Network Middleware Meeting A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks Torsten Braun.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

Introduction to Public Land Mobile Network (PLMN)
Amortized Analysis Some of the slides are from Prof. Leong Hon Wais resources at National University of Singapore Prof. Muhammad Saeed.
Computer Networks & Distributed University of Bern Torsten Braun Institute of Computer Science and Applied Mathematics Universität Bern
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
Geneva, Switzerland, 11 June 2012 Future Network: Mobility Tae-Wan You ETRI, Joint ITU-T SG 13 and ISO/JTC1/SC 6 Workshop on Future Networks.
1 Milk Market Situation Brussels, 23 February 2012.
ARC reporting ARC Cerny Verze
Lebanese Energy Statistics: A Decade in Review Dr. Joseph Al Assad.
Wireless Controllers. Building block for remote control & alarming Functions Local control Measurement SMS alarming Remote control via SMS Data transmission.
Milk Market Situation Brussels, 19 January Market Situation – 19 January !!! Data from some Member States are confidential and are NOT included.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Solving Manufacturing Equipment Monitoring Through Efficient Complex Event Processing Tilmann Rabl, Kaiwen Zhang, Mohammad Sadoghi, Navneet Kumar Pandey,
MEMS Thermal & Fluid Control Lab. RFID tag powered by solar cell was set up and integrated with multiple sensors, such as temperature, humidity, light.
Design and construction of a mid-IR SPIDER apparatus 09/10/2012 Malte Christian Brahms Imperial College London 09/10/20121.
Ayşe Gül ÇALIŞKAN Erhan IŞIK ECE 491 Interm Presentation Supervisors : Halil T. EYYUBOĞLU Fahrettin DOĞAN(Türk Telekom)
Milk Market Situation Brussels, 20 September 2012.
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
Mark Heggli Consultant to the World Bank Expert Real-time Hydrology Information Systems Workshop Module 4: Data Management Solutions for a Modernized HIS.
Interconnecting Sensor Networks and Research Networks by Wireless (Mesh) Technology Project Idea and further statements Kurt Baumann
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
Mobile Online Intelligent Decision Support System Rick Smith, Dr. Stacey Lyle and Dr. Patrick Michaud-Division of Nearshore Research Conrad Blucher Institute.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
A Guide to major network components
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Jadavpur University Centre for Mobile Computing & Communication Implementation of Ad-Hoc Mesh Network Presentation by: Sudipto Das Rajesh Roy.
Case Study Portable Wireless Network for Emergency Response.
AAA/SWITCH Info Day 2010 Project Idea: A 4 -Mesh Thomas Staub and Torsten Braun University of Bern, Switzerland.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Georgia Automated Environmental Monitoring Network (AEMN) Established in 1991 Housed on UGA Griffin Campus in Department of Crop and Soil Sciences, College.
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Soil Moisture Monitoring Using Wireless Sensor Network
Use of ICTs in Education, Healthcare and Agriculture
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 11: Remote Access Fundamentals
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Components of wireless LAN & Its connection to the Internet
Submission doc.: IEEE /1365r0 Use Cases of LRLP Operation for IoT November 2015 Chittabrata Ghosh, IntelSlide 1 Date: Authors:
A^4 Mesh Project 16. February 2011, Lyon
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 12: Ασύρματα Δίκτυα Πλέγματος (Wireless Mesh Networks) Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
INTRODUCTION:- The approaching 4G (fourth generation) mobile communication systems are projected to solve still-remaining problems of 3G (third generation)
A microcontroller-based system for multi sensor monitoring and messaging via GSM network Bachelor thesis Angelakis Vaios Supervisor:Kazarlis S.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
The OFIDIA Project CMCC Lecce, MUST, November 24th, 2015
Case Study: Real Life Unified Architecture Value
Integration of and Third-Generation Wireless Data Networks
Module Overview Installing and Configuring a Network Policy Server
Wireless Local Area Network (WLAN)
Data Management Solutions for a Modernized HIS
Module 8: Securing Network Traffic by Using IPSec and Certificates
Automated Irrigation Control System
Module 8: Securing Network Traffic by Using IPSec and Certificates
IT Security for Meteorological Measuring Networks
Global One Communications
Presentation transcript:

28 th TF-Mobility and Network Middleware Meeting A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks Torsten Braun Communication and Distributed Systems Institute of Computer Science and Applied Mathematics Universität Bern

Overview  Project Introduction  Application Scenario  Wireless Mesh Network  Authentication and Authorization  Accounting  Conclusions and Outlook Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Project Introduction

Project Partners  Institut für Informatik und Angewandte Mathematik  Geographisches Institut  Informatikdienste  Institut d’Informatique  Service Informatique et Télématique Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Project Goals and Objectives  Goal —Provide low-cost broadband network access to researchers and students at remote locations  Objectives —Cost-efficient network access —Easily deployable wireless mesh network (WMN) —Integrated into regular authentication and authorization infrastructure of Swiss higher education (SWITCHaai) Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) Application Scenarios 1. Environmental Monitoring 2. Campus Network Extension Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

AAAA for WMNs  Authentication and Authorization of 1.wireless mesh nodes entering the WMN 2.mobile users accessing the Internet via the WMN (using SWITCH AAI mechanisms)  Accounting of traffic generated by 1.wireless mesh nodes and sensors 2.individual mobile users (for charging and monitoring purposes)  Auditing functions —detect inconsistent or erroneous node states —perform recovery mechanisms or trigger alarms  Indoor testbed and pilot networks at 1.Crans Montana 2.University campuses at Bern and Neuchâtel Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Application Scenario: MontanAqua

Requirements by Environmental Monitoring  Support of scientists (hydrology researchers) to collect sensor data from environmental measurements.  Scientists use data for generating and verifying models of the environment.  Specific measurements to cover certain areas or to collect specific sensor data are needed. Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

MontanAqua Investigation Area Sion Sierre Tseuzier storage lake Plaine Morte glacier © Weingartner Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Modelling Water Resources PIHM - Penn State Integrated Hydrologic Model cc scenarios 2050 WATER RESOURCES 2010 LAND USE © Martina Kauzlaric module GLACIER module KARST Jeannin ice thickness 0 m 100 m 200 m © Matthias Huss © Weingartner PHIM high data demand for modelling water balance and fluxes Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Weather Stations and Rain Gauges wind velocity & direction air temperature & relative humidity solar radiation rainfall Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Runoff Station Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Soil Measurements soil moisture sensorstensiometers lysimeter Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Data Transfer Alternatives GSM Modem for weather stations lost GSM Signal GPRS Modem for weather stations data access only via server of producer of weather station Manually for rain gauges, runoff gauges, weather station Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Serial Port Tunneling Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Benefits for Scientists  Real-time access on logger (software up-dates, failure checking) →reduced frequency of maintenance  Real-time data access (data verification, monitoring of sensors)  Data stored on server at University and logger in the field →reduction of data loss risk (destruction of sensors/loggers) →independent of GSM/GPRS network availability →high data-transfer rates (web cam) Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Sensor Readings Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Wireless Mesh Network

MontanAqua Sensors and A4-Mesh Network webcam Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

A4-Mesh Topology © Atlas of Switzerland 3 Plaine Morte Glacier Sion Sierre Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Wireless Mesh Node Technology IP66 steel enclosure 1-2x Alix 3D2 system boards 1x Alix 6F2 system board 1-4x n mini PCI cards 1x g mini PCI card 1x UMTS mini PCI-Express card I 2 C twin relay 2x2 MIMO, 25dBi, dual polarization panel antennas ADAM Linux Optimized Link State Routing / s Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Deployment of Nodes 4a/b Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Deployment of Nodes 3/7 Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Deployment of Node 8 Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Authentication and Authorization

Authentication and Authorisation  Network resources can only be accessed by authenticated and authorized end users and wireless mesh nodes: —Wireless mesh nodes entering the WMN – Mechanism tailored to WMNs supporting easy and secure inter- organizational access to network resources using a separate Shibboleth federation. —Mobile users accessing the Internet via the WMN – Implementation based on web-based captive portal protected by SWITCHaai Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 27

A 4 -Mesh AAAA Architecture Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Machine Authentication and Authorization Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 29 Request VPN key Authentication request with X.509 certificate Machine attributes is authorized ?authorized VPN key Open firewall VPN tunnel establishment

User Authentication and Authorization (Captive Portal) Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 30

Accounting

 Traffic monitoring at each mesh node (NetFlow, RFC 3954)  Central storage of flow statistics at A 4 -Mesh gateway  Data enrichment at A 4 -Mesh gateway (IP, IP NAT, time, UniqueID) Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Accounting Aggregator Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Network Monitoring  Monitoring agent at each mesh node (Zabbix agent)  Central server at A 4 -Mesh gateway (Zabbix server) Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Conclusions and Outlook

Conclusions  WMN is valuable for researchers working in the field.  Implementation of SWITCHaai-based authentication and authorization for WMN nodes and end users  Implementation of monitoring functions for WMN nodes  Outlook: integration and tests Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 36

a4-mesh.unibe.ch Zürich, Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks