Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Unified Communications Bill Palmer ADNET Technologies, Inc.
Security in Mobile Ad Hoc Networks
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
1RD-CSY  LAN (Local Area Network) ◦ A group of computers and associated devices (printers, etc.) ◦ connected through a wired or wireless medium.
University of Würzburg Department of Distributed Systems Prof. Dr. P. Tran-Gia Challenges of (P2P-based) Scalable Multicast in Infrastructure-based Mobile.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
URSA: Providing Ubiquitous and Robust Security Support for MANET
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Service Oriented Architectures in Heterogeneous Environments
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wireless Sensor Network Security Anuj Nagar CS 590.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
SECURITY PROBLEMS PERTAINING TO E-CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS. P. Balagangadhar Rao INDIA
Principles for Collaboration Systems Geoffrey Fox Community Grids Laboratory Indiana University Bloomington IN 47404
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Wireless LAN Technology
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Wireless Networks Breakout Session Summary September 21, 2012.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
EAACK—A Secure Intrusion-Detection System for MANETs
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Lecture 24 Wireless Network Security
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
1 Information Technology Infrastructure & Management Overview.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
0 Agile Controller Key Message KM 1: Service Experience-centered Network Redefinition KM 2: Network-wide United Security KM 3: Product Openness and Collaboration.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Chapter 1: Explore the Network
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Presented by Edith Ngai MPhil Term 3 Presentation
Instructor Materials Chapter 1: Explore the Network
University of Maryland College Park
Chapter 1: Explore the Network
Cloud Testing Shilpi Chugh.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Wireless Ad-Hoc Networking
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Distributed computing deals with hardware
Presentation transcript:

Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns

 Overview of Ad Hoc Mobile and Cloud Networks– Josh  Overview of Security Concerns– Larry  Attack Methods & Vulnerabilities- Josh  Overview of Specific Security Proposals– Larry  Future Work - Josh 2

 Self-configuring infrastructureless network of clouds/mobile devices connected by wireless links.  The emergence of cloud-based computing, where storage and CPU are outsourced to multiple 3 rd parties across the globe, implies large collections of highly distributed and continuously evolving data points. 3

 Ensure the infrastructure is secure and the clients’ data and applications are protected. While the customer must ensure that the provider has taken the proper security measures to protect their information. 4

5

 Because mobile ad hoc networks have many more vulnerabilities than a traditional wired network, security is much more of a challenge in the mobile ad hoc network environment.  On a wireless network, an adversary is able to eavesdrop on all messages within the emission area, by operating in promiscuous mode and using a packet sniffer 6

 Furthermore, due to the limitations of the medium, communications can easily be perturbed; the intruder can perform this attack by keeping the medium busy sending its own messages, or just by jamming communications with noise. 7

 Vulnerabilities: ◦ Lack of Secure Boundaries ◦ Compromised Nodes ◦ Lack of Centralized Management/Standards ◦ Restricted Power Supply* ◦ Scalability  Attack Methods ◦ DoS ◦ Impersonation ◦ Eavesdropping ◦ Attacks Against Routing 8

 CloudSEC proposes a new architecture for composing collaborative security-related services in clouds, such as correlated intrusion analysis, anti-spam, anti-DDOS, automated malware detection and containment.  CloudSEC is modeled as a dynamic peer-to- peer overlay hierarchy with three types of top-down architectural components. 9

 Based on this architecture, both data distribution and task scheduling overlays can be simultaneously implemented in a loosely coupled fashion, which can efficiently retrieve data resources from heterogeneous network security facilities, and harness distributed collection of computational resources to process data-intensive tasks. 10

11

12

13

14

15

 Collaborative Mobile Environment  Better Network Mapping/Utilization Tools  Jurisdiction & Provider Integrity 16

17