研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Survey of Secure Wireless Ad Hoc Routing
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
1 多媒體行動通訊網路具動態重配置之可適性資源 管理機制及效能分析 Adaptive resource management with dynamic reallocation for layered encoded multimedia on wireless mobile communication.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
無線區域網路中自我相似交通流量之 成因與效能評估 The origin and performance impact of self- similar traffic for wireless local area networks 報 告 者:林 文 祺 指導教授:柯 開 維 博士.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
IEEE Wireless Local Area Networks (WLAN’s).
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Lecture 24 Wireless Network Security
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Wireless security Wi–Fi (802.11) Security
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Architecture and algorithms for an IEEE based multi-channel wireless mesh network 指導教授:許子衡 老師 學生:王志嘉.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Presented by Edith Ngai MPhil Term 3 Presentation
Authentication and handoff protocols for wireless mesh networks
無線環境的認證方法及其在電子商務應用之研究
Wireless Protocols WEP, WPA & WPA2.
CSE 4905 Network Security Overview
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Identity-based secure collaboration in wireless ad hoc networks
Network Architecture for Cyberspace
Install AD Certificate Services
Presentation transcript:

研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路

2005/7/152 Outline Introduction Background Design a Secure WMN Security Analysis Conclusion

2005/7/153 Introduction (1/2) Wireless Mesh Network Properties. Security Problem. Wireless Security Problem Attacks. Secure solution.

2005/7/154 Introduction (2/2) This thesis Tree topology Define the WMN ’ s basic functions Security issue Compare with other security issue

2005/7/155 Wireless Mesh Network (WMN) Full & Partial mesh network. Omni directional & directional. Benefit: Reduction of install cost Large-scale depolyment (last mile) Reliability Self-management

2005/7/156 WMN ’ s Architecture

2005/7/157 Wireless Security Wireless Environment Open media Unlicensed ISM band Wireless Attacks Infrastructure Ad hoc

2005/7/158 Wireless Attacks Infrastructure Insertion Interception and Monitoring Jamming Ad hoc Black hole Impersonation

2005/7/159 Wireless Security Solutions Main Purposes Authentication Data encryption Infrastructure WEP IEEE 802.1x Ad hoc Share Key Public Key Infrastructure (PKI)

2005/7/1510 WEP Wired Equivalent Privacy Integrity & Encryption Drawbacks: Key size is too small (only 40 bits) Key Sequence Reuse (Initial Vector) Message can ’ t be Authenticated

2005/7/1511 IEEE 802.1x (1/2) Provide network access authentication. Supplicant, Authenticator and Authentication Server. Drawback: One-way authentication. Not protect authentication.

2005/7/1512 IEEE 802.1x (2/2)

2005/7/1513 Share Key Use one key to authenticate and encryption in ad hoc network. Drawbacks: Only one key Non-repudiation Key management

2005/7/1514 Public Key Infrastructure Key feature of public key cryptosystem Two keys: Public Key & Private Key Computational infeasible to determine decryption key. Drawbacks Certificate Authority (CA) Spend a lot of time to en/decrypt.

2005/7/1515 Outline Introduction Background Design a Secure WMN Security Analysis Conclusion

2005/7/1516 The Properties of WMN Similar to ad hoc network AP should select a routing path. The routing path is always fix. Most data are sent to WG. My propose: Tree Topology.

2005/7/1517 Tree Topology

2005/7/1518 WMN ’ s Relationship Supplicant Authentication Agent Manage supplicants Help supplicant to authenticate. Management System Authentication server Maintain WMN

2005/7/1519 Locally Secure Management Different path, different secure channel. AA only maintain his supplicants. Session key Authentication

2005/7/1520 Two functions of WMN Self-Organization When a new AP joins... Self-Configuration Self-healing When a AP occurs failure … Self-reconfiguration When a AP not neighbor joins or fails …

2005/7/1521 Self-Organization

2005/7/1522 Trust Model Supplicant → WMN Group Key: Session key exchange first Confirm key: Authentication WMN → Supplicant WMN ’ s Public Key Signature

2005/7/1523 Choose Authentication Agent Two factors Hop count Node loading 1. Choose the node has smallest hop count value. 2. If there are two nodes has equal hop count value. 1. Compare their node loading value. 2. Select the smaller one.

2005/7/1524 Session Key Exchange Session key exchange first. Session key should be modified periodically. Default Key:

2005/7/1525

2005/7/1526 Self-Configuration (1/2) Self-Healing Determine the authentication agent fail. Start Self-Organization process.

2005/7/1527 Self-configuration (2/2) Self-reconfiguration

2005/7/1528 Outline Introduction Background Design a Secure WMN Security Analysis Conclusion

2005/7/1529 Security Issue Message encryption: data & control Locality security Trust model Session key exchange first Period session key exchange

2005/7/1530 Attacks Defense Man-in-middle (MIM) Forge AP Session Hijack Route Swindle Denial of Service (DoS)

2005/7/1531 MIM & Forge AP Man-in-Middle (MIM) Use session key create secure channel. Period session key exchange. Forge AP Period session key exchange.

2005/7/1532 Session Hijack Session key exchange first.

2005/7/1533 Route Swindle Use signature prove node ’ s legality.

2005/7/1534 Denial of Service Attack: Limited CPU and memory. Continually send streams of association and disassociation packets. Solutions: There are not any solution to solve this problem. Self-healing procedure

2005/7/1535 WMN Security Comparisons

2005/7/1536 Conclusion Tree based secure architecture was proposed. Define WMN ’ s basic functions of WMN. Analysis WMN ’ s security problems. Compare with other security issue.

2005/7/1537 Future Work Consider more available attacks. Mobile mesh network. Other application: Sensor network Ad hoc network

2005/7/1538 The End, Thank You