Assessing the Security Framework of the Serval Project “Serval Mesh Software”. Student : Mr. Saaed Ali Wantiti. Supervisor: Ms. Romana Challans.

Slides:



Advertisements
Similar presentations
1 doc.: IEEE /1138r0 Submission SlideDr Paul Gardner-Stephen & Romana Challans, The Serval Project Inc. September 2011 Proposed Use Case & Improve.
Advertisements

Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
 See One, Do One, Teach One Using Student-Produced Cases to Learn About Decision-Making.
Cloud computing security related works in ITU-T SG17
Identification, Authentication and Authorisation Issues in a way to Single Window (SW) Interoperability: An Australian Empirical Study Ms. Hemali Shah.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
MethodAssess System Assessment. Methoda Computers Ltd 2 List of Subjects 1. Introduction 2. Actions and deliverables 3. Lessons and decisions.
Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Information Security Risk.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Overview of “ITU-T SG5 Activities on Climate Change Adaptation” ” Nevine Tewfik Egypt Rapporteur of Question 15, ITU-T Study Group 5 Kuwait City, Kuwait,
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Model of business intelligence maturity levels for mobile operators Mikael Ojala Thesis Seminar on Networking Technology Helsinki University of Technology.
Network Fundamentals Instructor: Richard Fredrickson MCT NetTech Solutions.
1 Browser Compatibility Assessment TAC Presentation May 28, 2015 David Forfia Director, Enterprise Architecture.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
Supervisor: Paul Gardner-Stephen Student: Alexander Kotov Master Thesis
SERVAL PROJECT AD-HOC PACKET RADIO NETWORK 10/04/2012 – PROGRESS SEMINAR Kévin TABAR Supervisor: Dr Paul Gardner-Stephen.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
IAEA IAEA Support Services and Tools for Embarking Country Regulators Regulatory Cooperation Forum (RCF) Plenary 2015 NICIC Adriana Acting Section Head.
IT concept Alex (WAB) Yae (BISS). Summary of the article Technology & tool for helping people from disaster /blog/communication.gif.
Delete this slide from your final thesis presentation. S. No. Document Version Major ChangesAuthor/s Creation Date Review Date Reviewer/s Initial.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
IS Network and Telecommunications Risks Chapter Six.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Delete this slide from your final thesis presentation.
LORIS Background Disaster management key concept relying on communication Government plans driven by ICT Focus on data transfer Balance between.
Overview of “ITU-T SG5 Activities on Climate Change Adaptation” ” Nevine Tewfik Egypt Rapporteur of Question 15, ITU-T Study Group 5 ITU Symposium on ICTs,
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
Presented by Prof. Danilo Gligoroski MSc in Telematics Specialization in Information Security.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Updating ISSAI Project Proposal SAI India Comptroller and Auditor General of India1.
1 Browser Compatibility Assessment June 2 nd, 2015.
Tunis, Tunisia, 28 April 2014 Cloud Computing Standardization Includes Security Ruan HE, Senior Expert, Orange, Verdana 24 2 nd SG 13.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 12: Ασύρματα Δίκτυα Πλέγματος (Wireless Mesh Networks) Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammed Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response.
ICC eTerms Repository Supporting the PKI infrastructure and secure electronic commerce Janjaap Bos Dublin, June 2000.
CYBER SECURITY Industry guidelines for use on- board ships Mr Angus Frew, Secretary General.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
Technical Clarification CORP 3315 Eskom OT-IT integration and convergence strategy.
RSA Professional Services RSA SecurID Solution Design and Implementation (D&I) Services.
WP9: Dissemination and Exploitation
Update from the Faster Payments Task Force
Tutorials of Q.8: cloud security related works in SG17
Location Value Assessment: Kickoff
Project Title Presented By Student1 name - Roll no
Transmission Planning Code
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Providing Teleworker Services
Pre-Execution Process Review Presentation
Emergency Management Technical Committee
SQL Database Audit Planning
America’s First National Critical Infrastructure Exercise
Providing Teleworker Services
Does religious freedom exist?
Providing Teleworker Services
Guidelines for the implementation of Regulation (EC) No 91/2003 of the European Parliament and of the Council on Rail transport statistics version 6.0.
Progress Report on proposed GUID on Information TECHNOLOGY Audit
ITU-T Workshop on Security, Seoul (Korea), May 2002
Network Informational Interviewing
Title of the project Independent Study Project (MS CSIT/IS)
Presentation transcript:

Assessing the Security Framework of the Serval Project “Serval Mesh Software”. Student : Mr. Saaed Ali Wantiti. Supervisor: Ms. Romana Challans.

Content Background. Serval Mesh Software security framework. Research questions. Related research and projects. Research methodology. Deliverables. Timeline. Questions.

What is the Serval Project? Serval Project : Not for Profit research group that is part of Flinders University. Serval Mesh Software: a Software that uses Wireless Mesh Networks (WMNs) to provide communications without infrastructure for emergencies & disasters.

Security & WMN: What is the Issue? The Serval Project is based on Wireless Mesh Network (WMN) technology. The main objective of this Research project is to assess the security framework of Serval Mesh Software.

The Security Framework of Serval Mesh Software. It has not been assessed yet. The issues of encryption in the earliest releases of the Serval Project.  The initial release has no encryption.  The recent releases is using Elliptic Curve encryption.  The current version Serval Mesh Software does not have any authentication measures.  The next releases are intended to have authentication measures.

Research Question? What are the possible threats to the security of the Serval Mesh? Is the current Security Framework effective?

Related Research in similar area. General research about the security of mesh networks. Some Projects and approaches that are similar to Serval Project and Serval Mesh.  SafeMesh.  City Mesh.  iSurvival.  NerveNet.

Research Methodology. Qualitative research Method.  Similar Projects scenarios and applications.  The latest release of Serval Mesh software.  Industry expectations and best practices.

Deliverables A written Thesis.  Recommendations and suggestions of improvements.

Timeline JanFebMarAprMayJunJulAugSepOctNov The initial research on Serval Mesh software. Research on security and related projects. The assessment of the security framework of Serval Mesh software. Starting to write the draft of the Thesis and initial results. Final Results and finalizing the Thesis Draft. Final Thesis.

Thank you Student : Mr. Saaed Wantiti Supervisor : Ms. Romana Challans