Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Chris Karlof and David Wagner
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
How to Design Wireless Security Mechanisms Manel Guerrero Zapata Mobile Networks Laboratory Nokia Research Center.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 2 – Upcoming networks Generalities.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Arsitektur Jaringan Terkini
CS541 Advanced Networking 1 Wireless Mesh Networks Neil Tang 1/26/2009.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Wireless Sensor Network Security Anuj Nagar CS 590.
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
Network Topologies.
A Fair Scheduling for Wireless Mesh Networks Naouel Ben Salem and Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Fair Scheduling for Wireless Mesh Networks Naouel Ben Salem and Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL.
بسم الله الرحمن الرحيم. Wireless Mesh Network (WMN) Izzeldin Shibeika – April, UNCC -
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks IEEE Transactions on Mobile Computing,Volume 11,Number 6,June 2012 Authors.
Cryptography and Network Security (CS435) Part One (Introduction)
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Wireless Mesh Networks Myungchul Kim
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Routing Metrics and Protocols for Wireless Mesh Networks Speaker : 吳靖緯 MA0G0101.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
© Saravanan Kandasamy, Ricardo Morla, and Manuel Ricardo,INESC Porto 1 Improving the Performance of IEEE802.11s Networks using Directional Antennas over.
1 Wireless Networks Lecture 31 Wireless Mesh Networks Dr. Ghalib A. Shah.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
IMPROVING OF WIRELESS MESH NETWORKS.
Security Issues With Mobile IP
Internet of Things Vulnerabilities
Cryptography and Network Security
An Overview of Security Issues in Sensor Network
Presentation transcript:

Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran

Introduction Wireless Mesh Networks is gaining popularity Security in WMNs still in infancy Identifies three fundamental operations in Wireless Mesh Networks that need to be secured

Wireless Mesh Networks Used to provide internet connectivity over a large geographic area Uses economic transit access points instead of multiple costly wireless hot spots One wireless hot spot connects to the internet and the TAPs connect to the WHS TAPs use multi-hopping to relay traffic to the WHS Clients associate themselves to the TAPs

Characteristics ● Difference between WMNs and Cellular Networks ● Single-hop vs Multi-hop ● Centralized Security operations vs Decentralized ● Multi-hopping in WMNs pose routing difficulties and security issues ● Fairness problem in WMNs

Characteristics ● Difference between Internet and WMNs ● Internet : Routers :: WMNs : TAPs ● Routers are physically protected ● TAPs are not ; contributes to their cost-effectiveness ● Hence, tampering and replication of TAPs are easy to perform

Communication in WMNs Levels of Authentication TAP3 authenticates MC Mutual authentication between TAPs & WHS (initialization) Mutual authentication between TAPs & WHS (re-initialization) Mutual authentication during data transfer

Security Challenges Detection of Corrupt TAPs Securing routing mechanisms Ensuring fairness

Detection of Corrupt TAPs Removal or replacement of TAPs Modify network topology Accessing internal state of TAPs without changing it Passive attack Accessing internal state and modifying it. Modify the routing algorithm Cloning captured device; installing replicas Inject false data conveniently

Secure Multi-hop Routing Attacks – tamper routing messages, modify TAP’s internal state, use replicate nodes Prevention Use secure routing protocols Detect adversary replicated nodes based on known network topology Identify source of disturbance of DOS attack and if possible, disable it

Fairness Closely related to number of hops Fairness should be implemented based on number of clients

Attacks

Implications

Generalized WMNs Vehicular Networks Mobile TAPs Need for secure and accurate positioning information Multi-operator Networks TAPs controlled by multiple operators Challenge – same spectrum used by multiple operators Solution – use Multi-radio/Multi-channel TAPs.

Conclusion This paper analyses the security challenges of Wireless Mesh Networks. Introduces security challenges and fundamental security operations. Pioneering attempt in addressing security of WMN