SlideShare une entreprise Scribd logo
1  sur  37
Student: Reza Sadeghi
Advisor: Dr. Mazinani
Course: Smartgrid
My email: reza.sadeghi@imamreza.ac.ir
im_rezasadeghi@yahoo.com
November & December 2013
Smart Grid Common Networks
Neighbor Area Network (NAN) Home Area Network (HAN)
Power Generation Power Transmission Grid Power Distribution Grid Power Consumption
Smart
MeterSubstationSubstation Customer
Microgrid
Microgrid
(a) Power System Layer
(b) Communications Layer
Wireless
Backhaul
Base
Station
Control Center
Wired Backhaul
Network
Wide Area Network (WAN)
Smart
Meter
Data Aggregation
Point (DAP)
Electric Vehicle
Solar EnegyWind Enegy
Non-renewable Enegy
Concentrator Smart
Home
Device
2
NAN is first of the war
New houses produce their supply
3
Materials of NANs in
??IEEE802.11s??
MP->
A mesh point (MP) is an IEEE 802.11s entity that mainly acts as a relay
node.
MAP->
A mesh access point (MAP) is an MP but can also work as an access
point
MPP->
A mesh portal (MPP) is a logical point and has a bridging functionality
and connects the mesh network to other networks
STA->
Legacy wireless mobile stations (STA) are connected to an MAP through
generic WLAN protocols.
Thus, configuration of an MAP allows a single entity to logically provide
both mesh functionalities and AP functionalities simultaneously.
4
5
Security in SG in
routing perspective
Security in
NANs
Routing
protocols
Routing in
WMN
Routing
discovery
Routing
maintenance
Data passing
6
HWMN for IEEE 802.11s
7
Most of Mutable filed are
dangerous
8
Attacks on routing
9
Rout discovery attack
10
Routing Loop
11
Rout diversion attack
12
Key Establishment procedure
in IEEE 802.11s
13
SHWMN
14
Markle Tree
15
SHA1
Securing on demand mode
F1 F2
In action!
16
Markle Tree for S->B->C
17
Securing on proactive
18
Securing hybrid mode
Proactive mode
Tree
On-demand
Security analyses?
Flooding/Rout disruption/ Rout
diversion/Routing Loop 19
Performances analysis
20
Analysis
21
IBC-HWMP
IBC(Identity based Cryptosystems)
IBC Algorithm
Encryption
Setup Extract Encrypt Decrypt
Digital signature
Setup Extract Encrypt Decrypt
22
Solve external
nod problems
Solve internal
nods problem
Encryption
23
Digital signature
24
Changes
The digital signature is incorporated into
PREQ and PREP messages by adding two
new fields : IBC-Mac Size (digital signature
size : 1 Byte) and IBC-MAC (digital
signature).
25
Simulation
Software:NS3
The side of the square cell is defined by m
step (100m) parameter. We have used a
UDP traffic, Packet Size=1024 and Packet
Interval=0.1.
Three metrics: Mean delay, control routing
overhead and throughput.
26
Analysis
27
TOP(Type of protection)
Possible attacks in mesh networks
Nodes showing unintended behavior due to hardware or
software failures: problems caused by such nodes should
be solved by fault tolerance mechanisms instead of
security mechanisms. Therefore, we will not consider
such nodes within this work.
External malicious nodes, which are intentionally not
allowed to join the network.
Internal malicious nodes, which legitimately are part of
the network and show egoistic behavior or are
compromised by an attacker. Egoistic behavior, e. g.,
intentionally dropping frames, aims at saving resources or
gaining higher bandwidth. Attacks could be launched by
dropping frames, by corrupting the routine 28
Mainly focus on three attacks
Selective forwarding—With this active attack, an internal
malicious node intentionally drops frames of other nodes that
actually should be forwarded by the malicious node. This attack
may aim at disrupting a certain communication, a specific node,
or just the communication of the wireless network.
Routing Attacks—Incase of routing attacks, an internal
malicious node tries to influence the routing protocol in a way
that incorrect forwarding paths are used. A wormhole attack [6],
for example, aims at establishing a route to a victim node even
if there are shorter routes. This enables gaining information of
specific communications in the network or selectively
forwarding frames. 29
Mainly focus on three attacks
Eavesdropping—If no cryptographic protection is applied within a
wireless network, external and internal malicious nodes are able to
eavesdrop on the traffic. If some protection like Robust Secure
Network (RSN) [2] or IEEE 802.11s security mechanisms is
present,
. External attackers, however, are precluded
from eavesdropping.
30
Concept of TOP
Main idea:
Wireless mesh network can be as secure as
VLAN in Ethernet network
31
VLANs allow for
transport of different
virtual networks over
a single network by
tagging the frames
Structure of TOP
32
TOP mapping
33
Simulation
34
NS2
Ideas evaluation!
1. Insert a hole in Mesh network?
2. Broadcasting data in two ways time of money with
Global broadcasting and …
3. Change from prime Galvani to binary Galvani? ((prime
Galvani has simplest and better performing in software
vs. binary Galvani has better performance in special
hardware due to in our wireless mesh network we
should use prime Galvani))
4. Travel to secure protocol with less process consume
((bilinear map which is subroutine of discreet logarithm
is most effectives strongest algorithm ))
5. Why we create SGN?
6. Find Trojans with HMM and etc.
7. What are NAN protocol and way we use them?
35
In field of creating loop and external nodes work is
finished but the Trojans are alive to kill us and
destroy our world; therefore, we should slaughter
them as soon as possible.
References
1. A survey of routing protocols for smart grid communications written by Nico
Saputro, Kemal Akkaya, Suleyman Uludag
2. Chapter 5: Smart Grid Communications Networks.ppt produced by Quang-
Dung Ho and Tho Le-Ngoc;ECE Dept., McGill University, Montreal, Canada
3. M.S. Islam, Y.J. Yoon, M.A. Hamid, C.S. Hong, A secure hybrid wireless
mesh protocol for 802.11s mesh network,2008
4. T. Gamer, L.Vlker, M.Zitterbart, Differentiated security in wireless mesh
networks, Security and Communication Networks 4 (2011) 257–266.
5. On Securing HWMP using IBC(IEEE_05962921)
6. Dr. Nikoghadam prsentation
7. A New E-HWMP Routing Algorithm in Automatic Meter Reading
Networks written by Li Li, Xiaoguang Hu and Ketai He, 2013
8.www.wikipedia.org
36
END
37

Contenu connexe

Tendances

INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
International Journal of Technical Research & Application
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
paperpublications3
 

Tendances (20)

Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Grayhole
GrayholeGrayhole
Grayhole
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Wsn
WsnWsn
Wsn
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Presentation1
Presentation1Presentation1
Presentation1
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 

En vedette

Smart Grid _final e
Smart Grid _final eSmart Grid _final e
Smart Grid _final e
bakoukabou
 

En vedette (18)

Oracle log miner
Oracle log minerOracle log miner
Oracle log miner
 
Web navigation based on markov and anthology
Web navigation based on markov and anthologyWeb navigation based on markov and anthology
Web navigation based on markov and anthology
 
Modeling, Simulation and Analysis of Fuzzy Systems in Mat lab
Modeling, Simulation and Analysis of Fuzzy Systems in Mat labModeling, Simulation and Analysis of Fuzzy Systems in Mat lab
Modeling, Simulation and Analysis of Fuzzy Systems in Mat lab
 
Invitation for master thesis defence
Invitation for master thesis defenceInvitation for master thesis defence
Invitation for master thesis defence
 
Smart Nodes and Automation Modes for Energy Routing
Smart Nodes and Automation Modes for Energy RoutingSmart Nodes and Automation Modes for Energy Routing
Smart Nodes and Automation Modes for Energy Routing
 
Integrating the Grid of the Future
Integrating the Grid of the FutureIntegrating the Grid of the Future
Integrating the Grid of the Future
 
Global Markets, Global Standards
Global Markets, Global StandardsGlobal Markets, Global Standards
Global Markets, Global Standards
 
Sgcp13cochrane
Sgcp13cochraneSgcp13cochrane
Sgcp13cochrane
 
Protégé
ProtégéProtégé
Protégé
 
A review on typing on flat glass
A review on typing on flat glassA review on typing on flat glass
A review on typing on flat glass
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy Networks
 
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER ppt
 
Routing protocols in smart grids
Routing protocols in smart gridsRouting protocols in smart grids
Routing protocols in smart grids
 
Smart metering infrastructure Architecture and analytics
Smart metering infrastructure Architecture and analyticsSmart metering infrastructure Architecture and analytics
Smart metering infrastructure Architecture and analytics
 
Smart energy meter (Updated)
Smart energy meter (Updated)Smart energy meter (Updated)
Smart energy meter (Updated)
 
Smart Grid _final e
Smart Grid _final eSmart Grid _final e
Smart Grid _final e
 
Wireless Meter Bus
Wireless Meter BusWireless Meter Bus
Wireless Meter Bus
 

Similaire à Secure routing for wireless NANs

Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
IJMER
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
Jasmine Culbreth
 
Iss 2
Iss 2Iss 2
Iss 2
ijgca
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
iosrjce
 

Similaire à Secure routing for wireless NANs (20)

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
N0363079085
N0363079085N0363079085
N0363079085
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...A New Approach for Improving Performance of Intrusion Detection System over M...
A New Approach for Improving Performance of Intrusion Detection System over M...
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Iss 2
Iss 2Iss 2
Iss 2
 
Iss3
Iss3Iss3
Iss3
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
E0432933
E0432933E0432933
E0432933
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
 
H017615563
H017615563H017615563
H017615563
 

Plus de Reza Sadeghi

Early hospital mortality prediction using vital signals
Early hospital mortality prediction using vital signalsEarly hospital mortality prediction using vital signals
Early hospital mortality prediction using vital signals
Reza Sadeghi
 
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Reza Sadeghi
 
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Reza Sadeghi
 

Plus de Reza Sadeghi (11)

Predicting Subjective Sleep Quality Using Objective Measurements in Older Adults
Predicting Subjective Sleep Quality Using Objective Measurements in Older AdultsPredicting Subjective Sleep Quality Using Objective Measurements in Older Adults
Predicting Subjective Sleep Quality Using Objective Measurements in Older Adults
 
Sleep quality prediction in caregivers using physiological signals
Sleep quality prediction in caregivers using physiological signalsSleep quality prediction in caregivers using physiological signals
Sleep quality prediction in caregivers using physiological signals
 
A review on early hospital mortality prediction using vital signals
A review on early hospital mortality prediction using vital signalsA review on early hospital mortality prediction using vital signals
A review on early hospital mortality prediction using vital signals
 
A review on Analyzing Multiple Medical Corpora Using Word Embedding
A review on Analyzing Multiple Medical Corpora Using Word EmbeddingA review on Analyzing Multiple Medical Corpora Using Word Embedding
A review on Analyzing Multiple Medical Corpora Using Word Embedding
 
Chase presentation
Chase presentationChase presentation
Chase presentation
 
Early hospital mortality prediction using vital signals
Early hospital mortality prediction using vital signalsEarly hospital mortality prediction using vital signals
Early hospital mortality prediction using vital signals
 
Early hospital mortality prediction of intensive care unit patients using an ...
Early hospital mortality prediction of intensive care unit patients using an ...Early hospital mortality prediction of intensive care unit patients using an ...
Early hospital mortality prediction of intensive care unit patients using an ...
 
A review on Exploiting experts’ knowledge for structure learning of bayesian ...
A review on Exploiting experts’ knowledge for structure learning of bayesian ...A review on Exploiting experts’ knowledge for structure learning of bayesian ...
A review on Exploiting experts’ knowledge for structure learning of bayesian ...
 
Signal processing of heart signals
Signal processing of heart signalsSignal processing of heart signals
Signal processing of heart signals
 
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
 
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Secure routing for wireless NANs

  • 1. Student: Reza Sadeghi Advisor: Dr. Mazinani Course: Smartgrid My email: reza.sadeghi@imamreza.ac.ir im_rezasadeghi@yahoo.com November & December 2013
  • 2. Smart Grid Common Networks Neighbor Area Network (NAN) Home Area Network (HAN) Power Generation Power Transmission Grid Power Distribution Grid Power Consumption Smart MeterSubstationSubstation Customer Microgrid Microgrid (a) Power System Layer (b) Communications Layer Wireless Backhaul Base Station Control Center Wired Backhaul Network Wide Area Network (WAN) Smart Meter Data Aggregation Point (DAP) Electric Vehicle Solar EnegyWind Enegy Non-renewable Enegy Concentrator Smart Home Device 2
  • 3. NAN is first of the war New houses produce their supply 3
  • 4. Materials of NANs in ??IEEE802.11s?? MP-> A mesh point (MP) is an IEEE 802.11s entity that mainly acts as a relay node. MAP-> A mesh access point (MAP) is an MP but can also work as an access point MPP-> A mesh portal (MPP) is a logical point and has a bridging functionality and connects the mesh network to other networks STA-> Legacy wireless mobile stations (STA) are connected to an MAP through generic WLAN protocols. Thus, configuration of an MAP allows a single entity to logically provide both mesh functionalities and AP functionalities simultaneously. 4
  • 5. 5
  • 6. Security in SG in routing perspective Security in NANs Routing protocols Routing in WMN Routing discovery Routing maintenance Data passing 6
  • 7. HWMN for IEEE 802.11s 7
  • 8. Most of Mutable filed are dangerous 8
  • 16. Securing on demand mode F1 F2 In action! 16
  • 17. Markle Tree for S->B->C 17
  • 19. Securing hybrid mode Proactive mode Tree On-demand Security analyses? Flooding/Rout disruption/ Rout diversion/Routing Loop 19
  • 22. IBC-HWMP IBC(Identity based Cryptosystems) IBC Algorithm Encryption Setup Extract Encrypt Decrypt Digital signature Setup Extract Encrypt Decrypt 22 Solve external nod problems Solve internal nods problem
  • 25. Changes The digital signature is incorporated into PREQ and PREP messages by adding two new fields : IBC-Mac Size (digital signature size : 1 Byte) and IBC-MAC (digital signature). 25
  • 26. Simulation Software:NS3 The side of the square cell is defined by m step (100m) parameter. We have used a UDP traffic, Packet Size=1024 and Packet Interval=0.1. Three metrics: Mean delay, control routing overhead and throughput. 26
  • 28. TOP(Type of protection) Possible attacks in mesh networks Nodes showing unintended behavior due to hardware or software failures: problems caused by such nodes should be solved by fault tolerance mechanisms instead of security mechanisms. Therefore, we will not consider such nodes within this work. External malicious nodes, which are intentionally not allowed to join the network. Internal malicious nodes, which legitimately are part of the network and show egoistic behavior or are compromised by an attacker. Egoistic behavior, e. g., intentionally dropping frames, aims at saving resources or gaining higher bandwidth. Attacks could be launched by dropping frames, by corrupting the routine 28
  • 29. Mainly focus on three attacks Selective forwarding—With this active attack, an internal malicious node intentionally drops frames of other nodes that actually should be forwarded by the malicious node. This attack may aim at disrupting a certain communication, a specific node, or just the communication of the wireless network. Routing Attacks—Incase of routing attacks, an internal malicious node tries to influence the routing protocol in a way that incorrect forwarding paths are used. A wormhole attack [6], for example, aims at establishing a route to a victim node even if there are shorter routes. This enables gaining information of specific communications in the network or selectively forwarding frames. 29
  • 30. Mainly focus on three attacks Eavesdropping—If no cryptographic protection is applied within a wireless network, external and internal malicious nodes are able to eavesdrop on the traffic. If some protection like Robust Secure Network (RSN) [2] or IEEE 802.11s security mechanisms is present, . External attackers, however, are precluded from eavesdropping. 30
  • 31. Concept of TOP Main idea: Wireless mesh network can be as secure as VLAN in Ethernet network 31 VLANs allow for transport of different virtual networks over a single network by tagging the frames
  • 35. Ideas evaluation! 1. Insert a hole in Mesh network? 2. Broadcasting data in two ways time of money with Global broadcasting and … 3. Change from prime Galvani to binary Galvani? ((prime Galvani has simplest and better performing in software vs. binary Galvani has better performance in special hardware due to in our wireless mesh network we should use prime Galvani)) 4. Travel to secure protocol with less process consume ((bilinear map which is subroutine of discreet logarithm is most effectives strongest algorithm )) 5. Why we create SGN? 6. Find Trojans with HMM and etc. 7. What are NAN protocol and way we use them? 35 In field of creating loop and external nodes work is finished but the Trojans are alive to kill us and destroy our world; therefore, we should slaughter them as soon as possible.
  • 36. References 1. A survey of routing protocols for smart grid communications written by Nico Saputro, Kemal Akkaya, Suleyman Uludag 2. Chapter 5: Smart Grid Communications Networks.ppt produced by Quang- Dung Ho and Tho Le-Ngoc;ECE Dept., McGill University, Montreal, Canada 3. M.S. Islam, Y.J. Yoon, M.A. Hamid, C.S. Hong, A secure hybrid wireless mesh protocol for 802.11s mesh network,2008 4. T. Gamer, L.Vlker, M.Zitterbart, Differentiated security in wireless mesh networks, Security and Communication Networks 4 (2011) 257–266. 5. On Securing HWMP using IBC(IEEE_05962921) 6. Dr. Nikoghadam prsentation 7. A New E-HWMP Routing Algorithm in Automatic Meter Reading Networks written by Li Li, Xiaoguang Hu and Ketai He, 2013 8.www.wikipedia.org 36

Notes de l'éditeur

  1. Pic comes from BBC movies