SlideShare a Scribd company logo
First let us know what is Computer Security
vs. Network Security vs. Information Security
Simple steps to secure Information over Internet
Wireless Mesh Networks
Contents
 Wireless Mesh Network (WMN)
 Security challenges in WMN
 Attacks in WMN
 Handover Authentication in WMN
 Future scope
5
• WMN is composed of three different network elements
 Gateway Routers: which allows access to the wired infrastructure,
possibly the Internet or other local networks.
 Mesh Routers: also known as APs form the network backbone
spanning over wide areas.
 Mesh clients: include a wide range of devices like laptops or cell
phones, with varying degrees of mobility.
WMN Architecture
6
Architecture of WMN
7
Characteristics of WMN
• WMN is dynamically
 self-organized,
 self-configured,
 self-healing,
 easy maintenance,
 high scalability and
 reliable service with the nodes in the network
8
Advantages of WMN
 Auto-discovery of nodes and routes
 Auto-configuration of network components
 Rapid network deployment
 Reduced infrastructure and operational costs
 Increased network reliability
 Easy network maintenance
 Robustness
 Reliable service coverage, etc.
 & many more…
9
Security challenges
 Absence of trusted third party in WMNs due to
distributed network.
 High communication and computational cost to perform
security operations.
 Efficient key management schemes are required.
 Accuracy in detection rate is required.
 Providing high security services against both external
attack and internal attack in distributed network is must.
10
Types of attacks in WMNs
• Eavesdropping
• Impersonating
• Wormhole Attack
• Blackhole Attack
• Sleep deprivation Attack
• Replay Attack
• Sybil Attack
• DoS and flooding Attack
• and many more…
11
Efficient Authentication Protocol
during handover for Wireless Mesh
Networks
• We proposed a protocol that provides an authentication between the client
and MAP along with preserving the integrity of the transfer ticket ϴc ,
which was not considered in the existing protocols during Login
authentication protocol (LAP ) and Handover authentication protocol
(HAP).
• Our proposed protocol offers efficient authentication during handoff
operation when the client roams from its home MAP to foreign MAP.
• The experimental results shows that our protocol performs better in terms
of latency, communication cost and computational cost compared to the
existing protocols.
Handover operation
• Types of tickets issued for mutual authentication among mesh entities
1. Client Ticket: It established a trust relationship between User and MAP.
• where,
• IC = User identity.
• IA = TA identity.
• Ʈexp = expiry time of TC.
• PC = User public key.
• SigA = Digital signature of TA to ensure user legality during LAP.
}
,
,
,
,
{ exp Sig
P
I
I
T A
C
A
C
C 

2. MAP Ticket: It established a trust relationship between MAP and User.
• where,
• IM = MAP identity.
• IA = TA identity.
• Ʈexp = expiry time of TC.
• PC = MAP public key.
• SigA = Digital signature of TA to ensure MAP legality during LAP.
}
,
,
,
,
{ exp Sig
P
I
I
T A
M
A
M
M 

15
3. Transfer ticket ϴc is used during handover authentication which allows the roaming
client to authenticate with the foreign MAP . Elements within ϴc are shown below-
ϴc stores the following elements-
• IM: ID number of the MAP who issues this transfer ticket.
• IC: ID number of the client who owns this transfer ticket.
• IA: ID number of the ticket agent who issued C’s client ticket.
• Ʈ exp: expiry date and time of this ticket.
• Ni : nonce in an incremented order to prevent from a replay attack.
)
,
,
,
,
{ exp

 N
I
I
I i
A
M
c
c

Proposed Login Authentication Protocol
(LAP)
Following are the order of the messages to be exchanged in the protocol
between Client and MAP1 authentication. Later both parties compute
the message authentication code KMAC = NC1 N
∥ M1.
I
MAP C
C :
1

T
MAP M
C 1
1
:

)
,
(
: 1
1 1
N
T
E
MAP C
C
P
C
M

)
,
(
: 1
1
1 N
N
E
MAP C
M
P
C
C

)
(
: 1
1 N
V
MAP M
K
C
MAC

)
: (
1 C
V
MAP K
C
MAC

17
Proposed Handover Authentication Protocol
• When client move from home MAP1 to foreign MAPx , handover
authentication process took place. Before, handover took place the MAP1
encrypts the MAC key (i.e, KMAC = NC1 N
∥ M1) via Px of its neighboring
MAPx. Then, the encrypted MAC key is send to the neighboring MAPx .
We assumed public key of MAP's is known to each other.
 
N
V
MAP C
C
x K
C
MAC
,
: 

 
N
V
MAP C
x K
C
MAC
:

18
Experimental Results
Table1: Experimental Model Setup
Parameters Values
Simulator NS 3
Traffic Type CBR
Simulation Area 1000X1000m
No. of MAP’s 3
No. of Nodes 60
Transmission range of MAP’s 250 meter
Transmission range of Clients 100 meters
Simulation Time 100 sec
Node Placement Randomly
19
Performance Metrics
• Authentication delay occurs when a client sends an authentication request
to a nearby MAP and the receipt of an acceptance confirmation. It is the
time required for the transmission of an authentication request and
acceptance confirmation. Authentication delay is therefore, computed as
the addition of computation cost and communication cost.
• Computation cost, occurs due to delay in processing caused by various
security operations.
• The communication cost is computed with respect to number of message
transmitted between a MAP and a client during Login (LAP) and
Handover (HAP) which results in communication delay.
20
Result Analysis
• Comparison based on total computational cost during login (LAP)
• Comparison based on total computational cost during Handover (HAP)
• Comparison based on total communication cost during login (LAP)
• Comparison based on total communication cost during Handover (HAP)
21
Table 2 and 3: Performance comparison between proposed
protocol and existing protocols
Existing Protocol Proposed Protocol
Network Security its attacks and countersmeasures
Future Scope
• To design more efficient authentication protocol by reducing
the communication cost and computational cost.
• To design an efficient Information Privacy protocol.
• To overcome the security issues related to IoT using Machine
Learning approach.
• To work in the field of Information security and blockchain.
• And many more…
References
• Roy, A. K., Nath, K., Srivastava, G., Gadekallu, T. R., & Lin, J. C. W. (2022).
Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh
Networks. Sensors, 22(5), 1958.
• Roy, A. K., & Khan, A. K. (2020). Privacy preservation with RTT based detection
‐
for wireless mesh networks. IET Information Security, 14(4), 391-400.
• Roy, A. K., & Khan, A. K. (2019). Efficient authentication and key management
scheme for wireless mesh networks. International Journal of Internet Technology
and Secured Transactions, 9(1-2), 184-200.
• Li, C., Nguyen, U.T., Nguyen, H.L., et al.: ‘Efficient authentication for fast
handover in wireless mesh networks’, Comput. Secur., 2013, 37, pp. 124–142.
• Xu, L., He, Y., Chen, X., et al.: ‘Ticket-based handoff authentication for wireless
mesh networks’, Comput. Netw., 2014, 73, pp. 185–194.
• Yang, X., Huang, X., Han, J., et al.: ‘Improved handover authentication and key
pre-distribution for wireless mesh networks’, Concurrency Computa., Pract. Exp.,
2016, 28, (10), pp. 2978–2990.
• Cryptography and Network Security; Principles and Practice, 4,5th
Edition,
William Stallings.
Thank You

More Related Content

PDF
A novel secure handover mechanism in
PPTX
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
PDF
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
PDF
Technique for authenticating network users
PDF
PROTOTYPING A SERIAL NUMBER BASED AUTHENTICATION MODEL FOR A COMPUTER IN A WI...
PDF
PROTOTYPING A SERIAL NUMBER BASED AUTHENTICATION MODEL FOR A COMPUTER IN A WI...
PDF
Prototyping a Serial Number based Authentication Model for a Computer in a Wi...
PDF
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
A novel secure handover mechanism in
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Technique for authenticating network users
PROTOTYPING A SERIAL NUMBER BASED AUTHENTICATION MODEL FOR A COMPUTER IN A WI...
PROTOTYPING A SERIAL NUMBER BASED AUTHENTICATION MODEL FOR A COMPUTER IN A WI...
Prototyping a Serial Number based Authentication Model for a Computer in a Wi...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...

Similar to Network Security its attacks and countersmeasures (20)

PDF
Security Analysis and Improvement for IEEE 802.11i
PDF
Technique for authenticating network users
PPTX
Wireless lan security(10.8)
PDF
Security Technique and Congestion Avoidance in Mesh Network
PDF
Enhancing cryptographic protection, authentication, and authorization in cell...
PPT
wireless mobile security indentity adn management
PPT
security of mobile adn wireless network
PDF
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
PPT
secure_mobile.ppt
PPT
WLAN SECURITY ..........................outline
PPT
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
PDF
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
PPTX
Improved EAP-SRP in Wireless Network Authentication
PDF
M.E Computer Science Network Security Projects
PPT
Wireless hacking septafiansyah
PDF
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
PDF
M.Phil Computer Science Network Security Projects
PDF
M phil-computer-science-network-security-projects
PPTX
WLAN SECURITY BY SAIKIRAN PANJALA
PPTX
Classification and review of security schemes
Security Analysis and Improvement for IEEE 802.11i
Technique for authenticating network users
Wireless lan security(10.8)
Security Technique and Congestion Avoidance in Mesh Network
Enhancing cryptographic protection, authentication, and authorization in cell...
wireless mobile security indentity adn management
security of mobile adn wireless network
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
secure_mobile.ppt
WLAN SECURITY ..........................outline
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
Improved EAP-SRP in Wireless Network Authentication
M.E Computer Science Network Security Projects
Wireless hacking septafiansyah
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
M.Phil Computer Science Network Security Projects
M phil-computer-science-network-security-projects
WLAN SECURITY BY SAIKIRAN PANJALA
Classification and review of security schemes
Ad

Recently uploaded (20)

PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Digital Logic Computer Design lecture notes
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
composite construction of structures.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
additive manufacturing of ss316l using mig welding
PPT
Project quality management in manufacturing
PDF
PPT on Performance Review to get promotions
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Digital Logic Computer Design lecture notes
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
composite construction of structures.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
573137875-Attendance-Management-System-original
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Safety Seminar civil to be ensured for safe working.
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
additive manufacturing of ss316l using mig welding
Project quality management in manufacturing
PPT on Performance Review to get promotions
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Ad

Network Security its attacks and countersmeasures

  • 1. First let us know what is Computer Security vs. Network Security vs. Information Security
  • 2. Simple steps to secure Information over Internet
  • 4. Contents  Wireless Mesh Network (WMN)  Security challenges in WMN  Attacks in WMN  Handover Authentication in WMN  Future scope
  • 5. 5 • WMN is composed of three different network elements  Gateway Routers: which allows access to the wired infrastructure, possibly the Internet or other local networks.  Mesh Routers: also known as APs form the network backbone spanning over wide areas.  Mesh clients: include a wide range of devices like laptops or cell phones, with varying degrees of mobility. WMN Architecture
  • 7. 7 Characteristics of WMN • WMN is dynamically  self-organized,  self-configured,  self-healing,  easy maintenance,  high scalability and  reliable service with the nodes in the network
  • 8. 8 Advantages of WMN  Auto-discovery of nodes and routes  Auto-configuration of network components  Rapid network deployment  Reduced infrastructure and operational costs  Increased network reliability  Easy network maintenance  Robustness  Reliable service coverage, etc.  & many more…
  • 9. 9 Security challenges  Absence of trusted third party in WMNs due to distributed network.  High communication and computational cost to perform security operations.  Efficient key management schemes are required.  Accuracy in detection rate is required.  Providing high security services against both external attack and internal attack in distributed network is must.
  • 10. 10 Types of attacks in WMNs • Eavesdropping • Impersonating • Wormhole Attack • Blackhole Attack • Sleep deprivation Attack • Replay Attack • Sybil Attack • DoS and flooding Attack • and many more…
  • 11. 11 Efficient Authentication Protocol during handover for Wireless Mesh Networks • We proposed a protocol that provides an authentication between the client and MAP along with preserving the integrity of the transfer ticket ϴc , which was not considered in the existing protocols during Login authentication protocol (LAP ) and Handover authentication protocol (HAP). • Our proposed protocol offers efficient authentication during handoff operation when the client roams from its home MAP to foreign MAP. • The experimental results shows that our protocol performs better in terms of latency, communication cost and computational cost compared to the existing protocols.
  • 13. • Types of tickets issued for mutual authentication among mesh entities 1. Client Ticket: It established a trust relationship between User and MAP. • where, • IC = User identity. • IA = TA identity. • Ʈexp = expiry time of TC. • PC = User public key. • SigA = Digital signature of TA to ensure user legality during LAP. } , , , , { exp Sig P I I T A C A C C  
  • 14. 2. MAP Ticket: It established a trust relationship between MAP and User. • where, • IM = MAP identity. • IA = TA identity. • Ʈexp = expiry time of TC. • PC = MAP public key. • SigA = Digital signature of TA to ensure MAP legality during LAP. } , , , , { exp Sig P I I T A M A M M  
  • 15. 15 3. Transfer ticket ϴc is used during handover authentication which allows the roaming client to authenticate with the foreign MAP . Elements within ϴc are shown below- ϴc stores the following elements- • IM: ID number of the MAP who issues this transfer ticket. • IC: ID number of the client who owns this transfer ticket. • IA: ID number of the ticket agent who issued C’s client ticket. • Ʈ exp: expiry date and time of this ticket. • Ni : nonce in an incremented order to prevent from a replay attack. ) , , , , { exp   N I I I i A M c c 
  • 16. Proposed Login Authentication Protocol (LAP) Following are the order of the messages to be exchanged in the protocol between Client and MAP1 authentication. Later both parties compute the message authentication code KMAC = NC1 N ∥ M1. I MAP C C : 1  T MAP M C 1 1 :  ) , ( : 1 1 1 N T E MAP C C P C M  ) , ( : 1 1 1 N N E MAP C M P C C  ) ( : 1 1 N V MAP M K C MAC  ) : ( 1 C V MAP K C MAC 
  • 17. 17 Proposed Handover Authentication Protocol • When client move from home MAP1 to foreign MAPx , handover authentication process took place. Before, handover took place the MAP1 encrypts the MAC key (i.e, KMAC = NC1 N ∥ M1) via Px of its neighboring MAPx. Then, the encrypted MAC key is send to the neighboring MAPx . We assumed public key of MAP's is known to each other.   N V MAP C C x K C MAC , :     N V MAP C x K C MAC : 
  • 18. 18 Experimental Results Table1: Experimental Model Setup Parameters Values Simulator NS 3 Traffic Type CBR Simulation Area 1000X1000m No. of MAP’s 3 No. of Nodes 60 Transmission range of MAP’s 250 meter Transmission range of Clients 100 meters Simulation Time 100 sec Node Placement Randomly
  • 19. 19 Performance Metrics • Authentication delay occurs when a client sends an authentication request to a nearby MAP and the receipt of an acceptance confirmation. It is the time required for the transmission of an authentication request and acceptance confirmation. Authentication delay is therefore, computed as the addition of computation cost and communication cost. • Computation cost, occurs due to delay in processing caused by various security operations. • The communication cost is computed with respect to number of message transmitted between a MAP and a client during Login (LAP) and Handover (HAP) which results in communication delay.
  • 20. 20 Result Analysis • Comparison based on total computational cost during login (LAP) • Comparison based on total computational cost during Handover (HAP) • Comparison based on total communication cost during login (LAP) • Comparison based on total communication cost during Handover (HAP)
  • 21. 21 Table 2 and 3: Performance comparison between proposed protocol and existing protocols
  • 24. Future Scope • To design more efficient authentication protocol by reducing the communication cost and computational cost. • To design an efficient Information Privacy protocol. • To overcome the security issues related to IoT using Machine Learning approach. • To work in the field of Information security and blockchain. • And many more…
  • 25. References • Roy, A. K., Nath, K., Srivastava, G., Gadekallu, T. R., & Lin, J. C. W. (2022). Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks. Sensors, 22(5), 1958. • Roy, A. K., & Khan, A. K. (2020). Privacy preservation with RTT based detection ‐ for wireless mesh networks. IET Information Security, 14(4), 391-400. • Roy, A. K., & Khan, A. K. (2019). Efficient authentication and key management scheme for wireless mesh networks. International Journal of Internet Technology and Secured Transactions, 9(1-2), 184-200. • Li, C., Nguyen, U.T., Nguyen, H.L., et al.: ‘Efficient authentication for fast handover in wireless mesh networks’, Comput. Secur., 2013, 37, pp. 124–142. • Xu, L., He, Y., Chen, X., et al.: ‘Ticket-based handoff authentication for wireless mesh networks’, Comput. Netw., 2014, 73, pp. 185–194. • Yang, X., Huang, X., Han, J., et al.: ‘Improved handover authentication and key pre-distribution for wireless mesh networks’, Concurrency Computa., Pract. Exp., 2016, 28, (10), pp. 2978–2990. • Cryptography and Network Security; Principles and Practice, 4,5th Edition, William Stallings.