SlideShare a Scribd company logo
Student: Reza Sadeghi
Advisor: Dr. Mazinani
Course: Smartgrid
My email: reza.sadeghi@imamreza.ac.ir
im_rezasadeghi@yahoo.com
November & December 2013
Smart Grid Common Networks
Neighbor Area Network (NAN) Home Area Network (HAN)
Power Generation Power Transmission Grid Power Distribution Grid Power Consumption
Smart
MeterSubstationSubstation Customer
Microgrid
Microgrid
(a) Power System Layer
(b) Communications Layer
Wireless
Backhaul
Base
Station
Control Center
Wired Backhaul
Network
Wide Area Network (WAN)
Smart
Meter
Data Aggregation
Point (DAP)
Electric Vehicle
Solar EnegyWind Enegy
Non-renewable Enegy
Concentrator Smart
Home
Device
2
NAN is first of the war
New houses produce their supply
3
Materials of NANs in
??IEEE802.11s??
MP->
A mesh point (MP) is an IEEE 802.11s entity that mainly acts as a relay
node.
MAP->
A mesh access point (MAP) is an MP but can also work as an access
point
MPP->
A mesh portal (MPP) is a logical point and has a bridging functionality
and connects the mesh network to other networks
STA->
Legacy wireless mobile stations (STA) are connected to an MAP through
generic WLAN protocols.
Thus, configuration of an MAP allows a single entity to logically provide
both mesh functionalities and AP functionalities simultaneously.
4
5
Security in SG in
routing perspective
Security in
NANs
Routing
protocols
Routing in
WMN
Routing
discovery
Routing
maintenance
Data passing
6
HWMN for IEEE 802.11s
7
Most of Mutable filed are
dangerous
8
Attacks on routing
9
Rout discovery attack
10
Routing Loop
11
Rout diversion attack
12
Key Establishment procedure
in IEEE 802.11s
13
SHWMN
14
Markle Tree
15
SHA1
Securing on demand mode
F1 F2
In action!
16
Markle Tree for S->B->C
17
Securing on proactive
18
Securing hybrid mode
Proactive mode
Tree
On-demand
Security analyses?
Flooding/Rout disruption/ Rout
diversion/Routing Loop 19
Performances analysis
20
Analysis
21
IBC-HWMP
IBC(Identity based Cryptosystems)
IBC Algorithm
Encryption
Setup Extract Encrypt Decrypt
Digital signature
Setup Extract Encrypt Decrypt
22
Solve external
nod problems
Solve internal
nods problem
Encryption
23
Digital signature
24
Changes
The digital signature is incorporated into
PREQ and PREP messages by adding two
new fields : IBC-Mac Size (digital signature
size : 1 Byte) and IBC-MAC (digital
signature).
25
Simulation
Software:NS3
The side of the square cell is defined by m
step (100m) parameter. We have used a
UDP traffic, Packet Size=1024 and Packet
Interval=0.1.
Three metrics: Mean delay, control routing
overhead and throughput.
26
Analysis
27
TOP(Type of protection)
Possible attacks in mesh networks
Nodes showing unintended behavior due to hardware or
software failures: problems caused by such nodes should
be solved by fault tolerance mechanisms instead of
security mechanisms. Therefore, we will not consider
such nodes within this work.
External malicious nodes, which are intentionally not
allowed to join the network.
Internal malicious nodes, which legitimately are part of
the network and show egoistic behavior or are
compromised by an attacker. Egoistic behavior, e. g.,
intentionally dropping frames, aims at saving resources or
gaining higher bandwidth. Attacks could be launched by
dropping frames, by corrupting the routine 28
Mainly focus on three attacks
Selective forwarding—With this active attack, an internal
malicious node intentionally drops frames of other nodes that
actually should be forwarded by the malicious node. This attack
may aim at disrupting a certain communication, a specific node,
or just the communication of the wireless network.
Routing Attacks—Incase of routing attacks, an internal
malicious node tries to influence the routing protocol in a way
that incorrect forwarding paths are used. A wormhole attack [6],
for example, aims at establishing a route to a victim node even
if there are shorter routes. This enables gaining information of
specific communications in the network or selectively
forwarding frames. 29
Mainly focus on three attacks
Eavesdropping—If no cryptographic protection is applied within a
wireless network, external and internal malicious nodes are able to
eavesdrop on the traffic. If some protection like Robust Secure
Network (RSN) [2] or IEEE 802.11s security mechanisms is
present,
. External attackers, however, are precluded
from eavesdropping.
30
Concept of TOP
Main idea:
Wireless mesh network can be as secure as
VLAN in Ethernet network
31
VLANs allow for
transport of different
virtual networks over
a single network by
tagging the frames
Structure of TOP
32
TOP mapping
33
Simulation
34
NS2
Ideas evaluation!
1. Insert a hole in Mesh network?
2. Broadcasting data in two ways time of money with
Global broadcasting and …
3. Change from prime Galvani to binary Galvani? ((prime
Galvani has simplest and better performing in software
vs. binary Galvani has better performance in special
hardware due to in our wireless mesh network we
should use prime Galvani))
4. Travel to secure protocol with less process consume
((bilinear map which is subroutine of discreet logarithm
is most effectives strongest algorithm ))
5. Why we create SGN?
6. Find Trojans with HMM and etc.
7. What are NAN protocol and way we use them?
35
In field of creating loop and external nodes work is
finished but the Trojans are alive to kill us and
destroy our world; therefore, we should slaughter
them as soon as possible.
References
1. A survey of routing protocols for smart grid communications written by Nico
Saputro, Kemal Akkaya, Suleyman Uludag
2. Chapter 5: Smart Grid Communications Networks.ppt produced by Quang-
Dung Ho and Tho Le-Ngoc;ECE Dept., McGill University, Montreal, Canada
3. M.S. Islam, Y.J. Yoon, M.A. Hamid, C.S. Hong, A secure hybrid wireless
mesh protocol for 802.11s mesh network,2008
4. T. Gamer, L.Vlker, M.Zitterbart, Differentiated security in wireless mesh
networks, Security and Communication Networks 4 (2011) 257–266.
5. On Securing HWMP using IBC(IEEE_05962921)
6. Dr. Nikoghadam prsentation
7. A New E-HWMP Routing Algorithm in Automatic Meter Reading
Networks written by Li Li, Xiaoguang Hu and Ketai He, 2013
8.www.wikipedia.org
36
END
37

More Related Content

PPT
Security in mobile ad hoc networks
PPT
Attacks in MANET
PDF
Wormhole attack detection algorithms in wireless network coding systems
PPTX
Wsn protocols
PDF
Attacks on mobile ad hoc networks
PPTX
Abdullah Mukhtar ppt
PPT
Flooding attack manet
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Security in mobile ad hoc networks
Attacks in MANET
Wormhole attack detection algorithms in wireless network coding systems
Wsn protocols
Attacks on mobile ad hoc networks
Abdullah Mukhtar ppt
Flooding attack manet
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks

What's hot (20)

PPTX
Protocol manet
PPTX
Grayhole
PDF
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
PPTX
Threats in wireless sensor networks
PPTX
NetSim Webinar on Network Attacks and Detection
PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
PDF
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
PDF
Blackhole attack in Manet
PDF
“Reducing packet loss in manet”
PDF
International Journal of Engineering Research and Development
PPTX
Presentation1
PDF
Lt2520382043
PPTX
Routing Protocols in WSN
PDF
Thesis on Mobile Ad-hoc Network (MANET)
PPTX
Blackhole Attck detection in AODV Protocol
PDF
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
PDF
Network coding combined with onion routing for anonymous and secure communica...
PDF
Wormhole attack detection algorithms
PPTX
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Protocol manet
Grayhole
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Threats in wireless sensor networks
NetSim Webinar on Network Attacks and Detection
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
Blackhole attack in Manet
“Reducing packet loss in manet”
International Journal of Engineering Research and Development
Presentation1
Lt2520382043
Routing Protocols in WSN
Thesis on Mobile Ad-hoc Network (MANET)
Blackhole Attck detection in AODV Protocol
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
Network coding combined with onion routing for anonymous and secure communica...
Wormhole attack detection algorithms
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Ad

Viewers also liked (18)

PPTX
Oracle log miner
PPTX
Web navigation based on markov and anthology
PPTX
Modeling, Simulation and Analysis of Fuzzy Systems in Mat lab
PDF
Invitation for master thesis defence
PDF
Smart Nodes and Automation Modes for Energy Routing
PPTX
Integrating the Grid of the Future
PDF
Global Markets, Global Standards
PDF
Sgcp13cochrane
PPTX
Protégé
PPTX
A review on typing on flat glass
PPTX
Rpl dodag
PPTX
Rpl:Routing Protocol for Low-Power and Lossy Networks
PPTX
SMART METER ppt
PPTX
Routing protocols in smart grids
PPTX
Smart metering infrastructure Architecture and analytics
PPTX
Smart energy meter (Updated)
PPTX
Smart Grid _final e
PPTX
Wireless Meter Bus
Oracle log miner
Web navigation based on markov and anthology
Modeling, Simulation and Analysis of Fuzzy Systems in Mat lab
Invitation for master thesis defence
Smart Nodes and Automation Modes for Energy Routing
Integrating the Grid of the Future
Global Markets, Global Standards
Sgcp13cochrane
Protégé
A review on typing on flat glass
Rpl dodag
Rpl:Routing Protocol for Low-Power and Lossy Networks
SMART METER ppt
Routing protocols in smart grids
Smart metering infrastructure Architecture and analytics
Smart energy meter (Updated)
Smart Grid _final e
Wireless Meter Bus
Ad

Similar to Secure routing for wireless NANs (20)

PDF
The International Journal of Engineering and Science (The IJES)
PDF
PDF
N0363079085
PDF
Dr2645024509
PDF
An intrusion detection system for detecting malicious nodes in manet using tr...
PDF
Different Prediction Methods For Route Recovery In MANET
PDF
A New Approach for Improving Performance of Intrusion Detection System over M...
PDF
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
PDF
Iss 2
PDF
PDF
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
PDF
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
PDF
A dynamic approach for improving performance of intrusion detection system ov...
PDF
Injection of Attacks in MANETs
PDF
E0432933
PDF
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
PDF
A Survey on Secured Routing In AD HOC Networks for Various Attacks
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
H017615563
PDF
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...
The International Journal of Engineering and Science (The IJES)
N0363079085
Dr2645024509
An intrusion detection system for detecting malicious nodes in manet using tr...
Different Prediction Methods For Route Recovery In MANET
A New Approach for Improving Performance of Intrusion Detection System over M...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Iss 2
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
A dynamic approach for improving performance of intrusion detection system ov...
Injection of Attacks in MANETs
E0432933
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
A Survey on Secured Routing In AD HOC Networks for Various Attacks
International Journal of Computational Engineering Research(IJCER)
H017615563
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...

More from Reza Sadeghi (11)

PPTX
Predicting Subjective Sleep Quality Using Objective Measurements in Older Adults
PPTX
Sleep quality prediction in caregivers using physiological signals
PPTX
A review on early hospital mortality prediction using vital signals
PPTX
A review on Analyzing Multiple Medical Corpora Using Word Embedding
PPTX
Chase presentation
PPTX
Early hospital mortality prediction using vital signals
PPTX
Early hospital mortality prediction of intensive care unit patients using an ...
PPTX
A review on Exploiting experts’ knowledge for structure learning of bayesian ...
PPTX
Signal processing of heart signals
PDF
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
PPTX
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Predicting Subjective Sleep Quality Using Objective Measurements in Older Adults
Sleep quality prediction in caregivers using physiological signals
A review on early hospital mortality prediction using vital signals
A review on Analyzing Multiple Medical Corpora Using Word Embedding
Chase presentation
Early hospital mortality prediction using vital signals
Early hospital mortality prediction of intensive care unit patients using an ...
A review on Exploiting experts’ knowledge for structure learning of bayesian ...
Signal processing of heart signals
Strengthening support vector classifiers based on fuzzy logic and evolutionar...
Strengthening support vector classifiers based on fuzzy logic and evolutionar...

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Business Ethics Teaching Materials for college
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Basic Mud Logging Guide for educational purpose
PDF
RMMM.pdf make it easy to upload and study
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
01-Introduction-to-Information-Management.pdf
Business Ethics Teaching Materials for college
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Anesthesia in Laparoscopic Surgery in India
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Basic Mud Logging Guide for educational purpose
RMMM.pdf make it easy to upload and study
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf

Secure routing for wireless NANs

  • 1. Student: Reza Sadeghi Advisor: Dr. Mazinani Course: Smartgrid My email: reza.sadeghi@imamreza.ac.ir im_rezasadeghi@yahoo.com November & December 2013
  • 2. Smart Grid Common Networks Neighbor Area Network (NAN) Home Area Network (HAN) Power Generation Power Transmission Grid Power Distribution Grid Power Consumption Smart MeterSubstationSubstation Customer Microgrid Microgrid (a) Power System Layer (b) Communications Layer Wireless Backhaul Base Station Control Center Wired Backhaul Network Wide Area Network (WAN) Smart Meter Data Aggregation Point (DAP) Electric Vehicle Solar EnegyWind Enegy Non-renewable Enegy Concentrator Smart Home Device 2
  • 3. NAN is first of the war New houses produce their supply 3
  • 4. Materials of NANs in ??IEEE802.11s?? MP-> A mesh point (MP) is an IEEE 802.11s entity that mainly acts as a relay node. MAP-> A mesh access point (MAP) is an MP but can also work as an access point MPP-> A mesh portal (MPP) is a logical point and has a bridging functionality and connects the mesh network to other networks STA-> Legacy wireless mobile stations (STA) are connected to an MAP through generic WLAN protocols. Thus, configuration of an MAP allows a single entity to logically provide both mesh functionalities and AP functionalities simultaneously. 4
  • 5. 5
  • 6. Security in SG in routing perspective Security in NANs Routing protocols Routing in WMN Routing discovery Routing maintenance Data passing 6
  • 7. HWMN for IEEE 802.11s 7
  • 8. Most of Mutable filed are dangerous 8
  • 16. Securing on demand mode F1 F2 In action! 16
  • 17. Markle Tree for S->B->C 17
  • 19. Securing hybrid mode Proactive mode Tree On-demand Security analyses? Flooding/Rout disruption/ Rout diversion/Routing Loop 19
  • 22. IBC-HWMP IBC(Identity based Cryptosystems) IBC Algorithm Encryption Setup Extract Encrypt Decrypt Digital signature Setup Extract Encrypt Decrypt 22 Solve external nod problems Solve internal nods problem
  • 25. Changes The digital signature is incorporated into PREQ and PREP messages by adding two new fields : IBC-Mac Size (digital signature size : 1 Byte) and IBC-MAC (digital signature). 25
  • 26. Simulation Software:NS3 The side of the square cell is defined by m step (100m) parameter. We have used a UDP traffic, Packet Size=1024 and Packet Interval=0.1. Three metrics: Mean delay, control routing overhead and throughput. 26
  • 28. TOP(Type of protection) Possible attacks in mesh networks Nodes showing unintended behavior due to hardware or software failures: problems caused by such nodes should be solved by fault tolerance mechanisms instead of security mechanisms. Therefore, we will not consider such nodes within this work. External malicious nodes, which are intentionally not allowed to join the network. Internal malicious nodes, which legitimately are part of the network and show egoistic behavior or are compromised by an attacker. Egoistic behavior, e. g., intentionally dropping frames, aims at saving resources or gaining higher bandwidth. Attacks could be launched by dropping frames, by corrupting the routine 28
  • 29. Mainly focus on three attacks Selective forwarding—With this active attack, an internal malicious node intentionally drops frames of other nodes that actually should be forwarded by the malicious node. This attack may aim at disrupting a certain communication, a specific node, or just the communication of the wireless network. Routing Attacks—Incase of routing attacks, an internal malicious node tries to influence the routing protocol in a way that incorrect forwarding paths are used. A wormhole attack [6], for example, aims at establishing a route to a victim node even if there are shorter routes. This enables gaining information of specific communications in the network or selectively forwarding frames. 29
  • 30. Mainly focus on three attacks Eavesdropping—If no cryptographic protection is applied within a wireless network, external and internal malicious nodes are able to eavesdrop on the traffic. If some protection like Robust Secure Network (RSN) [2] or IEEE 802.11s security mechanisms is present, . External attackers, however, are precluded from eavesdropping. 30
  • 31. Concept of TOP Main idea: Wireless mesh network can be as secure as VLAN in Ethernet network 31 VLANs allow for transport of different virtual networks over a single network by tagging the frames
  • 35. Ideas evaluation! 1. Insert a hole in Mesh network? 2. Broadcasting data in two ways time of money with Global broadcasting and … 3. Change from prime Galvani to binary Galvani? ((prime Galvani has simplest and better performing in software vs. binary Galvani has better performance in special hardware due to in our wireless mesh network we should use prime Galvani)) 4. Travel to secure protocol with less process consume ((bilinear map which is subroutine of discreet logarithm is most effectives strongest algorithm )) 5. Why we create SGN? 6. Find Trojans with HMM and etc. 7. What are NAN protocol and way we use them? 35 In field of creating loop and external nodes work is finished but the Trojans are alive to kill us and destroy our world; therefore, we should slaughter them as soon as possible.
  • 36. References 1. A survey of routing protocols for smart grid communications written by Nico Saputro, Kemal Akkaya, Suleyman Uludag 2. Chapter 5: Smart Grid Communications Networks.ppt produced by Quang- Dung Ho and Tho Le-Ngoc;ECE Dept., McGill University, Montreal, Canada 3. M.S. Islam, Y.J. Yoon, M.A. Hamid, C.S. Hong, A secure hybrid wireless mesh protocol for 802.11s mesh network,2008 4. T. Gamer, L.Vlker, M.Zitterbart, Differentiated security in wireless mesh networks, Security and Communication Networks 4 (2011) 257–266. 5. On Securing HWMP using IBC(IEEE_05962921) 6. Dr. Nikoghadam prsentation 7. A New E-HWMP Routing Algorithm in Automatic Meter Reading Networks written by Li Li, Xiaoguang Hu and Ketai He, 2013 8.www.wikipedia.org 36

Editor's Notes

  • #4: Pic comes from BBC movies