Security and Privacy Issues in Wireless Mesh Networks: a Survey
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Comprehensive Study of Routing Protocols Performance with Topological Changes in the Networks Mohsin Masood Mohamed Abuhelala Prof
A comprehensive study of Routing Protocols Performance with Topological Changes in the Networks Mohsin Masood Mohamed Abuhelala Prof. Ivan Glesk Electronics & Electrical Electronics & Electrical Electronics & Electrical Engineering Department Engineering Department Engineering Department University of Strathclyde University of Strathclyde University of Strathclyde Glasgow, Scotland, UK Glasgow, Scotland, UK Glasgow, Scotland, UK mohsin.masood mohamed.abuhelala ivan.glesk @strath.ac.uk @strath.ac.uk @strath.ac.uk ABSTRACT different topologies and compare routing protocols, but no In the modern communication networks, where increasing work has been considered about the changing user demands and advance applications become a functionality of these routing protocols with the topology challenging task for handling user traffic. Routing with real-time network limitations. such as topological protocols have got a significant role not only to route user change, network congestions, and so on. Hence without data across the network but also to reduce congestion with considering the topology with different network scenarios less complexity. Dynamic routing protocols such as one cannot fully understand and make right comparison OSPF, RIP and EIGRP were introduced to handle among any routing protocols. different networks with various traffic environments. Each This paper will give a comprehensive literature review of of these protocols has its own routing process which each routing protocol. Such as how each protocol (OSPF, makes it different and versatile from the other. The paper RIP or EIGRP) does convergence activity with any change will focus on presenting the routing process of each in the network. Two experiments are conducted that are protocol and will compare its performance with the other. -
Inter-Flow Network Coding for Wireless Mesh Networks
Inter-Flow Network Coding for Wireless Mesh Networks Group 11gr1002 Martin Hundebøll Jeppe Ledet-Pedersen Master Thesis in Networks and Distributed Systems Aalborg University Spring 2011 The Faculty of Engineering and Science Department of Electronic Systems Frederik Bajers Vej 7 Phone: +45 96 35 86 00 http://es.aau.dk Title: Abstract: Inter-Flow Network Coding for This report documents the development and Wireless Mesh Networks implementation of the CATWOMAN (Coding Applied To Wireless On Mobile Ad-hoc Net- Project period: works) scheme for inter-flow network coding in February 1st - May 31st, 2011 wireless mesh networks. Networks that employ network coding differ Project group: from conventional store-and-forward networks, 11gr1002 by allowing intermediate nodes to combine packets from independent flows. Group members: CATWOMAN builds on the B.A.T.M.A.N Martin Hundebøll Adv. mesh routing protocol. The scheme Jeppe Ledet-Pedersen exploits the topology information from the routing layer to automatically identify cod- Supervisor: ing opportunities in the network. The net- Professor Frank H.P. Fitzek work coding scheme is implemented in the B.A.T.M.A.N Adv. Linux kernel module, and Number of copies: 4 can be used without modification to device Number of pages: 65 drivers or higher layer protocols. Appended documents: The protocol is tested in three different topolo- (2 appendices, 1 CD-ROM) gies, that are configured in a test network with Total number of pages: 71 five nodes. The coding scheme shows up to Finished: June 2011 62% increase in maximum achievable through- put for bidirectional UDP flows. The tests reveal an unequal allocation of transmission slots, when the nodes have different link quali- ties, with a preference for the node with the strongest link. -
Models and Algorithms for Physical Cryptanalysis
MODELS AND ALGORITHMS FOR PHYSICAL CRYPTANALYSIS Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨at fur¨ Elektrotechnik und Informationstechnik an der Ruhr-Universit¨at Bochum von Kerstin Lemke-Rust Bochum, Januar 2007 ii Thesis Advisor: Prof. Dr.-Ing. Christof Paar, Ruhr University Bochum, Germany External Referee: Prof. Dr. David Naccache, Ecole´ Normale Sup´erieure, Paris, France Author contact information: [email protected] iii Abstract This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a new evolving discipline in implementation se- curity of information systems. It is based on physically observable and manipulable properties of a cryptographic implementation. Physical observables, such as the power consumption or electromag- netic emanation of a cryptographic device are so-called `side channels'. They contain exploitable information about internal states of an imple- mentation at runtime. Physical effects can also be used for the injec- tion of faults. Fault injection is successful if it recovers internal states by examining the effects of an erroneous state propagating through the computation. This thesis provides a unified framework for side channel and fault cryptanalysis. Its objective is to improve the understanding of physi- cally enabled cryptanalysis and to provide new models and algorithms. A major motivation for this work is that methodical improvements for physical cryptanalysis can also help in developing efficient countermea- sures for securing cryptographic implementations. This work examines differential side channel analysis of boolean and arithmetic operations which are typical primitives in cryptographic algo- rithms. Different characteristics of these operations can support a side channel analysis, even of unknown ciphers. -
Non-Interactive Key Establishment in Wireless Mesh Networks
Chapter 1 Non-Interactive Key Establishment in Wireless Mesh Networks Zhenjiang Li†, J.J. Garcia-Luna-Aceves †∗ zhjli,jj @soe.ucsc.edu { } †Computer Engineering, University of California, Santa Cruz 1156 high street, Santa Cruz, CA 95064, USA Phone:1-831-4595436, Fax: 1-831-4594829 ∗Palo Alto Research Center (PARC) 3333 Coyote Hill Road, Palo Alto, CA 94304, USA Symmetric cryptographic primitives are preferable in designing security protocols for wireless mesh networks (WMNs) because they are computationally affordable for resource- constrained mobile devices forming a WMN. Most proposed key-establishment schemes for symmetric cryptosystem assume services from a centralized authority (either on-line or off- line), or involve the interaction between communicating parties. However, requiring access 1 c Springer, 2005. This is a revision of the work published in the proceedings of AdhocNow’05, LNCS 3738, pp. 164-177, Cancun," Mexico, Oct. 2005. 2This work was supported in part by the Baskin Chair of Computer Engineering at UCSC, the National Science Foundation under Grant CNS-0435522, the U.S. Army Research Office under grant No. W911NF-05-1-0246. Any opinions, findings, and conclusions are those of the authors and do not necessarily reflect the views of the funding agencies. 1 2CHAPTER 1. NON-INTERACTIVE KEY ESTABLISHMENT IN WIRELESS MESH NETWORKS to a centralized authority, or ensuring that correct routing be established before the key agreement is done, is difficult to attain in wireless networks. We present a new non-interactive key agreement and progression (NIKAP) scheme for wireless networks, which does not require an on-line centralized authority, can establish and update pairwise shared keys between any two nodes in a non-interactive manner, is configurable to operate synchronously (S-NIKAP) or asynchronously (A-NIKAP), and has the ability to provide differentiated security services w.r.t. -
Mesh Segmentation Guided by Seed Points
Bulletin of the JSME Vol.9, No.4, 2015 Journal of Advanced Mechanical Design, Systems, and Manufacturing Mesh segmentation guided by seed points Xue JIAO*, Huixin ZHANG* and Tieru WU* *Institute of Mathematics, Jilin University Changchun, Jilin130012, China E-mail: [email protected] Received 3 January 2015 Abstract Segmenting 3D models into meaningful parts is a fundamental problem in computer graphics. In this paper, we present an algorithm which is guided by the mesh vertices for segmenting a mesh into meaningful sub-meshes. First, a candidate set of feature points is selected to highlight the most significant features of the model. After that, a diversity measure is calculated by using Hausdorff distance. The collection of seed points we defined is a subset of the candidate set. The collection of seed points consists of two parts, namely, the basic point and lucky points. By maximizing the diversity measure between the seed set and candidate set, an appropriate seed point is selected. Based on the collection of seed points, the segmentation process can be guided by these seeds. Because humans generally perceive desirable segmentations at concave regions, and the geodesic distance and curvature are well-known noise sensitive. Considering the above factors, in order to partition the target into meaningful parts, we define a distance function between each pair of mesh vertices. This function is formed by arc length, angular distance and curvature-related correction term. We have tested the method developed in this paper with 3D meshes from the Princeton segmentation benchmark. Moreover, our segmentation method also has been compared with other methods. -
Overview of Wireless Mesh Networks
Journal of Communications Vol. 8, No. 9, September 2013 Overview of Wireless Mesh Networks Salah A. Alabady and M. F. M. Salleh School of Electrical and Electronic Engineering, Universiti Sains Malaysia, Seri Ampangan, 14300, Nibong Tebal, Pulau Pinang, Malaysia Email: [email protected]; [email protected] Abstract—Wireless Mesh Networks (WMNs) introduce a new and have a continuous power supply. They normally stay paradigm of wireless broadband Internet access by providing in static and supply connections and services to mesh high data rate service, scalability, and self-healing abilities at clients. reduced cost. Obtaining high throughput for multi-cast applications (e.g. video streaming broadcast) in WMNs is challenging due to the interference and the change of channel quality. To overcome this issue, cross-layer has been proposed to improve the performance of WMNs. Network coding is a powerful coding technique that has been proven to be the very effective in achieving the maximum multi-cast throughput. In addition to achieving the multi-cast throughput, network coding offers other benefits such as load balancing and saves bandwidth consumption. This paper presents a review the fundamental concept types of medium access control (MAC) layer, routing protocols, cross-layer and network coding for wireless mesh networks. Finally, a list of directions for further research is considered. Index Terms—Wireless mesh networks, multi-cast multi- radio multi- channel, medium access control, routing protocols, Wireless Wireless client channel assignment, cross layer, network coding. client Access I. INTRODUCTION point Nowadays, wireless mesh networks (WMNs) are Cellular Networks actively investigating with related applications and Wi-Fi services. -
Differential and Linear Attacks on the Full WIDEA-N Block Ciphers (Under
Differential and Linear Attacks on the full WIDEA-n block ciphers (under weak keys) Jorge Nakahara Jr Universit´eLibre de Bruxelles (ULB), Dept. of Computer Science, Belgium [email protected] Abstract. We report on differential and linear analysis of the full 8.5- round WIDEA-n ciphers for n 2 f4; 8g, under weak-key assumptions. The novelty in our attacks include the use of differential and linear rela- tion patterns that allow to bypass the diffusion provided by MDS codes altogether. Therefore, we can attack only a single IDEA instance out of n copies, effectively using a narrow trail for the propagation of differ- ences and masks across WIDEA-n. In fact, the higher the value of n, the better the attacks become. Our analyses apply both to particular MDS matrices, such as the one used in AES, as well as general MDS matrices. Our attacks exploit fixed points of MDS matrices. We also observed a curious interaction between certain differential/linear patterns and the coefficients of MDS matrices for non-trivial fixed points. This interac- tion may serve as an instructive design criterion for block cipher designs such as WIDEA-n. The authors of WIDEA-n suggested a compression function construction using WIDEA-8 in Davies-Meyer mode. In this setting, the weaknesses identified in this paper can lead to free-start col- lisions and even actual collisions depending on the output transformation of the hash function. Keywords: wide-block cipher, cryptanalysis, WIDEA-n, free-start collisions. 1 Introduction In [6], Junod and Macchetti presented a Wide-block version of IDEA cipher [7] called WIDEA-n, combining n instances of the 8.5-round IDEA cipher joined by an n×n matrix derived from a Maximum Distance Separable (MDS) code. -
Mesh Sensor Networks Bridge Iot's Last Mile
Internet of Things Internet of Things ADVERTISEMENT Fully Converged, Scalable Solution for an Intelligent Edge The solution is optimized for 1U and 2U rack environment, including a new 1U solution for 12x 3.5” hot-swap drive and 2U solutions for 24x 2.5” hot-swap drives. Features include redundant high efficiency power supplies, specially designed optimized cooling, and dual PCIe 3.0, Mini PCIe/mSATA and M.2 expansion slots for superior network and additional storage Mesh Sensor options. Supermicro Embedded Building Block Solutions: Lowest TCO for hyper-scale cloud workloads, storage, communications and security devices. Networks With the enormous growth of data and connected devices in mobile networks, carriers require a fully converged and scalable high-performance solution at the intelligent edge. Supermicro Figure 2: Supermicro® SC216 2U with 24x 2.5" and Supermicro® SC801 1U with 12x 12 3.5"Hot-Swap Drives Bridge is helping carrier providers address these edge convergence needs by introducing a converged yet scalable building block Powered by the Latest Intel® Xeon® Processor D Product solution with the new X10SDV-7TP8F embedded/server Family with up to 16 Cores motherboard design. The high-density hyper-scale Supermicro X10SDV-7TP8F IoT’s Last Mile provides scalable performance when paired the Intel® Xeon® Designed expressly for consolidating infrastructure at the processor D product family. Based on Intel’s 14nm process intelligent edge, this optimized solution offers exciting technology, these processors couple lower power consumption possibilities when paired with the latest Intel® Xeon® processor with the performance of up to 16 cores. The processor family D product family. -
DTC Offers Enhanced MANET Mesh Networking
DOMO TACTICAL COMMUNICATIONS DTC Offers Enhanced MANET Mesh Networking Rob Garth, Product Director, Domo Tactical Communications (DTC) talks to Soldier Modernisation about MANET Mesh Networks and the technology behind them actical MANET Mesh networks have become MANET Mesh Networks are also seamlessly self-healing a key part of the battlefield communications - if a node is removed or a link is broken, for example due Tpicture, most notably in solving the “Dismounted to interference or the introduction of a large obstacle, then Situational Awareness” challenge - delivering media the Mesh will try and re-route via another path. For a dense and data rich applications as well as video to and from cluster of nodes, this can provide significant redundancy and the dismounted soldier. Mesh networks have many resilience. But Garth notes “This is not magic. The resilience advantages over traditional military communications achieved is dependant very much on network topology - if systems, not least in their ease of configuration, ease of for example nodes are arranged in a long line, with each link deployment and in-built resilience. operating at the extreme of its range, and the node in the But as Rob Garth, Product Director at Domo Tactical middle is taken out then connectivity between the two ends Communications (DTC) notes “Mesh networks are resilient of the line will be lost.” and very tolerant to poor deployment, however to get the But when it comes to resilience, not all Mesh networks most out of the Mesh it is important to understand a little are the same - some are reliant on a central “Master Node” about the technology so that the right equipment can be or “Mobility Controller” to disseminate routing and path chosen and sensible deployment decisions can be made.” quality information, which can lead to a single point of MANET Mesh networks share some key characteristics: failure. -
Hybrid Wireless Mesh Network, Worldwide Satellite Communication, and PKI Technology for Small Satellite Network System
Hybrid Wireless Mesh Network, Worldwide Satellite Communication, and PKI Technology for Small Satellite Network System A project present to The Faculty of the Department of Aerospace Engineering San Jose State University in partial fulfillment of the requirements for the degree Master of Science in Aerospace Engineering By Stephen S. Im May 2015 approved by Dr. Periklis Papadopoulos Faculty Advisor 1 ©2015 Stephen S. Im ALL RIGHTS RESERVED 2 An Abstract of Hybrid Wireless Mesh Network, Worldwide Satellite Communication, and PKI Technology for Small Satellite Network System by Stephen S. Im1 San Jose State University May 2015 Small satellites are getting the spotlight in the aerospace industry because this earth- orbiting technology is well-suited for use in military service, space mission research, weather prediction, wireless communication, scientific observation, and education demonstration. Small satellites have advantages of low cost of manufacturing, ease of mass production, low cost of launch system, ability to be launched in groups, and minimal financial failure. Until now, a number of the small satellites have been built and launched for various purposes. As network simplification, operation efficiency, communication accessibility, and high-end data security are the fundamental communication factors for small satellite operations, a standardized space network communication with strong data protection has become a significant technology. This is also highly beneficial for mass manufacture, compatible for cross-platform, and common error detection. And the ground-based network technologies which fulfill Internet-of-Things (IOT) concept, which consist of Wireless Mesh Network (WMN) and data security, are presented in this paper. 1 Graduate Student, San Jose State University, One Washington Square, San Jose, CA. -
Ipsec VPN Solutions Using Next Generation Encryption
IPSec VPN Solutions Using Next Generation Encryption Deployment Guide Version 1.5 Authored by: Ben Rosenblum – CCIE #21084 (R&S, SP) IPSec VPN Solutions Using Deployment Guide Next Generation Encryption THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio- frequency energy. -
The Celeblain of Celeborn and Galadriel
Volume 9 Number 2 Article 5 6-15-1982 The Celeblain of Celeborn and Galadriel Janice Johnson Southern Illinois University Follow this and additional works at: https://dc.swosu.edu/mythlore Part of the Children's and Young Adult Literature Commons Recommended Citation Johnson, Janice (1982) "The Celeblain of Celeborn and Galadriel," Mythlore: A Journal of J.R.R. Tolkien, C.S. Lewis, Charles Williams, and Mythopoeic Literature: Vol. 9 : No. 2 , Article 5. Available at: https://dc.swosu.edu/mythlore/vol9/iss2/5 This Article is brought to you for free and open access by the Mythopoeic Society at SWOSU Digital Commons. It has been accepted for inclusion in Mythlore: A Journal of J.R.R. Tolkien, C.S. Lewis, Charles Williams, and Mythopoeic Literature by an authorized editor of SWOSU Digital Commons. An ADA compliant document is available upon request. For more information, please contact [email protected]. To join the Mythopoeic Society go to: http://www.mythsoc.org/join.htm Mythcon 51: A VIRTUAL “HALFLING” MYTHCON July 31 - August 1, 2021 (Saturday and Sunday) http://www.mythsoc.org/mythcon/mythcon-51.htm Mythcon 52: The Mythic, the Fantastic, and the Alien Albuquerque, New Mexico; July 29 - August 1, 2022 http://www.mythsoc.org/mythcon/mythcon-52.htm Abstract Reviews the history of Galadriel and Celeborn as revealed in unpublished materials as well as The Lord of the Rings, The Silmarillion, Tolkien’s Letters, and Unfinished alesT , and examines variations and inconsistencies. Additional Keywords Tolkien, J.R.R.—Characters—Celeborn; Tolkien, J.R.R.—Characters—Galadriel; Patrick Wynne This article is available in Mythlore: A Journal of J.R.R.