Preview

Security in Mobile Networks

Good Essays
Open Document
Open Document
701 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security in Mobile Networks
Security in Mobile Peer To Peer Networks

Group 9
Erik Andersson Mohammad Umer Zia Amir Tirdad

Chalmers University of Technology

Security in Mobile Peer To Peer Networks

Introduction A network that allows two wireless devices to communicate with the help of other wireless devices that lie within range of each other. Challenges Lack of resources The absence of a central node High mobility Different devices and platforms Leads to Key distribution problem Coping with attacks What model to use

Chalmers University of Technology

Security in Mobile Peer To Peer Networks

Self organized networks
Initialization Expansion Mechanism
Secure side channel - Short distance - Line of sight required - Integrity should be there - Confidentiality not required

Chalmers University of Technology

Security in Mobile Peer To Peer Networks

Expansion Mechanism or Friends mechanism (Based on one hop trust) Eric and Umer are friends • They have established a Security Association at initialisation • They faithfully share with each other the Security Associations they have set up with other users

Chalmers University of Technology

Security in Mobile Peer To Peer Networks

a) Activation of Secure Side Channel

i

j

i

j

f

f

b) Mutual friend i f j i f j

c) One hop Friend i j i j

i

j

Secure side Channel Already have Two way SA Established friends( know each other keys) One hop friend

Security in Mobile Peer To Peer Networks

Chalmers University of Technology

Security in Mobile Peer To Peer Networks

Transitivity of Trust

Chalmers University of Technology

Security in Mobile Peer To Peer Networks Speed of security associations establishment
Depends upon
Area size Number of nodes Number of friends Mobility model

Convergence :

∑ r (t ) =
Chalmers University of Technology

i , j ij

e (t ) ⋅ pi j ij ∑

pij

This r(t) is the earliest time at which r(t) = 1

Security in Mobile Peer To Peer

You May Also Find These Documents Helpful

  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    The ____ is the most important part of any network, so usually it is given a higher level of security.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To address the issue of data confidentiality, network will include a domain (EROS) and all stations, and user will be part of the domain. Through the use of active directory (AD), users will be granted access to the organization resources, based on their function and roles in the organization. Each use will be given a network account that will allow them access to the necessary means to perform their job. The wireless configuration will allow employees to connect to EROS-Employee Wi-Fi using two levels of security; MAC filtering and user authentication. Only devices, which physical address has been authorized will have access to the secured employee wireless network. In order to prevent employees from the 4th floor to see the wireless network and attempt to connect to it, EROS SSID will not be broadcast at all. The wireless configuration is part of EROS base image, for laptops, and can be setup on EROS provide mobile devices with a script. There is also a secured EROS Guest Wi-Fi for employees’ personal devices and guests. The wireless configuration is WPA2 and uses advance encryption standard (AES). The access key to the guest wireless will be reset on a weekly basis and user is able to retrieve the updated password from EROS intranet site. The IPsec tunnel configured for the organization offers encryption, data checksum, and user authentication.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Public Key Infrastructure

    • 634 Words
    • 2 Pages

    The PKI is a set of hardware, software, procedures and people for the creation, distribution, storing and management of digital certificates. It also maintains the networking environment of an organization by providing management service which could enable digital signature capabilities. It also enabled the users of unsecure public network for exchanging and private cryptographic key pair in order to obtain and share a trusted authority between the management of an organization. For improving an organization, PKI includes use of digital signatures, certificate validation, and permission management service in order to implement a wide variety of enterprise solution within an organization.…

    • 634 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Hello all, when it comes to designing a wireless network there are four steps to follow the first is the correct deployment scenario like Ad hoc or peer-to-peer, infrastructure, point-to-point and point-to-multipoint remote wireless bridge, Ethernet to wireless bridge, and wireless gate. However, infrastructure is the most commonly used with an access point connected to a wired infrastructure.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Marketing

    • 2844 Words
    • 12 Pages

    will identify the types of gaps that can exist in channel design and how to close them. We will then…

    • 2844 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    War Driving

    • 1481 Words
    • 6 Pages

    With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    The term mobile devices are not limited to cellphones; they include iPads, iPods, Laptops, PDAs and e-Readers. These devices act as a lifeline to the outdoor world, and are frequently used for navigating, social networking, shopping, banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone,” (Certic, 2013). Mobile Technology became widely accepted by most of the world in the early 1980’s and since then, the evolution of technology has shown substantial growth. “Worldwide smartphone sales reached 144.4 million units in the first quarter, a 45% increase year over year, research firm Gartner reported. Tablet shipments jumped 120%, to 17.4 million units worldwide, according to a report from research company IDC,” (Drew, 2012). In 2013, over 80% of the world’s population uses a mobile phone and to date there are more than 6 billion mobile devices in the world. Concerns regarding cancer in relation to frequent use and security risks associated with the ability to protect the user’s information are controversial.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Managing information security needs to have an overall balance. It cannot be just prevention, but it also needs to have detection function to review if prevention properly worked. Furthermore, detecting security incident must respond with a countermeasure to reduce damages. Cyberattack is diversifying and they operate with the aim to obtain information. It will be cost-effective and good management for a company to take the appropriate action of reinforcing IT security.…

    • 803 Words
    • 4 Pages
    Good Essays

Related Topics