SlideShare a Scribd company logo
1 of 37
28th TF-Mobility and Network Middleware
Meeting
A4-Mesh: Authentication, Authorization,
Accounting, and Auditing in
Wireless Mesh Networks
Torsten Braun
Communication and Distributed Systems
Institute of Computer Science and Applied Mathematics
Universität Bern
braun@iam.unibe.ch
http://cds.unibe.ch, http://a4-mesh.unibe.ch
Overview
> Project Introduction
> Application Scenario
> Wireless Mesh Network
> Authentication and Authorization
> Accounting
> Conclusions and Outlook
Zürich, 26.06.2012 2
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Project Introduction
Project Partners
> Institut für Informatik und
Angewandte Mathematik
> Geographisches Institut
> Informatikdienste
> Institut d’Informatique
> Service Informatique et
Télématique
Zürich, 26.06.2012 4
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Project Goals and Objectives
> Goal
— Provide low-cost broadband network access to researchers and
students at remote locations
> Objectives
— Cost-efficient network access
— Easily deployable wireless mesh network (WMN)
— Integrated into regular authentication and authorization
infrastructure of Swiss higher education (SWITCHaai)
Zürich, 26.06.2012 5
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Wireless Mesh Networks (WMNs)
Application Scenarios
1. Environmental
Monitoring
2. Campus Network
Extension
Zürich, 26.06.2012 6
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
AAAA for WMNs
> Authentication and Authorization of
1. wireless mesh nodes entering the WMN
2. mobile users accessing the Internet via the WMN
(using SWITCH AAI mechanisms)
> Accounting of traffic generated by
1. wireless mesh nodes and sensors
2. individual mobile users
(for charging and monitoring purposes)
> Auditing functions
— detect inconsistent or erroneous node states
— perform recovery mechanisms or trigger alarms
> Indoor testbed and pilot networks at
1. Crans Montana
2. University campuses at Bern and Neuchâtel
Zürich, 26.06.2012 7
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Application Scenario: MontanAqua
Requirements by Environmental Monitoring
> Support of scientists (hydrology researchers) to collect
sensor data from environmental measurements.
> Scientists use data for generating and verifying models of the
environment.
> Specific measurements to cover certain areas or to collect
specific sensor data are needed.
Zürich, 26.06.2012 9
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
MontanAqua Investigation Area
Sion
Sierre
Tseuzier
storage lake
Plaine Morte glacier
© Weingartner
Zürich, 26.06.2012 10
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Modelling Water Resources
PIHM - Penn State Integrated Hydrologic Model
cc scenarios
2050
WATER
RESOURCES
2010
LAND USE
©
Martina
Kauzlaric
module
GLACIER
module
KARST
Jeannin
ice thickness
0 m 100 m 200 m
©
Matthias
Huss
© Weingartner
PHIM
high data demand for modelling water balance and fluxes
Zürich, 26.06.2012 11
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Weather Stations and Rain Gauges
wind velocity &
direction
air temperature &
relative humidity
solar radiation
rainfall
Zürich, 26.06.2012 12
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Runoff Station
Zürich, 26.06.2012 13
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Soil Measurements
soil moisture sensors tensiometers
lysimeter
Zürich, 26.06.2012 14
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Data Transfer Alternatives
GSM Modem
for weather stations
lost GSM Signal
GPRS Modem
for weather stations
data access only via
server of producer
of weather station
Manually
for rain gauges,
runoff gauges,
weather station
Zürich, 26.06.2012 15
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Serial Port Tunneling
Zürich, 26.06.2012 16
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Benefits for Scientists
> Real-time access on logger (software up-dates, failure checking)
→ reduced frequency of maintenance
> Real-time data access (data verification, monitoring of sensors)
> Data stored on server at University and logger in the field
→ reduction of data loss risk (destruction of sensors/loggers)
→ independent of GSM/GPRS network availability
→ high data-transfer rates (web cam)
Zürich, 26.06.2012 17
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Sensor Readings
Zürich, 26.06.2012 18
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Wireless Mesh Network
MontanAqua Sensors and A4-Mesh Network
webcam
Zürich, 26.06.2012 20
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
A4-Mesh Topology
Sion
Sierre
Zürich, 26.06.2012 21
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Wireless Mesh Node Technology
• IP66 steel enclosure
• 1-2x Alix 3D2 system boards
• 1x Alix 6F2 system board
• 1-4x 801.11n mini PCI cards
• 1x 801.11g mini PCI card
• 1x UMTS mini PCI-Express card
• I2C twin relay
• 2x2 MIMO, 25dBi, dual
polarization panel antennas
• ADAM Linux
• Optimized Link State Routing /
802.11 s
Zürich, 26.06.2012 22
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Deployment of Nodes 4a/b
Zürich, 26.06.2012 23
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Deployment of Nodes 3/7
Zürich, 26.06.2012 24
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Deployment of Node 8
Zürich, 26.06.2012 25
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Authentication and Authorization
Authentication and Authorisation
> Network resources can only be accessed by authenticated
and authorized end users and wireless mesh nodes:
— Wireless mesh nodes entering the WMN
– Mechanism tailored to WMNs supporting easy and secure inter-
organizational access to network resources using a separate
Shibboleth federation.
— Mobile users accessing the Internet via the WMN
– Implementation based on web-based captive portal protected by
SWITCHaai
Zürich, 26.06.2012
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
27
A4-Mesh AAAA Architecture
Zürich, 26.06.2012 28
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Machine Authentication and Authorization
Zürich, 26.06.2012
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
29
Request VPN key
Authentication request with X.509 certificate
Machine
attributes
is authorized ?
authorized
VPN key
Open firewall
VPN tunnel establishment
User Authentication and Authorization
(Captive Portal)
Zürich, 26.06.2012
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
30
Accounting
Accounting
> Traffic monitoring at each mesh node (NetFlow, RFC 3954)
> Central storage of flow statistics at A4-Mesh gateway
> Data enrichment at A4-Mesh gateway (IP, IPNAT, time, UniqueID)
Zürich, 26.06.2012 32
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Accounting Aggregator
Zürich, 26.06.2012 33
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Network Monitoring
> Monitoring agent at each mesh node (Zabbix agent)
> Central server at A4-Mesh gateway (Zabbix server)
Zürich, 26.06.2012 34
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
Conclusions and Outlook
Conclusions
> WMN is valuable for researchers working in the field.
> Implementation of SWITCHaai-based authentication and
authorization for WMN nodes and end users
> Implementation of monitoring functions for WMN nodes
> Outlook: integration and tests
Zürich, 26.06.2012
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
36
a4-mesh.unibe.ch
Zürich, 26.06.2012 37
Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

More Related Content

Viewers also liked

Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system designTom Kaczmarek
 
Security and Integrity
Security and IntegritySecurity and Integrity
Security and Integritylubna19
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product SecuritySoftServe
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
Confidentiality 2
Confidentiality 2Confidentiality 2
Confidentiality 2Linda Sweat
 
Web Security Deployment
Web Security DeploymentWeb Security Deployment
Web Security DeploymentCisco Canada
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAAAhmed Habib
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
 
CONFIDENTIALITY CONTRACT TEMPLATE
CONFIDENTIALITY CONTRACT TEMPLATECONFIDENTIALITY CONTRACT TEMPLATE
CONFIDENTIALITY CONTRACT TEMPLATEGlobal Negotiator
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (18)

Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system design
 
Security and Integrity
Security and IntegritySecurity and Integrity
Security and Integrity
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Web Security
Web SecurityWeb Security
Web Security
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Confidentiality 2
Confidentiality 2Confidentiality 2
Confidentiality 2
 
Web Security Deployment
Web Security DeploymentWeb Security Deployment
Web Security Deployment
 
CCNA Security 06- AAA
CCNA Security 06- AAACCNA Security 06- AAA
CCNA Security 06- AAA
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
CONFIDENTIALITY CONTRACT TEMPLATE
CONFIDENTIALITY CONTRACT TEMPLATECONFIDENTIALITY CONTRACT TEMPLATE
CONFIDENTIALITY CONTRACT TEMPLATE
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks

Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1Aram Mohammed
 
Content-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksContent-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksTorsten Braun, Universität Bern
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?ADVA
 
IRJET- A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...
IRJET-  	  A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...IRJET-  	  A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...
IRJET- A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...IRJET Journal
 
IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET Journal
 
Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Schneider Electric
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
 
Real time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelessReal time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelesseSAT Publishing House
 
Bruckner Electrical Training 24-28 Oct 2016
Bruckner Electrical Training 24-28 Oct 2016Bruckner Electrical Training 24-28 Oct 2016
Bruckner Electrical Training 24-28 Oct 2016Nadeem Zai
 
What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?Safe Swiss Cloud
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksOn Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksTorsten Braun, Universität Bern
 
OneZone: Toronto metro-WiFi network overview
OneZone: Toronto metro-WiFi network overviewOneZone: Toronto metro-WiFi network overview
OneZone: Toronto metro-WiFi network overviewPhil Vlach
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
Call for Papers -International Journal of Wireless & Mobile Networks (IJWMN)...
Call for Papers -International Journal of  Wireless & Mobile Networks (IJWMN)...Call for Papers -International Journal of  Wireless & Mobile Networks (IJWMN)...
Call for Papers -International Journal of Wireless & Mobile Networks (IJWMN)...ijwmn
 
Reliable and Robust Wireless Comm. Solution for Mobile Industrial Applications
Reliable and Robust Wireless Comm. Solution for Mobile Industrial ApplicationsReliable and Robust Wireless Comm. Solution for Mobile Industrial Applications
Reliable and Robust Wireless Comm. Solution for Mobile Industrial ApplicationsAUTOWARE
 

Similar to A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks (20)

"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
"CLOUD INSTRUMENTATION", AN APPLICATION TO CLOUD COMPUTING
 
Easily Deployable A4 Wireless Mesh Networks
Easily Deployable A4 Wireless Mesh NetworksEasily Deployable A4 Wireless Mesh Networks
Easily Deployable A4 Wireless Mesh Networks
 
Information Technology ITM1
Information Technology  ITM1Information Technology  ITM1
Information Technology ITM1
 
Content-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile NetworksContent-Centric Networking in Opportunistic and Mobile Networks
Content-Centric Networking in Opportunistic and Mobile Networks
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?Security in Optical Networks - Useless or Necessary?
Security in Optical Networks - Useless or Necessary?
 
IRJET- A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...
IRJET-  	  A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...IRJET-  	  A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...
IRJET- A Study on: Wireless Sensing Network (WSN) Gas Leakage Detection S...
 
IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security System
 
Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...
 
Real time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelessReal time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wireless
 
Bruckner Electrical Training 24-28 Oct 2016
Bruckner Electrical Training 24-28 Oct 2016Bruckner Electrical Training 24-28 Oct 2016
Bruckner Electrical Training 24-28 Oct 2016
 
What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?What is this DevOps thing and why do I need it?
What is this DevOps thing and why do I need it?
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor NetworksOn Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
On Hardware and Software Approaches to Monitor Wireless Mesh and Sensor Networks
 
OneZone: Toronto metro-WiFi network overview
OneZone: Toronto metro-WiFi network overviewOneZone: Toronto metro-WiFi network overview
OneZone: Toronto metro-WiFi network overview
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Call for Papers -International Journal of Wireless & Mobile Networks (IJWMN)...
Call for Papers -International Journal of  Wireless & Mobile Networks (IJWMN)...Call for Papers -International Journal of  Wireless & Mobile Networks (IJWMN)...
Call for Papers -International Journal of Wireless & Mobile Networks (IJWMN)...
 
Reliable and Robust Wireless Comm. Solution for Mobile Industrial Applications
Reliable and Robust Wireless Comm. Solution for Mobile Industrial ApplicationsReliable and Robust Wireless Comm. Solution for Mobile Industrial Applications
Reliable and Robust Wireless Comm. Solution for Mobile Industrial Applications
 
Profinet Innovations 2018 - Karsten Schneider
Profinet Innovations 2018 - Karsten SchneiderProfinet Innovations 2018 - Karsten Schneider
Profinet Innovations 2018 - Karsten Schneider
 

More from Torsten Braun, Universität Bern

Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksTorsten Braun, Universität Bern
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Torsten Braun, Universität Bern
 
Future Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesFuture Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesTorsten Braun, Universität Bern
 
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Torsten Braun, Universität Bern
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksTorsten Braun, Universität Bern
 
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTopology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTorsten Braun, Universität Bern
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksTorsten Braun, Universität Bern
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...Torsten Braun, Universität Bern
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor NetworksTorsten Braun, Universität Bern
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...Torsten Braun, Universität Bern
 

More from Torsten Braun, Universität Bern (18)

Guaranteed Greedy Routing in Overlay Networks
Guaranteed Greedy Routing in Overlay NetworksGuaranteed Greedy Routing in Overlay Networks
Guaranteed Greedy Routing in Overlay Networks
 
Collaborations with U Coimbra and BME
Collaborations with U Coimbra and BMECollaborations with U Coimbra and BME
Collaborations with U Coimbra and BME
 
Real-World Energy Measurements of a Wireless Mesh Network
Real-World Energy Measurements of a Wireless Mesh NetworkReal-World Energy Measurements of a Wireless Mesh Network
Real-World Energy Measurements of a Wireless Mesh Network
 
Information-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile NetworksInformation-Centric Networking in Mobile Networks
Information-Centric Networking in Mobile Networks
 
Ic0906 wi-uav UAVNet
Ic0906 wi-uav UAVNetIc0906 wi-uav UAVNet
Ic0906 wi-uav UAVNet
 
Die Evolution des Internet
Die Evolution des InternetDie Evolution des Internet
Die Evolution des Internet
 
Information-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile NetworksInformation-Centric Networking in Wireless/Mobile Networks
Information-Centric Networking in Wireless/Mobile Networks
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
 
Future Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud TechnologiesFuture Mobile Telecommunication Networks Using Cloud Technologies
Future Mobile Telecommunication Networks Using Cloud Technologies
 
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
Wmich 2012Reliable and Energy-Efficient Communication in Wireless Sensor Netw...
 
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor NetworksReliable and Energy-Efficient Communication in Wireless Sensor Networks
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
 
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc NetworksTopology Control and Mobility Strategy for UAV Ad-hoc Networks
Topology Control and Mobility Strategy for UAV Ad-hoc Networks
 
Content-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant NetworksContent-Centric Networking in Delay/Disruption-Tolerant Networks
Content-Centric Networking in Delay/Disruption-Tolerant Networks
 
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
A smart Multi-hop hierarchical routing protocol for Efficient VIdeo communica...
 
Research Challenges in Networked Systems
Research Challenges in Networked SystemsResearch Challenges in Networked Systems
Research Challenges in Networked Systems
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...Development and Evaluation of Energy-Efficient and Adaptive Protocolsfor Wi...
Development and Evaluation of Energy-Efficient and Adaptive Protocols for Wi...
 
Soziale Netze – Einsatzmöglichkeiten der Zukunft
Soziale Netze – Einsatzmöglichkeiten der ZukunftSoziale Netze – Einsatzmöglichkeiten der Zukunft
Soziale Netze – Einsatzmöglichkeiten der Zukunft
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks

  • 1. 28th TF-Mobility and Network Middleware Meeting A4-Mesh: Authentication, Authorization, Accounting, and Auditing in Wireless Mesh Networks Torsten Braun Communication and Distributed Systems Institute of Computer Science and Applied Mathematics Universität Bern braun@iam.unibe.ch http://cds.unibe.ch, http://a4-mesh.unibe.ch
  • 2. Overview > Project Introduction > Application Scenario > Wireless Mesh Network > Authentication and Authorization > Accounting > Conclusions and Outlook Zürich, 26.06.2012 2 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 4. Project Partners > Institut für Informatik und Angewandte Mathematik > Geographisches Institut > Informatikdienste > Institut d’Informatique > Service Informatique et Télématique Zürich, 26.06.2012 4 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 5. Project Goals and Objectives > Goal — Provide low-cost broadband network access to researchers and students at remote locations > Objectives — Cost-efficient network access — Easily deployable wireless mesh network (WMN) — Integrated into regular authentication and authorization infrastructure of Swiss higher education (SWITCHaai) Zürich, 26.06.2012 5 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 6. Wireless Mesh Networks (WMNs) Application Scenarios 1. Environmental Monitoring 2. Campus Network Extension Zürich, 26.06.2012 6 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 7. AAAA for WMNs > Authentication and Authorization of 1. wireless mesh nodes entering the WMN 2. mobile users accessing the Internet via the WMN (using SWITCH AAI mechanisms) > Accounting of traffic generated by 1. wireless mesh nodes and sensors 2. individual mobile users (for charging and monitoring purposes) > Auditing functions — detect inconsistent or erroneous node states — perform recovery mechanisms or trigger alarms > Indoor testbed and pilot networks at 1. Crans Montana 2. University campuses at Bern and Neuchâtel Zürich, 26.06.2012 7 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 9. Requirements by Environmental Monitoring > Support of scientists (hydrology researchers) to collect sensor data from environmental measurements. > Scientists use data for generating and verifying models of the environment. > Specific measurements to cover certain areas or to collect specific sensor data are needed. Zürich, 26.06.2012 9 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 10. MontanAqua Investigation Area Sion Sierre Tseuzier storage lake Plaine Morte glacier © Weingartner Zürich, 26.06.2012 10 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 11. Modelling Water Resources PIHM - Penn State Integrated Hydrologic Model cc scenarios 2050 WATER RESOURCES 2010 LAND USE © Martina Kauzlaric module GLACIER module KARST Jeannin ice thickness 0 m 100 m 200 m © Matthias Huss © Weingartner PHIM high data demand for modelling water balance and fluxes Zürich, 26.06.2012 11 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 12. Weather Stations and Rain Gauges wind velocity & direction air temperature & relative humidity solar radiation rainfall Zürich, 26.06.2012 12 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 13. Runoff Station Zürich, 26.06.2012 13 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 14. Soil Measurements soil moisture sensors tensiometers lysimeter Zürich, 26.06.2012 14 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 15. Data Transfer Alternatives GSM Modem for weather stations lost GSM Signal GPRS Modem for weather stations data access only via server of producer of weather station Manually for rain gauges, runoff gauges, weather station Zürich, 26.06.2012 15 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 16. Serial Port Tunneling Zürich, 26.06.2012 16 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 17. Benefits for Scientists > Real-time access on logger (software up-dates, failure checking) → reduced frequency of maintenance > Real-time data access (data verification, monitoring of sensors) > Data stored on server at University and logger in the field → reduction of data loss risk (destruction of sensors/loggers) → independent of GSM/GPRS network availability → high data-transfer rates (web cam) Zürich, 26.06.2012 17 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 18. Sensor Readings Zürich, 26.06.2012 18 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 20. MontanAqua Sensors and A4-Mesh Network webcam Zürich, 26.06.2012 20 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 21. A4-Mesh Topology Sion Sierre Zürich, 26.06.2012 21 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 22. Wireless Mesh Node Technology • IP66 steel enclosure • 1-2x Alix 3D2 system boards • 1x Alix 6F2 system board • 1-4x 801.11n mini PCI cards • 1x 801.11g mini PCI card • 1x UMTS mini PCI-Express card • I2C twin relay • 2x2 MIMO, 25dBi, dual polarization panel antennas • ADAM Linux • Optimized Link State Routing / 802.11 s Zürich, 26.06.2012 22 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 23. Deployment of Nodes 4a/b Zürich, 26.06.2012 23 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 24. Deployment of Nodes 3/7 Zürich, 26.06.2012 24 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 25. Deployment of Node 8 Zürich, 26.06.2012 25 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 27. Authentication and Authorisation > Network resources can only be accessed by authenticated and authorized end users and wireless mesh nodes: — Wireless mesh nodes entering the WMN – Mechanism tailored to WMNs supporting easy and secure inter- organizational access to network resources using a separate Shibboleth federation. — Mobile users accessing the Internet via the WMN – Implementation based on web-based captive portal protected by SWITCHaai Zürich, 26.06.2012 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 27
  • 28. A4-Mesh AAAA Architecture Zürich, 26.06.2012 28 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 29. Machine Authentication and Authorization Zürich, 26.06.2012 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 29 Request VPN key Authentication request with X.509 certificate Machine attributes is authorized ? authorized VPN key Open firewall VPN tunnel establishment
  • 30. User Authentication and Authorization (Captive Portal) Zürich, 26.06.2012 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 30
  • 32. Accounting > Traffic monitoring at each mesh node (NetFlow, RFC 3954) > Central storage of flow statistics at A4-Mesh gateway > Data enrichment at A4-Mesh gateway (IP, IPNAT, time, UniqueID) Zürich, 26.06.2012 32 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 33. Accounting Aggregator Zürich, 26.06.2012 33 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 34. Network Monitoring > Monitoring agent at each mesh node (Zabbix agent) > Central server at A4-Mesh gateway (Zabbix server) Zürich, 26.06.2012 34 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
  • 36. Conclusions > WMN is valuable for researchers working in the field. > Implementation of SWITCHaai-based authentication and authorization for WMN nodes and end users > Implementation of monitoring functions for WMN nodes > Outlook: integration and tests Zürich, 26.06.2012 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks 36
  • 37. a4-mesh.unibe.ch Zürich, 26.06.2012 37 Torsten Braun: A4-Mesh: Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Editor's Notes

  1. location of area under investigation  south faced hill-slope of Bernese Alps between Sion and Sierre
  2. -> complex hydrological model
  3. 2 types of weather stations left -> Austrian producer right -> assembled by GIUB
  4. 2 possibilities:  others do the work: OFEN, MeteoSwiss, WSL, SLF, Universities, Engineering Offices, Privates you measure yourself (if u have no other spear time activities)
  5. 2 possibilities:  others do the work: OFEN, MeteoSwiss, WSL, SLF, Universities, Engineering Offices, Privates you measure yourself (if u have no other spear time activities)