SlideShare a Scribd company logo
DYNAMIC KEY REFRESHMENT 
FOR SMART GRID MESH 
NETWORK SECURITY 
Presented by 
K. ANURAMA 
12S11D6502
INTRODUCTION 
Distributed mesh sensor networks provide 
 cost-effective communications for deployment in various 
smart grid domains HAN, NAN 
Unique features of WMN 
self-configuration: where the network can incorporate a 
new node into the existing structure 
ease of installation, scalability, self-healing are also 
amongst other important features 
 A major drawback of mesh networks is that they are more 
exposed to cyber-attacks as data packets have to be relayed on 
a hop-by-hop basis.
WIRELESS MESH NETWORK 
MP: Mesh Point 
MAP: Mesh Access 
Point. 
MG: Mesh 
Gateways 
STA: Stations
INTRODUCTION 
 The security of a mesh network relies on its ability to protect 
the message integrity against malicious attacks. 
 Security protocols used are 
 Simultaneous Authentication of Equals (SAE) 
• Based on a password-authenticated key exchange. 
 Efficient Mesh Security Association (EMSA). 
• Relies on mesh key holders through the use of a mesh 
key hierarchy.
Simultaneous Authentication of Equals (SAE) 
• In SAE the participating pair of MPs can equally initiate the protocol. 
• Prior to the message exchanges, 
– the involved parties will generate the PWE based on the shared password and their MAC 
addresses. 
• The computation is either based on FFC or ECC. 
• After the generation of the PWE(password element), two random 
numbers, namely rand and mask, are produced and used with PWE in 
the following message exchanges. 
• Upon successful SAE authentication, both MP-A and MP-B generate a 
PMK, which is used in the following 4-way handshake to produce 
PTK(Pairwise Transit Key) and GTK(Group Transit Key). 
•
Efficient Mesh Security Association (EMSA) 
• EMSA services are based on providing an efficient 
establishment of link security between two MPs in a wireless 
mesh network through the use of a m 
• The EMSA operation consists of peer link establishment, 
followed by EAP (Extensible Authentication Protocol) and 4- 
way handshaking for the key derivation between every pair of 
mesh nodes in the network 
• After Mesh Key Holder Security Handshake (MKHSH) of the 
EMSA, the authenticated supplicant becomes a mesh 
authenticator.
CYBER-ATTACK 
• Despite of security provided still there are cyber-attacks. 
• An attacker is unable to determine the password through 
eavesdropping, disclosure of the password would allow 
unauthorized nodes to join the network, hence compromising 
the confidentiality and integrity of the network
IMPROVED SECURITY: PERIODIC KEY REFRESHMENT 
STRATEGY 
• The key materials will be updated at regular intervals 
• In the case SAE, are bound to the lifetime of the MSK or 
MPMK. 
• In EMSA, for instance, the lifetimes of the PMK-MKD and 
KDK should not be more than the lifetime of the MSK.
Periodic-key updating scheme for SAE
Periodic-key updating scheme for ESMA
SECURITY-IMPROVED 4-WAY 
HANDSHAKING
DENIAL OF SERVICE(DOS) 
• The PMK key is known 
only to both 
authenticator and the 
supplicant, it can be 
used to derive a trivial 
PTK and then an MIC. 
• In this way, the intruder 
cannot forge Message 1. 
• Therefore the one-message 
DoS attack 
shown in Fig. and 
multiple message DoS 
attack are avoided.
CONCLUSION 
• In this topic the performance of different authentication 
schemes for a multigate mesh networks are evaluated. 
• Then adopt a strategy which is based on periodical 
refreshment of key materials and investigate its effect on 
improving network protection against cyber attacks. 
• The results include a denial of service (DoS) attack by an 
intruder during 4-way handshake message exchanges.
REFERENCES 
1. Gharavi. H; Bin Hu. “Dynamic key refreshment for smart grid mesh 
network security”, Innovative Smart Grid Technologies (ISGT), 2013. 
IEEE Press. 2013 pp.1-6 
2. L. Lazos and M. Krunz, “Selective jamming/dropping insider attacks in 
wireless mesh networks”, IEEE Network, vol. 25, Issue 1, pp. 30-34, 
2011. 
3. H. Gharavi and Bin Hu, “Multigate Communication Network for Smart 
Grid”, THE PROCEEDINGS OF THE IEEE, vol. 99, NO. 6, pp. 1028- 
1045, June 2011. 
4. doc.: IEEE 802.11-06/1470r3: “Efficient Mesh Security and Link 
Establishment”, November 2006.
THANK YOU

More Related Content

What's hot

IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
Camilo do Carmo Pinto
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
Robert Herjavec
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
Robert Herjavec
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
EC-Council
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
Pvrtechnologies Nellore
 
Darktrace Proof of Value
Darktrace Proof of ValueDarktrace Proof of Value
Darktrace Proof of Value
Darktrace
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
Ulf Mattsson
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
Alexander Deucalion
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
Feisal Nanji
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
Cristian Garcia G.
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
Clifton M. Hasegawa & Associates, LLC
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
Vishwas Manral
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
Perforce
 

What's hot (20)

IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Darktrace Proof of Value
Darktrace Proof of ValueDarktrace Proof of Value
Darktrace Proof of Value
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 

Viewers also liked

Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...
Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...
Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...
claytonroot
 
патриотическое воспитание в мбоу сош №1
патриотическое воспитание в мбоу сош №1патриотическое воспитание в мбоу сош №1
патриотическое воспитание в мбоу сош №1
марина маслова
 
взгляд на проект в логике средового подхода
взгляд на проект в логике средового подходавзгляд на проект в логике средового подхода
взгляд на проект в логике средового подходамарина маслова
 
Learn basics
Learn basicsLearn basics
Learn basics
Chad Kealey
 
Florida DS
Florida DSFlorida DS
Florida DS
Sabrina Hughes
 
обл конкур эко_безопасность
обл конкур эко_безопасностьобл конкур эко_безопасность
обл конкур эко_безопасностьмарина маслова
 
SIAA Business Meeting 2016
SIAA Business Meeting 2016SIAA Business Meeting 2016
SIAA Business Meeting 2016
SIAA
 
Designing games for specific contexts (VS-Conference 2012)
Designing games for specific contexts (VS-Conference 2012)Designing games for specific contexts (VS-Conference 2012)
Designing games for specific contexts (VS-Conference 2012)
Carolina Islas Sedano
 
Actividades de los equipos
Actividades de los equiposActividades de los equipos
Actividades de los equipos
oscarreyesnova
 
Leo minor
Leo minorLeo minor
Leo minor
Jon Legin
 
Excel charts lesson 8
Excel charts lesson 8Excel charts lesson 8
Excel charts lesson 8
Tellez16
 
Battle of kurushetra bas relief
Battle of kurushetra bas reliefBattle of kurushetra bas relief
Battle of kurushetra bas reliefashokris
 
THE POWER OF BEING YOU
THE POWER OF BEING YOUTHE POWER OF BEING YOU
THE POWER OF BEING YOU
Mukund Chari
 
Main menu 0913
Main menu 0913Main menu 0913
Main menu 0913
Alexzandria Chill
 
подсчет вариантов с помощью графов
подсчет вариантов с помощью графовподсчет вариантов с помощью графов
подсчет вариантов с помощью графовмарина маслова
 
Technical composition 1 sample
Technical composition 1 sampleTechnical composition 1 sample
Technical composition 1 sample
Ecclesiatica Sebastian
 
En Venta/Renta Casa en condominio a 7 min de Sanata Fe,
En Venta/Renta Casa en condominio a 7 min de Sanata Fe,En Venta/Renta Casa en condominio a 7 min de Sanata Fe,
En Venta/Renta Casa en condominio a 7 min de Sanata Fe,
Inmóbily Bienes Raíces
 
Jurnal p value saru arah (kelompok ganjil) (1)
Jurnal p value saru arah (kelompok ganjil) (1)Jurnal p value saru arah (kelompok ganjil) (1)
Jurnal p value saru arah (kelompok ganjil) (1)
statistikaits
 

Viewers also liked (20)

Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...
Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...
Byline: Harris CapRock Communications - "Global Maritime Communications: Deli...
 
патриотическое воспитание в мбоу сош №1
патриотическое воспитание в мбоу сош №1патриотическое воспитание в мбоу сош №1
патриотическое воспитание в мбоу сош №1
 
взгляд на проект в логике средового подхода
взгляд на проект в логике средового подходавзгляд на проект в логике средового подхода
взгляд на проект в логике средового подхода
 
Learn basics
Learn basicsLearn basics
Learn basics
 
Florida DS
Florida DSFlorida DS
Florida DS
 
обл конкур эко_безопасность
обл конкур эко_безопасностьобл конкур эко_безопасность
обл конкур эко_безопасность
 
Siklus hidrologi
Siklus hidrologiSiklus hidrologi
Siklus hidrologi
 
SIAA Business Meeting 2016
SIAA Business Meeting 2016SIAA Business Meeting 2016
SIAA Business Meeting 2016
 
Designing games for specific contexts (VS-Conference 2012)
Designing games for specific contexts (VS-Conference 2012)Designing games for specific contexts (VS-Conference 2012)
Designing games for specific contexts (VS-Conference 2012)
 
Actividades de los equipos
Actividades de los equiposActividades de los equipos
Actividades de los equipos
 
Leo minor
Leo minorLeo minor
Leo minor
 
Excel charts lesson 8
Excel charts lesson 8Excel charts lesson 8
Excel charts lesson 8
 
Battle of kurushetra bas relief
Battle of kurushetra bas reliefBattle of kurushetra bas relief
Battle of kurushetra bas relief
 
THE POWER OF BEING YOU
THE POWER OF BEING YOUTHE POWER OF BEING YOU
THE POWER OF BEING YOU
 
Main menu 0913
Main menu 0913Main menu 0913
Main menu 0913
 
Latihan tatabahasa 1
Latihan tatabahasa 1Latihan tatabahasa 1
Latihan tatabahasa 1
 
подсчет вариантов с помощью графов
подсчет вариантов с помощью графовподсчет вариантов с помощью графов
подсчет вариантов с помощью графов
 
Technical composition 1 sample
Technical composition 1 sampleTechnical composition 1 sample
Technical composition 1 sample
 
En Venta/Renta Casa en condominio a 7 min de Sanata Fe,
En Venta/Renta Casa en condominio a 7 min de Sanata Fe,En Venta/Renta Casa en condominio a 7 min de Sanata Fe,
En Venta/Renta Casa en condominio a 7 min de Sanata Fe,
 
Jurnal p value saru arah (kelompok ganjil) (1)
Jurnal p value saru arah (kelompok ganjil) (1)Jurnal p value saru arah (kelompok ganjil) (1)
Jurnal p value saru arah (kelompok ganjil) (1)
 

Similar to DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY

Paper copy
Paper   copyPaper   copy
Paper copy
Selva Raj
 
Mobile slide
Mobile slideMobile slide
Mobile slide
Aman singh
 
TAM new report
TAM new reportTAM new report
TAM new report
Suzit Punk
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
 
N010617783
N010617783N010617783
N010617783
IOSR Journals
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
IJMER
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
IOSR Journals
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSN
IJMTST Journal
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
graphhoc
 
B018140813
B018140813B018140813
B018140813
IOSR Journals
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
IJMER
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
ijceronline
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
Selva Raj
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
IJCI JOURNAL
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
IJCNCJournal
 

Similar to DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY (20)

Paper copy
Paper   copyPaper   copy
Paper copy
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
N010617783
N010617783N010617783
N010617783
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSN
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
B018140813
B018140813B018140813
B018140813
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 

Recently uploaded

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 

Recently uploaded (20)

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 

DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY

  • 1. DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY Presented by K. ANURAMA 12S11D6502
  • 2. INTRODUCTION Distributed mesh sensor networks provide  cost-effective communications for deployment in various smart grid domains HAN, NAN Unique features of WMN self-configuration: where the network can incorporate a new node into the existing structure ease of installation, scalability, self-healing are also amongst other important features  A major drawback of mesh networks is that they are more exposed to cyber-attacks as data packets have to be relayed on a hop-by-hop basis.
  • 3. WIRELESS MESH NETWORK MP: Mesh Point MAP: Mesh Access Point. MG: Mesh Gateways STA: Stations
  • 4. INTRODUCTION  The security of a mesh network relies on its ability to protect the message integrity against malicious attacks.  Security protocols used are  Simultaneous Authentication of Equals (SAE) • Based on a password-authenticated key exchange.  Efficient Mesh Security Association (EMSA). • Relies on mesh key holders through the use of a mesh key hierarchy.
  • 5. Simultaneous Authentication of Equals (SAE) • In SAE the participating pair of MPs can equally initiate the protocol. • Prior to the message exchanges, – the involved parties will generate the PWE based on the shared password and their MAC addresses. • The computation is either based on FFC or ECC. • After the generation of the PWE(password element), two random numbers, namely rand and mask, are produced and used with PWE in the following message exchanges. • Upon successful SAE authentication, both MP-A and MP-B generate a PMK, which is used in the following 4-way handshake to produce PTK(Pairwise Transit Key) and GTK(Group Transit Key). •
  • 6. Efficient Mesh Security Association (EMSA) • EMSA services are based on providing an efficient establishment of link security between two MPs in a wireless mesh network through the use of a m • The EMSA operation consists of peer link establishment, followed by EAP (Extensible Authentication Protocol) and 4- way handshaking for the key derivation between every pair of mesh nodes in the network • After Mesh Key Holder Security Handshake (MKHSH) of the EMSA, the authenticated supplicant becomes a mesh authenticator.
  • 7. CYBER-ATTACK • Despite of security provided still there are cyber-attacks. • An attacker is unable to determine the password through eavesdropping, disclosure of the password would allow unauthorized nodes to join the network, hence compromising the confidentiality and integrity of the network
  • 8. IMPROVED SECURITY: PERIODIC KEY REFRESHMENT STRATEGY • The key materials will be updated at regular intervals • In the case SAE, are bound to the lifetime of the MSK or MPMK. • In EMSA, for instance, the lifetimes of the PMK-MKD and KDK should not be more than the lifetime of the MSK.
  • 12. DENIAL OF SERVICE(DOS) • The PMK key is known only to both authenticator and the supplicant, it can be used to derive a trivial PTK and then an MIC. • In this way, the intruder cannot forge Message 1. • Therefore the one-message DoS attack shown in Fig. and multiple message DoS attack are avoided.
  • 13. CONCLUSION • In this topic the performance of different authentication schemes for a multigate mesh networks are evaluated. • Then adopt a strategy which is based on periodical refreshment of key materials and investigate its effect on improving network protection against cyber attacks. • The results include a denial of service (DoS) attack by an intruder during 4-way handshake message exchanges.
  • 14. REFERENCES 1. Gharavi. H; Bin Hu. “Dynamic key refreshment for smart grid mesh network security”, Innovative Smart Grid Technologies (ISGT), 2013. IEEE Press. 2013 pp.1-6 2. L. Lazos and M. Krunz, “Selective jamming/dropping insider attacks in wireless mesh networks”, IEEE Network, vol. 25, Issue 1, pp. 30-34, 2011. 3. H. Gharavi and Bin Hu, “Multigate Communication Network for Smart Grid”, THE PROCEEDINGS OF THE IEEE, vol. 99, NO. 6, pp. 1028- 1045, June 2011. 4. doc.: IEEE 802.11-06/1470r3: “Efficient Mesh Security and Link Establishment”, November 2006.