SlideShare a Scribd company logo
1 of 12
NTUST - Mobilizing Information Technology Lab
NEW SECURE ROUTING METHOD &
APPLICATIONS FACING MITM ATTACKS
Next Generation Networks and Services (NGNS), 2014
Advisor:Jenq-Shiou Leu
Student:Bing-Syuan Wang
Date:2015/05/12
National Taiwan University of Science and Technology
NTUST - Mobilizing Information Technology Lab
Outline
• Introduction
• Graph theory in computer network
• Algorithm for pathfinder
• Choice of a secure combination of paths to use
• Conclusion
2
NTUST - Mobilizing Information Technology Lab
Introduction
• Majority of solutions proposed till now for security are located at User
Application Level (Anti-Virus, Intrusion detector…).
• Routing is the act of moving information across an Internetwork from a source
to a destination.
• Packet sniffing allows individuals to capture data as it is transmitted over a
network.
• MITM: Main-in-the-middle attack
3
NTUST - Mobilizing Information Technology Lab
Introduction
• Using Graph Theory
• Choose from possible paths given by
pathfinder algorithm, all combinations
that meet a number of criteria such as
safety, speed, buffer size, etc.
4
NTUST - Mobilizing Information Technology Lab
Graph theory in computer network
• 𝐺 = (𝑉, 𝐸) Where 𝑉 is the set of vertices and 𝐸 is the set of edges, formed by
pairs of vertices.
• In this condition every Graph could be represented as a simple Matrix called
adjacency matrix.
• The adjacency matrix of 𝐺 = (𝑉, 𝐸) is a 𝑛 × 𝑛 Matrix 𝐷 = (𝑑𝑖𝑗) where 𝑛 is the
number of nodes in G, and 𝑑𝑖𝑗 represent the weight of each edge.
5
NTUST - Mobilizing Information Technology Lab
Graph theory in computer network
• Go from n1 to n6 we have:
n1 → n2 → n3 → n6
• And
n1 → n2 → n5 → n3 → n6
6
NTUST - Mobilizing Information Technology Lab
Algorithm for pathFinder
• Source = n0
• Destination = n2
7
NTUST - Mobilizing Information Technology Lab
Algorithm for pathFinder
• no impact is foreseen on Routers if the number of hops does not exceed 12
8
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• Source n0 and Destination n8
9
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• The best solution will be to have at minimum two paths (Pi & Pj) with same
weight (wi = wj) and also using different intermediate nodes
• OSPF: Open Shortest Path First
• two paths with the same smallest total weight = 4
n0 → n4 → n8 = 4
n0 → n1 → n2 → n5 → n8 = 4
10
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• When such solution is not possible, then we can consider another option
which is to look for two paths that satisfies the condition
𝑚𝑖 × 𝑤𝑖 = 𝑚𝑗 × 𝑤𝑗
• Again from past example we can consider the solution:
n0 → n1 → n2 → n5 → n8 = 4
n0 → n3 → n6 → n4 → n7 → n8 = 8
• With:
m1= 2 (2 messages on P1, load of 67%)
w1 = 4
m2= 1 (1 messages on P2, load of 33%)
w2 = 8
11
NTUST - Mobilizing Information Technology Lab
Conclusion
• Using Graph Theory, this paper developed a new way of routing that includes
indirectly the notion of security, a simulation was done to confirm that this new
method will not have any major impact on the router performance
• This paper highlighted some conditions to be used in order to chose the most
safer combination of paths.
• Finally, Optimization is still needed in order to be able to handle more nodes in
one AREA, and also to add the possibility to show only most secure paths in
one algorithm.
12

More Related Content

What's hot

Numerical Integral using NNI
Numerical Integral using NNINumerical Integral using NNI
Numerical Integral using NNIFahmeen Mazhar
 
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...EuroIoTa
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
 
The Predictron: End-to-end Learning and Planning
The Predictron: End-to-end Learning and PlanningThe Predictron: End-to-end Learning and Planning
The Predictron: End-to-end Learning and PlanningYoonho Lee
 
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...miyurud
 
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催Preferred Networks
 
An Introduction to Neural Architecture Search
An Introduction to Neural Architecture SearchAn Introduction to Neural Architecture Search
An Introduction to Neural Architecture SearchBill Liu
 
Training machine learning k means 2017
Training machine learning k means 2017Training machine learning k means 2017
Training machine learning k means 2017Iwan Sofana
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionA New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionTELKOMNIKA JOURNAL
 
Unsupervised Learning: Similarities and distance functions for IoT data
Unsupervised Learning: Similarities and distance functions for IoT dataUnsupervised Learning: Similarities and distance functions for IoT data
Unsupervised Learning: Similarities and distance functions for IoT dataGiampaoloCasolla
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information TheoryDarshan Bhatt
 
transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...swathi78
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
 
Using Hopfield Networks for Solving TSP
Using Hopfield Networks for Solving TSPUsing Hopfield Networks for Solving TSP
Using Hopfield Networks for Solving TSPTolga Varol
 
Enterprise Scale Topological Data Analysis Using Spark
Enterprise Scale Topological Data Analysis Using SparkEnterprise Scale Topological Data Analysis Using Spark
Enterprise Scale Topological Data Analysis Using SparkAlpine Data
 
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...jaliyae
 

What's hot (19)

Numerical Integral using NNI
Numerical Integral using NNINumerical Integral using NNI
Numerical Integral using NNI
 
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
 
The Predictron: End-to-end Learning and Planning
The Predictron: End-to-end Learning and PlanningThe Predictron: End-to-end Learning and Planning
The Predictron: End-to-end Learning and Planning
 
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
 
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
 
An Introduction to Neural Architecture Search
An Introduction to Neural Architecture SearchAn Introduction to Neural Architecture Search
An Introduction to Neural Architecture Search
 
Training machine learning k means 2017
Training machine learning k means 2017Training machine learning k means 2017
Training machine learning k means 2017
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionA New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure Transmission
 
Unsupervised Learning: Similarities and distance functions for IoT data
Unsupervised Learning: Similarities and distance functions for IoT dataUnsupervised Learning: Similarities and distance functions for IoT data
Unsupervised Learning: Similarities and distance functions for IoT data
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information Theory
 
transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
 
Using Hopfield Networks for Solving TSP
Using Hopfield Networks for Solving TSPUsing Hopfield Networks for Solving TSP
Using Hopfield Networks for Solving TSP
 
Enterprise Scale Topological Data Analysis Using Spark
Enterprise Scale Topological Data Analysis Using SparkEnterprise Scale Topological Data Analysis Using Spark
Enterprise Scale Topological Data Analysis Using Spark
 
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
 
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...
 
9
99
9
 

Viewers also liked

Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routingAnand Dhouni
 
Dynamic routing under_sec
Dynamic routing under_secDynamic routing under_sec
Dynamic routing under_secsubhash85
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding techniquerajib_
 
static and dynamic routing
static and dynamic routingstatic and dynamic routing
static and dynamic routingRoziq Bahtiar
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static RoutingYaser Rahmati
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routingtmavroidis
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 

Viewers also liked (13)

Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
 
Dynamic routing under_sec
Dynamic routing under_secDynamic routing under_sec
Dynamic routing under_sec
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Dsdv
DsdvDsdv
Dsdv
 
static and dynamic routing
static and dynamic routingstatic and dynamic routing
static and dynamic routing
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Dsdv
DsdvDsdv
Dsdv
 

Similar to Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks

FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...IJCNCJournal
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...IAESIJAI
 
Dijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationDijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationIRJET Journal
 
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...Naoki Shibata
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossipIEEEFINALYEARPROJECTS
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeIJMTST Journal
 
Artificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 NegnevitskyArtificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 Negnevitskylopanath
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithmsaciijournal
 
Dp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalDp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalBikramjit Chowdhury
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSZac Darcy
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
X trepan an extended trepan for
X trepan an extended trepan forX trepan an extended trepan for
X trepan an extended trepan forijaia
 

Similar to Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks (20)

FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
J04401066071
J04401066071J04401066071
J04401066071
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...
 
Dijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationDijkstra Shortest Path Visualization
Dijkstra Shortest Path Visualization
 
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
 
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
Artificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 NegnevitskyArtificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 Negnevitsky
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Dp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalDp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_final
 
F017533540
F017533540F017533540
F017533540
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
X trepan an extended trepan for
X trepan an extended trepan forX trepan an extended trepan for
X trepan an extended trepan for
 

More from Syuan Wang

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to ArduinoSyuan Wang
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Syuan Wang
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Syuan Wang
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemSyuan Wang
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Syuan Wang
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesSyuan Wang
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesSyuan Wang
 

More from Syuan Wang (7)

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to Arduino
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality Interfaces
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks

  • 1. NTUST - Mobilizing Information Technology Lab NEW SECURE ROUTING METHOD & APPLICATIONS FACING MITM ATTACKS Next Generation Networks and Services (NGNS), 2014 Advisor:Jenq-Shiou Leu Student:Bing-Syuan Wang Date:2015/05/12 National Taiwan University of Science and Technology
  • 2. NTUST - Mobilizing Information Technology Lab Outline • Introduction • Graph theory in computer network • Algorithm for pathfinder • Choice of a secure combination of paths to use • Conclusion 2
  • 3. NTUST - Mobilizing Information Technology Lab Introduction • Majority of solutions proposed till now for security are located at User Application Level (Anti-Virus, Intrusion detector…). • Routing is the act of moving information across an Internetwork from a source to a destination. • Packet sniffing allows individuals to capture data as it is transmitted over a network. • MITM: Main-in-the-middle attack 3
  • 4. NTUST - Mobilizing Information Technology Lab Introduction • Using Graph Theory • Choose from possible paths given by pathfinder algorithm, all combinations that meet a number of criteria such as safety, speed, buffer size, etc. 4
  • 5. NTUST - Mobilizing Information Technology Lab Graph theory in computer network • 𝐺 = (𝑉, 𝐸) Where 𝑉 is the set of vertices and 𝐸 is the set of edges, formed by pairs of vertices. • In this condition every Graph could be represented as a simple Matrix called adjacency matrix. • The adjacency matrix of 𝐺 = (𝑉, 𝐸) is a 𝑛 × 𝑛 Matrix 𝐷 = (𝑑𝑖𝑗) where 𝑛 is the number of nodes in G, and 𝑑𝑖𝑗 represent the weight of each edge. 5
  • 6. NTUST - Mobilizing Information Technology Lab Graph theory in computer network • Go from n1 to n6 we have: n1 → n2 → n3 → n6 • And n1 → n2 → n5 → n3 → n6 6
  • 7. NTUST - Mobilizing Information Technology Lab Algorithm for pathFinder • Source = n0 • Destination = n2 7
  • 8. NTUST - Mobilizing Information Technology Lab Algorithm for pathFinder • no impact is foreseen on Routers if the number of hops does not exceed 12 8
  • 9. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • Source n0 and Destination n8 9
  • 10. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • The best solution will be to have at minimum two paths (Pi & Pj) with same weight (wi = wj) and also using different intermediate nodes • OSPF: Open Shortest Path First • two paths with the same smallest total weight = 4 n0 → n4 → n8 = 4 n0 → n1 → n2 → n5 → n8 = 4 10
  • 11. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • When such solution is not possible, then we can consider another option which is to look for two paths that satisfies the condition 𝑚𝑖 × 𝑤𝑖 = 𝑚𝑗 × 𝑤𝑗 • Again from past example we can consider the solution: n0 → n1 → n2 → n5 → n8 = 4 n0 → n3 → n6 → n4 → n7 → n8 = 8 • With: m1= 2 (2 messages on P1, load of 67%) w1 = 4 m2= 1 (1 messages on P2, load of 33%) w2 = 8 11
  • 12. NTUST - Mobilizing Information Technology Lab Conclusion • Using Graph Theory, this paper developed a new way of routing that includes indirectly the notion of security, a simulation was done to confirm that this new method will not have any major impact on the router performance • This paper highlighted some conditions to be used in order to chose the most safer combination of paths. • Finally, Optimization is still needed in order to be able to handle more nodes in one AREA, and also to add the possibility to show only most secure paths in one algorithm. 12

Editor's Notes

  1. or at most between Layer 4 and 7 like: Firewall (Access Control List), IPsec, Transport Layer Security …, when it is also possible to introduce security in the lower layers such as the network layer, where we have the famous router.