Security protocol design against malicious attacks in neighborhood area network in smart grid

In smart grid, the wireless mesh network (WMN) is an essential technique to connect mesh points in neighborhood area network (NAN), which is based on the wireless local area network (WLAN) and Ad hoc network. WMN not only inherits the merits from both of them, but also has its own feature, includ...

Full description

Saved in:
Bibliographic Details
Main Author: Li, Xiaochen
Other Authors: School of Electrical and Electronic Engineering
Format: Theses and Dissertations
Language:English
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/10356/65887
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-65887
record_format dspace
spelling sg-ntu-dr.10356-658872023-07-04T15:24:41Z Security protocol design against malicious attacks in neighborhood area network in smart grid Li, Xiaochen School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering In smart grid, the wireless mesh network (WMN) is an essential technique to connect mesh points in neighborhood area network (NAN), which is based on the wireless local area network (WLAN) and Ad hoc network. WMN not only inherits the merits from both of them, but also has its own feature, including wider coverage, broader bandwidth, better scalability, etc. It is attractive to suppliers and users that WMN supports wireless broadband services with low investment. However, despite its causal deployment and easy operation, the inherent security issues in WMN is increasingly drawing wide attention of experts and users. Without guarantee of safety, the value of this network will extremely decrease. In wireless mesh network, each party of the connection is supposed to have an authentication process to make sure the authenticity of each other. To ensure the security, dynamic key refreshment and 4-way handshake are used. Based on original 4-way handshake protocol standard, Mr. Bin Hu and Mr. Hamid Gharavi proposed the Merkle-Tree Based Handshaking Scheme (MTBH) that can overcome most vulnerabilities found in 4-way handshake. However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. Based on this analysis, I suggest some modification for the improved 4-way handshake protocol and purpose the Bilateral HMAC Based Protection Scheme (BHBP) to make it feasible and able to prevent DoS attack and replay attack more effectively and efficiently. All of my analysis, comparison and verification are based on simulator named Process Analysis Toolkit (PAT) as well as the logical derivation using BAN Logic. Master of Science (Communications Engineering) 2016-01-11T02:30:00Z 2016-01-11T02:30:00Z 2016 Thesis http://hdl.handle.net/10356/65887 en 108 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Li, Xiaochen
Security protocol design against malicious attacks in neighborhood area network in smart grid
description In smart grid, the wireless mesh network (WMN) is an essential technique to connect mesh points in neighborhood area network (NAN), which is based on the wireless local area network (WLAN) and Ad hoc network. WMN not only inherits the merits from both of them, but also has its own feature, including wider coverage, broader bandwidth, better scalability, etc. It is attractive to suppliers and users that WMN supports wireless broadband services with low investment. However, despite its causal deployment and easy operation, the inherent security issues in WMN is increasingly drawing wide attention of experts and users. Without guarantee of safety, the value of this network will extremely decrease. In wireless mesh network, each party of the connection is supposed to have an authentication process to make sure the authenticity of each other. To ensure the security, dynamic key refreshment and 4-way handshake are used. Based on original 4-way handshake protocol standard, Mr. Bin Hu and Mr. Hamid Gharavi proposed the Merkle-Tree Based Handshaking Scheme (MTBH) that can overcome most vulnerabilities found in 4-way handshake. However, the new protocol still has the vital problem when it is faced with the DoS attack and replay attack. In this project, I analyzes the threats and attacks in wireless mesh network together with the improved 4-way handshake protocol. Based on this analysis, I suggest some modification for the improved 4-way handshake protocol and purpose the Bilateral HMAC Based Protection Scheme (BHBP) to make it feasible and able to prevent DoS attack and replay attack more effectively and efficiently. All of my analysis, comparison and verification are based on simulator named Process Analysis Toolkit (PAT) as well as the logical derivation using BAN Logic.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Li, Xiaochen
format Theses and Dissertations
author Li, Xiaochen
author_sort Li, Xiaochen
title Security protocol design against malicious attacks in neighborhood area network in smart grid
title_short Security protocol design against malicious attacks in neighborhood area network in smart grid
title_full Security protocol design against malicious attacks in neighborhood area network in smart grid
title_fullStr Security protocol design against malicious attacks in neighborhood area network in smart grid
title_full_unstemmed Security protocol design against malicious attacks in neighborhood area network in smart grid
title_sort security protocol design against malicious attacks in neighborhood area network in smart grid
publishDate 2016
url http://hdl.handle.net/10356/65887
_version_ 1772828600978898944