Wireless Network Security Spring 2011

Size: px
Start display at page:

Download "Wireless Network Security Spring 2011"

Transcription

1 Wireless Network Security Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses

2 Announcements Homework #3 is due March 24 Exam in class March 31

3 Agenda Cross-layer attacks and defenses Layering and cross-layer design How attackers plan and execute How defenders design

4 Layering and Cross-Layer Design

5 Layering Networks are complex Layering simplifies network design Layered model: Layer 3 Layer 2 Layer 1 Lower layer provides a service to higher layer Higher layer doesn t care how service is implemented: transparency

6 Layered Operation Node A Application Layer Transport Layer Network Layer Link Layer Physical Layer Router Network Layer Link Layer Physical Layer Node B Application Layer Transport Layer Network Layer Link Layer Physical Layer Physical Medium

7 Pros/Cons of Layered Design Layering Pros Simplified design Layer transparency Modularity Layering Cons Hidden information can help performance Loss of context in wireless networks

8 Layering in Wireless Layering impacts wireless protocols Hiding physical layer upper layers see wired Cannot leverage advantages of wireless Layering is not appropriate for many wireless systems Wired Wireless Application Transport Network Link Physical

9 Broadcast B d AB E C D A F Broadcast Advantage Sender A transmitting to receiver B can reach other nodes at distance less than d AB for free

10 Cross-Layer Design Cross-layer design Sharing info helps performance Transparency lost Design is more challenging Application Transport Network Link Physical

11 Cross-Layer (R)Evolution Cross-layer evolution Incorporate cross-layer information sharing into a layered architecture Layering properties are minimally violated Protocols are still pretty widely usable Cross-layer revolution Design new architecture from the ground up Protocols are highly customized, narrowly usable Application Transport Network Link Physical

12 Ex: Broadcast Routing Minimum energy broadcast routing Design a routing protocol for node A to send a message to all other nodes with the minimum total energy expenditure G B C D A F E

13 Ex: Localization Allow a node A to estimate its location (x A,y A ) using messages and measurements from other nodes A needs to receive messages from B and C A uses physical properties of received signal to measure relative geometry Reported locations and measurements can be used to estimate (x A,y A ) B is at (x B,y B ) C is at (x C,y C ) B A C d AB δ B (x A,y A )? d AC δ C

14 How Attackers Plan and Execute

15 Layered Attacks Layering simplifies attack planning Layered attack model: Layer 3 Layer 2 Attackers can similarly rely on layered transparency, relying on generic services provided by other layers Layer 1

16 Pros/Cons of Attack Layering Layered Attack Pros Simplified planning and execution of attacks Transparency Layered Attack Cons Hidden information could make attack more effective, efficient, etc. Loss of context Modularity

17 Cross-Layer Attacks Cross-layer attacks Sharing information across protocol layers to improve attack performance For any definition of performance Planning and optimizing attacks may be much more challenging Application Transport Network Link Physical

18 Example Collaborating jammers with information about network flow topology and traffic rates can load-balance Source s Dest d Jammer load-balancing

19 Survey More Examples Thursday's survey topic is Cross-layer attack strategies Additional reading If you'd like more examples, I'll give you some references

20 How Defenders Design

21 Layered Defenses for Layered Attacks Layered Attack vs. Layered Defense This is what I consider classical network security Layer n protocols protect against layer n vulnerabilities Little/no protection from cascading attack impacts

22 Layered Defenses for Cross-Layer Attacks Cross-Layer Attack vs. Layered Defense Advanced attacks developed against classical network defenses Most likely, the attackers are going to win At a cost, of course

23 Cross-Layer Defenses for Layered Attacks Layered Attack vs. Cross-Layer Defense Classical attacks applied to advanced networking If well designed, defenses should come out ahead Again, at a cost

24 Cross-Layer Defenses for Cross-Layer Attacks Advanced Attack vs. Advanced Defense Most interesting case where there isn't much work yet How advanced do defenses need to be to keep up with the advanced attacks? Hard question... Can we come up with a general framework to allow a defender to learn and adapt to what it sees? Attacker can do the same thing now we have a game

25 Comparison Layered Attack Cross-Layer Attack Layered Defense Attack elements can target specific protocol performance Attacks are easy to plan, but probably sub-optimal Attacker may be smarter than the network under attack Attack has fairly low cost to optimize, but likely to succeed Cross-Layer Defense Detection of attacks is more likely due to cross-layer impacts Defense is more costly, but likely to succeed More difficult to characterize, optimize, predict, plan, Attack and defense are more costly Red vs. Blue games

26 Next time... Mar 24: Survey cross-layer attacks Mar 29: Survey data aggregation in WSN Mar 31: Exam

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Wireless Sensor Networks, PhD Postdoctoral Researcher DCS Research Group For classroom use only, no unauthorized distribution Wireless sensor networks:

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

LTE Essentials. Thursday, January 17, 2013 at 1:00 PM (ET)

LTE Essentials. Thursday, January 17, 2013 at 1:00 PM (ET) LTE Essentials Thursday, January 17, 2013 at 1:00 PM (ET) Instructor: Annabel Z. Dodd Author of "The Essential Guide to Telecommunications, Fifth Edition Questions for the Instructor or for a Logistics

More information

UNISI Team. UNISI Team - Expertise

UNISI Team. UNISI Team - Expertise Control Alberto Bemporad (prof.) Davide Barcelli (student) Daniele Bernardini (PhD student) Marta Capiluppi (postdoc) Giulio Ripaccioli (PhD student) XXXXX (postdoc) Communications Andrea Abrardo (prof.)

More information

March 20 th Sensor Web Architecture and Protocols

March 20 th Sensor Web Architecture and Protocols March 20 th 2017 Sensor Web Architecture and Protocols Soukaina Filali Boubrahimi Why a energy conservation in WSN is needed? Growing need for sustainable sensor networks Slow progress on battery capacity

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Engineered Resilient Systems DoD Science and Technology Priority

Engineered Resilient Systems DoD Science and Technology Priority Engineered Resilient Systems DoD Science and Technology Priority Mr. Scott Lucero Deputy Director, Strategic Initiatives Office of the Deputy Assistant Secretary of Defense (Systems Engineering) Scott.Lucero@osd.mil

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

200 West Baltimore Street Baltimore, MD TTY/TDD marylandpublicschools.org

200 West Baltimore Street Baltimore, MD TTY/TDD marylandpublicschools.org Karen B. Salmon, Ph.D. State Superintendent of Schools 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD marylandpublicschools.org TO: FROM: Members of the State Board of

More information

Privacy at the communication layer

Privacy at the communication layer Privacy at the communication layer The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability David Chaum 1988 CS-721 Carmela Troncoso http://carmelatroncoso.com/ (borrowed slides

More information

Configuring OSPF. Information About OSPF CHAPTER

Configuring OSPF. Information About OSPF CHAPTER CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013 Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

RF Considerations for Wireless Systems Design. Frank Jimenez Manager, Technical Support & Service

RF Considerations for Wireless Systems Design. Frank Jimenez Manager, Technical Support & Service RF Considerations for Wireless Systems Design Frank Jimenez Manager, Technical Support & Service 1 The Presentation Objective We will cover.. The available wireless spectrum 802.11 technology and the wireless

More information

Spectrum Sharing and Flexible Spectrum Use

Spectrum Sharing and Flexible Spectrum Use Spectrum Sharing and Flexible Spectrum Use Kimmo Kalliola Nokia Research Center FUTURA Workshop 16.8.2004 1 NOKIA FUTURA_WS.PPT / 16-08-2004 / KKa Terminology Outline Drivers and background Current status

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum Wireless replacement for cables in CAN Network Pros and Cons by Derek Sum TABLE OF CONTENT - Introduction - Concept of wireless cable replacement - Wireless CAN cable hardware - Real time performance and

More information

SDR - Based Resilient Wireless Communications

SDR - Based Resilient Wireless Communications SDR - Based Resilient Wireless Communications Item Type text; Electronic Thesis Authors Almoualem, Firas Publisher The University of Arizona. Rights Copyright is held by the author. Digital access to this

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

MILnews. IP-based split-site operation with the R&S M3SR Series4100 HF radios. Offprint from MILnews 12. Electronics for security and defense

MILnews. IP-based split-site operation with the R&S M3SR Series4100 HF radios. Offprint from MILnews 12. Electronics for security and defense MILnews Electronics for security and defense Offprint from MILnews 12 IP-based split-site operation with the R&S M3SR Series4100 HF radios IP-based split-site operation with the R&S M3SR Series4100 HF

More information

Engineering Project Proposals

Engineering Project Proposals Engineering Project Proposals (Wireless sensor networks) Group members Hamdi Roumani Douglas Stamp Patrick Tayao Tyson J Hamilton (cs233017) (cs233199) (cs232039) (cs231144) Contact Information Email:

More information

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing C O R P O R A T E T E C H N O L O Y Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing nformation & Sandrine PASQUALINI Antoine FROT Andreas Iselt Andreas Kirstädter C O R P O R A T

More information

Lecture 21: Links and Signaling

Lecture 21: Links and Signaling Lecture 21: Links and Signaling CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wed 3/15 Lecture 21 Overview Quality of Service Signaling Channel characteristics Types of physical media Modulation

More information

Cognitive Radio: Smart Use of Radio Spectrum

Cognitive Radio: Smart Use of Radio Spectrum Cognitive Radio: Smart Use of Radio Spectrum Miguel López-Benítez Department of Electrical Engineering and Electronics University of Liverpool, United Kingdom M.Lopez-Benitez@liverpool.ac.uk www.lopezbenitez.es,

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

A Wireless Smart Sensor Network for Flood Management Optimization

A Wireless Smart Sensor Network for Flood Management Optimization A Wireless Smart Sensor Network for Flood Management Optimization 1 Hossam Adden Alfarra, 2 Mohammed Hayyan Alsibai Faculty of Engineering Technology, University Malaysia Pahang, 26300, Kuantan, Pahang,

More information

Mobile Security Fall 2015

Mobile Security Fall 2015 Mobile Security Fall 2015 Patrick Tague #8: Location Services 1 Class #8 Location services for mobile phones Cellular localization WiFi localization GPS / GNSS 2 Mobile Location Mobile location has become

More information

The world s first collaborative machine-intelligence competition to overcome spectrum scarcity

The world s first collaborative machine-intelligence competition to overcome spectrum scarcity The world s first collaborative machine-intelligence competition to overcome spectrum scarcity Paul Tilghman Program Manager, DARPA/MTO 8/11/16 1 This slide intentionally left blank 2 This slide intentionally

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Total Points = 27 CSE 123: Computer Networks Homework 3 Solutions Out: 5/11, Due: 5/18 Problems 1. Distance Vector Routing [9 points] For the network shown below, give the global distance vector tables

More information

Self Organizing and Self-Healing Ad-hoc Networks

Self Organizing and Self-Healing Ad-hoc Networks Self Organizing and Self-Healing d-hoc Networks WLN 57- by hip (rig) Elliott, N Technologies ambridge, M, 02138 Presented at WLN 2001 by Jerry urchfiel 1 Example Problem N radios on a terrain Each moving

More information

Lecture 8 Link-State Routing

Lecture 8 Link-State Routing 6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are

More information

Chapter 10 Mobile Communication Systems

Chapter 10 Mobile Communication Systems Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying

More information

An Effective Defensive Node against Jamming Attacks in Sensor Networks

An Effective Defensive Node against Jamming Attacks in Sensor Networks International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor

More information

Introduction to Mesh

Introduction to Mesh Introduction to Mesh ICTP School on Radio-based Computer Networking February 24 th 2005 Tomas B. Krag wire.less.dk What is Mesh? "A mesh network is a network that employs one of two connection arrangements,

More information

The Deeter Group. Wireless Site Survey Tool

The Deeter Group. Wireless Site Survey Tool The Deeter Group Wireless Site Survey Tool Contents Page 1 Introduction... 3 2 Deeter Wireless Sensor System Devices... 4 3 Wireless Site Survey Tool Devices... 4 4 Network Parameters... 4 4.1 LQI... 4

More information

Victor Cid Senior Computer Scientist DIMRC, SIS, NLM

Victor Cid Senior Computer Scientist DIMRC, SIS, NLM Victor Cid Senior Computer Scientist DIMRC, SIS, NLM Patient arrives to Walter Reed NMMC Patient transferred to Suburban voice repot made from WRNMMC radio to Suburban cell phone via wireless bridge 2

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 20 Spring 2012 April 4, 2012 Announcements HW9 due this week HW10 out HW11 and HW12 coming soon! Student presenta)ons HW9 Capture packets using Wireshark

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

History of Communication

History of Communication 1 History of Communication Required reading: Forouzan Ch. 1 Garcia 1.1 and 1.2 CSE 3213, Fall 2015 Instructor: N. Vlajic History of Telecommunications 2 Papyrus 3000 BC http://www.prologprintmedia.co.uk/news-whats-next-in-the-evolution-of-communication

More information

Network Energy Performance of 5G Systems. Dr. Ylva Jading Senior Specialist Ericsson Research

Network Energy Performance of 5G Systems. Dr. Ylva Jading Senior Specialist Ericsson Research Network Energy Performance of 5G Systems Dr. Ylva Jading Senior Specialist Ericsson Research Network Energy Performance Targeting reduced energy consumption Economy Ecology Engineering The big picture

More information

Cooperative Transmission Techniques on Ad Hoc, Multi-Hop Wireless Networks

Cooperative Transmission Techniques on Ad Hoc, Multi-Hop Wireless Networks UNIVERSITY OF PADOVA Cooperative Transmission Techniques on Ad Hoc, Multi-Hop Wireless Networks Student: Cristiano Tapparello Master of Science in Computer Engineering Advisor: Michele Rossi Bio Born in

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

CS649 Sensor Networks IP Lecture 9: Synchronization

CS649 Sensor Networks IP Lecture 9: Synchronization CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization

More information

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 12, 2015 ISSN (online): 2321-0613 Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi

More information

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe BLOCKCHAIN FOR SOCIAL GOOD November 9, 2017 Dr. Cara LaPointe What is the Blockchain for Social Good project? 3 Building a Framework Around Privacy & Ethics 4 Approach Build Community Understand the Challenges

More information

ISSN Vol.06,Issue.09, October-2014, Pages:

ISSN Vol.06,Issue.09, October-2014, Pages: ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute

More information

Alibi framework for identifying reactive jamming nodes in wireless LAN

Alibi framework for identifying reactive jamming nodes in wireless LAN Alibi framework for identifying reactive jamming nodes in wireless LAN Hoang Nguyen University of Illinois at Urbana-Champaign hnguyen@illinois.edu Thadpong Pongthawornkamol University of Illinois at Urbana-Champaign

More information

Alcatel-Lucent 9500 MXC: Microwave Cross-Connect BROADBAND WIRELESS TRANSPORT FOR THE EDGE AND HUBS

Alcatel-Lucent 9500 MXC: Microwave Cross-Connect BROADBAND WIRELESS TRANSPORT FOR THE EDGE AND HUBS Alcatel-Lucent 9500 MXC: Microwave Cross-Connect BROADBAND WIRELESS TRANSPORT FOR THE EDGE AND HUBS OVERVIEW The 9500 MXC is a State-of-the-Art split architecture radio platform aimed at fulfilling the

More information

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Ahmet Onur Durahim, İsmail Fatih Yıldırım, Erkay Savaş and Albert Levi durahim, ismailfatih, erkays, levi@sabanciuniv.edu

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

Modeling Security Decisions as Games

Modeling Security Decisions as Games Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent

More information

Mesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve

Mesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve MOTOROLA TECHNOLOGY POSITION PAPER Mesh Networks Decentralized, self-forming, self-healing networks that achieve unprecedented coverage, throughput, flexibility and cost efficiency. Mesh networks technology

More information

A Performance Study of Deployment Factors in Wireless Mesh

A Performance Study of Deployment Factors in Wireless Mesh A Performance Study of Deployment Factors in Wireless Mesh Networks Joshua Robinson and Edward Knightly Rice University Rice Networks Group networks.rice.edu City-wide Wireless Deployments Many new city-wide

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

Lecture 18: Network Layer Link State and Distance Vector Routing

Lecture 18: Network Layer Link State and Distance Vector Routing Lecture 8: Network Laer Link State and Distance Vector Routing COMP 33, Spring 08 Victoria Manfredi Acknowledgements: materials adapted Computer Networking: A Top Down Approach 7 th edition: 996-06, J.F

More information

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu

MIMO-aware Cooperative Cognitive Radio Networks. Hang Liu MIMO-aware Cooperative Cognitive Radio Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2] Motivation & Relevance

More information

A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel

A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel ABSTRACT PATEL, UMANG SURESHBHAI. A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. (Under the direction of Dr. Rudra Dutta.) Wireless networks are susceptible to radio jamming

More information

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can

More information

VANET. Gilles Guette and Bertrand Ducourthial. IEEE MoVeNet 2007, Pisa. Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne

VANET. Gilles Guette and Bertrand Ducourthial. IEEE MoVeNet 2007, Pisa. Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne 1 1 out + On the Gilles Guette and Bertrand Ducourthial Laboratoire Heudiasyc, UMR CNRS 6599 Université de Technologie de Compiègne IEEE MoVeNet 2007, Pisa Outlines 2 2 out + 1 2 3 : hypotheses vs. impact

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

ECON30011 ENVIRONMENTAL ECONOMICS. Subject Guide

ECON30011 ENVIRONMENTAL ECONOMICS. Subject Guide ECON30011 ENVIRONMENTAL ECONOMICS Semester 2, 2011 Subject Guide Prepared by John Freebairn Department of Economics 1 Introduction Welcome to ECON 30011, Environmental Economics. In this subject we explore

More information

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming

More information

An Adaptive Indoor Positioning Algorithm for ZigBee WSN

An Adaptive Indoor Positioning Algorithm for ZigBee WSN An Adaptive Indoor Positioning Algorithm for ZigBee WSN Tareq Alhmiedat Department of Information Technology Tabuk University Tabuk, Saudi Arabia t.alhmiedat@ut.edu.sa ABSTRACT: The areas of positioning

More information

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety 7th ACM PE-WASUN 2010 Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety Carolina Tripp Barba, Karen Ornelas, Mónica Aguilar Igartua Telematic Engineering Dept. Polytechnic

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Progress on LAA and its relationship to LTE-U and MulteFire. Qualcomm Technologies, Inc. February 22, 2016

Progress on LAA and its relationship to LTE-U and MulteFire. Qualcomm Technologies, Inc. February 22, 2016 Progress on LAA and its relationship to LTE-U and MulteFire Qualcomm Technologies, Inc. February 22, 2016 Making best use of 5 GHz unlicensed band LTE-U/LAA, LWA, MulteFire and will coexist in 5 GHz Enterprises

More information

Physics-Based Modeling In Design & Development for U.S. Defense Virtual Prototyping & Product Development. Jennifer Batson Ab Hashemi

Physics-Based Modeling In Design & Development for U.S. Defense Virtual Prototyping & Product Development. Jennifer Batson Ab Hashemi Physics-Based Modeling In Design & Development for U.S. Defense Virtual Prototyping & Product Development Jennifer Batson Ab Hashemi 1 Outline Innovation & Technology Development Business Imperatives Traditional

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

H04W 4/04, 4/043, 4/046

H04W 4/04, 4/043, 4/046 EUROPEAN PATENT OFFICE U.S. PATENT AND TRADEMARK OFFICE CPC NOTICE OF CHANGES 485 The following classification changes will be effected by this Notice of Changes: Action Subclass Group(s) SCHEME: Symbols

More information

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li Secure Reac)ve Ad Hoc Rou)ng Hongyang Li Proac)ve vs. Reac)ve Rou)ng Proac&ve Reac&ve Build routing tables Know path to destination? Route Find path Route 2 Why Reac)ve Ad Hoc Rou)ng Unstable network condi)ons:

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Closing the loop around Sensor Networks

Closing the loop around Sensor Networks Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley Chess Review May 11, 2005 Berkeley, CA Conceptual Issues Given a certain wireless sensor

More information

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 399-404 International Research Publications House http://www. irphouse.com /ijict.htm Exhaustive

More information

10/17/2011. I have an Air-Card. I have Satellite Internet. Why would I use Wi-Fi? Just for

10/17/2011. I have an Air-Card. I have Satellite Internet. Why would I use Wi-Fi? Just for How much do you use the Internet? Just for e-mail Or. 2011 National HDT Rally How much do you use the Internet? How much do you use the Internet? E-mail Face Book Google Plus Blog reading Blog Writing

More information