Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li
|
|
- Evelyn Henry
- 5 years ago
- Views:
Transcription
1 Secure Reac)ve Ad Hoc Rou)ng Hongyang Li
2 Proac)ve vs. Reac)ve Rou)ng Proac&ve Reac&ve Build routing tables Know path to destination? Route Find path Route 2
3 Why Reac)ve Ad Hoc Rou)ng Unstable network condi)ons: nodes come and go in mobile or vehicular networks. Storage constraint: cannot fit en)re rou)ng table in resource constraint sensor nodes. Re- stabiliza)on may be expensive. 3
4 Dynamic Source Rou)ng (DSR) S S-A S-A-B (S,ID=7) (S,ID=7) (S,ID=7) S A B T (S,ID=7) (S,ID=7) (S,ID=7) S-A-B-T S-A-B-T S-A-B-T 4
5 DSR is not Secure A single compromised node can Pretend to be another node Flood route requests Remove nodes from paths in route requests Modify paths in route requests to create loops Claim any node is a neighbor Two compromised nodes can Short- circuit the route (illustrated later) 6
6 Ariadne Secure Reac)ve Source Rou)ng Building blocks: One- way hash func)on Message Authen)ca)on Code (MAC) TESLA 8
7 One- way Hash Func)on F is a one- way hash func)on if Given X, easy to compute F(X) Given Y, hard to find X such that Y = F(X) 10
8 MAC 11
9 TESLA Goal: efficient source authen)ca)on for mul)cast Problems with past solu)ons: MAC is not safe: any receiver can impersonate the sender Asymmetric cryptography has high overhead Main idea: Use symmetric cryptography. Delay the disclosure of keys. 12
10 TESLA (Simplified) K 1 K 0 = F(K 1 ) sender M MAC(K 1, M ) K 1 attacker K 1 receiver K 0 M MAC(K 1, M ) M ' MAC(K 1, M ') K 1 K 0 = F(K 1 )? 13
11 TESLA (Simplified) sender t s t s + Γ + 2Δ receiver t s + Γ + Δ Assume time error is bounded by, and transmission delay is, what is the earliest time the sender can disclose the key after he sends the data? Δ Γ 14
12 TESLA Key Chain F K 0 K 1... K N 2 F K N 1 F K N K K 0 = F N 2 (K N 2 )? 0 K N 2 Given y, hard to find x s.t. F(x)=y 15
13 TESLA Key Chain What if I do not receive the key from the source? Time K MAC(K, M ) K MAC(K, M ) K K 5 = F 2 (K 7 ) K 0 = F 7 (K 7 )? 16
14 TESLA Divide )me into equal intervals Use one key for each interval Need other mechanism to distribute Requires loosely synchronized )me K 0 17
15 Ariadne: Nota)ons H: one- way hash func)on : shared secret key between S and T K ST : current TESLA key used by A K A K A,0 : the first TESLA key of A MAC(K, M ) : MAC computed on message M using key K 22
16 Ariadne Route Request S A Z T < h S,(),() > h s = MAC(K ST, MSG) K ST Shared secret key between S and T MSG current message < h A,(A),(M A ) > h A = H (A,h s ) M A = MAC(K A, MSG) K A < h Z,(A,Z),(M A, M Z ) > h Z = H (Z,h A ) M Z = MAC(K Z, MSG) Current TESLA Current TESLA key used by A K Z key used by Z T verifies: h Z = H (Z, H (A,h s ))? 23
17 Ariadne Route Reply S A Z T < (M A, M Z ), M T,(K Z,K A ) > < (M A, M Z ), M T,(K Z ) > < (M A, M Z ), M T,() > M T = MAC(K TS, MSG) S verifies: K A? K Z? M A? M Z? M T? 24
18 Ariadne (using MAC) S A Z T < h Z,(A,Z),(M A, M Z ) > TESLA M Z = MAC(K Z, MSG) MAC M Z = MAC(K ZT, MSG) K Z Current TESLA key used by Z K ZT Shared secret key between Z and T 27
19 Ariadne Using TESLA Requires loosely synchronized )me among all nodes. Requires shared secret key between each pair of source and des)na)on. Requires each source to store the first TESLA key of every other node. Requires each node discloses the TESLA key before sending the Route Reply Using MAC Does not require )me synchroniza)on. Requires shared secret key between each pair of nodes 28
20 Ariadne Security Analysis Suppose you compromise a single node Can you pretend to be another node? NO: you need his MAC key shared with the target. Can you claim to be neighbor to all other nodes? NO: you need authen)ca)on from target. Can you flood route requests? YES. Can you drop packets? Sure, but you may lose reputa)on. Can you modify the node list in route request without being detected? NO: you need his TESLA key 29
21 Short- Circuit A]ack against Ariadne S A Z B C Z D T Goal: Convice S that the path S- >A- >Z- >D- >T exists Z a]racts more traffic 30
22 Route Request at First Z S A Z B C Z D T < h A,(A),(M A ) > < H (h A ),(A,Z),(M A,h A ) > (M A, M Z ) 31
23 Route Request at Second Z S A Z B C Z D T < H (C, H (...H (h A ))),(A,Z, B,...,C),(M A,h A, M B,..., M C ) > < H (Z,h A ),(A,Z),(M A, M Z ) > S A Z D T 32
24 Route Reply at Second Z S A Z B C Z D T < (A,Z, D), M T > < (A,Z, B,...,C,Z, D), M T > S A Z D T
25 Route Reply at first Z S A Z B C Z D T < (A,Z, B,...,C,Z, D), M T > < (A,Z, D), M T > S A Z D T 34
26 Discussion Why is the short- circuit a]ack powerful? Any other a]acks that Ariadne cannot completely defend against? How should the source choose from mul)ple paths to the target? Fewest hop- count? Shortest Latency? Is Ariadne Scalable? MAC list too long? 36
27 References Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks. MobiCom 02 Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and Secure Source Authentication for Multicast. NDSS 01 Acs, G.; Buttyan, L.; Vajda, I.;, "Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks," Mobile Computing, IEEE Transactions on, vol.5, no.11, pp , Nov
Secure Ad-Hoc Routing Protocols
Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol
More informationA Blueprint for Civil GPS Navigation Message Authentication
A Blueprint for Civil GPS Navigation Message Authentication Andrew Kerns, Kyle Wesson, and Todd Humphreys Radionavigation Laboratory University of Texas at Austin Applied Research Laboratories University
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationENSC 427: Communica1on Networks
ENSC 427: Communica1on Networks Spring 2014 Final Project Presenta1on Performance of Mobile Ad- Hoc Network Rou9ng Protocols Project website: hbp://www.sfu.ca/~rtariq/proj.html Tariq Rizvi (rtariq@sfu.ca)
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationA Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science
A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationSurvey of MANET based on Routing Protocols
Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing
More informationGeoMAC: Geo-backoff based Co-operative MAC for V2V networks.
GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th
More informationPrinciples of Ad Hoc Networking
Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationMathematical Problems in Networked Embedded Systems
Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous
More informationOverview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network
Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network
More informationTwo Improvements of Random Key Predistribution for Wireless Sensor Networks
Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationPropagating Trust in Ad-hoc Networks for Reliable Routing
Propagating Trust in Ad-hoc Networks for Reliable Routing Asad Amir Pirzada, Amitava Datta and Chris McDonald School of Computer Science & Software Engineering The University of Western Australia Sequence
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationInterleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationCryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationPerformance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationDynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET
Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced
More informationMinimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique
International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationLocali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall
Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage
More informationWireless Mesh Networks
Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationVisualization of Wormholes in Sensor Networks
Visualization of Wormholes in Sensor Networks Weichao Wang Bharat Bhargava wangwc@cs.purdue.edu bb@cs.purdue.edu CERIAS and Department of Computer Sciences Purdue University ABSTRACT Several protocols
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationJamming Attacks with its Various Techniques and AODV in Wireless Networks
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its
More informationRouting Messages in a Network
Routing Messages in a Network Reference : J. Leung, T. Tam and G. Young, 'On-Line Routing of Real-Time Messages,' Journal of Parallel and Distributed Computing, 34, pp. 211-217, 1996. J. Leung, T. Tam,
More informationPrevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods
Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationTRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS
TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad
More informationGeoencryption Using Loran
Geoencryption Using Loran Di Qiu, Sherman Lo, Per Enge, Dan Boneh, Stanford University Ben Peterson, Peterson Integrated Geopositioning BIOGRAPHY Di Qiu is a Ph.D. candidate in Aeronautics and Astronautics
More informationDetection and Prevention of Physical Jamming Attacks in Vehicular Environment
Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,
More informationHeterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks
Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks Shouwen Lai Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial
More informationGAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu
GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science
More informationVP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution
VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution Loukas Lazos, Javier Salido and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS by Lee Kok Thong December 24 Thesis Advisor: Second Reader: Geoffrey Xie Su Wen
More informationSafety Message Power Transmission Control for Vehicular Ad hoc Networks
Journal of Computer Science 6 (10): 1056-1061, 2010 ISSN 1549-3636 2010 Science Publications Safety Message Power Transmission Control for Vehicular Ad hoc Networks 1 Ghassan Samara, 1 Sureswaran Ramadas
More informationRandomized Channel Hopping Scheme for Anti-Jamming Communication
Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,
More informationCSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)
CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms
More informationSimulating AODV and DSDV For Adynamic Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010 219 Simulating AODV and DSDV For Adynamic Wireless Sensor Networks Fasee Ullah, Muhammad Amin and Hamid ul
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationLink Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif
Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute
More informationResource Optimization in Video Transmission Using Manet for Defence
European Journal of Applied Sciences 9 (2): 57-61, 2017 ISSN 2079-2077 IDOSI Publications, 2017 DOI: 10.5829/idosi.ejas.2017.57.61 Resource Optimization in Video Transmission Using Manet for Defence 1
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College
More informationJamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network
Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1 Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University,
More informationEfficient rekeying algorithms for WiMAX networks
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:392 400 Published online 30 July 2009 in Wiley InterScience (www.interscience.wiley.com).124 Efficient rekeying algorithms for WiMAX
More informationEVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS
EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,
More informationMethod for discovering intra-session network coding opportunity in wireless ad hoc networks
32 10 Vol.32 No.10 2011 10 Journal on Communications October 2011 1, 2 2 1 2 1. 210093 2. 210007 AODV AODV TN393 B 1000-436X(2011)10-0092-07 Method for discovering intra-session network coding opportunity
More informationCROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS
CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS Jarmo V. E. Mölsä Communications Laboratory Helsinki University of Technology P.O. Box 3, FI-25 HUT, Finland email: jarmo.molsa@tkk.fi
More informationSensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer
Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions? Today, we look much cuter! And we re usually carefully deployed Radio Power Processor Memory Sensors 2 Distributed (Network)
More informationRepelling Sybil-type attacks in wireless ad hoc systems
Outline Repelling Sybil-type attacks in wireless ad hoc systems Marek Klonowski Michał Koza Mirosław Kutyłowski Institute of Mathematics and Computer Science, Wrocław University of Technology ACISP 2,
More informationAn Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks
1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,
More informationENHANCEMENT OF LINK STABILITY USING RDGR IN VANET
ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET D.Mithila 1, R.Revathy 2, Rozamber Marline 3, P.Sathiyanarayanan 4 4 Assistant professor, Department of Computer Science and Engineering, sathiyanarayanan89@gmail.com.
More informationIntroduction to OSPF. ISP Workshops. Last updated 11 November 2013
Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationSo Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
83 So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue,
More informationScheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks
Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Mar 22, 2011 Class #19 Cross-layer attacks and defenses Announcements Homework #3 is due March 24 Exam in class March 31 Agenda Cross-layer attacks
More informationISSN Vol.06,Issue.09, October-2014, Pages:
ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute
More informationSafeguarding Wireless Service Access
Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech Wireless Service Access Service Access Points Users Wireless Service Access (cont d) Ad Hoc Networking
More informationOpportunistic Routing in Wireless Mesh Networks
Opportunistic Routing in Wireless Mesh Networks Amir arehshoorzadeh amir@ac.upc.edu Llorenç Cerdá-Alabern llorenc@ac.upc.edu Vicent Pla vpla@dcom.upv.es August 31, 2012 Opportunistic Routing in Wireless
More informationSecure Location Verification with Hidden and Mobile Base Stations
Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationOptimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer
Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-
More informationSecure and Privacy-Preserving, Timed Vehicular Communications. Mike Burmester*
1 Secure and Privacy-Preserving, Timed Vehicular Communications Mike Burmester* Department of Computer Science, Florida State University, Tallahassee, FL 32306-4530, U.S.A. Fax: 011-850-6440058, E-mail:
More informationAnti-Jamming: A Study
Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationPerformance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety
7th ACM PE-WASUN 2010 Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety Carolina Tripp Barba, Karen Ornelas, Mónica Aguilar Igartua Telematic Engineering Dept. Polytechnic
More informationHiRLoc: High-resolution Robust Localization for Wireless Sensor Networks
HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,
More informationLecture 8 Link-State Routing
6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationLocalization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering
Localization in WSN Marco Avvenuti Pervasive Computing & Networking Lab. () Dept. of Information Engineering University of Pisa m.avvenuti@iet.unipi.it Introduction Location systems provide a new layer
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationOLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig
OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,
More information