hybrid stealthy networks - paper presentation

17
Written by Durresi, Paruchuri and Barolli 2008

Upload: ddrager

Post on 18-Jul-2015

731 views

Category:

Technology


2 download

TRANSCRIPT

Written by Durresi, Paruchuri and Barolli

2008

Why?

David Drager - CSE 603 Spring 2009 2

Battlefield 2Screenshot

Fighting with a large army under your command is nowise different from fighting with a small one: it is merely a question of instituting signs and signals.- Sun Tzu, The Art of War

The Challenge

Wireless Adhoc Networks have many military uses

Traditional platforms (mica2, micaz) are not secure

How do we fix these issues?

David Drager - CSE 603 Spring 2009 3

Overview

What problems does this paper address?

The objective is to make a secure ad hoc wireless network.

David Drager - CSE 603 Spring 2009 4

Related Work Protocols for directional antennas – Energy savings

Optical networks – Last mile fix?

Previous work does not focus on security aspect but on performance

David Drager - CSE 603 Spring 2009 5

Antenna Design Mica2/Micaz platform – omnidirectional dipole

antenna.

These radiate in a doughnut shape pattern

David Drager - CSE 603 Spring 2009 6

Source: Antennatheory.com

Directional Antennas

Patch Antenna

Horn Antenna

Dish Antenna

David Drager - CSE 603 Spring 2009 7

Beamwidth How wide of an area the signal can be received

θ = Angle of radiation

David Drager - CSE 603 Spring 2009 8

Propagation Transmitted power decays as R-a

a varies between 2 & 4 depending on the medium

Received Power:

Gain of the transmitter:

David Drager - CSE 603 Spring 2009 9

Network Architecture Hybrid means that we will have both wireless and

optical connection

Optical: means that we will need to lay fiber.

Pros: Fast, latency free, secure; Cons: Hard to deploy

“AP” – Access Point

Wireless: Steerable, Assume has GPS to locate

“MN” – Mobile Node

Red Zones: Enemy listeners or even jammers

David Drager - CSE 603 Spring 2009 10

Network Architecture

David Drager - CSE 603 Spring 2009 11

Stealthy Communications Each MN has info about AP Locations; other MNs

Public Key distribution of all nodes

MN calculates location of closest AP based on location

Routing Tables

David Drager - CSE 603 Spring 2009 12

Stealthy PerformanceProbability of detection:

With one node:

David Drager - CSE 603 Spring 2009 13

Stealthy Performance Of multiple nodes:

(200m range): (100m range):

David Drager - CSE 603 Spring 2009 14

Conclusions Hybrid Stealthy Communications Protocol (HSCP) is

able to minimize detection to around .5% when there are multiple eavesdroppers.

Change power of the MN to receive even better stealth.

This protocol can be used in the battlefield to reach our original goal.

David Drager - CSE 603 Spring 2009 15

David Drager - CSE 603 Spring 2009 16

David Drager - CSE 603 Spring 2009 17

Questions?