Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Progress Report Wireless Routing By Edward Mulimba.
Ad-Hoc Networking Course Instructor: Carlos Pomalaza-Ráez D. D. Perkins, H. D. Hughes, and C. B. Owen: ”Factors Affecting the Performance of Ad Hoc Networks”,
SVC-Based Multisource Streaming for Robust Video Transmission in Mobile Ad-Hoc Networks Thomas Schierl, Karsten Ganger, Cornelius Hellge, and Thomas Wiegand.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Secure Routing in Ad Hoc Wireless Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian, Zygmunt J. Haas, and Emin Gun sirer ACM MobiHoc 2003.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
An Energy-Efficient Flooding Algorithm in ad hoc Network (EFA) Concrete Mathematic Final presentation of term project Professor: Kwangjo KimKwangjo Kim.
ROUTING ALGORITHMS IN AD HOC NETWORKS
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Outline Introduction Existing solutions for ad hoc
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
KAIS T AO2P: Ad Hoc On-Demand Position- Based Private Routing Protocol IEEE Transactions on Mobile Computing Vol.4, No. 3, May 2005 Xiaoxin Wu
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Ad Hoc Multicast Routing
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Wireless Control of a Multihop Mobile Robot Squad UoC Lab. 임 희 성.
Routing Metrics for Wireless Mesh Networks
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing Metrics for Wireless Mesh Networks
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
Vinay Singh Graduate school of Software Dongseo University
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07

Introduction Related works Proposed solution Simulation Conclusion 2011/06/072

Mobile Ad hoc Network (MANET)  Without any infrastructure to set up.  Each node has the ability to forward packet. 2011/06/073

Security issue  The lack of a central server or AP(Access Point) results security problem, nodes have native trust to transmit data. 2011/06/074

More paths to transmit your data by secure way. More reliability in wireless network. Proposed scheme.  Transmit data by trusted based routing with fountain code.  Prevent enough data sniffed by malicious node.  Increase the throughput of the network. 2011/06/075

Routing protocol  Proactive Protocol (Table driven protocol)  Each mobile node broadcasts to exchange message periodically to confirm the correctness of routing tables, but that will result network overhead and power consumption 。  It will reduce the correctness of routing tables, if nodes operate the message exchanging for a long time Interval.  Representative protocol: DSDV(Destination-Sequenced Distance Vector routing protocol), each node maintains a routing tables, and the node will need more resource.  Reactive Protocol (source initiation on-demand protocol)  When a node need to transmit date to the destination node, it starts to find the path to the destination, and the route finding will stop when an available path is found.  Representative protocol:  DSR (Dynamic Source Routing, based on source routing, it will get good efficient in low mobility networks, but the increasing mobility will result bad efficient.)  AODV (Ad Hoc On-Demand Distance Vector Routing), a good candidate routing protocol, but we need it to support node-disjoint function. 2011/06/076 [1] “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols”, MobiCom, 1998

Disjoint multipath routing  Link-disjoint  Node-disjoint 2011/06/077 S A C B I J D S A C B I J D

Design the secure route  Authentication  Trust-based Why use trust-based routing?  Adapting trust based can be achieved by exist equipment. it will not need additional equipment and complex technology.  Compute the trust values of nodes, to make nodes have the trust with each other before they transmit date. Why need multipath?  Improve the reliability 。  Redundant path, it can reduce the number of flooding from the route request for data retransmission.  To transmit the split data(encrypted data) by different path, it will be helpful to increase the throughput. 2011/06/078 [2] “Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing”, ACM. 2007

2011/06/079 Trust value assignment where [3] "Establishing Trust In Pure Ad-hoc Networks", ACSC, 2004

Find out the two paths which are not interference to each other. 2011/06/ 需要利用 GPS 定位, 確認節 點的座標, 找出將傳輸的方向, 並透過演算法, 防止不同路徑 節點發生重複。 2. 但在路徑上有安全上的疑慮 [4] “Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks”, ICC, 2009

To know the power condition of nodes by extend AODV, to distribute different paths. 2011/06/0711 [5] “PAMP: Power-Aware Multi-Path Routing Protocol for a Wireless Ad hoc Network”, WCNC, 以作者的舉例, 對 source 而 言, 唯一出口只有 N2, 如果 N2 出了意外, 仍必須重新再 找一次路徑, 會有潛在問題。 2. 在安全的考量上, N2 如果是 惡意節點, 將造成資訊的危 害

Fountain code  LT code (Luby Transform Codes, 2002 A.D) FF  A transformation from F 2 k to F 2 N  Raptor code (2004 A.D, RFC 5053)  Pre codes: LDPC (Low-density parity-check codes).  Transmit data by multi-paths with different trust value. Why use fountain code in MANET?  Increase the reliability of the secure route.  Reduce the overhead in the network. 2011/06/0712 [6] "Raptor codes", Information Theory, June 2006

What is digital fountain codes  A code with robust “recover” ability.  Data are broken up many components.  Redundant duplicate information is used.  Decoding with enough received components.  Without re-transmission in the network (especially good for using TCP). 2011/06/0713

Use trust value as pre-code of Raptor Code  Different priority of data will be distributed by different trust value(TV) in pre-code phase.  Depend on different TV, the pre-code will use high weight for higher trust path to transmit the data. 2011/06/0714 Raptor Codes concept

How to use fountain code in proposed algorithm  Use the “trust value of path” in “LDPC encoding” phase.  Different trust value will be used in different channel which is consecrated about security. 2011/06/0715 [3] Applications and implementation of Raptor Codes, 2007

Mechanism  Phase I  Find the trusted multi-path as security route.  One path transmit more data by higher trust-value, the other one by lower trust-value.  Phase II  Use two trusted paths to transmit for split data by using fountain code encryption. 2011/06/0716

Route algorithm 2011/06/0717 [NOTE] 1. When send data from S to D, more data will send by higher trust path, and less data will send by low trust path. 2. the data is separated in two parts with XOR encryption (or other encryption). 3. Based on AODV routing protocol Initial a security route discovery each node in the network has a trust value from it's interactive with other nodes. route_active_time = 3000ms (RFC3561, AODV route_active_time = 3000ms) a security route should has high trust-value route and low trust-value route, so that node S can send data by two path to node D var trust-valuel: from -1 to 4 -1 = malicious node, can't be trusted 0 = not trusted node, or an just join the network 1 ~ 4 = different trust values (4 is the highest) S: source node D: destination node

2011/06/0718 Pseudo code of the algorithm Procedure begin if a node joint a MANET, then assign trust value = 0; if node works normally, then increase it's trust value until 4; else decrease it's trust value until -1; end; begin if a node initial a route request, then select paths >= trust value sum >= 4; if a paths trust value = 4, then transmit data by the path; else if find 2 paths with different priority; end; Assign a trust value to a node Find 3 paths with different trust value Transmit data using fountain code (Raptor)

2011/06/0719

2011/06/0720 Primary-path tv = 1 tv = 4 tv = 2

2011/06/0721 Secondary-path Primary-path Secondary-path tv = 1 tv = 4 tv = 2 tv = 3

2011/06/0722 Primary-path Secondary-path Primary-path Secondary-path tv = 1 tv = 4 tv = 2 tv = 3 tv = 2 tv = 3 Secondary-path tv = 2

2011/06/0723 Primary-path Third-path Secondary-path Third-path Primary-path Secondary-path Third-path Secondary-path tv = 1 tv = 4 tv = 2 tv = 3 tv = 2 tv = 3 tv = 2

 The benefit of our trust-based routing protocol  Information security  Backup route  Having security without extra device or high-tech computing  Multipath, more reliability. 2011/06/0724

NS-2.34 AOMDV (node-disjoint function included) ecs.soton.ac.uk developed a fountain code implement for NS-2 (2008, 2009) 2011/06/0725

NS x1000 Nodes: 30, 40, 50, 60, 70, 80, 90 Compare: AODV, AOMDV, FTMAODV 2011/06/0726

2011/06/0727 Packet Delivery

2011/06/0728 End-to-end delay

2011/06/0729 First Path

Looking for the Fountain Code equation  References from a thesis titled "Applications and implementation of Raptor Codes“, 2007 Other References for fountain code  M. Luby and M. Watson, “Raptor Forward Error Correction Scheme for Object Delivery”, 2007 (RFC 5053)  Todor Mladenov, Saeid Nooshabadi and Kiseon Kim, ” Implementation and Evaluation of Raptor codes on Embedded systems”, /06/0730