Wireless environments and architectures CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Chris Karlof and David Wagner
Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
CS 268: Ad Hoc Routing Kevin Lai Feb 20, Ad Hoc Motivation  Internet goal: decentralized control -someone still has to deploy.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Ad Hoc Wireless Routing COS 461: Computer Networks
Network Topologies.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Common Devices Used In Computer Networks
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
UCAN: A Unified Cellular and Ad Hoc Network Architecture Presenter: Tripp Parker Authors: Haiyun Luo Ramachandran Ramjee Prasun Sinha, Li Erran Li, Songwu.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Integrating Quality of Protection into Ad Hoc Routing Protocols Seung Yi, Prasad Naldurg, Robin Kravets University of Illinois at Urbana-Champaign.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Networks and Distributed Systems Sarah Diesburg Operating Systems COP 4610.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Routing in Delay Tolerant Network Qing Ye EDIFY Group of Lehigh University.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
 What is Topology  Categories of Topology  Definition, structure, advantage and disadvantage of all of the following topologies: o Mesh o Bus o Ring.
Presentation transcript:

Wireless environments and architectures CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University

Spring 2002CS444N2 Diversity of wireless environments Differ in –Mobility –Type of application –Type of environment –Media characteristics –Pervasiveness of hosts –Level of infrastructure –Visibility of infrastructure –Coverage –Cost Examples –Cellular telephony –Satellite –Metropolitan-area data networks –Local-area networks –Personal-area networks –Ubiquitous computing environments –Infostations –Ad hoc networks

Spring 2002CS444N3 Ubiquitous computing Idea: environment outfitted with invisible helpful computing infrastructure and peripherals Both mobile and stationary hosts/displays –Components you carry with you –Components in infrastructure with which you interact Variety of applications – whatever you need Variety of media, both wired and wireless Lots of infrastructure – it’s all around you Infrastructure is invisible –It helps us where we need help in the context in which we need help –We do not need to cater to it Coverage appropriate to the context Your personal information/applications go with you through the network

Spring 2002CS444N4 Ubiquitous computing, continued Often called pervasive/invisible computing Augmented reality –Ability to query your environment –Ability to ask for non-intrusive guidance May include variety of wearable devices Interesting privacy and sociological questions Can we really build security that is equivalent but no stronger than what we are accustomed to currently? –This definition varies greatly across cultures/governments

Spring 2002CS444N5 Ubiquitous computing, continued No clear definition of ubiquitous computing now What is it really good for? How practical is it really? Is it a superset of mobile computing?

Spring 2002CS444N6 Infostations Mobile hosts traveling through fixed network Good for periodic download or upload of bulky data Wireless islands (interconnected by wired network) –Gas stations –Here and there on the freeway Possibly an invisible infrastructure with mobile- aware applications –In reality, you may need to know to go to it –Original paper assumes this: information kiosks Coverage is spotty Cost is lower than complete coverage

Spring 2002CS444N7 Infostations, continued Example: incremental map download –Prefetching at infostations –Know path and speed of traveler In reality will need to combine this with another more pervasive wireless network One study [Ye, Mobicom’98] shows performance is better with many smaller-range infostations rather than fewer longer-range ones density of infostations –But this misses the whole point of infostations I envision traffic snarls

Spring 2002CS444N8 Ad hoc networks Collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Hop-by-hop routing due to limited range of each node Nodes may enter and leave the network Usage scenarios: –Military –Disaster relief –Temporary groups of participants (conferences)

Spring 2002CS444N9 Ad hoc networks, continued Very mobile – whole network may travel Applications vary according to purpose of network No pre-existing infrastructure. Do-it-yourself infrastructure Coverage may be very uneven

Spring 2002CS444N10 Issues in ad hoc networks Routing performance –Routes change over time due to node mobility –Would like to avoid long delays when sending packets –But would like to avoid lots of route maintenance overhead –Want as many participating nodes as possible for greater aggregate throughput, shorter paths, and smaller chance of partition Security - interesting new vulnerabilities and complexities –Routing denial of service Nodes may agree to route packets Nodes may then fail to do so Broken, malicious, selfish –Key distribution and trust issues

Spring 2002CS444N11 Example routing protocol: DSR Dynamic Source Routing (DSR) is one of most popular On-demand routing s d a b c e f RR(d,1)s RR(d,1)sb RR(d,1)sa RR(d,1)sac RR(d,1)sacf

Spring 2002CS444N12 Security issues in ad hoc networks Routing advertisements –Come shoot me here –Particularly awkward in algorithms that give location information in route ads A priori trust of nodes? –In some environments you know ahead of time the nodes you can trust –Route only through these nodes? –But maybe some other nodes would be helpful? Radio medium affects what you can do –Promiscuous mode and broadcast not available for all wave forms –Assumptions of bidirectional links

Spring 2002CS444N13 Encryption issues With advance planning can give all good nodes known keys –This still doesn’t guarantee a node isn’t compromised What to encrypt? –Payload – can do this end-to-end –Headers – requires link-to-link encryption and decryption - expensive Still important to identify misbehaving nodes

Spring 2002CS444N14 Mitigating routing misbehavior - theme It is impossible to build a perfect network –Use of legacy software –Unexpected events –Bugs Incorporate tools within the network to detect and report on misbehavior

Spring 2002CS444N15 Possible solutions Route only through trusted nodes –Requires a priori trust relationship –Requires key distribution –Trusted nodes may still be overloaded or broken or compromised –Untrusted nodes might perform well Detect and isolate misbehaving nodes –Watchdog detects the nodes –Pathrater avoids routing packets through these nodes

Spring 2002CS444N16 Assumptions On-demand routing protocol –Route discovered at time source sends packet to destination for which it has no cached route –Neighbors forward route request & append their addresses Bidirectional communication symmetry on every link –802.1, MACAW and others assume this Wireless interface supports promiscuous mode –Only works with certain waveforms –WaveLAN and networks support this

Spring 2002CS444N17 Watchdog technique Each node may host a watchdog Watchdog listens promiscuously to next node’s transmissions Detects if next node does not forward packet Can sometimes detect tampering with payload –If encryption not performed separately for each link ab c

Spring 2002CS444N18 Watchdog, continued Node keeps buffer of recently sent packets Removes packet from buffer if it overhears forwarding If packet in buffer for too long, increment failure tally for next node If failure tally exceeds threshold, notify source node of possible misbehavior Watchdog weaknesses –Ambiguous collisions –Receiver collisions –Limited transmission power –Misbehavior falsely reported –False positives –Collusion –Partial dropping

Spring 2002CS444N19 Pathrater Run by each node Combines watchdog info with link reliability data Each node maintains rating for each other node it knows Calculates path metric by averaging node ratings in the path New nodes assigned neutral rating Calculation can pick shortest-path in absence of node data Good behavior increments rating Link breaks decrement node rating a little Misbehavior decrements rating a lot Send extra route request when all known paths include misbehaving node

Spring 2002CS444N20 Results NS simulator & Dynamic Source Routing algorithm With and without watchdog/pathrater/extra route requests Throughput: percentage of sent data packets actually received by intended destinations –In absence of misbehaving nodes, all achieve 95% throughput –With misbehaving nodes, new techniques up to 30% better Overhead: Ratio of routing–related transmissions –Doubles from 12% to 24% –Due to extra route requests that don’t help –Watchdog itself is very low overhead Effect of false positives on throughput –Doesn’t seem to hurt – may even help! –Some nodes flaky due to location/collisions: avoid them anyway

Spring 2002CS444N21 Discussion What do you see as the next interesting things in mobile computing? What potential do you see for wireless networks? What do you see as the hardest things for us to address? If you could wish for one key piece of technology to come true (for mobility), what would it be?