Written by Durresi, Paruchuri and Barolli
                                   2008
Why?
Fighting with a large
army under your
command is nowise
different from fighting
with a small one: it is
merely a ques...
The Challenge
 Wireless Adhoc Networks have many military uses


 Traditional platforms (mica2, micaz) are not secure


...
Overview
What problems does this paper address?

The objective is to make a secure ad hoc wireless
 network.




         ...
Related Work
 Protocols for directional antennas – Energy savings


 Optical networks – Last mile fix?


 Previous work...
Antenna Design
 Mica2/Micaz platform – omnidirectional dipole
  antenna.
 These radiate in a doughnut shape pattern




...
Directional Antennas
 Patch Antenna


 Horn Antenna


 Dish Antenna




             David Drager - CSE 603 Spring 2009...
Beamwidth
 How wide of an area the signal can be received


 θ = Angle of radiation




              David Drager - CSE...
Propagation
 Transmitted power decays as R-a
 a varies between 2 & 4 depending on the medium
 Received Power:



 Gain...
Network Architecture
 Hybrid means that we will have both wireless and
  optical connection
Optical: means that we will n...
Network Architecture




       David Drager - CSE 603 Spring 2009   11
Stealthy Communications
 Each MN has info about AP Locations; other MNs
 Public Key distribution of all nodes


 MN cal...
Stealthy Performance
Probability of detection:



               With one node:




               David Drager - CSE 603 ...
Stealthy Performance
 Of multiple nodes:



        (200m range):                              (100m range):




        ...
Conclusions
 Hybrid Stealthy Communications Protocol (HSCP) is
 able to minimize detection to around .5% when there
 are ...
David Drager - CSE 603 Spring 2009   16
Questions?


  David Drager - CSE 603 Spring 2009   17
Upcoming SlideShare
Loading in …5
×

Hybrid Stealthy Networks - Paper Presentation

929 views
861 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
929
On SlideShare
0
From Embeds
0
Number of Embeds
109
Actions
Shares
0
Downloads
23
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Hybrid Stealthy Networks - Paper Presentation

  1. 1. Written by Durresi, Paruchuri and Barolli 2008
  2. 2. Why? Fighting with a large army under your command is nowise different from fighting with a small one: it is merely a question of instituting signs and signals. - Sun Tzu, The Art of War Battlefield 2 David Drager - CSE 603 Spring 2009 2 Screenshot
  3. 3. The Challenge  Wireless Adhoc Networks have many military uses  Traditional platforms (mica2, micaz) are not secure  How do we fix these issues? David Drager - CSE 603 Spring 2009 3
  4. 4. Overview What problems does this paper address? The objective is to make a secure ad hoc wireless network. David Drager - CSE 603 Spring 2009 4
  5. 5. Related Work  Protocols for directional antennas – Energy savings  Optical networks – Last mile fix?  Previous work does not focus on security aspect but on performance David Drager - CSE 603 Spring 2009 5
  6. 6. Antenna Design  Mica2/Micaz platform – omnidirectional dipole antenna.  These radiate in a doughnut shape pattern Source: Antennatheory.com David Drager - CSE 603 Spring 2009 6
  7. 7. Directional Antennas  Patch Antenna  Horn Antenna  Dish Antenna David Drager - CSE 603 Spring 2009 7
  8. 8. Beamwidth  How wide of an area the signal can be received  θ = Angle of radiation David Drager - CSE 603 Spring 2009 8
  9. 9. Propagation  Transmitted power decays as R-a  a varies between 2 & 4 depending on the medium  Received Power:  Gain of the transmitter: David Drager - CSE 603 Spring 2009 9
  10. 10. Network Architecture  Hybrid means that we will have both wireless and optical connection Optical: means that we will need to lay fiber. Pros: Fast, latency free, secure; Cons: Hard to deploy “AP” – Access Point Wireless: Steerable, Assume has GPS to locate “MN” – Mobile Node Red Zones: Enemy listeners or even jammers David Drager - CSE 603 Spring 2009 10
  11. 11. Network Architecture David Drager - CSE 603 Spring 2009 11
  12. 12. Stealthy Communications  Each MN has info about AP Locations; other MNs  Public Key distribution of all nodes  MN calculates location of closest AP based on location  Routing Tables David Drager - CSE 603 Spring 2009 12
  13. 13. Stealthy Performance Probability of detection: With one node: David Drager - CSE 603 Spring 2009 13
  14. 14. Stealthy Performance  Of multiple nodes: (200m range): (100m range): David Drager - CSE 603 Spring 2009 14
  15. 15. Conclusions  Hybrid Stealthy Communications Protocol (HSCP) is able to minimize detection to around .5% when there are multiple eavesdroppers.  Change power of the MN to receive even better stealth.  This protocol can be used in the battlefield to reach our original goal. David Drager - CSE 603 Spring 2009 15
  16. 16. David Drager - CSE 603 Spring 2009 16
  17. 17. Questions? David Drager - CSE 603 Spring 2009 17

×