Hybrid Stealthy Networks - Paper Presentation

984 views

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
984
On SlideShare
0
From Embeds
0
Number of Embeds
109
Actions
Shares
0
Downloads
26
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Hybrid Stealthy Networks - Paper Presentation

  1. 1. Written by Durresi, Paruchuri and Barolli 2008
  2. 2. Why? Fighting with a large army under your command is nowise different from fighting with a small one: it is merely a question of instituting signs and signals. - Sun Tzu, The Art of War Battlefield 2 David Drager - CSE 603 Spring 2009 2 Screenshot
  3. 3. The Challenge  Wireless Adhoc Networks have many military uses  Traditional platforms (mica2, micaz) are not secure  How do we fix these issues? David Drager - CSE 603 Spring 2009 3
  4. 4. Overview What problems does this paper address? The objective is to make a secure ad hoc wireless network. David Drager - CSE 603 Spring 2009 4
  5. 5. Related Work  Protocols for directional antennas – Energy savings  Optical networks – Last mile fix?  Previous work does not focus on security aspect but on performance David Drager - CSE 603 Spring 2009 5
  6. 6. Antenna Design  Mica2/Micaz platform – omnidirectional dipole antenna.  These radiate in a doughnut shape pattern Source: Antennatheory.com David Drager - CSE 603 Spring 2009 6
  7. 7. Directional Antennas  Patch Antenna  Horn Antenna  Dish Antenna David Drager - CSE 603 Spring 2009 7
  8. 8. Beamwidth  How wide of an area the signal can be received  θ = Angle of radiation David Drager - CSE 603 Spring 2009 8
  9. 9. Propagation  Transmitted power decays as R-a  a varies between 2 & 4 depending on the medium  Received Power:  Gain of the transmitter: David Drager - CSE 603 Spring 2009 9
  10. 10. Network Architecture  Hybrid means that we will have both wireless and optical connection Optical: means that we will need to lay fiber. Pros: Fast, latency free, secure; Cons: Hard to deploy “AP” – Access Point Wireless: Steerable, Assume has GPS to locate “MN” – Mobile Node Red Zones: Enemy listeners or even jammers David Drager - CSE 603 Spring 2009 10
  11. 11. Network Architecture David Drager - CSE 603 Spring 2009 11
  12. 12. Stealthy Communications  Each MN has info about AP Locations; other MNs  Public Key distribution of all nodes  MN calculates location of closest AP based on location  Routing Tables David Drager - CSE 603 Spring 2009 12
  13. 13. Stealthy Performance Probability of detection: With one node: David Drager - CSE 603 Spring 2009 13
  14. 14. Stealthy Performance  Of multiple nodes: (200m range): (100m range): David Drager - CSE 603 Spring 2009 14
  15. 15. Conclusions  Hybrid Stealthy Communications Protocol (HSCP) is able to minimize detection to around .5% when there are multiple eavesdroppers.  Change power of the MN to receive even better stealth.  This protocol can be used in the battlefield to reach our original goal. David Drager - CSE 603 Spring 2009 15
  16. 16. David Drager - CSE 603 Spring 2009 16
  17. 17. Questions? David Drager - CSE 603 Spring 2009 17

×