(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย
Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks
1. Toward Secure and Efficient Peer-
to-Peer Voice over IP
Communication in Large-scale
Hierarchical Mobile Ad Hoc
Networks
By
Kashif Kashif
Kashif.namal@gmail.com
University of Camerino Italy
2. Mobile Ad Hoc Network
โข Formed by Mobile Host which may use Mobile
without using pre exisiting infratucture
โข Routes between Nodes may Contain Multiple
Hopsor
โข Decrease Dependence on infrastucture
โข Use for miltary Operations
4. Peer-to-Peer (P2P) Voice-over-Internet
Protocol (VoIP)
โข Protocols are a logical choice
โข MANET is also inherently a P2P network
where each node moves from one place to
another independently, joins and leaves the
network as it wishes.
5. Peer-to-Peer (P2P) Voice-over-Internet
Protocol (VoIP)
P2P VoIP uses a distributed hash table (DHT) for
routing among the nodes
โข Hierarchical topology consisting of cluster heads
that form the backbone of the MANET
โข Cluster head controls a set of ordinary nodes
that form an access MANET network
โข MANET uses a broadcast-based MANET physical
routing protocol
โข We will use P2P Session Initiation Protocol (P2P-
SIP) defined in RFCs 5694 and 6940,
6. P2P in Military
โข We propose to study two important aspects
of deploying P2P-SIP over MANETs
โข security and efficiency (routing optimization).
7. Security
โข In client/server model, the storage is
distributed in P2P networks
โข Need to prevent storage and retrieval attacks
โข In Store malicious peer may refuse to store the
data(store data but delete it later or
communication)
โข Coordinate attacks with other peers
โข P2P-SIP, the SIP protocol requires a
distributed registry service, implemented
8. Security
โข Using a lightweight PKI infrastructure: assuming
nodes require some sort of pre-authorization to
join the P2P network. ( X.509 certificates)
โข Trust-on-First-Use
โข Replication of messages can help ensure correct
routing in the presence of uncooperative or
malicious nodes.
โข Replication of data storage can also help deal
with storage and retrieval attacks,
9. Security
โข Resistance to storage/retrieval attacks can be
viewed as a case of requiring an agreement in
a completely decentralized manner in the
presence of malicious and uncooperative
nodes, and is known as the Byzantine
Generals problem
10. Routing Optimization
In overlay networks such as P2P-SIP, peers establish a
logical topology at the application layer and communicate
based on this logical topology
โข These logical connections are then mapped onto the
underlying physical topology and messages are routed
by the routing mechanism deployed at the network
layer
โข If these two layers each independently operate from
one another the Result is poor.
โข This is particularly true in MANETs, where the wireless
links that establish the physical topology have limited
bandwidth.
11. Approach to P2P
โข We will utilize a cross-layer design
โข P2P overlays need to know about the status of the
underlay/physical network (help to reducing the
maintenance o
โข MANET algorithms should also be aware of the P2P
overlay in order to maintain the appropriate
connections with relevant neighbouring overlay nodes
overhead).
โข Could be achieved either by having the application
layer and network layer exchange information within a
node or by integrating the P2P algorithms
12. Cluster head knowing
There are Multiple MANETs exist, running their
own internal routing protocol. Each MANET
elects a cluster head, and connectivity is
provided among the MANETs by organizing the
clusterheads in a P2P network
โข Nodes are free to move and new networks can
join and leave, without the need for a
fixed/centralized network infrastructure.
13. Tool to Implement P2P
OMNeT++
โข Component-based C++ simulation library and
framework
โข Open Source wired, wireless and mobile
networks, and OverSim
โข INET provides the basic protocols and
capabilities to simulate MANETs