SlideShare a Scribd company logo
Toward Secure and Efficient Peer-
to-Peer Voice over IP
Communication in Large-scale
Hierarchical Mobile Ad Hoc
Networks
By
Kashif Kashif
Kashif.namal@gmail.com
University of Camerino Italy
Mobile Ad Hoc Network
• Formed by Mobile Host which may use Mobile
without using pre exisiting infratucture
• Routes between Nodes may Contain Multiple
Hopsor
• Decrease Dependence on infrastucture
• Use for miltary Operations
Layers
Peer-to-Peer (P2P) Voice-over-Internet
Protocol (VoIP)
• Protocols are a logical choice
• MANET is also inherently a P2P network
where each node moves from one place to
another independently, joins and leaves the
network as it wishes.
Peer-to-Peer (P2P) Voice-over-Internet
Protocol (VoIP)
P2P VoIP uses a distributed hash table (DHT) for
routing among the nodes
• Hierarchical topology consisting of cluster heads
that form the backbone of the MANET
• Cluster head controls a set of ordinary nodes
that form an access MANET network
• MANET uses a broadcast-based MANET physical
routing protocol
• We will use P2P Session Initiation Protocol (P2P-
SIP) defined in RFCs 5694 and 6940,
P2P in Military
• We propose to study two important aspects
of deploying P2P-SIP over MANETs
• security and efficiency (routing optimization).
Security
• In client/server model, the storage is
distributed in P2P networks
• Need to prevent storage and retrieval attacks
• In Store malicious peer may refuse to store the
data(store data but delete it later or
communication)
• Coordinate attacks with other peers
• P2P-SIP, the SIP protocol requires a
distributed registry service, implemented
Security
• Using a lightweight PKI infrastructure: assuming
nodes require some sort of pre-authorization to
join the P2P network. ( X.509 certificates)
• Trust-on-First-Use
• Replication of messages can help ensure correct
routing in the presence of uncooperative or
malicious nodes.
• Replication of data storage can also help deal
with storage and retrieval attacks,
Security
• Resistance to storage/retrieval attacks can be
viewed as a case of requiring an agreement in
a completely decentralized manner in the
presence of malicious and uncooperative
nodes, and is known as the Byzantine
Generals problem
Routing Optimization
In overlay networks such as P2P-SIP, peers establish a
logical topology at the application layer and communicate
based on this logical topology
• These logical connections are then mapped onto the
underlying physical topology and messages are routed
by the routing mechanism deployed at the network
layer
• If these two layers each independently operate from
one another the Result is poor.
• This is particularly true in MANETs, where the wireless
links that establish the physical topology have limited
bandwidth.
Approach to P2P
• We will utilize a cross-layer design
• P2P overlays need to know about the status of the
underlay/physical network (help to reducing the
maintenance o
• MANET algorithms should also be aware of the P2P
overlay in order to maintain the appropriate
connections with relevant neighbouring overlay nodes
overhead).
• Could be achieved either by having the application
layer and network layer exchange information within a
node or by integrating the P2P algorithms
Cluster head knowing
There are Multiple MANETs exist, running their
own internal routing protocol. Each MANET
elects a cluster head, and connectivity is
provided among the MANETs by organizing the
clusterheads in a P2P network
• Nodes are free to move and new networks can
join and leave, without the need for a
fixed/centralized network infrastructure.
Tool to Implement P2P
OMNeT++
• Component-based C++ simulation library and
framework
• Open Source wired, wireless and mobile
networks, and OverSim
• INET provides the basic protocols and
capabilities to simulate MANETs

More Related Content

What's hot

Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocolijceronline
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...Xi'an Jiaotong-Liverpool University
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networksacapone
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routingAbhishek Kona
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETtelecomsutra
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentationIftach Ian Amit
 
Adhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanAdhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanRagavan K
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksparuvathavardhinipra
 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsRaluca Musaloiu-E.
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 

What's hot (20)

Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocol
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet
ManetManet
Manet
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Adhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanAdhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-Ragavan
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their Applications
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 

Viewers also liked

Big data presentation for University of Reykjavik, Iceland, March 22
Big data presentation for University of Reykjavik, Iceland, March 22 Big data presentation for University of Reykjavik, Iceland, March 22
Big data presentation for University of Reykjavik, Iceland, March 22 Thorhildur Jetzek, Ph.D.
 
Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comkashif kashif
 
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.comMcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.comkashif kashif
 
Process Mining For Customer Support
Process Mining For Customer SupportProcess Mining For Customer Support
Process Mining For Customer SupportHaim Toeg
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingWil van der Aalst
 
Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3limparando
 
Junta del 4 bimestre
Junta del 4 bimestreJunta del 4 bimestre
Junta del 4 bimestreJenny Angel
 
3Com 69-000205-06
3Com 69-000205-063Com 69-000205-06
3Com 69-000205-06savomir
 
Political alert house of representatives daily program, tuesday 21 march 2017
Political alert   house of representatives daily program, tuesday 21 march 2017Political alert   house of representatives daily program, tuesday 21 march 2017
Political alert house of representatives daily program, tuesday 21 march 2017Lisa Munoz
 
anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters sxmboatcharters
 
Jess presentation1
Jess presentation1Jess presentation1
Jess presentation1John Hall
 
Desenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimirDesenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimircamp desenhos
 

Viewers also liked (12)

Big data presentation for University of Reykjavik, Iceland, March 22
Big data presentation for University of Reykjavik, Iceland, March 22 Big data presentation for University of Reykjavik, Iceland, March 22
Big data presentation for University of Reykjavik, Iceland, March 22
 
Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.com
 
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.comMcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
 
Process Mining For Customer Support
Process Mining For Customer SupportProcess Mining For Customer Support
Process Mining For Customer Support
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
 
Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3Modello unità di apprendimento ub d fase 3
Modello unità di apprendimento ub d fase 3
 
Junta del 4 bimestre
Junta del 4 bimestreJunta del 4 bimestre
Junta del 4 bimestre
 
3Com 69-000205-06
3Com 69-000205-063Com 69-000205-06
3Com 69-000205-06
 
Political alert house of representatives daily program, tuesday 21 march 2017
Political alert   house of representatives daily program, tuesday 21 march 2017Political alert   house of representatives daily program, tuesday 21 march 2017
Political alert house of representatives daily program, tuesday 21 march 2017
 
anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters
 
Jess presentation1
Jess presentation1Jess presentation1
Jess presentation1
 
Desenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimirDesenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimir
 

Similar to Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks

Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .pptPawanKayande1
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...ssuser036308
 

Similar to Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks (20)

Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 

Recently uploaded

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdfKamal Acharya
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationRobbie Edward Sayers
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfAyahmorsy
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdfKamal Acharya
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdfKamal Acharya
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdfKamal Acharya
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerapareshmondalnita
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 

Recently uploaded (20)

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 

Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks

  • 1. Toward Secure and Efficient Peer- to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks By Kashif Kashif Kashif.namal@gmail.com University of Camerino Italy
  • 2. Mobile Ad Hoc Network • Formed by Mobile Host which may use Mobile without using pre exisiting infratucture • Routes between Nodes may Contain Multiple Hopsor • Decrease Dependence on infrastucture • Use for miltary Operations
  • 4. Peer-to-Peer (P2P) Voice-over-Internet Protocol (VoIP) • Protocols are a logical choice • MANET is also inherently a P2P network where each node moves from one place to another independently, joins and leaves the network as it wishes.
  • 5. Peer-to-Peer (P2P) Voice-over-Internet Protocol (VoIP) P2P VoIP uses a distributed hash table (DHT) for routing among the nodes • Hierarchical topology consisting of cluster heads that form the backbone of the MANET • Cluster head controls a set of ordinary nodes that form an access MANET network • MANET uses a broadcast-based MANET physical routing protocol • We will use P2P Session Initiation Protocol (P2P- SIP) defined in RFCs 5694 and 6940,
  • 6. P2P in Military • We propose to study two important aspects of deploying P2P-SIP over MANETs • security and efficiency (routing optimization).
  • 7. Security • In client/server model, the storage is distributed in P2P networks • Need to prevent storage and retrieval attacks • In Store malicious peer may refuse to store the data(store data but delete it later or communication) • Coordinate attacks with other peers • P2P-SIP, the SIP protocol requires a distributed registry service, implemented
  • 8. Security • Using a lightweight PKI infrastructure: assuming nodes require some sort of pre-authorization to join the P2P network. ( X.509 certificates) • Trust-on-First-Use • Replication of messages can help ensure correct routing in the presence of uncooperative or malicious nodes. • Replication of data storage can also help deal with storage and retrieval attacks,
  • 9. Security • Resistance to storage/retrieval attacks can be viewed as a case of requiring an agreement in a completely decentralized manner in the presence of malicious and uncooperative nodes, and is known as the Byzantine Generals problem
  • 10. Routing Optimization In overlay networks such as P2P-SIP, peers establish a logical topology at the application layer and communicate based on this logical topology • These logical connections are then mapped onto the underlying physical topology and messages are routed by the routing mechanism deployed at the network layer • If these two layers each independently operate from one another the Result is poor. • This is particularly true in MANETs, where the wireless links that establish the physical topology have limited bandwidth.
  • 11. Approach to P2P • We will utilize a cross-layer design • P2P overlays need to know about the status of the underlay/physical network (help to reducing the maintenance o • MANET algorithms should also be aware of the P2P overlay in order to maintain the appropriate connections with relevant neighbouring overlay nodes overhead). • Could be achieved either by having the application layer and network layer exchange information within a node or by integrating the P2P algorithms
  • 12. Cluster head knowing There are Multiple MANETs exist, running their own internal routing protocol. Each MANET elects a cluster head, and connectivity is provided among the MANETs by organizing the clusterheads in a P2P network • Nodes are free to move and new networks can join and leave, without the need for a fixed/centralized network infrastructure.
  • 13. Tool to Implement P2P OMNeT++ • Component-based C++ simulation library and framework • Open Source wired, wireless and mobile networks, and OverSim • INET provides the basic protocols and capabilities to simulate MANETs