Cognitive Radio Networks at WINLAB: Networking and Security Research

Size: px
Start display at page:

Download "Cognitive Radio Networks at WINLAB: Networking and Security Research"

Transcription

1 Cognitive Radio Networks at WINLAB: Networking and Security WINLAB Rutgers, The State University of New Jersey Contact: Professor Wade Trappe, Associate Director

2 Where Wireless is Heading: Robust, Adaptive and Programmable Multi-Radio Networks The community is researching new architectures, protocols and algorithms for robust/secure networks will allow for a 2 nd generation cognitive radio MANET Collaborative PHY for increased resilience at the radio level Novel MANET architectures and protocols (cross-layer, global control, adaptive) Innovative approaches to security in MANETs Cognitive radio technology to enable spectrum agility and adaptation Protocols for networking of cognitive radios backed up by a comprehensive set of laboratory capabilities for realistic and reproducible evaluations at scale Cognitive radio platforms (GNU/URSP, WiNC2R, WARP) ORBIT radio grid testbed, with upgrade to programmable radios Outdoor vehicular testing Integration with wired network testbeds, PlanetLab & VINI Government will be affected by: Rapidly evolving technologies with high levels of flexibility More universal connectivity Is this really a good thing? New forms of security risks [2] WINLAB

3 WINLAB CogNet projects use unique hardware capabilities and software design Global Control Plane (GCP) Common framework for spectrum allocation, PHY/MAC bootstrap, topology discovery, cross-layer routing and security management Decentralized coordination of protocols across location and layers Data plane Dynamically linked spectrum mgmt, PHY, MAC, Network modules and parameters as specified by control plane protocol Logical separation of control & data for flexible design and low overhead Minimize contention between control & data ( >>50% overhead in networks!) Adaptive Networks of Cognitive Radios Data Plane PHY1/MAC1 to the Internet PHY3/MAC3 Bootstrap Disco very Control Plane Data Path Establish ment Control MAC Control PHY Global Control Plane Control Signalling Naming & Addres sing Data Plane Application Transport Network MAC PHY Radios with Programmable PHY/MAC PHY2/MAC2 WiNC2R platform Protocol Stack with GCP [3] WINLAB

4 Global Control Planes support a Common Spectrum Coordination Channel (CSCC) for cognitive networks CSCC enables mutual observation between heterogeneous nodes to explicitly coordinate spectrum usage Exchange of CSCC messages by an extra narrow-band (low bitrate) radio Periodically broadcast self-states to others Coordinate spectrum usage [4] WINLAB

5 CogRadio Nets: Integrating routing and MAC layer functions is possible via the Global Control Plane Global scheduling of routes and MAC time slots is possible through the Global Control Plane architecture Such scheduling eliminates usual contention that degrades conventional wireless system designs Allocation algorithm works on both frequency (FD) and time (TD) Algorithm checks for compatible time slot and freq at each receiver Allows for more parallel transmissions (fewer exposed nodes ) and eliminates packet contention Significant performance improvement over conventional layered AODV etc. Requires GCP-type capability for distribution of control Comparison of Individual and Aggregate Throughput Global Scheduling Aloha Slot Aloha flow 1 flow 2 flow 3 flow 4 flow 5 Total [5] WINLAB

6 Warp-5: An AI-based Wireless Adaptive Routing Protocol exploits control-plane separation for improvement Overview: Intended for the (CBMANET) CLAN architecture AODV-based Routing: Overload Investigated by Brian Russel and Michael Littman in conjunction with WINLAB AODV (1 radio) Based on machine learning algorithms AODV (Control Plane) Design philosophy: Warp-5 (1 radio) Routing protocols generally make decisions Warp-5 based on (Control Plane) metrics that don t reflect quality of service objectives Shortest route may not always be the fastest or best! Cross-layer factors should be considered: MAC/PHY level data: SNR, RSS, symbol error rate, bit error rate? What about router congestion? WARP-5: 8000 Distance vector, on-demand routing protocol for ad WARP-5 Routing: Automated Balancing hoc networks 6000 Time-based routing metric incorporates router congestion level and environmental noise/interference Routes around heavily-used routers and noisy links even if the route is longer Nodes learn estimated time-to-destination for all neighbors. Protocol benefits 0 present for both single channel and control-channel architectures Simulation Trial Runs Total Packets Delivered [6] WINLAB

7 AUSTIN: An Initiative to Assure Software Radios have Trusted Interactions Goal: to regulate the future radio environment, ensure trustworthy cognitive radio operation (Team: Rutgers, Virginia Tech, UMass) How two complementary mechanisms On-board enforcement restrict any violation attempt from accessing the radio: Each CR runs its own suite of spectrum etiquette protocols Onboard policy checking verifies actions occur according to spectrum laws An external monitoring infrastructure: Distributed Spectrum Authority (DSA) police agent observes the radio environment DSA will punish CRs if violations are detected via authenticated kill commands. [7] WINLAB

8 AUSTIN involves formalizing security languages for CR regulation and a security management plane AUSTIN will use law-governed interaction (LGI), which is more powerful than conventional access control in both expressive power and scalability. LGI employs locality, which supports decentralization of access control, and scalability for stateful regulation LGI can achieve global effects over a community because all members of that community are subject to the same law A broad and expressive regulatory language will be designed XGPL is a starting point, but does not involve policy enforcement AUSTIN-XGPL will use a concrete representation of past behaviors to allow a detailed evaluation for regulation. AUSTIN-XGPL challenges: Make the language support variable degrees of interoperability between federations of CR devices. Make the language powerful, yet simple enough to minimize the risk of a poorly-written/buggy law AUSTIN Credo: Security must be designed into all future CR devices (e.g. an FCC-imposed requirement) All CR devices will have a mandatory trusted computing component that includes a well-architected Security Management Plane (SMP) RF units immediately partition incoming signals to extract SMP communications and relay these to a trusted module on the CR AUSTIN-SMP will be driven by associated Security Management Agents (SMA) Security Message Units (SMUs) will support multiple regulation services via a unified packet format. AUSTIN-SMP provides an exciting approach to more provably secure protocols, as well as improved network manageability LGI-based Interaction AUSTIN-SMP Architecture [8] WINLAB

9 Secure software and hardware methods prevent corruption of CR software, while the AUSTIN-Controller regulates actions Ensuring the security of radio software involves Ensuring that the radio software components come from authorized entities Assuring that the download and installation processes are secure Thwarting the unauthorized modification of the software once it has been installed. Hardware security mechanisms should provide a rootof-trust and thus must be tamper-proof Bitstream encryption prevents the configuration from being revealed outside the chip Unlike ASICS, FPGAs reveal no design information when powered off, forcing the adversary to probe an active die. AUSTIN will investigate the enforcement of basic operational policies using hardware-layer interlocks that cannot be overridden by software layers. Will require: Analyzing the interfaces and dependencies between hardware and software Selecting the policies to be enforced with hardware Formal state analysis of the hardware blocks responsible for policy enforcement A mechanism for securely updating policy enforcement circuits. Sensorary Data Regulatory Policies/ Ontologies Ontology Interface Rule Sets Knowledge Database AUSTIN- Controller Requests & Commands Policy Controller Policy Reasoner General Radio Interface Radio Platform Reasoning Results & Response Policy Monitor The AUSTIN-Controller is a policy engine that receives requests from CR processes, and makes formal decisions on whether to allow requested actions to occur AUSTIN-Controller involves: Ontology Interface Knowledge Database Policy Reasoner Policy Controller Policy Monitor [9] WINLAB

10 Cognitive radios support new forms of security: Secret Key Extraction from a Wireless Channel Use channel reciprocity to build highly correlated data sets Probe the channel in each direction Estimate channel using recd. probe Eve receives only uncorrelated information as she is more than λ/2 away Level crossings are used to generate bits Alice and Bob must exchange msgs over public channel to create identical bits What if channel is not already authenticated? Requires additional sophistry to prevent man-in-the-middle attack. It is possible using the correlated data collected from received probes. PROBE PROBE Positive excursion Get channel estimates PROBE Locations of excursions Negative excursion Locations in agreement [10] Key WINLAB Key

11 Radio Telepathy Prototyping: Establishing a secret key using a 64 Point Channel Impulse Response from a Preamble Tallest Peak in CIR Extracted STA= Bob, AP =Alice Probing of channel: PROBE request and PROBE response New PROBE every 110msec [11] WINLAB

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005 GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005 Rutgers, The State University of New Jersey D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 GENI Wireless Network

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Cognitive radio technology and GENI project

Cognitive radio technology and GENI project Cognitive radio technology and GENI project Ivan Seskar Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: seskar (at) winlab (dot) rutgers (dot) edu ORBIT Cognitive Capable Platforms

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Overview of Mobile Networking Initiatives at WINLAB

Overview of Mobile Networking Initiatives at WINLAB Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. IEEE 802 Standards Overview

Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. IEEE 802 Standards Overview Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems IEEE 802 Standards Overview David Law, Chair, IEEE 802.3 3Com General Disclaimer All speakers presenting information on IEEE standards

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Cognitive Radio Platform Research at WINLAB

Cognitive Radio Platform Research at WINLAB Cognitive Radio Platform Research at WINLAB December 2, 2010 Zoran Miljanic and Ivan Seskar WINLAB Rutgers University www.winlab.rutgers.edu 1 WiNC2R objectives Programmable processing of phy and higher

More information

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom

More information

FLAVIA - # FLexible Architecture for Virtualizable future wireless Internet Access. (FP7 call 5, obj1.1)

FLAVIA - # FLexible Architecture for Virtualizable future wireless Internet Access. (FP7 call 5, obj1.1) FLAVIA - #257263 FLexible Architecture for Virtualizable future wireless Internet Access (FP7 call 5, obj1.1) FLAVIA: Project Overview R&D towards the Future Wireless Internet Paradigm shift: From pre-designed

More information

Programmable Wireless Networking Details and Logistics

Programmable Wireless Networking Details and Logistics Programmable Wireless Networking Details and Logistics Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation NSF Programmable

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering Auburn Information Assurance Laboratory J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering 107 Dunstan Hall Auburn

More information

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made

More information

Research supported by NSF grant CNS

Research supported by NSF grant CNS Global Control Plane Architecture for Cognitive Radio Networks Xiangpeng Jing and Dipankar Raychaudhuri WINLAB, Rutgers University 67 Route South North Brunswick, NJ 08902 {xjing, ray}@winlab.rutgers.edu

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Notes on implementing a IEEE s Mesh Point

Notes on implementing a IEEE s Mesh Point Fourth EuroFGI Workshop on Wireless and Mobility Notes on implementing a IEEE 802.11s Mesh Point R. G. Garroppo, S. Giordano, D. Iacono, L. Tavanti Telecommunication Networks Research Group Dip. Ingegneria

More information

Project Title: Open Virtualized WiMAX Base Station Node for GENI Wide-Area Wireless Deployments

Project Title: Open Virtualized WiMAX Base Station Node for GENI Wide-Area Wireless Deployments GENI Project Quarterly Progress Report, Project Title: Open Virtualized WiMAX Base Station Node for GENI Wide-Area Wireless Deployments Principal Investigators: Dipankar Raychaudhuri, WINLAB, Rutgers University

More information

Network Simulators, Emulators and Testbeds

Network Simulators, Emulators and Testbeds Outline Network Simulators, Emulators and Testbeds By: George Nychis Gaurang Sardesai Motivation for Research Different Techniques Simulators Assumptions/Axioms Methods and Results Testbeds Architecture

More information

Architecture and Prototyping of an based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)

Architecture and Prototyping of an based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN) Architecture and Prototyping of an 802.11- based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN) PIMRC 2004, Barcelona Sept 5-8, 2004 S. Ganu, L. Raju, B. Anepu, S. Zhao, I. Seskar and D.

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Resource management issues in mobile ad hoc networks (MANET)

Resource management issues in mobile ad hoc networks (MANET) Autonomic Communication and Knowledge Plane Resource management in autonomic communication Resource management issues in mobile ad hoc networks (MANET) S-38.4030 The aim of this presentation is to give

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

FairVPN, overlay topology construction tool to maximize TCP fairness. A framework for packet droppers mitigation in OLSR Wireless Community Networks

FairVPN, overlay topology construction tool to maximize TCP fairness. A framework for packet droppers mitigation in OLSR Wireless Community Networks FairVPN, overlay topology construction tool to maximize TCP fairness A framework for packet droppers mitigation in OLSR Wireless Community Networks Giornata di incontro con i borsisti GARR, Roma, 23.02.2011

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 8, 2011 Class #9 Link/MAC layer security Announcements HW #1 is due on Thursday 2/10 If anyone would like Android phones for their course

More information

How to develop and validate a scalable mesh routing solution for IEEE sensor networks Altran Benelux

How to develop and validate a scalable mesh routing solution for IEEE sensor networks Altran Benelux How to develop and validate a scalable mesh routing solution for IEEE 802.15.4 sensor networks Altran Benelux Leuven, 29 October 2015 Daniele Lacamera picotcp The reference

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

A TVWS ZigBee Prototype

A TVWS ZigBee Prototype A TVWS ZigBee Prototype James Jody Neel james.neel@crtwireless.com SDR 11 Nov 29-Dec 2, 2011 Cognitive Plane Control Plane Protocol Plane Application API Security Propagation 32- / 64- / 128-bit benefits

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

EPLRS within the BCS/L November 2013

EPLRS within the BCS/L November 2013 EPLRS within the BCS/L November 2013 Copyright 2013 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company. Wade Hughes Lead CIS Engineer Integrated

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

The WINLAB Cognitive Radio Platform

The WINLAB Cognitive Radio Platform The WINLAB Cognitive Radio Platform IAB Meeting, Fall 2007 Rutgers, The State University of New Jersey Ivan Seskar Software Defined Radio/ Cognitive Radio Terminology Software Defined Radio (SDR) is any

More information

WIreless DEployable Network System. Symposium Hitachi-Eurecom November 27th 2003 Vania Conan, Thales Communications

WIreless DEployable Network System. Symposium Hitachi-Eurecom November 27th 2003 Vania Conan, Thales Communications WIreless DEployable Network System Symposium Hitachi-Eurecom November 27th 2003 Vania Conan, Thales Communications Project overview WIDENS is a European funded cooperative R&D project addressing future

More information

APP-PHY Interactions in Wireless Networks

APP-PHY Interactions in Wireless Networks University of Minnesota September 29, 2009 APP-PHY Interactions in Wireless Networks Vince Poor (poor@princeton.edu) APP-PHY Interactions in Wireless Nets Wireless Networks: Layers Application (APP) Web

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

P 5 : A Protocol for Scalable Anonymous Communications

P 5 : A Protocol for Scalable Anonymous Communications P 5 : A Protocol for Scalable Anonymous Communications 1 P 5 : A Protocol for Scalable Anonymous Communications Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan University of Maryland, College Park

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

6LoWPAN (IPv6 based Low Power WPAN)

6LoWPAN (IPv6 based Low Power WPAN) 6LoWPAN (IPv6 based Low Power WPAN) Kyung Hee University Nov. 19. 2007 Choong Seon Hong, cshong@khu.ac.kr Outline 2 Overview of 6LoWPAN Transmission of IPv6 Packets over IEEE 802.15.4 WPAN Networks 6LoWPAN

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE ) Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

CSC 574 Computer and Network Security. TCP/IP Security

CSC 574 Computer and Network Security. TCP/IP Security CSC 574 Computer and Network Security TCP/IP Security Alexandros Kapravelos kapravelos@ncsu.edu (Derived from slides by Will Enck and Micah Sherr) Network Stack, yet again Application Transport Network

More information

Prototyping and Evaluation of Mobility First Architecture

Prototyping and Evaluation of Mobility First Architecture Prototyping and Evaluation of Mobility First Architecture Kiran Nagaraja, Ivan Seskar Rutgers, The State University of New Jersey Contact: nkiran (at) winlab (dot) rutgers (dot) edu NSF FIA MobilityFirst

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Virtualization of networks

Virtualization of networks Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering Computing examples: Virtual memory, virtual devices Virtual machines: e.g., Java IBM VM OS from 1960

More information

Requirements from the

Requirements from the Requirements from the collaborative Protection Profile for Network Devices Extended Package (EP) for Wireless Intrusion Detection/Prevention Systems (WIDS/WIPS) Version: 1.0 2016-10-06 National Assurance

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Virtualization in Wireless Networks Feb. 23 th, 2009

Virtualization in Wireless Networks Feb. 23 th, 2009 Virtualization in Wireless Networks Feb. 23 th, 2009 Heejin Lee Keum-mo Park Prof. Chong-kwon Kim Outline Introduction Examples: WLAN virtualization Techniques: Wireless resource isolation Embedding problem

More information

Networking. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Networking. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Networking Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Why is Networking Needed? To enhance many devices Cars communicating to reduce

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Programmable BitPipe. Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs

Programmable BitPipe. Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs Programmable BitPipe Andreas Gladisch VP Convergent Networks and Infrastructure, Telekom Innovation Labs 25.10.2012 How do you program a switch / router today? Vendor N SDK and API Vendor 3 Vendor 2 SDK

More information

Wireless, Mobile, Sensor Technologies and the Future Internet Aug 2, 2005

Wireless, Mobile, Sensor Technologies and the Future Internet Aug 2, 2005 Wireless, Mobile, Sensor Technologies and the Future Internet Aug 2, 2005 Rutgers, The State University of New Jersey D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction 2 Introduction:

More information

Cisco 440X Series Wireless LAN Controllers Deployment Guide

Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco 440X Series Wireless LAN Controllers Deployment Guide Cisco customers are rapidly adopting the Cisco Unified Wireless Network architecture for next generation wireless LAN performance and advanced

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Secure Embedded Wireless Networks

Secure Embedded Wireless Networks Secure Embedded Wireless Networks Prof. Saurabh Bagchi School of Electrical & Computer Engineering, Purdue University September 22, 2010 Product/Service Communication and reprogramming protocol that can

More information

METIS II and Xhaul Projects in 5G PPP. Fang-Chu Chen ICL ITRI On behave of METIS II and Xhaul Consortia

METIS II and Xhaul Projects in 5G PPP. Fang-Chu Chen ICL ITRI On behave of METIS II and Xhaul Consortia METIS II and Xhaul Projects in 5G PPP Fang-Chu Chen ICL ITRI On behave of METIS II and Xhaul Consortia Sept 22, 2015 1 ITRI s Participation in ICT-14 5GPPP Projects - METIS II and Xhaul METIS II : 5G Radio

More information

PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios

PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios PARMA: A PHY/MAC Aware Routing Metric for Ad-Hoc Wireless Networks with Multi-Rate Radios Suli Zhao and Zhibin Wu WINLAB, Rutgers Univ. Piscataway, NJ 8854 {sulizhao, zhibinwu}@winlab.rutgers.edu Arup

More information

Detection of Vampire Attack in Wireless Adhoc

Detection of Vampire Attack in Wireless Adhoc Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,

More information

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY

BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY BYZANTINE ATTACK ON WIRELESS MESH NETWORKS: A SURVEY Sunil Goyal1 M.Tech Student, Deptt. of CSE GKU TalwandiSabo,India Vinod sharma2 Assistant Professor, Deptt. of CSE GKU TalwandiSabo,India Abstract-The

More information