Secured network formation for self-organized personal area network

Size: px
Start display at page:

Download "Secured network formation for self-organized personal area network"

Transcription

1 Secured network formation for self-organized personal area network Leping Huang, 2, Kaoru Sezaki, Hongyuan Chen 2, T.V.L.N Sivakumar 2, Yoshikatsu Nakagawa 2 Institute of Industrial Science, University of Tokyo, 4-6- Komaba, Meguro-ku, Tokyo, Japan 2 Nokia Research Center Tokyo, Nagata-cho, Chiyoda-ku, Tokyo, , Japan {Leping.Huang, HongYuan.Chen, T.Sivakumar, Yoshikatsu.Nakagawa}@nokia.com sezaki@iis.u-tokyo.ac.jp Abstract Network formation is one of the indispensable steps for personal area networks (PAN) that use radio technologies such as Bluetooth, ZigBee and WiMedia. Existing network formation algorithm assumes that nodes trust and cooperate with each other in exchanging neighbor information and establishing physical link. This assumption may no be true when there is some malicious node in the radio coverage of the network. It is easy for a malicious node to block or disturb the network formation process by either passively dropping information request from other nodes or actively providing incorrect neighbor information. To protect the system from such attack, we propose a solution that includes a secured network formation algorithm, and a decentralized authentication service. The authentication service is based on the webof-trust concept, where link can be established only when two nodes find a path between each other on the web of trust. Secured network formation algorithm is proposed to prevent the attack from compromised inner node. One enhancement to the authentication service to guarantee the connectivity of formed network is also discussed. By using such service, our network formation proposal restricts the formation process within nodes that can be mutually authenticated. This prevents the attack from malicious nodes and guarantees the success ratio of forming a fully connected network. I. INTRODUCTION The recent history of the Internet and of cellular networks has shown that if security of a given network architecture is not properly designed from the very beginning, then the security breaches will be exploited by malicious user. Moreover, introducing or reinforcing security mechanism later can be a painful and expensive process. Security in mobile ad hoc network is particularly difficult to achieveâ notably because of its vulnerability of channels, vulnerability of nodes, absence of infrastructure, dynamic changing topology. The threat to the ad hoc network can be mainly classified into two categories. The first one is the attack on the basic mechanisms of the ad hoc network, such as routing. Prevention of these attacks requires security mechanisms that are often based on cryptographic algorithm. The second one is the attack on the security mechanisms and notably on the key management mechanisms. The research on basic mechanisms focuses on routing protocol because most of current research [][] on ad hoc security assumes a connection-less broadcast-based MAC layer like However, network formation, one critical function for connection-oriented network, is ignored by most of the researchers. In connection-oriented network such as Bluetooth, network formation is one of the indispensable steps before multiple-hop communication. Network formation process coordinates spontaneous nodes to form point-topoint physical links cooperatively. Existing network formation algorithm assumes that nodes trust and cooperate with each other in exchanging neighbor information and establishing physical link. This assumption may no be true when there is some malicious node in the radio coverage of the network. It is easy for a malicious node to block or disturb the network formation process by either passively dropping information request from other nodes or actively providing incorrect neighbor information. This may result in the failure of forming a fully connected network, or a formed network whose network topology is easy to be attacked by malicious user. According to our knowledge, it is the first paper to discuss the security problem in network formation. The rest of the paper is organized as follows. In section 2, we discuss the background information about Bluetooth, its security mechanism, and the state of art of distributed authentication service. Section 3 assesses the Bluetooth network formation process in the respect of network security. Based on the assessment, we propose a solution in section 4, which contains a distributed authentication service based on the concept of web-oftrust and a securely network formation protocol, which forms security-robust network protocol in the absence of authentication service. The connectivity problem when using authentication service is discussed and a simple solution is also presented in section 4. Finally, we conclude this paper in section 5. II. BACKGROUND A. Bluetooth Bluetooth is a promising wireless technology that enables portable devices to form short-range wireless ad hoc network. The basic unit of Bluetooth is piconet, which follows a master-slave TDD architecture between nodes, and can only connect nodes up to 8. So it is a natural requirement to develop technology that can connect multiple piconets to form a large-scale network called scatternet. Scatternet is defined as a group of piconets in which connections exist between different piconets. The node that connects multiple piconets is called PMP (Participant in multiple piconets) in Bluetooth specification. Issues such as how to form a multi-hop

2 network (which is called Network Formation), and how to route packet within scatternet (which is called PAN routing) is still under discussion at Bluetooth SIG. Network formation is not a simple issue, notably because of the connectivity constraint in master and PMP node, network performance, difficulty in collecting neighboring information etc. One major difference between Bluetooth and 802. family radios is that Bluetooth network is connection-oriented, which means any two nodes can not communicate or overhear with each other before establishing a physical link. The Bluetooth specification includes security features at both link level and application level. It supports authentication (unidirectional or mutual) and encryption. These features are based on a secret link key that is shared by a pair of devices. To generate this key a pairing procedure is used when the two devices communicate for the first time. Three security modules are specified in [4]. First, security mode (non-secure): A device will not initiate any security procedure. Second, security mode 2 (service-level enforced security): A device does not initiate security procedures before channel establishment at L2CAP level. This mode allows different and flexible access policies for applications, especially running applications with different security requirements in parallel. Third, security modes 3 (link level enforced security): A device initiates security procedures before the link set-up at the LMP level is completed. Generally, security module 3 is more robust than other two modules. B. Distributed authentication service Authentication service plays a central role in the network security. Asymmetric key cryptography and public key infrastructure (PKI) is widely accepted as the standard authentication service in the Internet. However, it is infeasible to apply the PKI into ad hoc network directly, because the distributed and self-organized characteristics of ad hoc network. In security terms, the self-organized ad hoc network means that there is no centralized trusted third party, no central server, no secret sharing dealer etc. Generally, there are essentially two families of approaches for eliminating a centralized certification authority in a mobile ad hoc network. The first family is to emulate a conventional certification authority by distributing it on several nodes. For example, Zhou [] proposes a distributed authentication service based on the concept of (n, t+) secrete sharing, which allows n parties to share the ability to perform a cryptographic operation (e.g. creating a digital signature) so that t+ parties can perform this operation jointly where it is infeasible for at most t parties to do so, even by collusion. In their proposal, the functionality of trusted third party is distributed to several nodes within the network. It results a trustworthy aggregation by composing otherwise untrustworthy individual entities. The aggregation remains available and correct if some of its entities fail or become compromised. The second family is a totally distributed solution, where nodes authenticate each other by setting up an appropriate context. Most of those proposals are originated from the pretty good privacy (PGP) [3] and the web of trust concept. Web of trust is defined as the trust established based on the chain of certificate certificated by user based on their personal acquaintances. In PGP, each certificate contains several signatures from different users. The trust level of each certificate is calculated from the trust level of nodes that signed this certificate. This, as a result, becomes the trust level to the node that issued this certificate. In [2], the authors extend the PGP by changing the centralized key storage strategy to local certificate repository maintained by each user. When two users want to verify the public keys of each other, they merge their local certificate repositories and try to find appropriate certificate chains within the merged repository that make the verification possible. An example of the web-of-trust concept is given at Figure. U Figure : merging sub-graphs. When user u want to verify the public key of user v, u and v merge their local certificate repositories and v tries to find a certificate chain to u in the merged repositories. III. SECURITY ASSESSMENT OF CURRENT NETWORK FORMATION PROTOCOLS A. Analysis of network formation algorithm Network formation is a cooperative process, which requires the cooperation between all nodes that want to join the network. The process is not trivial, notably because of nodes connectivity constraint, asymmetric role of each node in the scatternet, and device discovery issue. We use Figure 2 to explain those constraints in detail. First, the connectivity constraint: each piconet can only serve nodes up to eight. Many simulation results [9] indicates that it is very inefficient for PMP node to access piconets above 2 simultaneously. So most of the formation algorithm restricts the number of piconet PMP can serve to two. Second, nodes assigned with different role have different forwarding capacity. Master controls the forwarding speed of links between its slaves and itself. The behavior of PMP node influences the throughput of all paths, which pass through this PMP node. Finally, the frequency hopping mechanism used in Bluetooth, cause long delay to find unsynchronized node nearby. Based on the analysis of current network formation process, we think most of the proposals are composed of at most four phases. The explanation of each phase is given below. V

3 Phase : device discovery. One node can be discovered only when it is in inquiry scan status, and receive an inquiry request message, which is sent by another node in inquiry status. The inquiry response message sent by the inquired node discloses its identity information. The objective of most proposals in this phase is to discover all nodes within its radio coverage. Some proposals [5] use symmetric discovery in this phase, where all nodes switch their status between inquiry and inquiry scan independently to discover each other. Other proposals [8] use method called asymmetric discovery, where each node first decide its role (inquiry or inquiry scan) based on a statistical test, then the node in inquiry status is responsible to discover node in inquiry scan mode. Besides, one proposal [9] shortens the formation time by extending the current inquiry reply message with the identity information of nodes that discovered by it. Another proposal [9] propagates the neighboring information to all nodes in the network to share a common network topology between nodes. Phase.5: leader selection: In a distributed system like Bluetooth, each node has even role and partial knowledge about the network. However, nodes involved in Bluetooth network has asymmetric role. Master of the piconet controls the behavior of piconet and its slaves, so it has heavier roles than its slave. The behavior of bridge node between piconets influences the performance of those piconets, so have heavier role than master node. To establish asymmetric relationship between nodes by a distributed manner, some algorithms use leader selection algorithm to select coordinator of scatternet [8] or master of piconet [7]. Elected leader is responsible for establishing the whole scatternet or piconet. Phase 2: piconet formation: Some algorithms form isolated cluster (or piconets) before forming a fully connected network. Piconet formation methods can be classified as distributed and centralized methods. In centralized formation methods, the role of master is decided through leader-selection phase or by topology calculation done at coordinator. In some distributed methods, node switches between page and page-scan mode randomly to compete for the role of master. Other methods decide the role of all nodes by some statistical function, and then do not change their role. Phase 3: scatternet formation: fully connected network is formed in this phase. Some algorithms use distributed approach to form a scatternet, and others use a centralized leader (or super master) to decide on the scatternet topology. 3 M 3 S SP 3 S 3 M MP 2 S 2 S 32 S 3 Master Slave PMP S 2 S 22 Figure 2: Example of scatternet B. Security assessment of network formation algorithm We analyze each phase of network formation process in respect of security. Phase : Device discovery: The objective of device discovery is to find neighbors that is within its radio coverage, or in other words, to establish a visibility graph. If all nodes are within same radio coverage of each other (conference scenario), there is no obvious security problem for both symmetric and asymmetric discovery algorithms because the discovery process between a pair of normal nodes does not depend on the information provided by others. The only exception we found is the extension of inquiry process by attaching discovered nodes identity information in inquiry reply message as discussed in [6]. Nodes that receive this extended inquiry reply message identify the neighbor id listed in the message as its own neighbor. Although this method shortens the time of device discovery, it may be abused by malicious node. Malicious node can tamper the neighbor information it sent in inquiry reply message to disturb the calculation of optimal network topology. In some centralized algorithms like BTCP [7], some node (e.g. network coordinator) requires not only the information of neighbors but also information of nodes out of its radio coverage when calculating the whole network topology. In such algorithm, malicious node can add fake node ID or remove exiting node id from the information in the messages to the network coordinator. Removal of existing node ID results that node to be isolated from the scatternet. Adding of fake node disturbs and blocks the formation process. Phase.5 Leader selection: Leader selection is used in some distributed algorithm. Generally, the selected leader (e.g. scatternet coordinator, master) has more responsibilities than normal nodes. It is less secure when the malicious node takes the responsibility of leader in the network. Malicious user can attack the system by providing incorrect information about itself in voting. By changing the voting right (weight), malicious node can become the coordinator of scatternet [6]. By changing the weight in comparison, malicious node can become the master of one piconet [7]. When a malicious node becomes the coordinator of a scatternet, it can 2 S 23

4 change the topology of network as its wish, which may greatly decrease the robustness and trustworthiness of the network. Phase 2 Piconet formation: In centralized piconet formation, malicious node can influence the leader selection process to become a more important node in the network as discussed in previous clue. If malicious node becomes the master of a piconet, it can refuse its responsibility like connecting its slaves, or refuse the normal signaling to super-master which may disturb the network formation process. This problem will not happen in distributed piconet formation algorithm, because all nodes compete with each other to become the scatternet leader. If one node refuses to take the responsibility of network formation, others will form the network instead. It means autonomous piconet formation is more robust to such DoS(Denial of Service) attack. However, distributed algorithm also has its own drawback. In algorithm like Bluenet [5], all nodes refuse new connection request after it has been connected by a node as slave. In such algorithm, anonymous piconet formation is not robust in respect of security because malicious node can block nodes from joining the scatternet by establishing link between it. Such attack is called as useless connection attack in the paper. Phase 3 Scatternet formation: Similar to the piconet formation, centralized formation algorithm is easy to be disturbed by DoS attack, while distributed scatternet formation is easy to be disturbed by useless connection attack. C. Summary of security attack Denial of service attack: This type of attack includes any non-cooperative behavior in network formation process. It includes denial of forming piconet, denial of providing neighboring information etc. Besides, abusing of timeout and confirmation signal mechanism can also be classified into this category. Topology attack: The basic topology of Bluetooth is starshaped piconet. Some algorithms like bluetree [8] and Min-te [9] forms tree-based Bluetooth network, which is thought to be low efficiency protocol. Tree topology is also not robust from security and reliability point of view. The failure of root node will break the communication of the whole network. If root node is compromised by malicious node, the compromised root node can monitor/intercept all communication within the network. Other algorithms like bluenet [5], clustering [0] does not analyze about the characteristics of their topology clearly. From graph theory point of view, it is better to increase the connectivity of graph(minimum number of path between any two sub graph of network) between piconets, which can improve the network reliability and security. If one malicious node is identified, the communication can be switched to an alternative path easily. In this sense, bluering [6], which form a ring between nodes, are robust than distributed clustering. Malicious node can provide incorrect information to influence the formed topology. Useless connection: Because each Bluetooth node can connects to only one node when it is slave and at most seven nodes when it is master. The recommended upper limit for bridge node is two. Malicious user can attack the system by utilizing such connection degree constraint. For example, nodes in Bluenet switch between page and page scan periodically. When a node is connected with others as slave, it will refuse connection from others. A malicious user can block the communication of that node with others by connecting to it. Incorrect information attack malicious node can make such attack by providing incorrect information in leader selection, visibility graph/neighbor discovery, and piconet master selection etc. IV. PROPOSED SECURED NETWORK FORMATION PROTOCOL Based on the analysis above, we notice that the cooperative nature of network formation process results in serious security problem. We propose a new formation protocol to alleviate and alleviate such security problem. In our proposal, we assume that each node has a partial list of the trusted nodes in the network initially. When a node begins network formation process, it only cooperates with nodes, which are listed in its trust list. After two trusted nodes establish a physical link, they exchange and merge their trust list, which increases the number of trusted nodes in the list of both nodes. The link establishment between trusted node and merge of trust list between two end nodes of newly established link is executed recursively. Although initially each node only contains small amount of trusted nodes in the network, the list increase along with the new link establishment. As a result, we assume that our proposal will not decrease the network connectivity, but blocks the malicious nodes from joining network formation process. Our proposal consists of two components. The first component is a distributed authentication service, which is proposed to prevent the intruder from jointing network formation process. The second component is a network formation protocol optimized in respect to security, which avoids some critical security problem like topology, mutual voting we mentioned in previous section. The second component is proposed to alleviate the attack launched by compromised internal nodes. We discuss the protocol in detail below. A. Authentication service The authentication service is designed as an extension to Bluetooth security mode 2(service level security). Within network formation process, all nodes should be configured in security mode 2. We illustrate the link establishment process with extended service level security in Figure 3. The major difference between original procedures is marked with gray color. The security DB is configured with the trusted node list deduced from trust graph. The trust graph is exchanged and updated whenever a new link is established. The method to

5 establish the distributed trust is generally based on Hubuax s proposal [3]. Figure 3: illustration of extended channel establishment process, the function block filled with gray color is from our own modification. Original graph: Vol.3 Part C section 5.2 Figure 5.2 of Bluetooth.2 draft 4 B. Security-robust formation protocol Based on the security assessment analysis done in previous section, we select the components for each of the four phases separately, and then compose a new network formation protocol. The detailed algorithm is listed below. Phase : symmetric device discovery: symmetric device discovery dos not have any security problem. Phase.5: mutual voting is done between trusted nodes. To prevent the selected coordinator to make a fake topology, the network connectivity graph (visibility graph) is also propagated to all masters in addition to the selected coordinator. All of those nodes run the same algorithm to calculate the optimal topology. The optimal topology calculated by each master will be compared with peer masters and the coordinator. If any node detects the mismatch between two topologies, the network formation process should be terminated/reviewed at that time. The formula to calculate the network topology is based on BTCP. Phase 2: Piconet formation: same as BTCP Phase 3: Scatternet formation: same as BTCP C. Mismatch problem and its solution Although the proposed authentication service enhances the security level in network, it may increase the network formation time and causes connectivity problem when the node distributes very sparsely. We define the connectivity problem as the increase of disjoint subnet. This problem is caused by the mismatch between the trust graph (each line in the graph indicates the direct trust relationship between node pair) and visibility graph (each line in the graph indicates one node within the radio coverage of another node). Figure 4 illustrates an example of this problem. When node 2 detects that node 4 is within its radio coverage, it cannot connect to node 4 because node 4 is listed in its trust list. However, we find that node 2 and 4 share the common neighbor node 6 in trust graph. As a result, it is possible to establish a link between node 2 and node 4 securely in the absence of node 6. But this cannot be realized by current authentication solution. When the node 6 is not in the network at the time of network formation, the link 2-4 cannot be established (connectivity problem). When the node 6 is within the network, but within neither node 2 or 4 s radio coverage, link 2-4 can not be established until the trust relationship between node 2 and 4 is propagated to either node 2 or 4 after merge of trust graph. This increases the network formation time. We propose following extension to solve this problem. Extension to authentication service: Inquiry request message is extended with the broadcast of trust list. When a node receives an inquiry request, it compares its own trust list with received list. If two node lists has some common neighboring trust node, the inquiring node is identified as potential securely connectable node by inquired node. Inquired node will utilize this information to try link establishment between inquiring nodes Line of Visibility graph Line of trust graph Figure 4: illustration of mismatch problem between visibility graph and trust graph V. CONCLUSION AND FUTURE WORK In this paper, we assessed the network formation protocol in respect of security. New network formation protocol with authentication service is proposed based on the security assessment. The connectivity problem caused by the mismatch of trust graph and radio visibility graph is also discussed in this paper. In the future, we will further

6 our research on solving the problem of mismatch between trust graph and radio coverage graph. VI. REFERENCE [] L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 3, pp , 999. [2] Hubaux, J., L. Buttyan, et al. (200). The Quest for Security in Mobile Ad Hoc Networks. Mobile Ad Hoc Networks Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). [3] P. Zimmermann. The official PGP User s Guide, MIT Press, 995 [4] Bluetooth SIG: Bluetooth Specification.2 draft 4, 2003 [5] Wang, Zhifang, Thomas, R.J. and Haas, Z., Bluenet- a New Scatternet Formation Scheme, Proc. 35th Hawaii Intern. Conf. on System Sciences, pp , [6] T. Salonidis, P. Bhagwat, L. Tassiulas, and R. Lamaire. Distributed topology construction of Bluetooth personal area networks. In Proceedings of INFOCOM'200. [7] Ting-Yu Lin, Yu-Chee Tseng, Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths, 36th Annual Hawaii International Conference on System Sciences (HICSS'03) [8] Gergely V. Zruba, Stefano Basagni and Imrich Chlamtac: Bluetrees -- Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks, IEEE, 200, ISBN [9] G.V. Zaruba, S. Basagni, I. Chlamtac, Bluetrees - scatternet formation to enable Bluetooth-based ad hoc networks", IEEE International Conference on Communications (ICC) 200, pp [0] M. Sun, C.K. Chang and T.H. Lai, "A Self-Routing Topology for Bluetooth Scatternets," Proc. I-SPAN 2002, pp. 3-8, Manila, Philippines, May [] L. B. a. J. P. Hubaux, "Report on a Working Session on Security in Wireless Ad Hoc Networks," Mobile Computing and Communications Review, VII. APPENDIX Phase Name Explanation Security problem Device discovery Symmetric Nodes switch between inquiry/inquiry scan not found Asymmetric each node decide its role by running some statistical test not found Not defined device discovery phase is omitted because it is done along with scatternet formation or as pre-knowledge not found symmetric/indirect enhancement of symmetric method by aggregating enhancement neighboring info collected by neighbor as its own Tampering the topology of whole network is sent to one node through network-wide discovery some intermediate nodes Tampering, DoS leader selection Manual Leader is defined manually. mutual voting leader is selected through voting between each other change votes comparison betweensuper master is selected from master of formed piconet based master on some criteria change value of criteria Piconet formation Distributed-symmetric distributed-asymmetric node switch between page and page-scan, each node compete for master useless connection node decided its role by statistical function, and do not change its role useless connection Centralized the role of master is decided by leader-selection or topology calculation done in coordinator DoS the topology betweens clusters (piconets) is decided bytopology attack, DoS, Scatternet formation Centralized electing super master wrong info Distributed each piconet try to connects to several neighboring piconet topology attack, wrong info Topology Tree hierarchical tree point of failure scatternet is formed through connection between piconet, mesh(something of star) which results in not found

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation

More information

FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES

FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES Paal Engelstad, Do Van Thanh, Tore E. Jonvik University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do, Tore-erling.Jonvik

More information

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks : A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks Chu Zhang, Vincent W.S. Wong, and Victor C.M. Leung Department of Electrical and Computer Engineering The University of British

More information

ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS

ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS Paal Engelstad, Tore E. Jonvik, Do Van Thanh, University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, tore-erling.jonvik,

More information

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices Stefano Basagni Dept. of Electrical and Computer Engineering Northeastern University E-mail: basagni@ece.neu.edu Chiara Petrioli

More information

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network Hemali Kotak 1, Hiteishi Diwanji 2 1 A.V.P.T.I. /Comp. Deptt, RAJKOT,INDIA Email: Hemali@yahoo.com 2 L.D. ENGG. College/Comp.

More information

A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets

A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets Deepak Jayanna, Gergely V. Záruba Department of Computer Science and Engineering, The University of Texas at

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Tsung-Chuan Huang* Chu-Sing Yang. Chao-Chieh Huang. Sheng-Wen Bai

Tsung-Chuan Huang* Chu-Sing Yang. Chao-Chieh Huang. Sheng-Wen Bai Int. J. Computational Science and Engineering, Vol. 2, Nos. 1/2, 2006 23 Hierarchical Grown Bluetrees (HGB): an effective topology for Bluetooth scatternets Tsung-Chuan Huang* Department of Electrical

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Distributed Self-Healing Bluetooth Scatternet Formation

Distributed Self-Healing Bluetooth Scatternet Formation Distributed Self-Healing Bluetooth Scatternet Formation K. Persson and D. Manivannan Laboratory for Advanced Networking Computer Science Department University of Kentucky Lexington, KY 40506 E-mail: {karl,mani}@cs.uky.edu

More information

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith

More information

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( ) Dimitris Kalfonos (

Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( ) Dimitris Kalfonos ( Enabling ecure Ad-hoc Group Collaboration over Bluetooth catternets omil Asthana ( asthana@cse.buffalo.edu ) Dimitris Kalfonos ( dimitris.kalofonos@nokia.com ) Outline Introduction Related Work otivating

More information

Special Issue on Self-organisation in Mobile Networking

Special Issue on Self-organisation in Mobile Networking EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. 2005; 16:483 493 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/ett.1064 Special Issue on Self-organisation

More information

Cross-layer Optimized Routing for Bluetooth Personal Area Network

Cross-layer Optimized Routing for Bluetooth Personal Area Network Cross-layer Optimized Routing for Bluetooth Personal Area Network Leping Huang, Hongyuan Chen, T.V.L.N Sivakumar and Kaoru Sezaki Nokia Research Center Tokyo; 2-13-5 Nagata-cho, Chiyoda-ku, Tokyo, Japan

More information

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks Han Sang Kim, Jin Wook Lee*, Sandeep K. S. Gupta and Yann-Hang Lee Department of Computer Science and Engineering Arizona

More information

A self-organising protocol for Bluetooth scatternet formation SUMMARY

A self-organising protocol for Bluetooth scatternet formation SUMMARY 1 1 1 1 1 0 1 0 EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. 00; 1:1 Published online in Wiley InterScience (www.interscience.wiley.com). DOI:.0/ett. A self-organising protocol for

More information

Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation

Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation 1 Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation Navendu Jain Nitin Pabuwal B. N. Jain University of Texas at Austin Amazon Indian Institute of Technology, Delhi nav@cs.utexas.edu

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,

More information

A Framework of Decentralized PKI Key Management Based on Dynamic Trust

A Framework of Decentralized PKI Key Management Based on Dynamic Trust A Framework of Decentralized PKI Key Management Based on Dynamic Trust Zhiqian Xu 1 and Hai Jiang 2 1 FedEx Corporation, Collierville, TN, U.S.A. 2 Dept. of Computer Science, Arkansas State University,

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks A Two-hase Scatternet Formation rotocol for luetooth Wireless ersonal Area Networks Yoji Kawamoto 1, Vincent W.S. Wong 2, and Victor C.. Leung 2 1 Network & Software Technology Center, Sony Corporation,

More information

Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks

Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks Wireless Netw (2009) 15:209 226 DOI 10.1007/s11276-007-0036-7 Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks Zhifang Wang Robert J. Thomas Zygmunt J. Haas Published

More information

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks

The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks Somil Asthana Department of Computer Science State University of New York Buffalo, NY 14226 asthana@cse.buffalo.edu

More information

Networks. 1 Introduction

Networks. 1 Introduction Bluetrees-Scatternet Formation to Enable Bluetooth-Based Ad Hoc Networks Gergely V. ZBruba, Stefan0 Basagni, and Imrich Chlamtac Center for Advanced Telecommunications Systems and Services (CATSS) Erik

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

An On-Demand Bluetooth Scatternet Formation Algorithm

An On-Demand Bluetooth Scatternet Formation Algorithm An On-Demand Bluetooth catternet Formation Algorithm Elena Pagani, Gian Paolo Rossi, and tefano Tebaldi Computer cience Dept., Università degli tudi di Milano {pagani,rossi}@dico.unimi.it, tefano.tebaldi@unimi.it

More information

Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem

Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem Ahmed Jedda, Guy-Vincent Jourdan and Hussein T. Mouftah School of Electrical Engineering and Computer Science

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging

More information

Mobile ad hoc networks Various problems and some solutions

Mobile ad hoc networks Various problems and some solutions Mobile ad hoc networks Various problems and some solutions Humayun Bakht School of Computingand Mathematical Sciences Liverpool John Mores University Email:humayunbakht@yahoo.co.uk Main Focus Problems

More information

A Survey of BGP Security Review

A Survey of BGP Security Review A Survey of BGP Security Review Network Security Instructor:Dr. Shishir Nagaraja Submitted By: Jyoti Leeka November 16, 2011 1 Introduction to the topic and the reason for the topic being interesting Border

More information

BISS: Building secure routing out of an Incomplete Set of Security associations

BISS: Building secure routing out of an Incomplete Set of Security associations BISS: Building secure routing out of an Incomplete Set of Security associations Srdjan Čapkun and Jean-Pierre Hubaux Secure routing in ad hoc networks - Common assumptions for secure routing: - a network

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Public Key Management Scheme with Certificate Management Node for Wireless Ad Hoc Networks

Public Key Management Scheme with Certificate Management Node for Wireless Ad Hoc Networks Proceedings of the International Multiconference on Computer Science and Information Technology pp. 445 451 ISSN 1896-7094 c 2006 PIPS Public Key Management Scheme with Certificate Management Node for

More information

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks BHARAT.VEERLA *1, and SREERAMA MURTHY #2 * Student, Dept of CSE, Sree Vahini Institute of Science and

More information

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks

Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks International Journal of Computational Engineering Research Vol, 03 Issue, 4 Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks 1, K. Priyadharshini, 2, V. Kathiravan, 3,

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems J. Parallel Distrib. Comput. 66 (2006) 1243 1258 www.elsevier.com/locate/jpdc BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems Chao-Tsun

More information

An Effective Solution for Bluetooth Adhoc Networking

An Effective Solution for Bluetooth Adhoc Networking An Effective Solution for Bluetooth Adhoc Networking by Sijun Jia A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Science in THE FACULTY OF GRADUATE STUDIES (Computer

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Secure Routing for Mobile Ad-hoc Networks

Secure Routing for Mobile Ad-hoc Networks Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)

More information

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR

Routing Security in Mobile Ad Hoc Networks: An Extension of DSR Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (1): 155-159 Scholarlink Research Institute Journals, 2011 (ISSN: 2141-7016) jeteas.scholarlinkresearch.org Journal of Emerging

More information

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

More information

Distributed Topology Construction of Bluetooth Wireless Personal Area Networks

Distributed Topology Construction of Bluetooth Wireless Personal Area Networks 1 Distributed Topology Construction of Bluetooth Wireless Personal Area Networks Theodoros Salonidis, Member, IEEE, Pravin Bhagwat, Leandros Tassiulas, Member, IEEE, and Richard LaMaire Abstract Bluetooth,

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:  Volume 4, Issue VI, June 2016 ISSN SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Implementation: Detection of Blackhole Mechanism on MANET

Implementation: Detection of Blackhole Mechanism on MANET Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014

More information

A Review on Black Hole Attack in MANET

A Review on Black Hole Attack in MANET A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,

More information

Bluetooth Information Exchange Network

Bluetooth Information Exchange Network Bluetooth Information Exchange Network Xiaoning (Linda) Liu A thesis submitted to AUT University In partial fulfilment of the requirements for the degree of Master of Engineering (ME) October 2008 School

More information

Trust in Ad hoc Networks A Novel Approach based on Clustering

Trust in Ad hoc Networks A Novel Approach based on Clustering Trust in Ad hoc Networks A Novel Approach based on Clustering J. Boodnah and E.M. Scharf Department of Electronic Engineering, Queen Mary, University of London Abstract Ad hoc Networks by virtue of their

More information

An overview of Trust, Naming and Addressing and Establishment of security associations

An overview of Trust, Naming and Addressing and Establishment of security associations Security and Cooperation in Wireless Networks Georg-August University Göttingen An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models;

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks

An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks LI XIANG, YANG XIAO ZONG School of Computer Science and Technology Harbin Institute of Technology No.92, West Da-Zhi Street, Harbin,

More information

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION

EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION EXPEDITE MESSAGE AUTHENTICATION PROTOCOL FOR VANETs USING DATA AGGREGATION Shaiba Wahab Dept. Of Computer Science and Engineering M.E.A. Engineering College Perinthalmanna, Kerala Jemsheer Ahmed P Dept.

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Cluster Based Group Key Management in Mobile Ad hoc Networks

Cluster Based Group Key Management in Mobile Ad hoc Networks 42 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 Cluster Based Group Key Management in Mobile Ad hoc Networks Renuka A. and K.C.Shet, Dept. of Computer Science

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices Wireless Networks 10, 197 213, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

More information

Cooperation and Accounting Strategy for Multi-hop Cellular Networks

Cooperation and Accounting Strategy for Multi-hop Cellular Networks Cooperation and Accounting Strategy for Multi-hop Cellular Networks Attila Weyland Torsten Braun {weyland braun}@iam.unibe.ch Institute of Computer Science and Applied Mathematics University of Bern Neubrückstrasse

More information

STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS

STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS Soumyasri S M 1, Dr. Rajkiran Ballal 2 and Ramakrishna Hegde 3 1,2 Computer Science, SDM College, Ujire, Electrical & Electronics,

More information

Security Issues in Mobile (Wireless) Ad Hoc Networking

Security Issues in Mobile (Wireless) Ad Hoc Networking Security Issues in Mobile (Wireless) Ad Hoc Networking Christopher Levari Department of Computing Macquarie University Sydney, NSW, Australia clevari@cox.net Abstract Technology and communication have

More information

Inside Bluetooth Low Energy

Inside Bluetooth Low Energy Inside Bluetooth Low Energy Naresh Gupta BOSTON LONDON artechhouse.com Contents Preface Acknowledgments Foreword xix xxiii xxv Introduction 1 1.1 Introduction to Wireless Communication 1 1.2 Data Rates

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

Secure routing in ad hoc and sensor networks

Secure routing in ad hoc and sensor networks Security and Cooperation in Wireless Networks Secure routing in ad hoc and sensor networks routing in ad hoc networks; attacks on routing; countermeasures and secured routing protocols; routing security

More information

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp

More information

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions Yu Wang Dept. of Computer Science Illinois Institute of Technology Chicago, USA wangyu1@iit.edu Ivan Stojmenovic

More information

MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks

MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks MaCC: Supporting Network ormation and Routing in Wireless Personal rea Networks Makoto Takizawa Hiroto ida Masato Saito Graduate School of Media and Governance, Keio University {makoto, haru, masato}@ht.sfc.keio.ac.jp

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

SIP-Based Multimedia Services Provision in Ad Hoc Networks

SIP-Based Multimedia Services Provision in Ad Hoc Networks SIP-Based Multimedia Services Provision in Ad Hoc Networks Y. Rebahi, D. Sisalem, U. Depirianto Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 31 10589 Berlin, Germany {rebahi, sisalem, depirianto}@fokus.fraunhofer.de

More information

A Collaborative Network Security Management System in Metropolitan Area Network

A Collaborative Network Security Management System in Metropolitan Area Network 211 Third International Conference on Communications and Mobile Computing A Collaborative Network Security Management System in Metropolitan Area Network Beipeng Mu and Xinming Chen Department of Automation

More information

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

IT is widely anticipated that fourth-generation wireless

IT is widely anticipated that fourth-generation wireless IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 6, JUNE 2003 779 Configuring BlueStars: Multihop Scatternet Formation for Bluetooth Networks Chiara Petrioli, Member, IEEE, Stefano Basagni, Member, IEEE, and

More information

A survey on AODV routing protocol for AD-HOC Network

A survey on AODV routing protocol for AD-HOC Network A survey on AODV routing protocol for AD-HOC Network Parveen Kumar Jatin Sharma Kriti saini Astt. Professor Research fellow Research fellow Dept. of Computer Science Dept. of Computer Science Dept. of

More information

Routing Security in Wireless Ad Hoc Networks

Routing Security in Wireless Ad Hoc Networks TELECOMMUNICATIONS NETWORK SECURITY Routing Security in Wireless Ad Hoc Networks Hongmei Deng, Wei Li, and Dharma P. Agrawal, University of Cincinnati This work has been supported by the Ohio Board of

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Bluetooth. March 28, 2005 Patrick Lui

Bluetooth. March 28, 2005 Patrick Lui Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Trusted Platform for Mobile Devices: Challenges and Solutions

Trusted Platform for Mobile Devices: Challenges and Solutions Trusted Platform for Mobile Devices: Challenges and Solutions Lily Chen Motorola Inc. May 13, 2005 Outline Introduction Challenges for a trusted platform Current solutions Standard activities Summary New

More information

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe Talk Overview Security has been one of the great detractors for wireless technologies (and

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Security issues and vulnerabilities in Mobile Ad hoc Networks (MANET)-A Survey

Security issues and vulnerabilities in Mobile Ad hoc Networks (MANET)-A Survey Security issues and vulnerabilities in Mobile Ad hoc Networks (MANET)-A Survey P.Visalakshi, 1 S.Anjugam 2 1, 2 Asst.Professor (Selection Grade) Department of Computer Applications SRM University, Kattankulathur,

More information