Enabling Secure Ad-hoc Group Collaboration over Bluetooth Scatternets Somil Asthana ( ) Dimitris Kalfonos (

Similar documents
The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

BTSpin - Single Phase Distributed Bluetooth Scatternet Formation

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

An On-Demand Bluetooth Scatternet Formation Algorithm

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

Special Issue on Self-organisation in Mobile Networking

ASYNCHRONOUS FORMATION OF NON-HIERARCHICAL BLUETOOTH SCATTERNETS

A self-organising protocol for Bluetooth scatternet formation SUMMARY

Locally Optimal Scatternet Topologies for Bluetooth Ad Hoc Networks

FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Dynamic and Distributed Scatternet Formation Protocol for Real-life Bluetooth Scatternets

Secured network formation for self-organized personal area network

Tsung-Chuan Huang* Chu-Sing Yang. Chao-Chieh Huang. Sheng-Wen Bai

Distributed Self-Healing Bluetooth Scatternet Formation

Distributed, Robust and Self-Organizing Bluetooth Scatternet Formation

Protocol Based on Mobile Agents

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

An Energy-efficient Multihop Scatternet Formation for Bluetooth Networks

Amarjeet Singh. February 7, 2012

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Bluetooth Information Exchange Network

Bluetooth. Basic idea

Lecture Objectives. Lecture and Bluetooth technology. Agenda. IEEE b. Characteristics. Center Frequencies

Forming Connected Topologies in Bluetooth Adhoc Networks An Algorithmic Perspective

Bluetooth: Short-range Wireless Communication

MaCC: Supporting Network Formation and Routing in Wireless Personal Area Networks

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

The Open System Interconnect model

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks

Performance comparison of Bluetooth scatternet formation protocols for multi-hop networks

Time-efficient Algorithms for the Outdegree Limited Bluetooth Scatternet Formation Problem

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

New Bluetooth Interconnection Methods: Overlaid Bluetooth Piconets (OBP) and Temporary Scatternets (TS)

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

On Efficient Topologies for Bluetooth Scatternets

Computer Networks II Advanced Features (T )

Lessons Learned from Implementing a Wi-Fi and BT Stack

101seminartopics.com. Bluetooth Based Smart Sensor Networks

Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling

Distributed Topology Construction of Bluetooth Wireless Personal Area Networks

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems

Wireless Personal Area Networks

Wireless Sensor Networks

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Embedded Systems. 8. Communication

CHAPTER 3 BLUETOOTH AND IEEE

BGN: A novel scatternet formation algorithm for bluetooth-based sensor networks

Forming Scatternets from Bluetooth Personal Area Networks

Bluetooth Demystified

Bluetooth Scatternet Formation for Single-hop Ad Hoc Networks Based on Virtual Positions

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security of Wireless Networks in Intelligent Vehicle Systems

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Sensor Application for Museum Guidance

An Energy-Efficient Scatternet Formation Algorithm for Bluetooth-Based Sensor Networks

A location-aware multicasting protocol for Bluetooth Location Networks

Securing A Bluetooth Device

Guide to Wireless Communications, 3 rd Edition. Objectives

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

Comparative Performance Evaluation of Scatternet Formation Protocols for Networks of Bluetooth Devices

Special Course in Computer Science: Local Networks. Lecture

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Security. Nelli Gordon and Sean Vakili May 10 th 2011

THE rapid adoption of the Internet and mobile wireless

Distributed Topology Construction of Bluetooth Personal Area Networks

Mobile Message Passing using a Scatternet Framework

Networks. 1 Introduction

Advanced Computer Networks

A Dynamic Slot Assignment Scheme for Slave-to-Slave and Multicast-like Communication in Bluetooth Personal Area Networks

An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks

Introduction to Wireless Networking ECE 401WN Spring 2009

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1

Proposed Bluetooth Middleware Profile for On-location Universal Format Announcement

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Collaborative Middleware for Bluetooth-based ad-hoc Wireless Networks on Symbian OS

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India

Inside Bluetooth Low Energy

NETWORK SECURITY. Ch. 3: Network Attacks

Wireless Mesh Networks

PAN-on-Demand: Building self-organizing WPANs for better power management

Wireless# Guide to Wireless Communications. Objectives

How to use Video Conferencing & Desktop Sharing on Magnet Voice

Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet

Bluetooth. Bluetooth Radio

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Top considerations for implementing secure backup and recovery. A best practice whitepaper by Zmanda

An Effective Solution for Bluetooth Adhoc Networking

Multi-hop scatternet formation and routing for large scale Bluetooth networks. Wen-Zhan Song*

Digital Communication Networks

Wireless Network Security Spring 2011

Trust-Propagation Based Authentication Protocol in Multihop Wireless Home Networks

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Lecture Computer Networks

Transcription:

Enabling ecure Ad-hoc Group Collaboration over Bluetooth catternets omil Asthana ( asthana@cse.buffalo.edu ) Dimitris Kalfonos ( dimitris.kalofonos@nokia.com )

Outline Introduction Related Work otivating User cenario Design Goals ecure catternet Topology Formation Protocol ecure catternet Topology Update Protocol Experimental etup Performance Results Conclusions and Future Work

Introduction An application-driven framework to enable secure ad-hoc group collaboration using Bluetooth scatternet. Our scatternet protocol is designed for scenarios like secure group meeting, where individuals can participate with their private piconets. During scatternet formation existing sessions and security associations are maintained. Our scatternet protocol creates loop free compact tree topology. We describe a prototype implementation and provide some initial experimental and simulation results.

Related Work BTH Network Formation Protocol can be divided into following categories: Resulting Topology: esh C. Petrioli and. Basagni. Degree-constraint multihop scatternet formation for Bluetooth networks. In IEEE Globecom,2002. Tree G. Tan, A. iu, J. Guttag, and H. Balakrishnan. An efficient scatternet formation algorithm for dynamic environments. In IATED Comm. and Comp. Networks (CCN'02), 2002. Variant of mesh C. C. Foo and K. C. Chua. Bluerings - bluetooth scatternets with ring structures. In IATED International Conference on Wireless and Optical Communication (WOC'02), 2002. Adaptation Capabilities: tatic T. alonidis, P. Bhagwat, L. Tassiulas, and R. Laaira. Distributed topology construction of bluetooth personal area networks. In IEEE INFOCO, 2001.

Dynamic Related Work contd F. Cuomo, G. Di Bacco, and T. elodia. HAPER: a self-healing algorithm producing multi-hop Bluetooth scatternets. In IEEE Globecom, 2003. Centralized / Decentralized approach: Centralized T. alonidis, P. Bhagwat, L. Tassiulas, and R. Laaira. Distributed topology construction of bluetooth personal area networks. In IEEE INFOCO, 2001. Decentralized G. Zaruba,. Basagni, and I. Chlamtac. Bluetrees - scatternet formation to enable Bluetooth-based ad hoc networks. In IEEE Int. Conf. on Comm. (ICC'01), 2001. None of the above protocols consider the impact of security except Karl E. Persson and D. anivannan. ecure connections in Bluetooth scatternets. In Proceedings of 36 th Hawaii International conference on ystem science, 2003.

otivating User cenario User cenario: John decides to organize a secure meeting with his teammates. Everyone except ary bring their BTH-enabled devices in the meeting. Frank comes with his laptop paired with his mobile phone. John initiates the meeting, passes the meeting name and the password. During scatternet formation Frank continues synchronizing his phone. All of them connect and start exchanging presentations and files. Eventually, ary turns up and requests Frank to let her in the meeting. Frank passes the meeting name and the password and opens the door for her.

Design goals : Design Goals catternet formation involves pre-configured private piconets with existing security associations. Devices should be properly authenticated before associating with the scatternet, new devices can join only by invitation. All scatternet traffic is encrypted. The scatternet formation should involve minimal (if any) user interactions. Once scatternet formation completes the devices dedicate all their energy in communication. Create a topology which simplify routing. BTH 1.1 compliant.

ecure catternet Topology Formation Protocol Our scatternet protocol only allows a master of the piconet called as Pico-Head (PH), to participate. A particular user chooses its PH as ROOT, takes an action like hosting a meeting and enters the scatternet PIN. Other users wanting to participate take an action like joining a meeting and enter their scatternet PIN. Root PH starts scanning (both uiry and page scanning) and other PH start uiring. On successful uiry, the PH pages the discovered PH, which authenticates using the scatternet PIN. If authentication succeeds, devices connect and perform a role-switch. Each PH on attachment starts scanning inviting other free PHs. Once scatternet is formed, all devices stop scanning.

ecure catternet Topology Formation Protocol contd scan scan scan scan scan scan scan scan catternet formation starts catternet formation in progress catternet formation completes

ecure catternet Topology Formation Protocol contd UER A Creating eeting eeting Name : Password : DONE UER B (KEY1) project PIN laptop (KEY1) (KEY1) camera phone mp3player UER A laptop (KEY4) (KEY2) (KEY2) (KEY4) phone UER E mp3player phone UER D phone (KEY4) (KEY4) UER B-E Joining eeting eeting Name : Password : DONE UER C laptop (KEY3) (KEY3) (KEY3) project PIN camera phone mp3player

ecure catternet Topology Update Protocol Our protocol allows new users to join the scatternet by invitation. Participating user takes an action like updating a meeting on any PH. That PH broadcasts an UPDATE scatternet message to all PH in the scatternet and starts scanning. On receiving the UPDATE message each PH starts scanning and becomes a potential attachment point. New user take an action like joining the meeting and enters the scatternet PIN, PH starts uiring. On successful uiry, the PH connects to the discovered PH after proper authentication. Once the scatternet updates all devices stop scanning.

ecure catternet Topology Update Protocol contd UER B Update eeting eeting Name : project Password : PIN DONE (KEY4) UER B (KEY1) laptop (KEY1) (KEY1) (KEY4) camera phone mp3player phone UER A laptop (KEY2) (KEY2) mp3player phone UER E (KEY4) UER D phone UER D-E Joining eeting eeting Name : project Password : PIN DONE (KEY4) UER C laptop (KEY3) (KEY3) (KEY3) camera phone mp3player

Experimental etup Prototyped our scatternet formation protocol using BTH v1.1 compliant hardware, running Linux kernel 2.4.18 with Bluez stack v2.2. We equipped nodes with dual-radios, since no off-the-self BTH hardware supported master/slave (or slave/slave) scatternet operation at that time. imulated our protocol over modified Blueware nssimulator. odified Blueware by introducing important features like periodic page scan mode, randomized uiry/paging start time and fine tuned BTH parameters like page-timeout value, randomized selection of Inquiry Train.

Performance Results catternet Formation Time (sec) 80 70 60 50 40 30 20 catternet Formation Time for Incremental Arrivals Experiment imulation TF (Blueware) Instantaneous connection upon arrival 10 2 3 4 5 6 7 Number of Pico-Heads

Performance Results (contd ) 4 Average path length Average Path Length (hops) 3.5 3 2.5 2 1.5 1 0.5 TF Our Protocol 0 2 4 6 8 10 12 14 16 18 20 Number of Pico-Heads

Conclusions imple scatternet formation protocol to enable secure group collaboration using Bluetooth. Our protocol requires BTH authentication before allowing devices to join the scatternet. Our protocol allows encryption of the inter-(private) piconet and intra-(private) piconet with separate keys. Once scatternet formation completes no device is scanning making scatternet undiscoverable and unconnectable to the intruders.

Future Work Future work will include solving problem where the intruder compromise the network by discovering the scatternet PIN and joining the scatternet. Another challenge is dealing with dynamic environment enhancing existing protocol to provide secure healing protocol. Finally developing access control framework to provide selective and dynamic access to specific scatternet devices.

Thank You