Spontaneous Wireless Networking to Counter Pervasive Monitoring
|
|
|
- Angelina Perry
- 10 years ago
- Views:
Transcription
1 Spontaneous Wireless Networking to Counter Pervasive Monitoring E. Baccelli, O. Hahm, M. Wählisch January 15, Pervasive Monitoring is a Myth Pervasive monitoring does not exist for one good reason: if monitoring does happen, as revealed by recent whistleblowing that highlighted the scale of NSA surveillance activities [1], it happens in very few key central locations in the network. Monitoring, as we know it so far, is thus by no means pervasive in the geographical or topological sense. One might further speculate that such monitoring will probably never become pervasive because it would simply be too expensive to put in place. This observation leads to a fundamental question: how could NSA surveillance reach such an incredibly large scope, to the point where it seems pervasive, while in fact, they only monitor the network from a few select locations? The answer to this question is simple: the NSA s monitoring could scale because we are addicted to centralization. From the physical point of view, we made ourselves absolutely dependent on the deployed, fixed infrastructure. Whenever we communicate, the quasi totality of the traffic relies upon going through a central access point of some sort. This approach to networking certainly offers substantial advantages (a good performance/cost compromise for starters), but on the other hand it offers cheap and efficient vantage points for whoever seeks large scale monitoring opportunities. It does not have to be so. Similarly, from the logical point of view, we make ourselves more and more dependent on cloud services. Whenever we store, or access our data, we rely on a centralized architecture that concentrates everything in data centers. Again, this approach offers great advantages (e.g. easier access from anywhere, lower Emmanuel Baccelli is affiliated with INRIA and Freie Universität Berlin. Oliver Hahm is affiliated with INRIA. Matthias Wählisch is affiliated with Freie Universität Berlin. 1
2 cost reliability and efficiency), but on the other hand it offers more cheap and efficient vantage points for would-be spies. It does not have to be so either. 2 Making Massive Surveillance Harder At this point, it becomes apparent that there are essentially three ways to make large scale systematic surveillance a much harder task. The first type of solution is to significantly increase the physical security of potential vantage points. While this type of solution is obviously necessary, history shows that there are always cracks to infiltrate if the will to break in is there. And it will be there. So this type of solution is by no means sufficient. The second type of solution is to significantly increase the default levels of encryption used over the network. For starters, the default behavior should be to encrypt door-to-door and don t let communication be decrypted by intermediate devices. Furthermore the default cryptographic mechanisms should be significantly harder to decipher. Note that to ensure this actually happens consistently, the use of open source software should be mandatory concerning such cryptographic mechanisms. On one hand, as highlighted in [21], open-source bundled with automatic updates can slow down or stop obsolescence altogether, and on the other hand, open source is best known guarantee against malware and potential backdoors. However, if one of the physical end points of the communication is a vantage point of potentially high interest (say a data center), we quickly come back to the problems of the first type of solution, i.e. there are always cracks to infiltrate if the will to break in is there. And it will be there, with an extremely intense focus, because this is a potential vantage point and with an intense focus one can do wonders. The third type of solution is of an entirely different nature, which is the main purpose of this document. Instead of hardening the current architecture and increasing the security of high profile targets, another category of approach could be to aim for target dispersal, as suggested recently by B. Schneier in [2]. Target dispersal would eliminate default vantage points and thus naturally disable systematic mass surveillance. De facto, surveillance efforts would be forced to be more specific and personalized, and thus more directly accountable for. To that end, stateless networking approaches should be developed and employed, i.e. approaches that do not rely on central entities (infrastructure-based), but rather on spontaneous interaction between autonomous peer entities, as locally as possible (topologically and/or geographically). The network architecture should evolve towards a mode of operation where all possible stateless solutions are tried first, before considering any infrastructure-based approach again, the goal being to increase target dispersal. In fact, several examples of stateless approaches have appeared over the last decade, at different layers. These include 2
3 for instance peer-to-peer (P2P) networks or WebRTC [22] at the application layer, and multi-hop spontaneous wireless networks at the network layer [4], such as mobile ad hoc networks [3], wireless sensor networks, vehicular networks, or wireless mesh networks. While P2P networks have been massively deployed and adopted (WebRTC will likely enjoy the same fate) spontaneous wireless networks have not yet been widely adopted. There has however been quite some work in the research community over the past decade on this topic, which has identified issues that must (still) be tackled in order to efficiently adapt IP protocols for these new networks. Actually, the community has already produced a number of new protocol specifications dedicated to spontaneous wireless networking operation, such as [5] [6] [9], [13] among others. Some of these protocols have even been deployed in specific contexts. Several european and american military applications have deployed using mobile ad hoc routing to power spontaneous, on-the-move local communications between elements on-site. In another context, several cities in Europe and in the USA have deployed wireless community mesh networks (e.g. [18] [19]), which use these protocols. Last, but not least, the highly anticipated Internet of Things (IoT) is heavily based on spontaneous wireless networking and the outcome of efforts such as 6LoWPAN [14] or ROLL [15]. Indeed, merging spontaneous wireless networks with traditional, operated networks presents a number of advantages, aside of target dispersal to counter massive surveillance. First, it could offer operator infrastructure offloading [20]. Second, the resulting network would systematically maximize connectivity at marginal cost. Third, it offers natural coverage extension for the network access infrastructure already deployed. And last, it offers increased resilience of the network in face of infrastructure outage. There are of course lingering issues that do not allow off-the-shelf, spontaneous wireless networking at large scale. Among others, such issues include (i) the absence of efficient standard router auto-configuration schemes in this context [12], which has profound implications, (ii) the lack of dedicated, optimized link layer technology (which has focused on infrastructure based networking for decades), (iii) no standard key exchange protocol or alternatives for efficient authentication method to date, and (iv) some fundamental differences in terms of characteristics compared to traditional networks, such as throughput capacity vs number of nodes in the network. However, in light of the recent events revealing massive and systematic surveillance [1], there is a strong argument to decentralize our networking paradigms, and in this realm, spontaneous wireless networking at the networks layer is an asset that should not be overlooked. Contrary to infrastructure-based approaches, which are prone to monitoring, spontaneous wireless networking uses communication links that are local and volatile, i.e. unless one is physically present at the time and location of the communication, one must abandon all hope of 3
4 monitoring anything. While the wireless nature of the communication may on the other hand facilitate eavesdropping, the fact that one has to be there at the time/place of the communication significantly hampers mass surveillance, and cryptographic techniques can provide a privacy equivalent to what is achieved on wire. The honest, technical question that we should ask ourselves at this point is: are the lingering issues of spontaneous wireless networking integration in the IP stack worth solving/improving or not, taking into account our goal to maximize surveillance target dispersal? 3 Position: More Spontaneity Please The position highlighted in this paper is that in order to maximize target dispersal to counter systematic massive surveillance, we should not overlook the full potential of decentralized network paradigms. This full potential includes not only mantras such as think hard before you use the cloud, or let s bypass the service provider but also alternative techniques at the network layer, such as multi-hop spontaneous wireless networking, which could significantly reduce our dependence on the infrastructure which will remain, whether we want it or not, a desirable vantage point for mass monitoring. There are a number of issues that need to be resolved or alleviated towards native and massive integration of spontaneous wireless networks in the currently deployed IP architecture and infrastructure-based networks (massive IPv6 adoption could already help somewhat). However, the gains obtained in terms of target dispersal alone could be worth this cost and there are other gains too. References [1] G. Greenwald, E. MacAskill, L. Poitras, Edward Snowden: the whistleblower behind the NSA surveillance revelations, The Guardian, June [2] B. Schneier, What we know and what we do not know, IETF88 Technical Plenary on Internet Hardening, Vancouver, November [3] M. Corson, J. Macker, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, January [4] J.A. Cordero, J. Yi, T. Clausen, E. Baccelli, Enabling Multihop Communication in Spontaneous Wireless Networks, in ACM SIGCOMM ebook on Recent Advances in Networking, Hamed Haddadi and Olivier Bonaventure (Ed.), Volume 1, Chapter 9, pp , August [5] T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC 3626, October [6] C. Perkins, E. Belding-Royer, S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC 3561, July
5 [7] R. Ogier, F. Templin, M. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), RFC 3684, February [8] D. Thaler, Multi-Link Subnet Issues, RFC 4903, June [9] E. Baccelli, P. Jacquet, D. Nguyen, T. Clausen, OSPF Multipoint Relay (MPR) Extension for Ad Hoc Networks, RFC 5449, February [10] D. Johnson, Y. Hu, D. Maltz, The Dynamic SourceRouting Protocol (DSR) for Mobile Ad Hoc Networks foripv4, RFC 4728, February [11] D. Thaler, Evolution of the IP Model, RFC 6250, May [12] E. Baccelli, M. Townsley, IP Addressing Model in Ad Hoc Networks, RFC 5889, September [13] T. Winter, P. Thubert, RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, IETF Request For Comments, RFC 6550, March [14] IPv6 over Low power WPAN (6lowpan) IETF Working Group, [15] Routing Over Low power and Lossy networks (roll) IETF Working Group, [16] Kotz, D., Newport, C., and C. Elliott, The Mistaken Axioms of Wireless- Network Research, Dartmouth College Computer Science Technical Report TR , [17] E. Baccelli, C. Perkins, Multi-hop Ad Hoc Wireless Communication, IETF Internet Draft draft-baccelli-manet-multihop-communication, [18] Freifunk Wireless Community Networks, online at [19] Austria Wireless Community Network, online at [20] E.Baccelli, F. Juraschek, O. Hahm, T. C. Schmidt, H. Will, M. Wählisch, Proceedings of the 3rd MANIAC Challenge, published on ARXIV, January [21] B. Schneier, Security Risks of Embedded Systems, published online (Blog) risks 9.html, [22] Real-Time Communication in WEB-browsers IETF Working Group, 5
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
MetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force [email protected] Acknowledgement Reference:
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
Unit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles [email protected],[email protected] Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
mlab: A Mobile Ad Hoc Network Test Bed
mlab: A Mobile Ad Hoc Network Test Bed A. Karygiannis and E. Antonakakis National Institute of Standards and Technology {karygiannis, manos}@nist.gov Abstract Over the last few years, research in the area
Name Service in IPv6 Mobile Ad-hoc Network
Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,
Performance comparison and analysis of routing strategies in Mobile ad hoc networks
2008 International Conference on Computer Science and Software Engineering Performance comparison and analysis of routing strategies in Mobile ad hoc networks Fu Yongsheng, Wang Xinyu, Li Shanping Department
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking
6PANview: A Network Monitoring System for the Internet of Things
6PANview: A Network Monitoring System for the Internet of Things 23-August-2011 Lohith Y S, Brinda M C, Anand SVR, Malati Hegde Department of ECE Indian Institute of Science Bangalore Funded by DIT, Government
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
An IEEE 802.11 static mesh network design for isolated rural areas in developing regions
An IEEE 802.11 static mesh network design for isolated rural areas in developing regions Javier Simó Pablo Osuna < [email protected]> Joaquín Seoane Andrés Martínez
A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES
A REVIEW: MOBILE AD-HOC NETWORK PROTOCOLS AND SECURITY ISSUES Ankit Mehto, Hitesh Gupta Department of Computer Science & Engineering, PIT, Bhopal, India ABSTRACT The instant growth of communication takes
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol
, pp. 195-208 http://dx.doi.org/10.14257/ijsia.2015.9.6.19 Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol Haiyan Liu 1, * and Zhanlei Shang 2 Engineering Training
A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks
A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan [email protected] Ashwani Kush Computer Dept, University College Kurukshetra University India [email protected]
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool
1 Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool Rafael De T. Valle 1, Diego Passos 2, Célio Albuquerque 2, Débora C. Muchaluat Saade 1 Abstract This paper
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
Result Analysis of Virtual IP Address Configuration Protocol
Volume 64 No2, February 2013 Result Analysis of Virtual IP Address Configuration Protocol Satinder Kaur MTech Student Amritsar College of Engineering & Technology, Amritsar, Punjab-India- 143001 Tanu Preet
6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt [email protected] 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Routing in the Internet of Things
Routing in the Internet of Things Lotte Steenbrink Ausarbeitung Fakultät Technik und Informatik Studiendepartment Informatik Faculty of Engineering and Computer Science Department of Computer Science Lotte
Proposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation
Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation Zhijiang Chang, Georgi Gaydadjiev, Stamatis Vassiliadis Computer Engineering laboratory, EEMCS, Delft University of Technology
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt John Buford, Avaya Labs Research Topics SAM Charter Recap and Problem Statement AMT(Automatic Multicast Tunneling) Overview
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
Security improvement in IoT based on Software Defined Networking (SDN)
Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,
VirtIX. Virtual Internet Exchange. IPredator et al. virtix.st
Virtual Internet Exchange virtix.st Introducing the Virtual Internet Exchange Managerial summary What is the? The idea of is to build an ISP-level VPN provider for Tier 3 and to allow peering at a Virtual
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Emerging Mobile Networking Architectures
UNCLASSIFIED/UNLIMITED Click here to view PowerPoint presentation; Press Esc to exit Emerging Mobile Networking Architectures Joseph P. Macker, Raymond Cole Code 5520 Information Technology Division U.S.
Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014
Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014
A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS
A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering [email protected] [email protected]
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Project Introduction/Motivation With the emergence of the integrated circuits, the wireless
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
New System Security Model for a Mobile Operator s Meshed Access Network
New System Security Model for a Mobile Operator s Meshed Access Network Sharad Kumar Verma 1, Dr. D.B. Ojha 2 Research Scholar, Department of CSE, Mewar University, Chittorgarh, Rajasthan, India 1 Professor,
Fostering IoT Deployment Challenges and Assets of SDN Techniques
Fostering IoT Deployment Challenges and Assets of SDN Techniques C. Jacquenet [email protected] Slide 1 Outline Context On IoT networking, routing and service design Additional IoT challenges
Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks
Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks Thomas Heide Clausen *, Philippe Jacquet and Laurent Viennot INRIA Rocquencourt, Projet Hipercom, Domaine de Voluceau, B.P.5, 7853 Le Chesnay
Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
LOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks
Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks Saida ELYENGUI, Riadh BOUHOUCHI 2, Tahar EZZEDINE 3.2.3 Communication System Laboratory Sys'Com, National Engineering School
Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing
Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing Jun-Zhao Sun MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland
