AIA IAS Research Review & Proposals July 14, 2006 Turgay Korkmaz Department of Computer Science UTSA

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Smart Networks Project University of California, Berkeley DARPA NMS PI Meeting Miami, Jan 21-23, 2004.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove
Laboratory of Modelling and Optimizing Information Communication Networks and Services University of Zagreb Faculty of Transport and Traffic Sciences.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Reducing Traffic Congestion in ZigBee Networks: Experimental Results th International Wireless Communications and Mobile Computing Conference (IWCMC)
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
College of Computer Science Karl Lieberherr. Projects Focus on two Projects: –Karl Lieberherr: Demeter and Aspect-Oriented Programming Java tools XML.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Jason Ernst, University of Guelph 1.  Introduction ◦ Background Information ◦ Motivation for Research / Current Problems  Proposed Solution ◦ Algorithm.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
Off By One Power-Save Protocols Corey Andalora Keith Needels.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Md. Abdul Hamid, Muhammad Mahbub Alam, and Choong Seon Hong Networking Lab, Department of Computer Engineering, Kyung Hee University, Korea Presenter :
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Adversary models in wireless security Suman Banerjee Department of Computer Sciences Wisconsin Wireless and NetworkinG Systems (WiNGS)
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Power Controlled Network Protocols for Multi- Rate Ad Hoc Networks Pan Li +, Qiang Shen*, Yuguang Fang +, and Hailin Zhang # +: EE, Florida University.
Support for Multimedia Traffic in Mobile, Distributed, Multiple-Hop Wireless Networks Steven Boyd S.U.R.E. Program 2003.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
Ch 10. Multimedia Communications over WMNs Myungchul Kim
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Wireless Mesh Networks Myungchul Kim
Security in Wireless Networks Mike Swift CSE b Summer 2003.
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
DETECTION OF WORMHOLE ATTACK IN MANET
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Presented by Edith Ngai MPhil Term 3 Presentation
Presentation transcript:

AIA IAS Research Review & Proposals July 14, 2006 Turgay Korkmaz Department of Computer Science UTSA

Overview of Previous Research Research Objective –Investigate how to combat against replay-based attacks that cannot be just dealt with using cryptographic techniques –Develop a protocol to verify physical presence of neighboring wireless nodes Progress –We first consider RTT-based and power-based approaches. We then couple them to design an effective neighbor verification protocol (NVP). –With the extension of this grant, we start investigating topology control, MAC and QoS issues in wireless ad hoc networks. Outcome –Turgay Korkmaz, Wei Zhou, "On Finding Optimal Paths in Multi-radio, Multi-hop Mesh Networks using WCETT Metric", International Wireless Communications and Mobile Computing Conference IWCMC 2006, ACM. July 3 - 6, Vancouver, CanadaIWCMC 2006 –Turgay Korkmaz, Verifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Ad Hoc Networks, International Journal of Information Technology (IJIT), Volume 11 Number 2, 2005 pages Volume 11 Number 2, 2005 –Turgay Korkmaz and Mustafa N.Kaynak, ``Impacts of Channel Reliability on Topology Control in Multi-hop Wireless Networks,'' IEEE VTC 2005-Fall, Sept , 2005, Dallas.IEEE VTC 2005-Fall –Turgay Korkmaz, "Verifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Ad Hoc Networks", IEEE ITCC 2005, Wireless Ad Hoc/Sensor Networks and Network Security track, pages , April 4-6, 2005 Las Vegas, NV, USA.IEEE ITCC 2005 Power-efficient mechanisms for detecting replay-based intruders in wireless ad hoc networks

Proposed Research Objective –Despite their potential benefits, MANETs are currently not able to meet the stringent security and quality-of-service (QoS) requirements in military settings. In this project, we investigate these two key issues and integrate them so that various attacks can be detected/avoided during the QoS-aware operations of the network. Approach –Develop basic mechanisms such as traffic prioritization and packet authentication at MAC layer. (We have some preliminary work here and continue to improve it) –Consider soft QoS techniques across transport, network and data link layers –Consider behavior monitoring to combat both outsider and internal attacks Budget –Two Graduate students $50,000 (12-month stipend and tuition) –Faculty summer support$24,000 (two-month salary and fringe benefits) –Travel $5,000 ($3000 for faculty and $2000 for students) –Supplies/Materials $1,000 Integrated QoS and security mechanisms to support mission critical applications in MANETs

Title:Integrated QoS and security mechanisms to support mission critical applications in MANETs Project DescriptionDeliverables Qtrly. MilestonesBudget & Spending Plan 3 mos. 6 mos. 9 mos. 12 mos. 3 mos. 6 mos. 9 mos. 12 mos $’s Planned Budget= $80k $12,000 $18,000 $69,000 $80,000 Basic QoS and security mechanisms Soft QoS-based networking Integrating QoS and security mechanisms, and conducting performance evaluations using simulations Investigate QoS and security issues in MANTEs and develop integrated solutions to detect/avoid various attacks while providing the required QoS support to mission critical applications Testing and reporting proposed/developed mechanisms  Implementation of proposed QoS and security mechanisms using ns2 and/or glomosim  Publications and reports describing the details of proposed mechanisms and their effectiveness