Secure Mobile UAV-MBN Network

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

InterMR ( Inter - M ANET R outing for Heterogeneous MANETs) 12-Apr-15 1 SeungHoon Lee, Mario Gerla (UCLA) Starsky H.Y. Wong, Kang-Won Lee (IBM Research)
MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
URSA: Providing Ubiquitous and Robust Security Support for MANET
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
TTDD: A Two-tier Data Dissemination Model for Large- scale Wireless Sensor Networks Haiyun Luo Fan Ye, Jerry Cheng Songwu Lu, Lixia Zhang UCLA CS Dept.
1 Key Establishment in Ad Hoc Networks Part 1 of 2 S. Capkun, JP Hubaux.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
ECMANSI - Energy Conserving Multicast for Ad- Hoc Networks with Swam Intelligence Chaiporn Jaikaeo Vinay Sridhara Chien-Chung Shen.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
The Impact of Multihop Wireless Channel on TCP Throughput and Loss Zhenghua Fu, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla INFOCOM2003,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Landmark Routing for Large Ad Hoc Wireless Networks Globecom 2000 San Francisco, Nov 30, 2000 Mario Gerla, Xiaoyan Hong and Gary Pei Computer Science Department.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
UCAN: A Unified Cellular and Ad Hoc Network Architecture Presenter: Tripp Parker Authors: Haiyun Luo Ramachandran Ramjee Prasun Sinha, Li Erran Li, Songwu.
GENI Experiments on P2P, MANET, WSN Networks Haiying (Helen) Shen, Kuang-Ching Wang, Kang Chen and Ke Xu Clemson University Abstract Today’s society is.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Scalable Routing Protocols for
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
TNA Mobility II By Henry N Jerez. TNA Principles Persistent Identification of all:  Network Components  Services  Users Functionality Abstraction 
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
Repairing Sensor Network Using Mobile Robots Y. Mei, C. Xian, S. Das, Y. C. Hu and Y. H. Lu Purdue University, West Lafayette ICDCS 2006 Speaker : Shih-Yun.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Fixing the replicated Nodes in mobile Sensor Networks GUIDED BY Mr. N.SHIVA KUMAR Presented by K.Sumathy (08c117) C.Bindu Prasad (08c19)
In the name of God.
Routing Metrics for Wireless Mesh Networks
Presented by Edith Ngai MPhil Term 3 Presentation
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Grid Computing Security Mechanisms: the state-of-the-art
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Routing Metrics for Wireless Mesh Networks
Overview of Wireless Networks:
VANET.
AODV-OLSR Scalable Ad hoc Routing
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
DDR-Distributed Dynamic Routing Algorithm for Mobile Ad Hoc Networks
Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Providing Real-time Security Support for Multi-level Ad-hoc Networks
A Study of Group-Tree Matching in Large Scale Group Communications
Outline Introduction Routing in Mobile Ad Hoc Networks
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Sensor Network Routing
Introduction to Wireless Sensor Networks
CSE 4340/5349 Mobile Systems Engineering
Dipanjan Chakraborty Anupam Joshi CSEE University of Maryland Baltimore County Anamika: Distributed Service Discovery and Composition Architecture for.
Presented by Prashant Duhoon
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad hoc Routing Protocols
Routing Metrics for Wireless Mesh Networks
Mobile ad hoc networking: imperatives and challenges
Subject Name: Computer Networks - II Subject Code: 10CS64
Proactive vs. Reactive Routing
Effectiveness of RTS/CTS
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Improving Routing & Network Performances using Quality of Nodes
به نام آنکه هستی نام از او یافت
A Distributed Clustering Scheme For Underwater Sensor Networks
Efficient flooding with Passive clustering (PC) in Ad Hoc Networks
Presentation transcript:

Secure Mobile UAV-MBN Network Jiejun Kong, Kaixin Xu, Haiyun Luo, Daniel Lihui Gu, Mario Gerla, Songwu Lu Challenges Current centralized solutions are incompatible with ad-hoc networks due to mobility, node failure and denial-of-service attack Provide a scalable and robust security solution for a potentially huge ad-hoc network with volatile members and heterogeneous mobile nodes Neighborhood broadcast Responding unicast Security services in mobile networks are supported at anywhere and anytime with a threshold based secret sharing mechanism Simple execution plan with one round-trip communication delay in each locality No single point of privilege and failure Works in very large mobile networks Fully Distributed Security Service Applicable to multi-level UAV-MBN network via damage control zone partitioning Capable of enemy identification Intra-zone and inter-zone security design Recursive SK-aggregation along the hierarchy Cascaded certification by routing gateways Secure zone composition in case of heavy battle loss Battle Ready Security for Multi-level UAV-MBN Mobile Networks Implementation and Simulation Prototype implementation includes public key cryptosystem, Lagrange polynomial threshold secret sharing, and all novel algorithms doing fully distributed certificate renewal, self initialization, and proactive secret share update GloMoSim simulation on UAV-MBN network proves the solution is effective, scalable, and insensitive to mobility Certification overall delay Certification overall overhead Lifetime certification persistence ratio Supported by ONR’s MINUTEMAN project and NSF