Optical Networks & Smart Grid Lab.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Tri-Band RF Transceivers for Dynamic Spectrum Access By Nishant Kumar and Yu-Dong Yao.
1 Virtual Machine Resource Monitoring and Networking of Virtual Machines Ananth I. Sundararaj Department of Computer Science Northwestern University July.
16/19/2015 EFFICIENT PARKING METER MANAGEMENT SYSTEM APRIL 26, 2006 STEPHEN DABIDEEN YIZENIA MORA ADVISORS: DR. ROCH GUERIN AND DR. SALEEM KASSAM.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
A Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks Seung-Jong Park, Ramanuja Vedantham, Raghupathy Sivakumar and Lan.
ESTeem Training Class Radio Technology Overview. Radio Basics Terminology – Familiarization with radio expressions Basic Components – Transmitter – Receiver.
Elec 599 Report: Modeling Media Access in Embedded Two-Flow Topologies of Multi-hop Wireless Networks Jingpu Shi Advisor: Dr. Edward Knightly Department.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
SMART ANTENNA under the guidance of Mr. G.V.Kiran Kumar EC
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
1 © 2006 Nokia pullola_ ppt / Extending Base Station Active Radio Link Set for Improved Uplink Scheduling Esa-Pekka Pullola Supervisor:
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lectures Cellular and PCS Systems.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 11 Cellular and PCS Systems Dr. Stewart D. Personick Drexel.
BLUETOOTH THROUGHPUT IMPROVEMENT USING A SLAVE TO SLAVE PICONET FORMATION By Christophe Lafon and Tariq S Durrani Institute for Communications & Signal.
Components of wireless LAN & Its connection to the Internet
Design, Implementation and Tracing of Dynamic Backpressure Routing for ns-3 José Núñez-Martínez Research Engineer Centre Tecnològic de Telecomunicacions.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Vidya Bharathi Institute of Technology
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
A High Speed USB Digital Pattern Generator and User Interface to Operate a Wireless Implantable Neural Microstimulating System Jim Simpson, Frankie Myers,
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
A Comparison of RaDiO and CoDiO over IEEE WLANs May 25 th Jeonghun Noh Deepesh Jain A Comparison of RaDiO and CoDiO over IEEE WLANs.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Networks on a purpose By Indrani Chakraborty For VIII ICT 1Copyright reserved to
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Securing Interconnect Networks By: Bryan Roberts.
1 Layer 3: Routing & Addressing Honolulu Community College Cisco Academy Training Center Semester 1 Version
[1] TECHNICAL SEMINAR PRESENTATION SMART ANTENNA Edited by: Priyabrata Nayak, Lecturer, Dept. of CSE SMART ANTENNA.
Component 9 – Networking and Health Information Exchange Unit 2-3 Network Media and Hardware Communication Devices This material was developed by Duke.
Unit Communication Hardware
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
Seminar on 4G wireless technology
Instructor Materials Chapter 2 Networks in Our Daily Lives
Transfer of data in ICT systems
Planning & System Installation
Networking and Health Information Exchange
Kunal Amarnani, Ayush Bhardwaj, Angad Kumar Kapoor & Tejas Pargaonkar
Instructor Materials Chapter 1 Ever Wonder How It Works?
SPECTRUM SHARING IN COGNITIVE RADIO NETWORK
Weather Station Weather station design for measuring
Packet Leashes: Defense Against Wormhole Attacks
An Enhancement of WirelessHART Protocol
SMART ANTENNA.
Planning & System Installation
SMART - AKK Department of Electrical and Computer Engineering
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Planning & System Installation
Group 2: Qiuxi Zhu, Buchao Yu, Guoxi Wang
Optical Networks & Smart Grid Lab
Optical Networks & Smart Grid Lab.
Network Basics Extended Learning Module E
Faiza Iqbal Mobile Networks Faiza Iqbal EC-425 Mobile Networks Lab 1.
Smart Homes Automation using Z-Wave Protocol
CPE 401 / 601 Computer Network Systems
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
ECE 4450:427/527 - Computer Networks Spring 2017
Cognitive Radio Networks
Protocols 2 Key Revision Points.
Introduction and Overview
Kyoungwoo Lee, Minyoung Kim, Nikil Dutt, and Nalini Venkatasubramanian
SMART ANTENNA.
WJEC GCSE Computer Science
Department of Electrical Engineering
Introduction to Course
Comp 410 AOS Packet Switching
Presentation transcript:

Optical Networks & Smart Grid Lab. Countering Attackers In Software Defined Radio Networks using Moving Target Defense Isaac Cushman Advisor: Dr. Rami Haddad Department of Electrical Engineering Georgia Southern University

Outline Purpose & Motivation Problem Statement Background Results Conclusion Q & A

Purpose & Motivation Wireless communication is quickly becoming the primary source of data transmission. Network providers are in charge of maintaining very sensitive data stored by their customers. Reality: There is no perfectly secure network system!

Problem Statement Transmission of sensitive data is primarily in danger of being taken from eavesdropping attacks. If it is possible to split the data into multiple pieces and scramble the transmission, then an attacker may only obtain a small fragment and/or not be able to piece it back together.

Background Key Components: Moving Target Defense Software Defined Networks Cloud Database Connectivity

Moving Target Defense MTD is the process of making the attack surface more complex, increasing difficulty for the attacker. Primary strategies: IP address Hopping Port Hopping Frequency Hopping

Software Defined Networks Composed of programmable radios to transmit and receive data. Operate on multiple frequencies within a specific band. Use cloud based synchronization to hop from one frequency to another.

Results Goal: Determine probability of successful eavesdrop attack at varying switching time intervals.

Experimental Design Setup 1x1 Model

4x1 Model

Conclusion The effects of a minimal switching time result in lost packets for users. The probably of sniffed packet when split among four transmitters set at 40 second interval decreases from 14-11% (Max and Min) Further experimentation needed to asses burst packet loss.

Thank You For Your time! Questions?