Student: Mallesham Dasari Faculty Advisor: Dr. Maggie Cheng

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
TSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He,
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
An Approach to Flexible QoS Routing Active Networks Proceedings of the Fourth International Workshop on Active Middleware Services(AMS’02) 謝志峰 2002/11/14.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
17/10/2003TCP performance over ad-hoc mobile networks. 1 LCCN – summer 2003 Uri Silbershtein Roi Dayagi Nir Hasson.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Enhancing TCP Fairness in Ad Hoc Wireless Networks using Neighborhood RED Kaixin Xu, Mario Gerla UCLA Computer Science Department
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
UNIVERSITY OF JYVÄSKYLÄ 2005 Multicast Admission Control in DiffServ Networks Department of Mathematical Information Technology University of Jyväskylä.
Designing Reliable Delivery for Mobile Ad-hoc Networks in Robots BJ Tiemessen Advisor: Dr. Dan Massey Department of Computer Science Colorado State University.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
1 On Detection and Concealment of Critical Roles in Tactical Wireless Networks Zhuo Lu University of Memphis Cliff Wang Army Research Office Mingkui Wei.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
DETECTION OF WORMHOLE ATTACK IN MANET
Presenter: Kuei-Yu Hsu Advisor: Dr. Kai-Wei Ke 2013/9/30 Performance analysis of video streaming on different hybrid CDN & P2P infrastructure.
Reporter: Hung-Wei Liu Advisor: Tsung-Hung Lin 1.
MAC Protocols for Sensor Networks
Routing Metrics for Wireless Mesh Networks
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
Speaker Dr. Saloua CHETTIBI Lecturer at University of Jijel
AODV-OLSR Scalable Ad hoc Routing
A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks Name: Patrick Zwane University: National Taipei University of.
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Computing and Compressive Sensing in Wireless Sensor Networks
Video scheduling algorithm
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
Ad Hoc Networks - Performance
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Wireless Ad Hoc Networks by Analogy to Electrostatic Theory
Routing Metrics for Wireless Mesh Networks
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
[Preliminary Simulation Results on Power Saving]
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
[Preliminary Simulation Results on Power Saving]
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Study of performance of regular TCP in MANETs (using simulator).
Subject Name: Adhoc Networks Subject Code: 10CS841
QoS routing Finding a path that can satisfy the QoS requirement of a connection. Achieving high resource utilization.
Modeling and Evaluating Variable Bit rate Video Steaming for ax
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Presentation transcript:

Student: Mallesham Dasari Faculty Advisor: Dr. Maggie Cheng The Role Real Time Network Protocol in Every Industry for the Upcoming World Student: Mallesham Dasari Faculty Advisor: Dr. Maggie Cheng Department of Computer Science, Missouri University Science and Technology 2) New Sequential Change Point Detection Algorithm: SW-CLT Wormhole Detection in a Stationary Network All traffic is redirected to the wormhole tunnel flows: 18-28 and 17-38. No background traffic. Wormhole attacks on 50s 1. Background No requirement about the data characteristics. Use a sliding window to calculate its detection statistics, and the detection threshold is decided based on the Central Limit Theory. m – window size , t – time 0<=t<=n-2m Windows: Compare the difference between the sums of the two windows with a threshold DTh. ) is CDF for standard normal distribution. is a desired false alarm rate. As the windows slide from the low end to the high end of the time series. If Then The algorithm decides a change point has occurred between the boundary of two windows, and report change time μ ̃ = t + m. For a true positive, the detection delay is the time difference between Wormhole attack Fake a route that is shorter than the original one within the network Confuse routing mechanisms which rely on distance between nodes Captures from one wormhole node and replays on the other Easily be launched Out-band wormhole attack Utilizes an external link between the two control points In-band wormhole attack Redirect the traffic to a multi-hop tunnel over existing wireless medium Identify the in-band wormhole in wireless ad hoc network by detecting abrupt increase in end-to-end delay. PLR and E-to-E delay of ASRIMA protocol with respect to Load Impact of packet loss in reconstruction phase Histogram for compressed bit stream 2. Objective The goal is to provide real time environment in multiple industries such as given below: Fake a route that is shorter than the original one within the network Identify the in-band wormhole in wireless ad hoc network by detecting abrupt increase in end-to-end delay. Average PSNR versus PLR and bandwidth B. Wormhole Detection in a Mobile Network Benign case : node 1 and node 2 are moving towards each other. Attack case : route change is caused by wormhole. C. Comparison of SW-CLT and NP-CUSUM Scenario 1 : 18-28 and 17-38 flows Scenario 2 : attack case with three flows:9-24,17-38, and 18-12 RTNP as the Middleware in Multiple Industries 3. The RTNP Protocol 3. Simulation 1) The Sequential Change Point Detection Algorithm Throughput versus time frame Detect a change point in a time series{x1,x2,…, xt , …,}, however, manually-set thresholds or parameters that limit the application. The parametric version CUSUM algorithm is the best when the pre- and post-change distributions are known The non-parametric version CUSUM need to preset threshold and related constant parameter. The repeated sequential probability ratio test (R-SPRT) is used when the distributions are known or can be reliably estimated. 5. Conclusion and Future Work A new in-band wormhole detection SW-CLT method was proposed. Identification of wormhole end nodes and removal the wormhole or mitigation the damage caused by the wormhole in future