1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007.

Slides:



Advertisements
Similar presentations
What Is an Ad Hoc Network?
Advertisements

Exploring User Social Behavior in Mobile Social Applications Konglin Zhu *, Pan Hui $, Yang Chen *, Xiaoming Fu *, Wenzhong Li + * University of Goettingen,
Security in Mobile Ad Hoc Networks
Enhancing DTN capacity with Throwboxes (work-in-progress)
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Preference-based Mobility Model and the Case for Congestion Relief in WLANs using Ad hoc Networks Wei-jen Hsu, Kashyap Merchant, Haw-wei Shu, Chih-hsin.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Delay Tolerant and Opportunistic Networks Past, current and future work
ECGR-6185 ZIGBEE Advanced Embedded Systems University of North Carolina –Charlotte Gajendra Singh Some figures borrowed from Zigbee Alliance web pages.
Network Initiated Handovers T. Melia, J. Korhonen, R. Aguiar, S. Sreemanthula, V. Gupta Based on draft-melia-mipshop-niho-ps-00.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
Arsitektur Jaringan Terkini
Internet Quarantine: Requirements for Containing Self- Propagating Code David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage.
Opportunistic Networking (aka Pocket Switched Networking)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
Wireless Sensor Network Security Anuj Nagar CS 590.
NSF-RPI Workshop on Pervasive Computing and Networking, April 29-30, Self Optimization in Wireless Sensor Networks Bhaskar Krishnamachari Autonomous.
UNDERSTANDING PERIODICITY AND REGULARITY OF NODAL ENCOUNTERS IN MOBILE NETWORKS: A SPECTRAL ANALYSIS Sungwook Moon, Ahmed Helmy Dept. of Computer and Information.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang Fall 2011.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad-hoc Networks
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
Doc.: IEEE /0984r0 Submission September 2008 John R. Barr, Motorola, Inc.Slide 1 Bluetooth test cases with n 40 MHz Date: Authors:
9. Demo Scenario #1 Behavioral profile upon discovering friends/enemies 1)No friends and enemies: search for friends.  Turn by 90 degree and go forward.
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Introduction to Delay Tolerant Networks Tzu-Chieh Tsai Department of Computer Science, National Cheng Chi University.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
How Small Labels create Big Improvements April Chan-Myung Kim
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
1 CEN4500C: Wireless Experiments Background Wireless Measurements: Shao-Cheng Wang ( Encounter-based Networks: Sapon.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
Ad Hoc Network.
An Evaluation of Routing Reliability in Non-Collaborative Opportunistic Networks Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen Institute of Information.
Networking Basics 8th Grade
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
1 Chapter 2: Wireless LANs and PANs  Introduction  Fundamentals of WLANs  IEEE Standard  HIPERLAN Standard  Bluetooth  HomeRF.
RTLAB Real-Time Systems Lab. Kyungpook National University School of Electrical Engineering and Computer Science Sung Ho Park Message Ferrying: Proactive.
Presented by Edith Ngai MPhil Term 3 Presentation
Internet Quarantine: Requirements for Containing Self-Propagating Code
DELAY TOLERANT NETWORK
Mobile &Wireless Computing
CHARACTERISTICS.
Mobile ad hoc networking: imperatives and challenges
Ling-Jyh Chen and Ting-Kai Huang
Presentation transcript:

1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007

2 Agenda Introduction Motivation Examples of Encounter based networking Encounter-based worm interactions Experiment for our class Reference

3 Introduction What is Encounter-based networking –Networking relying on encounter or relationships between nodes (Social networking) –Wireless ad hoc networks –Discontinuous path (Intermittent connection) –Store-and-forward (Bundles) –Similar to delay-and-disruption-tolerant-networking Large delay Low data rate High loss rate Basic assumptions of each node –Persistent storage –Willing to participate –Limitation of Power –Short Radio Range

4 Motivation Why we need encounter-based networks –Reasons? –What we can learn from Experiment 1 and 2 Wireless LAN Coverage on Campus is good for any where and any time computing? How can you analyze of the potential of encounter-based networking? –Step 1: Look where the holes on campus? –Step 2: Analyze the encounter characteristic based on WLAN –Step 3: Do Experiment number 3 –Step 4: ?

5 Examples of encounter-based networks Military tactical networks Disaster relief ZebraNet Interplanetary networks Rural village networks Underwater acoustic networks Other?

6

7 Epidemic Routing

8 Encounter-based worms Future direction on worm attacks!! (Cabir, ComWar) –Rely on encounter pattern/relationships between users. –Close to flooding, i.e. Epidemic routing. –Propagate via Bluetooth connection (10-meter range) Question: How can we alleviate this problem? –Traditional prevention at gateway such as firewall not effective against fully distributed attacks –Disconnected networks  No centralized update Inspired by War of the Worms : CodeGreen worms launched to terminate CodeRed worms Approach: Deploy automated generated predator worm to terminate prey worm  worm interaction

9 Encounter-based worm interaction Predator Prey Susceptible Prey and predator’s infection rate rely only on encounter characteristics

10 Analysis of Worm Interaction S=Susceptible I A = Prey infected hosts I B = Predator infected hosts β = Contact rate

11 Simulation Results Simulation Mathematical Model Closely estimate the infectives when varying reaction times (off 3.8%) encounter rate = contact rate Based on aggressive one-sided interaction Encounter level simulation with 1000 mobile nodes having uniform encounter Reaction time

12 Worm Propagation Based On Encounter Derived from WLAN Trace

13 Worm Interaction Based on Bluetooth i-Mote Traces

14 Experiment Setup Goal: To answer the following questions –Is the UF campus the good target for worm propagation, given that it propagates via Bluetooth? –If so, what places are most vulnerable? –If you want to stop the propagation with other worm, how can you do it effectively? Equipments: iPAQs, your laptops, your strategies Software: Modified Bluechat, Bluetooth Explorer,Netstumbler, AirSnort, etc. Trace format of Modified Bluechat: –Name of device (brand) [MAC Address] Month/Date/Year Hour/Minute/Second

15 Experiment Bluetooth device discovery –Distribution of Bluetooth devices that you encounter during the day E.g. Type of devices such as cell phone or lap top, brand of such devices such as Nokia, Motorola, etc. Bluetooth game  Design the strategies for –Largest of encounter rate per day –Largest number of unique devices –Largest number of stable devices (long-duration encounters) –Different roles between teams e.g. Cops and Cons Bluetooth and WLAN relationships –Can you derive the correlation between them?

16 Example of Bluetooth map

17 Reference E. Anderson, K. Eustice, S. Markstrum, M. Hansen, P. L. Reiher, “Mobile Contagion: Simulation of Infection and Defense” PADS 2005: S. Capkun, J. P. Hubaux, and L. Buttyan "Mobility Helps Security in Ad Hoc Networks" Fourth ACM Symposium on Mobile Networking and Computing (MobiHoc), June 2003 F. Castaneda, E.C. Sezer, J. Xu, “WORM vs. WORM: preliminary study of an active counter-attack mechanism”, ACM workshop on Rapid malcode, 2004 A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass and J. Scott, “Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms” IEEE INFOCOM, April 2006 W. Hsu, A. Helmy, "On Nodal Encounter Patterns in Wireless LAN Traces", The 2nd IEEE Int.l Workshop on Wireless Network Measurement (WiNMee), April 2006 S.Tanachaiwiwat, A. Helmy, "Encounter-based Worms: Analysis and Defense", IEEE Conference on Sensor and Ad Hoc Communications and Networks (SECON) 2006 Poster/Demo Session, VA, September 2006 A. Vahdat and D. Becker. Epidemic routing for partially connected ad hoc networks. Technical Report CS-2000.