Download presentation
Presentation is loading. Please wait.
1
Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer
2
Outline Routing Protocols Load Balancing Techniques Cluster Computing Software Wireless Security Attacks Conclusion
3
Wireless Adhoc Mode Peer-to-Peer Communication
4
Wireless Infrastructure Mode Communication through Access Point
5
Direct Sequence Spread Spectrum (DSSS)
6
Wireless Range
7
Routing Protocols Dynamic Source Routing (DSR) Destination Sequence Distance Vector (DSDV) Temporary-Ordered Routing Algorithm (TORA) Ad Hoc On-Demand Distance Vector (AODV)
8
Comparison of Routing Protocols Packet Delivery RatioRouting Overhead
9
Diffusive Load Balancing on Domain
10
Windows Management Instrumentation Namespace: root\WMI for signal strength root\CIMV2 for LB information
11
Cluster Computing Software Resource Manager Server Job ManagerClient Manager Application Client Display Manager
12
Wireless Network Display
13
Client to Server Routing 1 Server Client A Client B Routing A
14
Client to Server Routing 2 Server Client A Client B Routing A, B Routing to Server
15
Encryption using Java import javax.crypto.*; import javax.crypto.spec.*; import java.security.*; SecretKey key = KeyGenerator.getInstance("DESede").generateKey(); byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher ecipher = Cipher.getInstance("DESede"); ecipher.init(Cipher.ENCRYPT_MODE, key); // Seal (encrypt) the object s1 = new SealedObject(mat1, ecipher); s2 = new SealedObject(mat2, ecipher); } catch (Exception e) {}
16
Decryption with Java byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher dcipher = Cipher.getInstance("DESede"); dcipher.init(Cipher.DECRYPT_MODE, key); // Unseal (decrypt) the class a = (Matrix)s1.getObject(dcipher); b = (Matrix)s2.getObject(dcipher); } catch (Exception e) {}
17
Java Transformation String Algorithm AES, Blowfish, DES, DESede, RSA, RC2, RC4, RC5 Mode None, CBC (Cipher Block Chaining), CFB (Cipher Feedback Mode), ECB (Electronic Codebook), OFB (Output Feedback Mode), PCBC (Propagating Cipher Block Chaining) Padding No Padding, PKCS5Padding SSL3Padding Default: DES/CBC/PKCS5Padding (64 bits to 128 bits) DES 64 bits to 64 bits: transform = "DES/ECB/NoPadding“
18
Passive attacks to decrypt traffic Destination Eavesdropper Packet 1 XOR Packet 2 = Plaintext Access Point
19
Active attack to inject new traffic Destination Eavesdropper RC4(X) XOR X XOR Y = RC4(Y) Access Point
20
Active attacks to decrypt traffic Eavesdropper Access Point InternetEavesdropper’s Computer Encrypted Message Decrypted Message Decrypted Message
21
Table based Attack Destination Eavesdropper Access Point Table of IV and Key Streams
22
WPA Denial of Service Attack WPA can shutdown the system if it receives two failed packets within a one- second period Wi-Fi Encryption Fix Not Perfect http://www.wired.com/news/business/0,13 67,56350,00.html
23
Conclusion It is possible to improve performance through resource sharing of portable computers In the future, the transfer rate for wireless will be greater therefore reducing transfer time Security is provided for access points but not for ad-hoc mode Encryption is possible through Java with a small overhead factor
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.