2. Why?
Fighting with a large
army under your
command is nowise
different from fighting
with a small one: it is
merely a question of
instituting signs and
signals.
- Sun Tzu, The Art of
War
Battlefield 2
David Drager - CSE 603 Spring 2009 2
Screenshot
3. The Challenge
Wireless Adhoc Networks have many military uses
Traditional platforms (mica2, micaz) are not secure
How do we fix these issues?
David Drager - CSE 603 Spring 2009 3
4. Overview
What problems does this paper address?
The objective is to make a secure ad hoc wireless
network.
David Drager - CSE 603 Spring 2009 4
5. Related Work
Protocols for directional antennas – Energy savings
Optical networks – Last mile fix?
Previous work does not focus on security aspect but on
performance
David Drager - CSE 603 Spring 2009 5
6. Antenna Design
Mica2/Micaz platform – omnidirectional dipole
antenna.
These radiate in a doughnut shape pattern
Source: Antennatheory.com
David Drager - CSE 603 Spring 2009 6
8. Beamwidth
How wide of an area the signal can be received
θ = Angle of radiation
David Drager - CSE 603 Spring 2009 8
9. Propagation
Transmitted power decays as R-a
a varies between 2 & 4 depending on the medium
Received Power:
Gain of the transmitter:
David Drager - CSE 603 Spring 2009 9
10. Network Architecture
Hybrid means that we will have both wireless and
optical connection
Optical: means that we will need to lay fiber.
Pros: Fast, latency free, secure; Cons: Hard to deploy
“AP” – Access Point
Wireless: Steerable, Assume has GPS to locate
“MN” – Mobile Node
Red Zones: Enemy listeners or even jammers
David Drager - CSE 603 Spring 2009 10
12. Stealthy Communications
Each MN has info about AP Locations; other MNs
Public Key distribution of all nodes
MN calculates location of closest AP based on location
Routing Tables
David Drager - CSE 603 Spring 2009 12
14. Stealthy Performance
Of multiple nodes:
(200m range): (100m range):
David Drager - CSE 603 Spring 2009 14
15. Conclusions
Hybrid Stealthy Communications Protocol (HSCP) is
able to minimize detection to around .5% when there
are multiple eavesdroppers.
Change power of the MN to receive even better stealth.
This protocol can be used in the battlefield to reach
our original goal.
David Drager - CSE 603 Spring 2009 15