SlideShare una empresa de Scribd logo
1 de 17
Written by Durresi, Paruchuri and Barolli
                                   2008
Why?
Fighting with a large
army under your
command is nowise
different from fighting
with a small one: it is
merely a question of
instituting signs and
signals.
- Sun Tzu, The Art of
War




                                                           Battlefield 2
                      David Drager - CSE 603 Spring 2009                   2
                                                           Screenshot
The Challenge
 Wireless Adhoc Networks have many military uses


 Traditional platforms (mica2, micaz) are not secure


 How do we fix these issues?




              David Drager - CSE 603 Spring 2009        3
Overview
What problems does this paper address?

The objective is to make a secure ad hoc wireless
 network.




               David Drager - CSE 603 Spring 2009   4
Related Work
 Protocols for directional antennas – Energy savings


 Optical networks – Last mile fix?


 Previous work does not focus on security aspect but on
 performance




               David Drager - CSE 603 Spring 2009          5
Antenna Design
 Mica2/Micaz platform – omnidirectional dipole
  antenna.
 These radiate in a doughnut shape pattern




                                                   Source: Antennatheory.com
              David Drager - CSE 603 Spring 2009                               6
Directional Antennas
 Patch Antenna


 Horn Antenna


 Dish Antenna




             David Drager - CSE 603 Spring 2009   7
Beamwidth
 How wide of an area the signal can be received


 θ = Angle of radiation




              David Drager - CSE 603 Spring 2009   8
Propagation
 Transmitted power decays as R-a
 a varies between 2 & 4 depending on the medium
 Received Power:



 Gain of the transmitter:




               David Drager - CSE 603 Spring 2009   9
Network Architecture
 Hybrid means that we will have both wireless and
  optical connection
Optical: means that we will need to lay fiber.
Pros: Fast, latency free, secure; Cons: Hard to deploy
“AP” – Access Point
Wireless: Steerable, Assume has GPS to locate
“MN” – Mobile Node

Red Zones: Enemy listeners or even jammers

               David Drager - CSE 603 Spring 2009        10
Network Architecture




       David Drager - CSE 603 Spring 2009   11
Stealthy Communications
 Each MN has info about AP Locations; other MNs
 Public Key distribution of all nodes


 MN calculates location of closest AP based on location


 Routing Tables




               David Drager - CSE 603 Spring 2009          12
Stealthy Performance
Probability of detection:



               With one node:




               David Drager - CSE 603 Spring 2009   13
Stealthy Performance
 Of multiple nodes:



        (200m range):                              (100m range):




              David Drager - CSE 603 Spring 2009                   14
Conclusions
 Hybrid Stealthy Communications Protocol (HSCP) is
 able to minimize detection to around .5% when there
 are multiple eavesdroppers.

 Change power of the MN to receive even better stealth.


 This protocol can be used in the battlefield to reach
 our original goal.


               David Drager - CSE 603 Spring 2009          15
David Drager - CSE 603 Spring 2009   16
Questions?


  David Drager - CSE 603 Spring 2009   17

Más contenido relacionado

Similar a Hybrid Stealthy Networks - Paper Presentation

RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignNETSCOUT
 
Ehternet Security "Unplugged" .pptx
Ehternet Security "Unplugged" .pptxEhternet Security "Unplugged" .pptx
Ehternet Security "Unplugged" .pptxTony Lauro
 
National building code 2016 by (bis) and Product Offering by JMV LPS LTD
National building code 2016 by (bis) and Product Offering by  JMV LPS LTD National building code 2016 by (bis) and Product Offering by  JMV LPS LTD
National building code 2016 by (bis) and Product Offering by JMV LPS LTD Mahesh Chandra Manav
 
India National building code 2016 and JMV LPS LTD
India National building code 2016  and JMV LPS LTDIndia National building code 2016  and JMV LPS LTD
India National building code 2016 and JMV LPS LTDMahesh Chandra Manav
 
Tried and Tested Best Practices for the Implementation of LTE
Tried and Tested Best Practices for the Implementation of LTETried and Tested Best Practices for the Implementation of LTE
Tried and Tested Best Practices for the Implementation of LTEBSP Media Group
 
Exploring Wireless Technology for Off-Chip Memory Access
Exploring Wireless Technology for Off-Chip Memory AccessExploring Wireless Technology for Off-Chip Memory Access
Exploring Wireless Technology for Off-Chip Memory AccessAshif Sikder
 
19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdf19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdfgowravnagula
 
8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPC8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPCFS.COM
 
8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPC8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPCFS.COM
 
dwdm
 dwdm dwdm
dwdmg d
 
Defense Systems Take Flight with Intelligent RF Integration
Defense Systems Take Flight with Intelligent RF IntegrationDefense Systems Take Flight with Intelligent RF Integration
Defense Systems Take Flight with Intelligent RF IntegrationRFSOI
 
Air max sector_antennas_ds
Air max sector_antennas_dsAir max sector_antennas_ds
Air max sector_antennas_dspattala01
 
Fiber otdr testing
Fiber otdr testingFiber otdr testing
Fiber otdr testingbsateeshbsnl
 
Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...
Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...
Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...luca-bencini
 

Similar a Hybrid Stealthy Networks - Paper Presentation (20)

RF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and DesignRF Propagation Modelling for 5G RAN Planning and Design
RF Propagation Modelling for 5G RAN Planning and Design
 
Fundamental of dwdm
Fundamental of dwdmFundamental of dwdm
Fundamental of dwdm
 
Ehternet Security "Unplugged" .pptx
Ehternet Security "Unplugged" .pptxEhternet Security "Unplugged" .pptx
Ehternet Security "Unplugged" .pptx
 
National building code 2016 by (bis) and Product Offering by JMV LPS LTD
National building code 2016 by (bis) and Product Offering by  JMV LPS LTD National building code 2016 by (bis) and Product Offering by  JMV LPS LTD
National building code 2016 by (bis) and Product Offering by JMV LPS LTD
 
India National building code 2016 and JMV LPS LTD
India National building code 2016  and JMV LPS LTDIndia National building code 2016  and JMV LPS LTD
India National building code 2016 and JMV LPS LTD
 
CDMA Introducton
CDMA IntroductonCDMA Introducton
CDMA Introducton
 
Tried and Tested Best Practices for the Implementation of LTE
Tried and Tested Best Practices for the Implementation of LTETried and Tested Best Practices for the Implementation of LTE
Tried and Tested Best Practices for the Implementation of LTE
 
Exploring Wireless Technology for Off-Chip Memory Access
Exploring Wireless Technology for Off-Chip Memory AccessExploring Wireless Technology for Off-Chip Memory Access
Exploring Wireless Technology for Off-Chip Memory Access
 
19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdf19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdf
 
8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPC8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPC
 
8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPC8 Channels Single Fiber DWDM Mux Demux,LC/UPC
8 Channels Single Fiber DWDM Mux Demux,LC/UPC
 
dwdm
 dwdm dwdm
dwdm
 
CHOKI
CHOKICHOKI
CHOKI
 
Defense Systems Take Flight with Intelligent RF Integration
Defense Systems Take Flight with Intelligent RF IntegrationDefense Systems Take Flight with Intelligent RF Integration
Defense Systems Take Flight with Intelligent RF Integration
 
FUNDAMENTALS OF WSN
FUNDAMENTALS OF WSNFUNDAMENTALS OF WSN
FUNDAMENTALS OF WSN
 
networking by sandeep sir.ppt
networking by sandeep sir.pptnetworking by sandeep sir.ppt
networking by sandeep sir.ppt
 
Air max sector_antennas_ds
Air max sector_antennas_dsAir max sector_antennas_ds
Air max sector_antennas_ds
 
Fiber otdr testing
Fiber otdr testingFiber otdr testing
Fiber otdr testing
 
Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...
Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...
Energy Efficient Communications Solutions for Nomadic Nodes within a Wireless...
 
WDM SYSTEMS
WDM SYSTEMSWDM SYSTEMS
WDM SYSTEMS
 

Último

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Hybrid Stealthy Networks - Paper Presentation

  • 1. Written by Durresi, Paruchuri and Barolli 2008
  • 2. Why? Fighting with a large army under your command is nowise different from fighting with a small one: it is merely a question of instituting signs and signals. - Sun Tzu, The Art of War Battlefield 2 David Drager - CSE 603 Spring 2009 2 Screenshot
  • 3. The Challenge  Wireless Adhoc Networks have many military uses  Traditional platforms (mica2, micaz) are not secure  How do we fix these issues? David Drager - CSE 603 Spring 2009 3
  • 4. Overview What problems does this paper address? The objective is to make a secure ad hoc wireless network. David Drager - CSE 603 Spring 2009 4
  • 5. Related Work  Protocols for directional antennas – Energy savings  Optical networks – Last mile fix?  Previous work does not focus on security aspect but on performance David Drager - CSE 603 Spring 2009 5
  • 6. Antenna Design  Mica2/Micaz platform – omnidirectional dipole antenna.  These radiate in a doughnut shape pattern Source: Antennatheory.com David Drager - CSE 603 Spring 2009 6
  • 7. Directional Antennas  Patch Antenna  Horn Antenna  Dish Antenna David Drager - CSE 603 Spring 2009 7
  • 8. Beamwidth  How wide of an area the signal can be received  θ = Angle of radiation David Drager - CSE 603 Spring 2009 8
  • 9. Propagation  Transmitted power decays as R-a  a varies between 2 & 4 depending on the medium  Received Power:  Gain of the transmitter: David Drager - CSE 603 Spring 2009 9
  • 10. Network Architecture  Hybrid means that we will have both wireless and optical connection Optical: means that we will need to lay fiber. Pros: Fast, latency free, secure; Cons: Hard to deploy “AP” – Access Point Wireless: Steerable, Assume has GPS to locate “MN” – Mobile Node Red Zones: Enemy listeners or even jammers David Drager - CSE 603 Spring 2009 10
  • 11. Network Architecture David Drager - CSE 603 Spring 2009 11
  • 12. Stealthy Communications  Each MN has info about AP Locations; other MNs  Public Key distribution of all nodes  MN calculates location of closest AP based on location  Routing Tables David Drager - CSE 603 Spring 2009 12
  • 13. Stealthy Performance Probability of detection: With one node: David Drager - CSE 603 Spring 2009 13
  • 14. Stealthy Performance  Of multiple nodes: (200m range): (100m range): David Drager - CSE 603 Spring 2009 14
  • 15. Conclusions  Hybrid Stealthy Communications Protocol (HSCP) is able to minimize detection to around .5% when there are multiple eavesdroppers.  Change power of the MN to receive even better stealth.  This protocol can be used in the battlefield to reach our original goal. David Drager - CSE 603 Spring 2009 15
  • 16. David Drager - CSE 603 Spring 2009 16
  • 17. Questions? David Drager - CSE 603 Spring 2009 17