rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas...

60
DE COMPUTADORES mento de Sistemas Informáticos y Computadores Computer Networks Group - UPV http://www.grc.upv.es/ GRUPO DE REDES D Universidad Politécnica de Valencia – Departam 1 11 September 2008

Transcript of rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas...

Page 1: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Computer Networks Group - UPV

http://www.grc.upv.es/

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

111 September 2008

Page 2: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Group structure

�UPV � DISCA � GRC

�Created in 2000

�The group members are:�5 associate professors

�2 assistant professors

�3 lecturers

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

�3 lecturers

�9 PhD students� 3 full-time (with some sort of

funding)

� 3 almost full-time

� 3 part-time

�4 Master students

2

Page 3: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Collaborations

�UPV� Fault Tolerance Group (DISCA)

� Department of Applied Mathematics

� Technology Institute of Valencia (ITI)

�Spanish Universities� University of Murcia

� University of Malaga

� University of Castilla La Mancha

� University Jaume I

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

3

�Thematic network on “Codification and Transmission of Contents Multimedia”; 14 Spanish universities are part of this network

� Industry� Applus+ IDIADA (IDIADA, http://www.idiada.es/) , Barcelona.

� Grupo Tecnológico e Industrial (GMV, http://www.gmv.es/), Madrid.

� Métodos y Tecnología (MTP, http://www.mtp.es/), Madrid

� QIS, Valencia

� GEDSA , Valencia

Page 4: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Area of interest

�The design, the implementation and the evaluation of

algorithms and protocols for “mobile ad hoc networks”

MANETs�Security

�QoS

�Management & configuration

�Power control

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

4

�Objectives:� to offer the required network services to “context-aware”

applications.

� FP7: Ambient Intelligence.

� to offer connection to Internet in contexts where the wiring is either impossible or excessively expensive.

� FP7: Next Generation Internet: available everywhere, on more

platforms.

� roads � VANETs

� rural areas � rural communications

Page 5: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Work methodology

ns-2 http://nsnam.isi.edu/nsnam/

CASTADIVA

mozart

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

5

Page 6: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

CASTADIVA

�A MANETs emulator

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

http://castadiva.sourceforge.net/6

Page 7: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

CASTADIVA: InterfaceG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

7

Page 8: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

CASTADIVA: Random scenarios generatorG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

8

Page 9: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

CASTADIVA: future

�Ease installation and scaling

�Better physical layer simulation

�Modularization�Security attacks injection

�Mobility models

�Routing protocols

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

�Routing protocols

�Multiple technology integration�UMTS

�WiFi

�WiMAX

9

Page 10: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Developments

�Mesh networks

� Toc2: captive portal that allows users

classification � Dulendue

� Ruralnet

� Maya: APs firmware for the

management of mesh networks

�Pervasive computing

� Ubiqmuseum; Bluemall; Bluefriend;

BlueHospital

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

BlueHospital

�VANETs

� OBU prototype

� Mobility models

�MANETs configuration� EasyMANET, VisualDNS

10

Page 11: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Toc2

�Network access control through web tools.

Servidor

Principal Base de

Datos

Red Ethernet

PHP

SQL

Linux Shell Script

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

AP AP AP

ClientesClientesClientes

HTML

CSS

XML

XSL

Javascript

DHTML

11

Page 12: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Toc2 applications

�Dulenduè:

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

12

Page 13: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

RuralNet

�Based on Toc2:

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

13

Page 14: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

MAYAG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

14

Page 15: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Proyecto MozambiqueG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

15

Page 16: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

UBIQMUSEUM

Central Data Server

Ethernet based Network

Architecture

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

16

MIP(Venus)

MIP(Meninas)

MIP(Monalisa)

ClientClientClient

Client

Client

Bluetoothbased Network

PDA’s client main screen

Page 17: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

UBIQMUSEUM: User Profile ConfigurationG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

17

— Before connecting to the MIP the user has to configure the profile: (Profile screen)

— Type of device, educational level, Language of preference

— Then � Accept, Found Services and connect to them to get the information …

Page 18: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

UBIQMUSEUM: Searching for services

• Now the client …— Inquiry to find any MIP

— SDP to search for services

— Select a specific service to

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

18

— Select a specific service to connect to

Page 19: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

UBIQMUSEUM: Getting the information

• The client receives info — According to its profile

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

19

Page 20: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

BlueFriend

�Bluefriend, an application for mobile devices that takes

advantage of Bluetooth functionalities to create mobile

social networks.

�It runs on PDA and mobile phones equipped with a

Bluetooth adapter.

�Bluefriend periodically scans the environment in search for

other members of the Bluefriend community; when found,

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

other members of the Bluefriend community; when found,

``virtual personal cards'' (VPCs) are exchanged with

information about: user preferences, likes/dislikes, etc. to

assess the degree of matching among found users. �High degrees of matching result in the exchange of personal

information and contact details so that connected users are aware of how to reach each other in a future.

20

Page 21: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

BlueFriend: creating a profileG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

21

Page 22: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

BlueFriend: scanningG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

22

Page 23: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

BlueMall

�Advertising system based on Bluetooth.

�Bluetooth terminals receive data with advertising content

(mainly) sent from various access points.

�These contents are controlled in a centralized manner.

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

23

Page 24: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

BlueMall: components general schemeG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

24

Page 25: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

QUOVADIS: overall architectureG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

25

Page 26: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

QUOVADIS: Nodes architecture

HSDPA Modem

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

GPS

SystemAsus WL-500G P

with OpenWrt OSQuovadis Program

26

Page 27: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

QUOVADIS: Control Unit interfaceG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

27

Page 28: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EasyMANET: MANET-autoconf

802.11Bluetooth

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

28

Page 29: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EasyMANET: VisualDNSG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

29

Page 30: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EasyMANET: ejecution exampleG

RU

PO

DE

RE

DE

S D

E C

OM

PU

TA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

30

Page 31: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

On-going research

�Security�Defence against passive attacks

�Defence against active attacks

�VANETs�Modeling

�Alert propagation

�Seamless handoff

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

�Seamless handoff

�Video with QoS�DACME

�DACME-DV

�Mesh management�MAYA 2.0

31

Page 32: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

MANETs attacks classification

Attacks on routing

Active attacks Passive attacks

Packet silent Routing Routing Flood network

SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

32

discardRouting information hiding

procedureFlood network

False reply Wormhole attacks

Route request

Route broken message

False distance vector

False destination sequence

Page 33: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Possible anonymity attacks

5.5.5.65.5.5.16

5.5.5.11

5.5.5.23410.10.10.3

� Correlate nodes’

identities and their

locations

� Visualize ad hoc

routes

� Visualize mobile

nodes’ motion

patterns

SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

33

5.5.5.78

5.5.5.82

5.5.5.147

5.5.5.153

5.5.5.69

5.5.5.9

5.5.5.211

5.5.5.18

5.5.5.3

10.10.10.4

Page 34: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Possible anonymity attacks

5.5.5.65.5.5.16

5.5.5.11

5.5.5.23410.10.10.3

� Correlate nodes’

identities and their

locations

� Visualize ad hoc

routes

� Visualize mobile

nodes’ motion

patterns

� Disrupt ad hoc

communications

SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

34

5.5.5.78

5.5.5.82

5.5.5.147

5.5.5.153

5.5.5.69

5.5.5.9

5.5.5.211

5.5.5.18

5.5.5.3

10.10.10.4

communications

Page 35: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Solution being evaluated

5.5.5.65.5.5.16

5.5.5.11

5.5.5.23410.10.10.3

1. Adopt a proactive

routing protocol

2. Spread the traffic

among all the nodes

uniformly

3. Use multiple paths

for the same data

flow

Q. How to measure and

compare the

D

SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

35

5.5.5.78

5.5.5.82

5.5.5.147

5.5.5.153

5.5.5.69

5.5.5.9

5.5.5.211

5.5.5.18

5.5.5.3

10.10.10.4

compare the

performance the new

solution

S

Page 36: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

CASTADIVACASTADIVACASTADIVACASTADIVA

(Ad-hoc network simulator)

Devices Devices Devices Devices

SimulationSimulationSimulationSimulation

controllercontrollercontrollercontrollerJADE (MultiJADE (MultiJADE (MultiJADE (Multi----

Agent Platform)Agent Platform)Agent Platform)Agent Platform)

PIEAgent

PDPAgent

Active attacks detection: frameworkSECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

SEFORASEFORASEFORASEFORA

(Attack injection)

Devices Devices Devices Devices

(ad(ad(ad(ad----hoc nodes)hoc nodes)hoc nodes)hoc nodes)

routersroutersroutersrouters

laptopslaptopslaptopslaptops

PEPAgent

1

PEPAgent

2 36

Page 37: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EKIGAEKIGAEKIGAEKIGA

Active attacks detection:SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EKIGAEKIGAEKIGAEKIGAEKIGAEKIGAEKIGAEKIGA

EKIGAEKIGAEKIGAEKIGA

User AUser AUser AUser A User BUser BUser BUser B

37

Page 38: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Active attacks detection: Stealth attack launch

EKIGAEKIGA

EKIGA

SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Malicioususer

OLSROLSROLSROLSROLSROLSROLSROLSR

User A User B

38

Page 39: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Active attacks detection: Stealth attack launchSECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

The malicious user gets control over Ekiga The malicious user gets control over Ekiga The malicious user gets control over Ekiga The malicious user gets control over Ekiga

communications between users A and B communications between users A and B communications between users A and B communications between users A and B

User AUser AUser AUser A User BUser BUser BUser B

EKIGAEKIGAEKIGAEKIGA EKIGAEKIGAEKIGAEKIGA

39

Page 40: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

User AUser AUser AUser A User BUser BUser BUser B

Active attacks detection: Blackhole attack launchSECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EKIGAEKIGAEKIGAEKIGA

40

Page 41: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Step 4 - Attack detection

User A User B

Blackhole detected !!

SECURITY

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

EKIGAEKIGAEKIGA

Watchdog

41

Page 42: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Modeling: The CityMob tool

�We designed a mobility pattern generator, called CityMob.

The tool allows to modify the following parameters:� The model used

� The number of nodes

� The time simulated

� The maximum speed of the nodes

� The size of the area

� The distance between the streets

VANETS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

� The distance between the streets

� The number of damaged nodes

� The size and position of the Downtown (only in DM)

� The probability that a node is in Downtown (only in DM)

42

Page 43: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Modeling: Example of the Downtown model

• Models random direction

changes

• Simulates semaphores at

random positions (not

only in crossing), and with

different delays

VANETS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

43

• Adds traffic density.

Vehicles must move more

slowly than in the

outskirts

• User can change the

probability of a node

being located inside the

downtown area

Page 44: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Modeling:RPMs

�Realistic Radio Propagation Models

(RPMs) �Distance Attenuation Model (DAM)

�Building Model (BM)

�Building and Distance Attenuation Model(BDAM)

VANETS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

44

Page 45: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

An alert propagation protocol

First and very basic proposal

VANETS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

45

Page 46: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Seamless Handoff

A seamless handoff is defined as a

handoff scheme that maintains the

connectivity of all applications on

the mobile device when the handoff

occurs.

VANETS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

46

Page 47: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Seamless Handoff

�Two goals: low latencies and few packet losses

�Related Work�Network Layer Approaches

� MIPv4, IPv6

�Upper Layer Approaches

� End-to-End Approaches (e.g. Dynamic DNS)

� New Session Layer Protocols (e.g. MSOCKS)

� Transport Layer Protocols (e.g. TCP-MH and SCTP)

VANETS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

� Transport Layer Protocols (e.g. TCP-MH and SCTP)

� Middleware Approach (e.g. USHA)

47

Page 48: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

DACME architecture

�The proposal involves and

integrates three elements� Transport layer and middleware

�Distributed Admission

Control for Manets

Environments

(DACME)

IP

Mpaths-DSR

DACME

TCP/UDP

VIDEO WITH QOS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

(DACME)�Routing layer

�Multiple paths as an

extension of a standard

protocol (MDSR)�MAC layer

�IEEE 802.11e

48

IEEE802.11e

IEEE802.11g

Page 49: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

The IEEE 802.11e (WMM)

IEEE 802.11e MAC parameters for an IEEE 802.11a/g radio

Acess category Designation AIFSN TXOPLimit (ms)

AC_BK Background 7 15 1023 0

AC_BE Best effort 3 15 1023 0

AC_VI Video 2 7 15 3.008

AC_VO Voice 2 3 7 1.504

Cwmin CWmax

VIDEO WITH QOS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

49

Page 50: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

DACME architecture

1. The application registers with DACME,

indicating the source port, as well as

the destination's port and IP address

2. DACME periodically sends probes to

assess available bandwidth on the

path

3. The port state is set to up or down

according to current network

VIDEO WITH QOS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

50

according to current network

conditions

4. The packet filter module is responsible

for enforcing accept/reject decisions,

and also for changing the packet's

TOS field if accepted

� Note: In the Linux kernel this

architecture is implemented using

iptables

Page 51: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

DACME-SV: Goals

�Extend DACME to support scalable video.�Pass from a single-level video output to a multi-level video

output. (see figures below)

�Decrease Idle times.

�With DACME-SV, path information is used by the source to

decide how many video layers can be transmitted over the

network without congesting it, thus guaranteeing that traffic

VIDEO WITH QOS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

network without congesting it, thus guaranteeing that traffic

will not exceed network capacity.

DACME DACME - SV

tt

51

Page 52: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Maya 2.0MESH MANAGEMENT

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

�Integration with RADIUS

�Various Internet access point

�Localization

�Auto-configuration

�Pre-authentication

�Load balancingFutu

re

52

Page 53: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Stand-by research

�Power efficient protocols�WiFi, Bluetooth

�Broadcast storm problem

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

53

Page 54: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Energetic model

� The consumption of the wireless interface depends on the operation mode

� Rx, Tx, Idle y Sleep

IdleTx

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

54

� The reception process includes two activities

Reception of own data + overhearing� Juan Carlos Cano, Pietro Manzoni, "A

Performance Comparison of Energy Consumption for Mobile Ad Hoc Networks Routing Protocols", IEEE/ACM MASCOTS 2000: Eighth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, San Francisco (USA), August 2000.

IdleRx

Page 55: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Path selection based on energetic criteria

�MDR (Minimum Drain Rate) Destino

N1

N2

N5

N4

N7

N8

Fuente

N1 +

N1 +

N1-N2 +

N1-N3 +

N1-N2-N5 +

N1-N3-N4 +

N1-N3-N4 +

N1-N3-N4-N6 +

N1-N3-N4-N7 +

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

55

N3N6 RREQUEST

RREPLYN1-N3-N4 +

N1-N3-N4-N6 +

N1-N2-N5-N8: E.Cost

N1-N2-N5-N4-N7-N8: E.Cost

N1-N2-N5-N4-N6-N7-N8: E.Cost

N1-N3-N4-N7-N8: E.Cost

N1-N3-N4-N5-N8: E.Cost

N1 cache de rutas

Page 56: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Path selection based on energetic criteria

�MDR (Minimum Drain Rate) Destino

N1

N2

N5

N4

N7

N8

Fuente

N1 +

N1 +

N1-N2 +

N1-N3 +

N1-N2-N5 +

N1-N3-N4 +

N1-N3-N4 +

N1-N3-N4-N6 +

N1-N3-N4-N7 +

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

56

N3N6 RREQUEST

RREPLYN1-N3-N4 +

N1-N3-N4-N6 +

i

Battery

capacity

+

Usage rate

j

N1-N2-N5-N8: E.Cost

N1-N2-N5-N4-N7-N8: E.Cost

N1-N2-N5-N4-N6-N7-N8: E.Cost

N1-N3-N4-N7-N8: E.Cost

N1-N3-N4-N5-N8: E.Cost

N1 cache de rutas

Page 57: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Obtained results

�Techniques are required to integrate the routing with algorithms of consumption reduction and algorithms for topology control

�This would allow the use of the Sleep mode without affecting the routing activities

30

35

40

45

50

mero

de e

sta

cio

nes o

pera

tivas

MTPR

MMBCR

MDR

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

57

the routing activities

15

20

25

100 200 300 400 500 600 700 800

Tiempo de simulación (s)

mero

de e

sta

cio

nes o

pera

tivas

Page 58: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Reducing overhearing impact

�Overhearing problem

� Totalenergy = Energytx + N * Energyrx.

(N=number of neighbours)

�Solution: disable the network interface

�� ¿When?, ¿How long?¿When?, ¿How long?

�We use the MAC protocol information

� RTS/CTS

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

58

Page 59: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

Proposed solution

�Cluster-based Energy-saving Routing Algorithm (CERA)

includes:�Topology control creating a cluster based architecture

�Power control algorithm which uses clusters to:

� reduce the consumption due to the overhearing activities

� reduce the consumption due to the Idle mode

� Inter- and Intra- clusters routing Dominio

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

59

cluster A

cluster B

cluster C

a

b

Page 60: rar2008-v1 0 - UPV · MAYA 2.0 31. GRUPO DE REDES DE COMPUTADORES Departamento de Sistemas Informáticos y Computadore s MANETs attacks classification Attacks on routing Active attacks

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SD

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

More information…

http://www.grc.upv.es/

GR

UP

O D

E R

ED

ES

DE

CO

MP

UTA

DO

RE

SU

niv

ers

idad

Po

lité

cn

ica d

e V

ale

ncia

–D

ep

art

am

en

to d

e S

iste

mas I

nfo

rmáti

co

s y

Co

mp

uta

do

res

6011 September 2008