Electric-Field-Based Routing: Secure Spatially Disjoint Routes in MANETs - PowerPoint PPT Presentation

About This Presentation
Title:

Electric-Field-Based Routing: Secure Spatially Disjoint Routes in MANETs

Description:

Electric-Field-Based Routing (EFR) defends against. Black-hole routers. Man-in-the-middle attacks ... Locally apply electric-field equations at each node ... – PowerPoint PPT presentation

Number of Views:61
Avg rating:3.0/5.0
Slides: 19
Provided by: csF2
Learn more at: http://www.cs.fsu.edu
Category:

less

Transcript and Presenter's Notes

Title: Electric-Field-Based Routing: Secure Spatially Disjoint Routes in MANETs


1
Electric-Field-Based Routing Secure Spatially
Disjoint Routes in MANETs
  • DARPA Proposers Day for
  • Defense Against Cyber Attacks on Mobile Ad Hoc
    Networks
  • An-I (Andy) Wang
  • Florida State University
  • awang_at_cs.fsu.edu

2
Goal
  • Defend pair-wise communication channels in MANETs
  • Electric-Field-Based Routing (EFR) defends
    against
  • Black-hole routers
  • Man-in-the-middle attacks
  • Byzantine and geographically localized failures
  • Service degradation

3
Electric-Field-Based Routing
  • With two opposite poles
  • Locally apply electric-field equations at each
    node
  • Globally define spatially disjoint routes for all
    communicating pairs
  • No further route coordination

-

4
Rapid Reconfiguration for Failures and Mobility
5
Rapid Reconfiguration for Failures and Mobility
Stateless 3D routing
6
EFR vs. Black-Hole Routers
STOP
Contextual routing
7
EFR vs. Black-Hole Routers
STOP
Contextual routing
8
EFR vs. Black-Hole Routers
STOP
Contextual routing
9
EFR vs. Localized Failures
Spatially disjoint routes
10
EFR vs. Localized Failures
Spatially disjoint routes
11
EFR vs. Localized Failures
Spatially disjoint routes
12
EFR vs. Integrity Breaches
Redundant routes and information
13
EFR vs. Integrity Breaches
Redundant routes and information
14
EFR vs. Multiple Interceptions
STOP
STOP
Threshold-based encryption encoding
15
EFR vs. Multiple Interceptions
STOP
STOP
Threshold-based encryption encoding
16
Research Challenges
  • Evaluate EFR under different attacks
  • Overcome practical deployment constraints
  • Build obstacle/corridor conforming routes
  • Balance energy consumptions
  • Explore other stateless approaches of
    constructing secure spatially disjoint routes

17
Questions
  • Electric-Field-Based Routing
  • An-I (Andy) Wang
  • awang_at_cs.fsu.edu

18
How to select the next hop
min(?)
min(D)
Field line
Next hop
Ideal next hop
Current node
Transmission range
Write a Comment
User Comments (0)
About PowerShow.com