Written by Durresi, Paruchuri and Barolli 2008
Why?
David Drager - CSE 603 Spring 2009 2
Battlefield 2Screenshot
Fighting with a large army under your command is nowise different from fighting with a small one: it is merely a question of instituting signs and signals.- Sun Tzu, The Art of War
The Challenge
Wireless Adhoc Networks have many military uses
Traditional platforms (mica2, micaz) are not secure
How do we fix these issues?
David Drager - CSE 603 Spring 2009 3
Overview
What problems does this paper address?
The objective is to make a secure ad hoc wireless network.
David Drager - CSE 603 Spring 2009 4
Related Work Protocols for directional antennas – Energy savings
Optical networks – Last mile fix?
Previous work does not focus on security aspect but on performance
David Drager - CSE 603 Spring 2009 5
Antenna Design Mica2/Micaz platform – omnidirectional dipole
antenna.
These radiate in a doughnut shape pattern
David Drager - CSE 603 Spring 2009 6
Source: Antennatheory.com
Beamwidth How wide of an area the signal can be received
θ = Angle of radiation
David Drager - CSE 603 Spring 2009 8
Propagation Transmitted power decays as R-a
a varies between 2 & 4 depending on the medium
Received Power:
Gain of the transmitter:
David Drager - CSE 603 Spring 2009 9
Network Architecture Hybrid means that we will have both wireless and
optical connection
Optical: means that we will need to lay fiber.
Pros: Fast, latency free, secure; Cons: Hard to deploy
“AP” – Access Point
Wireless: Steerable, Assume has GPS to locate
“MN” – Mobile Node
Red Zones: Enemy listeners or even jammers
David Drager - CSE 603 Spring 2009 10
Stealthy Communications Each MN has info about AP Locations; other MNs
Public Key distribution of all nodes
MN calculates location of closest AP based on location
Routing Tables
David Drager - CSE 603 Spring 2009 12
Stealthy Performance Of multiple nodes:
(200m range): (100m range):
David Drager - CSE 603 Spring 2009 14
Conclusions Hybrid Stealthy Communications Protocol (HSCP) is
able to minimize detection to around .5% when there are multiple eavesdroppers.
Change power of the MN to receive even better stealth.
This protocol can be used in the battlefield to reach our original goal.
David Drager - CSE 603 Spring 2009 15