Top Banner
Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer
23

Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Resource Sharing of Portable Computers Using Wireless Communication

By Christine Meyer

Page 2: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Outline

• Routing Protocols

• Load Balancing Techniques

• Cluster Computing Software

• Wireless Security Attacks

• Conclusion

Page 3: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Wireless Adhoc Mode

Peer-to-Peer Communication

Page 4: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Wireless Infrastructure Mode

Communication through Access Point

Page 5: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Direct Sequence Spread Spectrum (DSSS)

Page 6: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Wireless Range

Page 7: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Routing Protocols

• Dynamic Source Routing (DSR)

• Destination Sequence Distance Vector (DSDV)

• Temporary-Ordered Routing Algorithm (TORA) • Ad Hoc On-Demand Distance Vector (AODV)

Page 8: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Comparison of Routing Protocols

Packet Delivery Ratio Routing Overhead

Page 9: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Diffusive Load Balancing on Domain

Page 10: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Windows Management Instrumentation

Namespace: root\WMI for signal strength root\CIMV2 for LB information

Page 11: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Cluster Computing Software

Resource Manager

Server

Job Manager Client Manager

Application

ClientDisplay

Manager

Page 12: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Wireless Network Display

Page 13: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Client to Server Routing 1

ServerClient A

Client B

Routing A

Routing A

Page 14: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Client to Server Routing 2

Server

Client A

Client B

Routing A, B

Routing A, B

Routing to Server

Page 15: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Encryption using Javaimport javax.crypto.*;import javax.crypto.spec.*;import java.security.*;

SecretKey key = KeyGenerator.getInstance("DESede").generateKey();byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher ecipher = Cipher.getInstance("DESede"); ecipher.init(Cipher.ENCRYPT_MODE, key); // Seal (encrypt) the object s1 = new SealedObject(mat1, ecipher); s2 = new SealedObject(mat2, ecipher); } catch (Exception e) {}

Page 16: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Decryption with Java byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher dcipher = Cipher.getInstance("DESede"); dcipher.init(Cipher.DECRYPT_MODE, key); // Unseal (decrypt) the class a = (Matrix)s1.getObject(dcipher); b = (Matrix)s2.getObject(dcipher); } catch (Exception e) {}

Page 17: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Java Transformation String• Algorithm AES, Blowfish, DES, DESede, RSA, RC2, RC4, RC5

• Mode None, CBC (Cipher Block Chaining), CFB (Cipher Feedback Mode), ECB (Electronic Codebook), OFB (Output Feedback Mode), PCBC (Propagating Cipher Block Chaining)

• Padding No Padding, PKCS5Padding SSL3Padding

Default: DES/CBC/PKCS5Padding (64 bits to 128 bits)

DES 64 bits to 64 bits:transform = "DES/ECB/NoPadding“

Page 18: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Passive attacks to decrypt traffic

Destination

Eavesdropper

Packet 1 XOR Packet 2= Plaintext

Access Point

Page 19: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Active attack to inject new traffic

Destination

Eavesdropper

RC4(X) XOR X XOR Y= RC4(Y)

Access Point

Page 20: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Active attacks to decrypt traffic

Eavesdropper

Access Point Internet Eavesdropper’sComputerEncrypted

Message

DecryptedMessage

DecryptedMessage

Page 21: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Table based Attack

Destination

Eavesdropper

Access Point

Table of IV andKey Streams

Page 22: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

WPA Denial of Service Attack

WPA can shutdown the system if it receives two failed packets within a one-second period

Wi-Fi Encryption Fix Not Perfecthttp://www.wired.com/news/business/0,1367,56350,00.html

Page 23: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer.

Conclusion• It is possible to improve performance through resource sharing of portable computers

• In the future, the transfer rate for wireless will be greater therefore reducing transfer time

• Security is provided for access points but not for ad-hoc mode

• Encryption is possible through Java with a small overhead factor