SECURE COGNITIVE MOBILE HOTSPOT
#1

Presented by:
Nypunya Devraj

[attachment=10716]
INTRODUCTION
 Blend of WAN & LAN connectivity while on move.
 Difficult and challenging market conditions – substantial Investments to upgrade the networks for higher capacity technology.
Various technologies
• GPRS
• EDGE
• W-CDMA/3G services/UMTS
• CDMA2000
• HSDPA/3.5G
• WiMAX
Secure Cognitive Mobile Hotspot
 SCMH addresses the challenges by integrating all the available broadband technologies in a geographical area & selects the optimal technology for the peer nodes in a hotspot.
 Dynamically adjusting the position.
 Seamless switching.
 2 broad categories of consumer applications
◦ Extension of enterprise network to mobile branch offices.
◦ Providing WAN connectivity to mission critical applications.
SCMH ARCHITECTURE
 Optimum & secure connectivity.
 Real challenges
◦ Dynamically changing topologies/routes.
◦ Limited communication bandwidth.
◦ Variable capacity links.
◦ Secure & broadcast nature.
 Critical requirement-rapid deployment of secure connected network.
SCMH ARCHITECTURE
 Configuration & Management layer.
◦ Top most communication layer.
◦ Holds provisioned network interfaces ,ciphering & compression parameters and services.
◦ Crypto/Compression Engine layer.
◦ Supports standard & proprietary security algorithms.
◦ Data integrity & confidentiality.
◦ Supports multilayer of security.
◦ Optimized to process all algorithms.
◦ Powerful instruction set.
◦ Optimized key generation engine.
◦ Lossless data compression algorithm.
 Cognitive Controller.
◦ Integrates heterogeneous network technologies.
◦ Selects dynamically.
◦ WAN interfaces & LAN interfaces.
 Cross Layer Protocol.
◦ Extension of the layered network protocol architecture.
◦ Gathers information.
 Steps describing the detailed procedure of cognitive network management.
◦ Step 1 : Application configures cognitive controller.
◦ Step 2 : cognitive controller configures cryptographic parameters.
◦ Step 3 : Dynamically maintain & update GPS info & page link state table to form the routing table.
◦ Step 4 : Cognitive layer decides the action to enhance the performance & reconfigures the relevant routing parameters.
 Design of Mobile Hotspots for Mission Critical Applications
 Real challenges
◦ Multiple communication technologies in patch.
◦ Variable capacity links.
◦ Limited communication bandwidth.
◦ Secure connectivity.
◦ Rapid deployment.
 Divided into multiple zones.
 Secure mobile backbone.
 Mobile backbone nodes(MBNs)
 MBN forming cluster in a hotspot
 GPS aware secure mobile backbone.
 MBNs act as authentication authority to incorporate security.
 Optimum available broadband communication link.
 Hybrid network.
 Network establishment comprises of four steps.
◦ Node configuration
◦ Cluster formation
◦ Registration and
◦ Authentication
 Node configuration
◦ MBNs are provided with public/private key pair and public key of all the user mobile nodes.
◦ User mobile nodes are provided with their node ID, public/private key pair and the public key of the AA.
◦ Preconfigured with symmetric keys and their corresponding key ids embedded flash of SCMHs.
◦ Communication takes place in secure communication channel.
◦ Information is secured by the symmetric cipher AES.
Cluster formation.
◦ Approximate placement of MBNs depending upon the communication range with one MBN per cluster.
◦ Mobile nodes become part of cluster.
◦ Nodes within cluster-directly connected.
◦ Nodes outside the cluster-secure mobile backbone.
◦ MBN in a cluster acts as a zonal registrar
 Registration.
◦ Sends its node ID signed by its private key, verified by their MBN.
◦ Completes registration by sending certificate.
◦ Un-trusted to trusted.
 Authentication.
◦ sends a message signed by its private key.
◦ peer node verifies the signature.
 Nodes are equipped with GPS.
 Assigned to a cluster depending on the design constraints such as minimum distance constraint and implemented using K-mean algorithm.
 Achieve optimal connectivity in heterogeneous environment .
 Example Scenario
 4 MBNs (MBN0, MBN1, MBN2 and MBN3).
 The user nodes number changes dynamically with the mobility of users.
 Network of configured nodes can be established in three steps.
◦ Initialization of the MBNs’ positions with some approximate values.
◦ Node to the respective cluster is allocated by calculating the Euclidean distance between that node and each of the MBNs.
◦ The mobile backbone nodes adjust their positions according to the cluster mean.
◦ Next location of the MBN is constrained by the geographical terrain / topology of the area and maximum line of sight.
◦ If there is a crater or a pit in the ground, the vehicle will be moved to the optimum possible location.
◦ The node allocation and mean update steps are repeated until the network converges.
◦ MBNs are placed in the converged area with approximate distances between MBN’s.
◦ Figure depicts the initial allocation of user mobile nodes to MBNs.
Figure : Allocation of mobile nodes to MBNs
• The MBNs will calculate their new positions according to new cluster mean. After a few iterations the network will converge.
Reply
#2
Any reports for this seminar topic
Reply
#3

To get more information about the topic "SECURE COGNITIVE MOBILE HOTSPOT " please refer the page link below
http://studentbank.in/report-secure-cogn...le-hotspot
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mobile hotspot seminar ppt file, hotspot technology free ppt s, report for moblie congitive hotspot, bluetooth hotspot abstract downloadognition ppt, hotspot seminar ppt, hotspot topic seminar, hotspot in cricket,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Mobile Virtual Reality Service (VRS) computer science crazy 13 15,147 29-12-2012, 11:24 AM
Last Post: seminar details
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 1 3,095 29-10-2012, 05:31 PM
Last Post: seminar details
  3d face recognition in mobile phone dafy 3 3,304 01-02-2012, 10:40 AM
Last Post: seminar addict
  Cognitive controller for multiple interfaces(c2mi) seminar class 0 1,149 26-04-2011, 04:09 PM
Last Post: seminar class
  Smart Cards: Technology for Secure Management of Information seminar class 0 2,037 23-04-2011, 04:10 PM
Last Post: seminar class
  NEXT GENERATION OF WINDOWS MOBILE seminar class 0 2,110 04-04-2011, 09:24 AM
Last Post: seminar class
  MOBILE WEB BROWSER seminar class 0 2,390 30-03-2011, 02:29 PM
Last Post: seminar class
  Intel Centrino Mobile Technology computer science crazy 2 3,248 25-03-2011, 06:22 PM
Last Post: [email protected]
  Picture Password(A Visual Login Technique for Mobile Devices ) seminar class 1 2,730 18-03-2011, 03:27 PM
Last Post: [email protected]
  Routing protocols in Mobile Ad Hoc Network seminar surveyer 1 2,465 10-03-2011, 10:08 AM
Last Post: seminar class

Forum Jump: