22-03-2011, 11:13 AM
Presented by:
Nypunya Devraj
[attachment=10716]
INTRODUCTION
Blend of WAN & LAN connectivity while on move.
Difficult and challenging market conditions – substantial Investments to upgrade the networks for higher capacity technology.
Various technologies
• GPRS
• EDGE
• W-CDMA/3G services/UMTS
• CDMA2000
• HSDPA/3.5G
• WiMAX
Secure Cognitive Mobile Hotspot
SCMH addresses the challenges by integrating all the available broadband technologies in a geographical area & selects the optimal technology for the peer nodes in a hotspot.
Dynamically adjusting the position.
Seamless switching.
2 broad categories of consumer applications
◦ Extension of enterprise network to mobile branch offices.
◦ Providing WAN connectivity to mission critical applications.
SCMH ARCHITECTURE
Optimum & secure connectivity.
Real challenges
◦ Dynamically changing topologies/routes.
◦ Limited communication bandwidth.
◦ Variable capacity links.
◦ Secure & broadcast nature.
Critical requirement-rapid deployment of secure connected network.
SCMH ARCHITECTURE
Configuration & Management layer.
◦ Top most communication layer.
◦ Holds provisioned network interfaces ,ciphering & compression parameters and services.
◦ Crypto/Compression Engine layer.
◦ Supports standard & proprietary security algorithms.
◦ Data integrity & confidentiality.
◦ Supports multilayer of security.
◦ Optimized to process all algorithms.
◦ Powerful instruction set.
◦ Optimized key generation engine.
◦ Lossless data compression algorithm.
Cognitive Controller.
◦ Integrates heterogeneous network technologies.
◦ Selects dynamically.
◦ WAN interfaces & LAN interfaces.
Cross Layer Protocol.
◦ Extension of the layered network protocol architecture.
◦ Gathers information.
Steps describing the detailed procedure of cognitive network management.
◦ Step 1 : Application configures cognitive controller.
◦ Step 2 : cognitive controller configures cryptographic parameters.
◦ Step 3 : Dynamically maintain & update GPS info & page link state table to form the routing table.
◦ Step 4 : Cognitive layer decides the action to enhance the performance & reconfigures the relevant routing parameters.
Design of Mobile Hotspots for Mission Critical Applications
Real challenges
◦ Multiple communication technologies in patch.
◦ Variable capacity links.
◦ Limited communication bandwidth.
◦ Secure connectivity.
◦ Rapid deployment.
Divided into multiple zones.
Secure mobile backbone.
Mobile backbone nodes(MBNs)
MBN forming cluster in a hotspot
GPS aware secure mobile backbone.
MBNs act as authentication authority to incorporate security.
Optimum available broadband communication link.
Hybrid network.
Network establishment comprises of four steps.
◦ Node configuration
◦ Cluster formation
◦ Registration and
◦ Authentication
Node configuration
◦ MBNs are provided with public/private key pair and public key of all the user mobile nodes.
◦ User mobile nodes are provided with their node ID, public/private key pair and the public key of the AA.
◦ Preconfigured with symmetric keys and their corresponding key ids embedded flash of SCMHs.
◦ Communication takes place in secure communication channel.
◦ Information is secured by the symmetric cipher AES.
Cluster formation.
◦ Approximate placement of MBNs depending upon the communication range with one MBN per cluster.
◦ Mobile nodes become part of cluster.
◦ Nodes within cluster-directly connected.
◦ Nodes outside the cluster-secure mobile backbone.
◦ MBN in a cluster acts as a zonal registrar
Registration.
◦ Sends its node ID signed by its private key, verified by their MBN.
◦ Completes registration by sending certificate.
◦ Un-trusted to trusted.
Authentication.
◦ sends a message signed by its private key.
◦ peer node verifies the signature.
Nodes are equipped with GPS.
Assigned to a cluster depending on the design constraints such as minimum distance constraint and implemented using K-mean algorithm.
Achieve optimal connectivity in heterogeneous environment .
Example Scenario
4 MBNs (MBN0, MBN1, MBN2 and MBN3).
The user nodes number changes dynamically with the mobility of users.
Network of configured nodes can be established in three steps.
◦ Initialization of the MBNs’ positions with some approximate values.
◦ Node to the respective cluster is allocated by calculating the Euclidean distance between that node and each of the MBNs.
◦ The mobile backbone nodes adjust their positions according to the cluster mean.
◦ Next location of the MBN is constrained by the geographical terrain / topology of the area and maximum line of sight.
◦ If there is a crater or a pit in the ground, the vehicle will be moved to the optimum possible location.
◦ The node allocation and mean update steps are repeated until the network converges.
◦ MBNs are placed in the converged area with approximate distances between MBN’s.
◦ Figure depicts the initial allocation of user mobile nodes to MBNs.
Figure : Allocation of mobile nodes to MBNs
• The MBNs will calculate their new positions according to new cluster mean. After a few iterations the network will converge.