Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21
Wireless environments and
architectures
CS 444N, Spring 2002
Instructor: Mary Baker
Computer Science Department
Stanford University Diversity of wireless environments • Differ in • Examples – Mobility – Cellular telephony – Type of application – Satellite – Type of environment – Metropolitan-area data – Media characteristics networks – Pervasiveness of hosts – Local-area networks – Level of infrastructure – Personal-area networks – Visibility of infrastructure – Ubiquitous computing – Coverage environments – – Infostations Cost – Ad hoc networks
Spring 2002 CS444N 2
Ubiquitous computing • Idea: environment outfitted with invisible helpful computing infrastructure and peripherals • Both mobile and stationary hosts/displays – Components you carry with you – Components in infrastructure with which you interact • Variety of applications – whatever you need • Variety of media, both wired and wireless • Lots of infrastructure – it’s all around you • Infrastructure is invisible – It helps us where we need help in the context in which we need help – We do not need to cater to it • Coverage appropriate to the context • Your personal information/applications go with you through the network Spring 2002 CS444N 3 Ubiquitous computing, continued
• Often called pervasive/invisible computing
• Augmented reality – Ability to query your environment – Ability to ask for non-intrusive guidance • May include variety of wearable devices • Interesting privacy and sociological questions • Can we really build security that is equivalent but no stronger than what we are accustomed to currently? – This definition varies greatly across cultures/governments
Spring 2002 CS444N 4
Ubiquitous computing, continued
• No clear definition of ubiquitous computing now
• What is it really good for? • How practical is it really? • Is it a superset of mobile computing?
Spring 2002 CS444N 5
Infostations • Mobile hosts traveling through fixed network • Good for periodic download or upload of bulky data • Wireless islands (interconnected by wired network) – Gas stations – Here and there on the freeway • Possibly an invisible infrastructure with mobile- aware applications – In reality, you may need to know to go to it – Original paper assumes this: information kiosks • Coverage is spotty • Cost is lower than complete coverage Spring 2002 CS444N 6 Infostations, continued
• Example: incremental map download
– Prefetching at infostations – Know path and speed of traveler • In reality will need to combine this with another more pervasive wireless network • One study [Ye, Mobicom’98] shows performance is better with many smaller-range infostations rather than fewer longer-range ones density of infostations – But this misses the whole point of infostations • I envision traffic snarls
Spring 2002 CS444N 7
Ad hoc networks • Collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. • Hop-by-hop routing due to limited range of each node • Nodes may enter and leave the network • Usage scenarios: – Military – Disaster relief – Temporary groups of participants (conferences)
Spring 2002 CS444N 8
Ad hoc networks, continued
• Very mobile – whole network may travel
• Applications vary according to purpose of network • No pre-existing infrastructure. Do-it-yourself infrastructure • Coverage may be very uneven
Spring 2002 CS444N 9
Issues in ad hoc networks • Routing performance – Routes change over time due to node mobility – Would like to avoid long delays when sending packets – But would like to avoid lots of route maintenance overhead – Want as many participating nodes as possible for greater aggregate throughput, shorter paths, and smaller chance of partition • Security - interesting new vulnerabilities and complexities – Routing denial of service • Nodes may agree to route packets • Nodes may then fail to do so • Broken, malicious, selfish – Key distribution and trust issues
Spring 2002 CS444N 10
Example routing protocol: DSR
• Dynamic Source Routing (DSR) is one of most
popular • On-demand routing RR(d,1)s RR(d,1)sa RR(d,1)sac a c d s f e RR(d,1)sacf b RR(d,1)sb
Spring 2002 CS444N 11
Security issues in ad hoc networks • Routing advertisements – Come shoot me here – Particularly awkward in algorithms that give location information in route ads • A priori trust of nodes? – In some environments you know ahead of time the nodes you can trust – Route only through these nodes? – But maybe some other nodes would be helpful? • Radio medium affects what you can do – Promiscuous mode and broadcast not available for all wave forms – Assumptions of bidirectional links
Spring 2002 CS444N 12
Encryption issues
• With advance planning can give all good nodes
known keys – This still doesn’t guarantee a node isn’t compromised • What to encrypt? – Payload – can do this end-to-end – Headers – requires link-to-link encryption and decryption - expensive • Still important to identify misbehaving nodes
Spring 2002 CS444N 13
Mitigating routing misbehavior - theme
• It is impossible to build a perfect network
– Use of legacy software – Unexpected events – Bugs • Incorporate tools within the network to detect and report on misbehavior
Spring 2002 CS444N 14
Possible solutions
• Route only through trusted nodes
– Requires a priori trust relationship – Requires key distribution – Trusted nodes may still be overloaded or broken or compromised – Untrusted nodes might perform well • Detect and isolate misbehaving nodes – Watchdog detects the nodes – Pathrater avoids routing packets through these nodes
Spring 2002 CS444N 15
Assumptions
• On-demand routing protocol
– Route discovered at time source sends packet to destination for which it has no cached route – Neighbors forward route request & append their addresses • Bidirectional communication symmetry on every link – 802.1, MACAW and others assume this • Wireless interface supports promiscuous mode – Only works with certain waveforms – WaveLAN and 802.11 networks support this
Spring 2002 CS444N 16
Watchdog technique
• Each node may host a watchdog
• Watchdog listens promiscuously to next node’s transmissions • Detects if next node does not forward packet • Can sometimes detect tampering with payload – If encryption not performed separately for each link
a b c
Spring 2002 CS444N 17
Watchdog, continued • Node keeps buffer of recently sent packets • Removes packet from buffer if it overhears forwarding • If packet in buffer for too long, increment failure tally for next node • If failure tally exceeds threshold, notify source node of possible misbehavior • Watchdog weaknesses – Ambiguous collisions – Receiver collisions – Limited transmission power – Misbehavior falsely reported – False positives – Collusion – Partial dropping Spring 2002 CS444N 18 Pathrater • Run by each node • Combines watchdog info with link reliability data • Each node maintains rating for each other node it knows • Calculates path metric by averaging node ratings in the path • New nodes assigned neutral rating • Calculation can pick shortest-path in absence of node data • Good behavior increments rating • Link breaks decrement node rating a little • Misbehavior decrements rating a lot • Send extra route request when all known paths include misbehaving node
Spring 2002 CS444N 19
Results • NS simulator & Dynamic Source Routing algorithm • With and without watchdog/pathrater/extra route requests • Throughput: percentage of sent data packets actually received by intended destinations – In absence of misbehaving nodes, all achieve 95% throughput – With misbehaving nodes, new techniques up to 30% better • Overhead: Ratio of routing–related transmissions – Doubles from 12% to 24% – Due to extra route requests that don’t help – Watchdog itself is very low overhead • Effect of false positives on throughput – Doesn’t seem to hurt – may even help! – Some nodes flaky due to location/collisions: avoid them anyway
Spring 2002 CS444N 20
Discussion
• What do you see as the next interesting things in
mobile computing? • What potential do you see for wireless networks? • What do you see as the hardest things for us to address? • If you could wish for one key piece of technology to come true (for mobility), what would it be?