Download File - Computer Networks & Information Security
Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security
What’s New ? Wireless medium is easy to snoop on Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node (for instance, to obtain a secret key) Easier for trouble-makers to insert themselves into a mobile ad hoc network (as compared to a wired network) 398
Resurrecting Duckling [Stajano99] Battery exhaustion threat: A malicious node may interact with a mobile node often with the goal of draining the mobile node’s battery Authenticity: Who can a node talk to safely? Resurrecting duckling: Analogy based on a duckling and its mother. Apparently, a duckling assumes that the first object it hears is the mother A mobile device will trust first device which sends a secret key 399
- Page 347 and 348: Slow-start Congestion avoidance F
- Page 349 and 350: Performance of TCP Several factors
- Page 351 and 352: Random Errors May Cause Fast Retran
- Page 353 and 354: Random Errors May Cause Fast Retran
- Page 355 and 356: Random Errors May Cause Fast Retran
- Page 357 and 358: Sometimes Congestion Response May b
- Page 359 and 360: Burst Errors May Cause Timeouts If
- Page 361 and 362: Impact of Transmission Errors TCP
- Page 363 and 364: This Tutorial This tutorial consid
- Page 365 and 366: Mobile Ad Hoc Networks Mobility ca
- Page 367 and 368: Impact of Multi-Hop Wireless Paths
- Page 369 and 370: Ideal Throughput f(i) = fraction o
- Page 371 and 372: Impact of Mobility 20 m/s 30 m/s Id
- Page 373 and 374: Actual throughput But not always
- Page 375 and 376: mobility causes link breakage, resu
- Page 377 and 378: B C A Why Does Throughput Improve?
- Page 379 and 380: Network feedback How to Improve Thr
- Page 381 and 382: Actual throughput Performance Impro
- Page 383 and 384: Issues Network Feedback Network kn
- Page 385 and 386: To Cache or Not to Cache Average sp
- Page 387 and 388: Issues To Cache or Not to Cache Ca
- Page 389 and 390: TCP Performance Two factors result
- Page 391 and 392: Issues RTO After Route Repair Same
- Page 393 and 394: Impact of Acknowledgements TCP Ack
- Page 395 and 396: Security Issues 395
- Page 397: Security Issues in Mobile Ad Hoc Ne
- Page 401 and 402: Secure Routing Establishing a Cert
- Page 403 and 404: Techniques for Intrusion-Resistant
- Page 405 and 406: Intrusion Detection [Zhang00Mobicom
- Page 407 and 408: Packet Purse Model [Byttayn00MobiHo
- Page 409 and 410: Existing Implementations Several i
- Page 411 and 412: CMU Implementation: Lessons Learned
- Page 413 and 414: BBN Implementation [Ramanathan00Wcn
- Page 415 and 416: Link layer Implementation Issues: W
- Page 417 and 418: Implementation Issues: Address Assi
- Page 419 and 420: Implementation Issues: Security Ho
- Page 421 and 422: Implementation Issues Only some is
- Page 423 and 424: Distributed Algorithms for Mobile A
- Page 425 and 426: Distributed Algorithms There is al
- Page 427 and 428: Related Standards Activities 427
- Page 429 and 430: Internet Engineering Task Force (IE
- Page 431 and 432: Bluetooth [Haartsen98,Bhagawat00Tut
- Page 433 and 434: Bluetooth: Piconet A channel is ch
- Page 435 and 436: Bluetooth: Scatternet Several pico
- Page 437 and 438: Open Issues in Mobile Ad Hoc Networ
- Page 439 and 440: Related Research Areas Algorithms
- Page 441: Thank you !! For more information,
What’s New ?<br />
Wireless medium is easy to snoop on<br />
Due to ad hoc connectivity and mobility, it is hard to<br />
guarantee access to any particular node (for<br />
instance, to obtain a secret key)<br />
Easier for trouble-makers to insert themselves into a<br />
mobile ad hoc network (as compared to a wired<br />
network)<br />
398