130 likes | 251 Vues
This ongoing research project investigates the dynamics of autonomous mobile hosts interconnected by wireless links within a Mobile Ad Hoc Network (MANET). Key focuses include innovative routing protocols to ensure resilient and secure data communication, applicable in emergency services and hostile environments. The designed Virtual Routing Protocols facilitate efficient route maintenance and acquisition through a logical network structure. Additionally, methods for dependable data storage, retrieval, and confidentiality using Redundant Residue Number Systems (RRNS) are explored, ensuring file availability and secure sharing among distributed mobile nodes.
E N D
Progetto IS-MANET ISTI - Pisa
Ongoing research:System Model • Autonomous system of mobile hosts connected by wireless links
Ongoing research • Routing protocols • Dependable and secure data storage and retrieval Applications: • Emergency services • Communication support in hostile environments
Virtual Routing Protocol (1) • Defines a Logical Structure of the network • Each mobile implements two roles: peer and scout (to multiple peers) • Every peer is assigned a set of scouts • The scouts maintain a path to the assigned peers • Three protocols: • Route acquisition • Communication route maintenance • Route maintenance
Virtual Routing Protocol (2) Logical Structure
Virtual Routing Protocol (3) Route acquisition • The source sets up a virtual path • Computed on the logical structure • It is a sequence of scouts Redundancy of the logical structure: multiple virtual paths
Virtual Routing Protocol (4) Route acquisition Setting a Physical path exploiting the information held by the scouts in the logical path u3 u2 u1 u0
u4 Virtual Routing Protocol (5) Communication Route Maintenance • Used when a communication path gets broken • Selects a different logical path u0 u1 u4 u3 u5 u6 u2
Virtual Routing Protocol (6) Route Maintenance • Used by the scouts to keep the path to the peered mobiles • Activated by failures in the route setup procedure • Low priority protocol • Similar to the route discovery of reactive protocols
Dependable and Secure Data Storage and Retrieval Model • The mobiles cooperate by: • creating and sharing files • The system provides procedures to: • Create, share and reading of files Data dependability and confidentiality are important issues
Dependable and Secure Data Storage and Retrieval • The file is encoded using a redundant code • A file of n records in encoded into n+d records • Each record is stored in a different mobile • a file descriptor keeps track of the records • File sharing by distributing the file descriptor Issues: • Choice of the redundant code • How to ensure data confidentiality
Dependable and Secure Data Storage and Retrieval Data Encoding: • By means of RRNS (Redundant Residue Number System) • File creator defines n+r moduli (pairwise positive integers) • The file is encoded into n+r records hosted in different mobiles • The file descriptor is a mapping between moduli and hosting mobiles Features: • Data availability: • The file can be read if h records are unavailable and k records are corrupted, provided h+2kr • Data confidentiality: • No information can be read unless the file descriptor is known • Data sharing: • Encrypted distribution of the file descriptor