resource sharing of portable computers using wireless communication by christine meyer

23
Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Post on 20-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Resource Sharing of Portable Computers Using Wireless Communication

By Christine Meyer

Page 2: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Outline

• Routing Protocols

• Load Balancing Techniques

• Cluster Computing Software

• Wireless Security Attacks

• Conclusion

Page 3: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Wireless Adhoc Mode

Peer-to-Peer Communication

Page 4: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Wireless Infrastructure Mode

Communication through Access Point

Page 5: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Direct Sequence Spread Spectrum (DSSS)

Page 6: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Wireless Range

Page 7: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Routing Protocols

• Dynamic Source Routing (DSR)

• Destination Sequence Distance Vector (DSDV)

• Temporary-Ordered Routing Algorithm (TORA) • Ad Hoc On-Demand Distance Vector (AODV)

Page 8: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Comparison of Routing Protocols

Packet Delivery Ratio Routing Overhead

Page 9: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Diffusive Load Balancing on Domain

Page 10: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Windows Management Instrumentation

Namespace: root\WMI for signal strength root\CIMV2 for LB information

Page 11: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Cluster Computing Software

Resource Manager

Server

Job Manager Client Manager

Application

ClientDisplay

Manager

Page 12: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Wireless Network Display

Page 13: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Client to Server Routing 1

ServerClient A

Client B

Routing A

Routing A

Page 14: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Client to Server Routing 2

Server

Client A

Client B

Routing A, B

Routing A, B

Routing to Server

Page 15: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Encryption using Javaimport javax.crypto.*;import javax.crypto.spec.*;import java.security.*;

SecretKey key = KeyGenerator.getInstance("DESede").generateKey();byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher ecipher = Cipher.getInstance("DESede"); ecipher.init(Cipher.ENCRYPT_MODE, key); // Seal (encrypt) the object s1 = new SealedObject(mat1, ecipher); s2 = new SealedObject(mat2, ecipher); } catch (Exception e) {}

Page 16: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Decryption with Java byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher dcipher = Cipher.getInstance("DESede"); dcipher.init(Cipher.DECRYPT_MODE, key); // Unseal (decrypt) the class a = (Matrix)s1.getObject(dcipher); b = (Matrix)s2.getObject(dcipher); } catch (Exception e) {}

Page 17: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Java Transformation String• Algorithm AES, Blowfish, DES, DESede, RSA, RC2, RC4, RC5

• Mode None, CBC (Cipher Block Chaining), CFB (Cipher Feedback Mode), ECB (Electronic Codebook), OFB (Output Feedback Mode), PCBC (Propagating Cipher Block Chaining)

• Padding No Padding, PKCS5Padding SSL3Padding

Default: DES/CBC/PKCS5Padding (64 bits to 128 bits)

DES 64 bits to 64 bits:transform = "DES/ECB/NoPadding“

Page 18: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Passive attacks to decrypt traffic

Destination

Eavesdropper

Packet 1 XOR Packet 2= Plaintext

Access Point

Page 19: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Active attack to inject new traffic

Destination

Eavesdropper

RC4(X) XOR X XOR Y= RC4(Y)

Access Point

Page 20: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Active attacks to decrypt traffic

Eavesdropper

Access Point Internet Eavesdropper’sComputerEncrypted

Message

DecryptedMessage

DecryptedMessage

Page 21: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Table based Attack

Destination

Eavesdropper

Access Point

Table of IV andKey Streams

Page 22: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

WPA Denial of Service Attack

WPA can shutdown the system if it receives two failed packets within a one-second period

Wi-Fi Encryption Fix Not Perfecthttp://www.wired.com/news/business/0,1367,56350,00.html

Page 23: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

Conclusion• It is possible to improve performance through resource sharing of portable computers

• In the future, the transfer rate for wireless will be greater therefore reducing transfer time

• Security is provided for access points but not for ad-hoc mode

• Encryption is possible through Java with a small overhead factor