Resource Sharing of Portable Computers Using Wireless Communication

23
Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer

description

Resource Sharing of Portable Computers Using Wireless Communication. By Christine Meyer. Outline. Routing Protocols Load Balancing Techniques Cluster Computing Software Wireless Security Attacks Conclusion. Wireless Adhoc Mode. Peer-to-Peer Communication. - PowerPoint PPT Presentation

Transcript of Resource Sharing of Portable Computers Using Wireless Communication

Page 1: Resource Sharing of Portable Computers Using Wireless Communication

Resource Sharing of Portable Computers Using Wireless Communication

By Christine Meyer

Page 2: Resource Sharing of Portable Computers Using Wireless Communication

Outline• Routing Protocols

• Load Balancing Techniques

• Cluster Computing Software

• Wireless Security Attacks

• Conclusion

Page 3: Resource Sharing of Portable Computers Using Wireless Communication

Wireless Adhoc Mode

Peer-to-Peer Communication

Page 4: Resource Sharing of Portable Computers Using Wireless Communication

Wireless Infrastructure Mode

Communication through Access Point

Page 5: Resource Sharing of Portable Computers Using Wireless Communication

Direct Sequence Spread Spectrum (DSSS)

Page 6: Resource Sharing of Portable Computers Using Wireless Communication

Wireless Range

Page 7: Resource Sharing of Portable Computers Using Wireless Communication

Routing Protocols

• Dynamic Source Routing (DSR)

• Destination Sequence Distance Vector (DSDV)

• Temporary-Ordered Routing Algorithm (TORA) • Ad Hoc On-Demand Distance Vector (AODV)

Page 8: Resource Sharing of Portable Computers Using Wireless Communication

Comparison of Routing Protocols

Packet Delivery Ratio Routing Overhead

Page 9: Resource Sharing of Portable Computers Using Wireless Communication

Diffusive Load Balancing on Domain

Page 10: Resource Sharing of Portable Computers Using Wireless Communication

Windows Management Instrumentation

Namespace: root\WMI for signal strength root\CIMV2 for LB information

Page 11: Resource Sharing of Portable Computers Using Wireless Communication

Cluster Computing Software

Resource Manager

Server

Job Manager Client Manager

Application

ClientDisplay

Manager

Page 12: Resource Sharing of Portable Computers Using Wireless Communication

Wireless Network Display

Page 13: Resource Sharing of Portable Computers Using Wireless Communication

Client to Server Routing 1

ServerClient A

Client B

Routing A

Routing A

Page 14: Resource Sharing of Portable Computers Using Wireless Communication

Client to Server Routing 2

ServerClient A

Client B

Routing A, B

Routing A, B

Routing to Server

Page 15: Resource Sharing of Portable Computers Using Wireless Communication

Encryption using Javaimport javax.crypto.*;import javax.crypto.spec.*;import java.security.*;

SecretKey key = KeyGenerator.getInstance("DESede").generateKey();byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher ecipher = Cipher.getInstance("DESede"); ecipher.init(Cipher.ENCRYPT_MODE, key); // Seal (encrypt) the object s1 = new SealedObject(mat1, ecipher); s2 = new SealedObject(mat2, ecipher); } catch (Exception e) {}

Page 16: Resource Sharing of Portable Computers Using Wireless Communication

Decryption with Java byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher dcipher = Cipher.getInstance("DESede"); dcipher.init(Cipher.DECRYPT_MODE, key); // Unseal (decrypt) the class a = (Matrix)s1.getObject(dcipher); b = (Matrix)s2.getObject(dcipher); } catch (Exception e) {}

Page 17: Resource Sharing of Portable Computers Using Wireless Communication

Java Transformation String• Algorithm AES, Blowfish, DES, DESede, RSA, RC2, RC4, RC5

• Mode None, CBC (Cipher Block Chaining), CFB (Cipher Feedback Mode), ECB (Electronic Codebook), OFB (Output Feedback Mode), PCBC (Propagating Cipher Block Chaining)

• Padding No Padding, PKCS5Padding SSL3Padding

Default: DES/CBC/PKCS5Padding (64 bits to 128 bits)

DES 64 bits to 64 bits:transform = "DES/ECB/NoPadding“

Page 18: Resource Sharing of Portable Computers Using Wireless Communication

Passive attacks to decrypt traffic

Destination

Eavesdropper

Packet 1 XOR Packet 2= Plaintext

Access Point

Page 19: Resource Sharing of Portable Computers Using Wireless Communication

Active attack to inject new traffic

Destination

Eavesdropper

RC4(X) XOR X XOR Y= RC4(Y)

Access Point

Page 20: Resource Sharing of Portable Computers Using Wireless Communication

Active attacks to decrypt traffic

Eavesdropper

Access Point Internet Eavesdropper’sComputerEncrypted

Message

DecryptedMessage

DecryptedMessage

Page 21: Resource Sharing of Portable Computers Using Wireless Communication

Table based Attack

Destination

Eavesdropper

Access Point

Table of IV andKey Streams

Page 22: Resource Sharing of Portable Computers Using Wireless Communication

WPA Denial of Service Attack

WPA can shutdown the system if it receives two failed packets within a one-second period

Wi-Fi Encryption Fix Not Perfecthttp://www.wired.com/news/business/0,1367,56350,00.html

Page 23: Resource Sharing of Portable Computers Using Wireless Communication

Conclusion• It is possible to improve performance through resource sharing of portable computers

• In the future, the transfer rate for wireless will be greater therefore reducing transfer time

• Security is provided for access points but not for ad-hoc mode

• Encryption is possible through Java with a small overhead factor