130 likes | 247 Views
Progetto IS-MANET. ISTI - Pisa. Ongoing research: System Model. Autonomous system of mobile hosts connected by wireless links. Ongoing research. Routing protocols Dependable and secure data storage and retrieval Applications: Emergency services
E N D
Progetto IS-MANET ISTI - Pisa
Ongoing research:System Model • Autonomous system of mobile hosts connected by wireless links
Ongoing research • Routing protocols • Dependable and secure data storage and retrieval Applications: • Emergency services • Communication support in hostile environments
Virtual Routing Protocol (1) • Defines a Logical Structure of the network • Each mobile implements two roles: peer and scout (to multiple peers) • Every peer is assigned a set of scouts • The scouts maintain a path to the assigned peers • Three protocols: • Route acquisition • Communication route maintenance • Route maintenance
Virtual Routing Protocol (2) Logical Structure
Virtual Routing Protocol (3) Route acquisition • The source sets up a virtual path • Computed on the logical structure • It is a sequence of scouts Redundancy of the logical structure: multiple virtual paths
Virtual Routing Protocol (4) Route acquisition Setting a Physical path exploiting the information held by the scouts in the logical path u3 u2 u1 u0
u4 Virtual Routing Protocol (5) Communication Route Maintenance • Used when a communication path gets broken • Selects a different logical path u0 u1 u4 u3 u5 u6 u2
Virtual Routing Protocol (6) Route Maintenance • Used by the scouts to keep the path to the peered mobiles • Activated by failures in the route setup procedure • Low priority protocol • Similar to the route discovery of reactive protocols
Dependable and Secure Data Storage and Retrieval Model • The mobiles cooperate by: • creating and sharing files • The system provides procedures to: • Create, share and reading of files Data dependability and confidentiality are important issues
Dependable and Secure Data Storage and Retrieval • The file is encoded using a redundant code • A file of n records in encoded into n+d records • Each record is stored in a different mobile • a file descriptor keeps track of the records • File sharing by distributing the file descriptor Issues: • Choice of the redundant code • How to ensure data confidentiality
Dependable and Secure Data Storage and Retrieval Data Encoding: • By means of RRNS (Redundant Residue Number System) • File creator defines n+r moduli (pairwise positive integers) • The file is encoded into n+r records hosted in different mobiles • The file descriptor is a mapping between moduli and hosting mobiles Features: • Data availability: • The file can be read if h records are unavailable and k records are corrupted, provided h+2kr • Data confidentiality: • No information can be read unless the file descriptor is known • Data sharing: • Encrypted distribution of the file descriptor