270 likes | 417 Views
MILITARY COMMUNICATION INSTITUTE prof. Janusza Groszkowskiego. 05-130 ZEGRZE. The Concept of an Adaptive Ad-hoc Network for a Netcentric Warfare. Authors: Emil KUBERA Rafał BRYŚ Jacek PSZCZÓŁKOWSKI. PRESENTATION PLAN. Introduction Architecture of an adaptive Ad-hoc network
E N D
MILITARY COMMUNICATION INSTITUTE prof. Janusza Groszkowskiego 05-130 ZEGRZE The Concept of an Adaptive Ad-hoc Network for a Netcentric Warfare Authors: Emil KUBERA Rafał BRYŚ Jacek PSZCZÓŁKOWSKI
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
INTRODUCTION This task is a part of work under the title: „Development of the concept of adaptive communication platform for ad-hoc networks to support network-centric operations, in the identification, authentication, auto-configuration, and data exchange.” Results of previous works have been presented on MCC 2012 conference: „Mechanisms of Ad-hoc Network Supporting Network Centric Warfare” The concept presents: • proposed ad-hoc networkarchitecture based on the wireless LAN standards (based on IEEE802.11s), • mechanisms supporting operation of network components, • the way of their workingand interworking, • the way of network elements/mechanisms implementation in the proposednetwork architecture.
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
ARCHITECTURE OF AN ADAPTIVE AD-HOC NETWORK In the architecture of adaptive ad-hoc network we distinguished two layers: • Logical (application, transport, internet layers) – describes mechanisms supporting the network adaptation: • autoconfiguration – in internet layer – IP addresses configuration, • authorization – depending on mechanisms can be placed in transport, internet or network access layer, • data exchange – application layer. • Infrastructure – defines the network elements.
ARCHITECTURE OF AN ADAPTIVE AD-HOC NETWORK Ad-hoc terminals Basic equipment of network users, operates in IEEE 802.11s technology, has implemented supporting mechanisms. IEEE802.11s – MeshPoint (MP) Infrastructure layer Ad-hoc Gateway One of theuserterminalsthatacts asanaccesstothe fixed network or other networks, has two interfaces (IEEE802.11s and e.g. IEEE802.11g). IEEE802.11s – MeshPortalPoint (MPP) Access Point An intermediate device in data transmission between adaptive ad-hoc network and another. E.g. classic network Access Point
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
APLICATIONS OF ADAPTIVE Ad-hoc NETWORKS Theuseofindividualcomponentsandtheirnumbermayvary depending onenvironmental and system factors. These factorsdepend on applying areas ofadaptive ad-hoc networks. Taking into account results of our previous analysis, the main applications of Ad-hoc networks include: • Militaryoperationonanurbanizedterrain; • Militaryoperationonaruralterrain; • Anti-crisissupportoperationsandremovingconsequencesofnaturaldisasters; • Protectionofpublicevents; • Monitoringtheinaccessibleareas.
APLICATIONS OF ADAPTIVE Ad-hoc NETWORKS Ad-hoc networks characteristics for various applications
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
HARDWARE PLATFORM Choice of hardware platform was dictated by the requirements of associatedadditional mechanisms supporting the network functionality. Most of them are developed on Linux operating system with kernel version 3.x. It is proposed to use the platforms built onthe ARM architecture processors(up to 1,5 GHz), RAM up to 512 MB and storage up to 512 MB. For technology demonstrator it is planned to use miniPC: • CPU AllWinner Cortec A9 • GPU Mali 400 • RAM 512MB, Flash 4GB • WLAN 802.11b/g/n
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
IMPLEMENTATIONS OF SUPPORTING MECHANISMSautoconfiguration The purpose of an auto configuration mechanism is to assign IP addresses for nodes in case of: • leaving or joining network, • splitting and merging network. Addressing in mobile ad-hoc networks can be classified in terms of nodes addresses managing as follows: • state accumulation addresing, so-called stateful – with central point (server), • stateless addressing. For netcentric Ad-hoc networks it is recommended – stateless mechanism. Nevertheless we choose a stateful mechanism – AHCP (Ad-Hoc Configuration Protocol)
IMPLEMENTATIONS OF SUPPORTING MECHANISMSautoconfiguration AHCP – is used in place of „router discovery” and DHCP, it will automatically configure IPv4 and IPv6 addresses. AHCP is similar to DHCP but: • 1st DISCOVER is sent with TTL=1, • DISCOVER is sent 3 times, • then TTL is incremented by 1 • DISCOVER is sent again 3 times, • TTL is incremented until will receive OFFER
IMPLEMENTATIONS OF SUPPORTING MECHANISMSauthorization The IEEE802.11 technique has a number of mechanisms proposals: • MAC filtration, • WEP (Wired Equivalent Privacy), • EAP (Extensible Authentication Protocol) and 802.1X, • WPA/WPA2 (WIFI Protected Access). From the netcentric operations point of view, the WPA2-PSK mechanism seems to be optimal, because there is no needto use a network authentication server (destructive factor). IEEE802.11s terminals use the SAE protocol (Simultaneous Authentication of Equals): • use pre-shared secret, • use 4-way handshake to compute PMK (Pairwise Master Key), • use Abbreviated Handshake for peers that already share PMK, • base on ECC (Ecliptic Curve Cryptography) – y2 = x3 + ax + b
IMPLEMENTATIONS OF SUPPORTING MECHANISMSauthorization PMK computation: • A generatesPWE (point on an ecliptic curve), • A sends commit scalar (cs) and element (ce), • B countsN and sendscs and ce, • A&B compute k using shared key F k = F ((randA × (csB × N + ceB)) k = F ((randB × (csA × N + ceA)) • A&B send confirmation message – hash of secret k, reply-protection counter, cs and ce, • if hash equals, A&B compute PMK. • finally the MTK (Mesh Temporal Key) is computed during Abbreviated Handshake and Group Key Handshake.
IMPLEMENTATIONS OF SUPPORTING MECHANISMSdata exchange Requirements for data and voice applications: • workingwithothernetworkuserswithoutacentralmanagingelement; • supporting connection parameters negotiation; • supporting SIP/H.323 signalling protocols; • supporting for point-to-point and point-to-multipoint; • use local databases for users’ identification data; • supporting authentication mechanisms and data encyption; For demonstrator we plan to use EKIGA: • dedicated to the Linux OS; • supporting SIP/H.323 protocols; • allows to simulate target specialized applications; • open source.
PRESENTATION PLAN Introduction Architecture of an adaptive Ad-hoc network Applications Hardware platform Implementations of supporting mechanisms Conclusions
CONCLUSIONS The concept of the adaptive Ad-hoc networks for netcentric operations was presented and will be helpful in designing and building target network. We assume using IEEE802.11s technology with autorization and autoconfiguration mechanisms. The next step will be to perform simulation experiments for operational scenarios taking into account user’s operational and technical requirements. The network model and plan of experiments is almost ready now – integration of mechanisms and complex model verification remains. The experiments will allow to estimate proper functionality of network technology and supporting mechanisms. The network models will be presented on the next slides, and the experiment results are planned to present on the next conference. The project ends with building a network demonstrator.
NETWORK MODELS The network models consist of 5 scenarios: • Military operation on an urbanized terrain; • Military operation on a rural terrain; • Anti-crisis support operations and removing consequences of natural disasters; • Protection of public events; • Monitoring the inaccessible areas. Simplified model
NETWORK MODELS Military operation on an urbanized terrain NET3 NET2 NET1
NETWORK MODELS Military operation on a rural terrain NET1 NET2 NET3
NETWORK MODELS Anti-crisis support operations and removing consequences of natural disasters NET1 INF1 INF2 NET2
NETWORK MODELS Protection of public events NET1 NET2
NETWORK MODELS Monitoring the inaccessible areas – sensor network NET1 This scenario is planned to use to make an additional experiments: • detachment and atachment node(s), • divide and merge network(s), • time of configuration = f (N, mobility, etc.), • QoS parameters = f (…), • etc. UAV UGV