Sheikh Omer Tariq – 6898271 [email protected] Submitted to Professor Ivan Stojmenovic in the...
If you can't read please download the document
Sheikh Omer Tariq – 6898271 [email protected] Submitted to Professor Ivan Stojmenovic in the partial fulfillment of the requirements for the course Wireless
Sheikh Omer Tariq 6898271 [email protected] Submitted to
Professor Ivan Stojmenovic in the partial fulfillment of the
requirements for the course Wireless networks and mobile computing
- CSI5169 Mobile social and spontaneous networks
Slide 2
Agenda Wireless networks and mobile computing CSI-5169
IntroductionTypesArchitectureSecurityApplications
Slide 3
Introduction Social network should be defined as group of
people with some pattern of contacts and interaction between them
forming social relationships Social Networks have attracted
billions of active users under major online social network (OSN)
systems such as Facebook, etc. These systems allow people with
common interests to come together and form virtual communities.
Nowadays these online social networks are increasingly used on
mobile devices thus forming a new field of mobile social networks.
Wireless networks and mobile computing CSI-5169
Slide 4
Mobile social network Mobile social networks has been
introduced by combining concepts from two disciplines social
network and mobile communications. Due to the availability of smart
phones mobile social network can fully take advantage of human
interaction by delivering efficient and effective data delivery
services. A mobile social network can be established on any
existing centralized or distributed mobile network. Wireless
networks and mobile computing CSI-5169
Slide 5
Types of mobile social network There are broadly classified
into two types 1.WEB- based MSN: The mobile users can communicate
with a web based application through internet provided by wireless
connectivity. Generally web based MSN is based on a centralized
communication structure. There are numerous web based MSN
application such as iPhone Facebook App 2.Decentralized MSN: In a
decentralized MSN a group of mobile users is formed to disseminate
data among them without connecting to a centralized server. Such
connectivity is best defined where users exchange and share
information when they come in contact using wireless technologies
such as Bluetooth or Wi-Fi. Eye Vibe is a video and chat community
on mobile devices where users can share or transfer videos with the
mobile community. Wireless networks and mobile computing
CSI-5169
Slide 6
Components of mobile social network Mobile devices are the ones
that users carry to access the content from social groups, present
in centralized, Distributed and Hybrid MSN. Network Infrastructure
includes cellular network base stations and access points providing
communication between source and destination it is also present in
all types of MSN. Content Providers servers used for storing and
distributing the social content using network infrastructure to
make it available for mobile users.They are only present in
centralized and hybrid MSN Wireless networks and mobile computing
CSI-5169
Slide 7
Architecture Centralized MSN: Centralized server is used to
share,exchange and deliver data between content provider and mobile
users. This is a client server structure in which mobile user is
client and centralized server of content provider is the server.
Most of the mobile applications used to access online social
networking websites are based on centralized architecture.
Centralized architecture is an example of web based MSN. The main
advantage include simplicity of implementation and high efficiency
centralized control. Wireless networks and mobile computing
CSI-5169
Slide 8
Architecture Distributed MSN: In distributed MSN architecture
the mobile users communicate using existing network technologies
(Wi-Fi and Bluetooth). There is no centralized server present in
distributed architecture. The mobile users interact with each other
on the basis of interest and thus forming groups. The data flow
will be through other mobile devices or access points. Middleware's
are able to provide all necessary functionalities such as
identifying users, sharing data and supports expanding of MSN.
Wireless networks and mobile computing CSI-5169
Slide 9
Architecture Hybrid MSN: It has the combination of centralized
and distributed architecture. In hybrid architecture mobile users
can access data from content provider but also they can communicate
with each other as in distributed architecture. All the new mobile
phone are equipped with both i.e. (GSM antenna) and a short range
(Wi- Fi or Bluetooth) communication capabilities. The cellular
network provides data delivery using an ad hoc network reduces the
cost. Wireless networks and mobile computing CSI-5169
Slide 10
Label Based Propagation Algorithm For The k-clique is extracted
by erasing all non diagonal elements smaller than k -1 and erasing
all diagonal elements smaller than k. The rest of the elements are
replaced by value of 1 Wireless networks and mobile computing
CSI-5169
Slide 11
Security AvailabilityAuthenticity Data confidentiality
Integrity Wireless networks and mobile computing CSI-5169
Slide 12
Attacks Attack launched by a node that does not belong to the
network Attack Launched by a node belongs to network External
Internal Attack in which continues collection of data is gathered
to launch an active attack later. Attach launched by actively
interacting with victims. Passive Active Wireless networks and
mobile computing CSI-5169
Slide 13
Sybil Attack In this type of attack the attacker attempt to
create many identities in order to gain larger effect. This type of
attack is usually carried out to confuse neighboring nodes and to
create relationship with honest users. When the honest user is
compromised the attacker will gain special privileges. Wireless
networks and mobile computing CSI-5169
Slide 14
Sybil Attack PodNetSec framework could be used to protect
network against these types of attack. It has three types of
channels namely Open, closed and restricted channels. Closed
channel allow private and encrypted dissemination of content in a
limited group. Restricted channel only allow authorized users to
publish content Open channel allow everyone to consume and create
new content Wireless networks and mobile computing CSI-5169
Slide 15
Black-Hole Attack It is a type of denial of service attack
which targets trust. In this type of attack a malicious node sends
a path reply packet to the source node in reply of path request for
route discovery. The malicious nodes pretends to be a destination
node or an immediate neighbor of the source node. As a result the
source node will forward all of its data packets to malicious node.
Data forwarding protocols for comprehensive evaluation Wireless
networks and mobile computing CSI-5169
Slide 16
Location cheating attack Location cheating attack has the
ability to bypass the location verification mechanism in MSN. The
location cheater creates a fake location and forces the server to
reveal that location. When the server connects to a falsified
location the connection between the true location and the server is
blocked. Access control Wireless networks and mobile computing
CSI-5169
Slide 17
Access control It uses Key management system and policies that
secure network nodes when they attempt to access the social
network. Deployment in mobile network is a challenge because when a
user is denied for security concern the device is lost and affect
the ability of the customer to complete a task. Wireless networks
and mobile computing CSI-5169
Slide 18
Access control This is an example of group based access
control. It divides the users into communities to communicate
safely. It uses pubic key cryptography. All communication is
encrypted with the public key of the receiver. Secure communication
is provided once the node ID of receiver is known. Wireless
networks and mobile computing CSI-5169
Slide 19
Access control This access control uses an anonymous identifier
(AID). The AID is generated by a trusted server IS. Before a source
node advertise itself to its nearby node it contacts the IS to
obtain AID. The IS generates AID and associates it with mobile
node. It establish connection on shared AID. Wireless networks and
mobile computing CSI-5169
Slide 20
Applications Social Services This is the most common category
of mobile social networks applications. They include web based
social network platforms such as Facebook, LinkedIn as well as
purely mobile ones such as google latitude. Social Services on
mobile provides freedom of movement and ease of use connection to
social world. All MSN services can be regarded as social services
but the above mentioned ones purely regards to social networking
services. Wireless networks and mobile computing CSI-5169
Slide 21
Applications Healthcare Services Mobile social networks are
also able to assist people with special needs. People with severe
mental illness, healthcare services can provide continues support.
MSN is used to locate patients and help them to locate them if they
are lost. Free web based applications such as Patients LikeMe
connect its members to share information and learn from real world
Wireless networks and mobile computing CSI-5169
Slide 22
Applications Wearable MSN Wearable network comprises mobile
devices which can be worn on the body and it can be used in
behavior modeling and entertainment development. Hug shirt can
provide virtual hug by exerting pressure to a person wearing to it.
It has a sensor which interacts with normal Bluetooth enabled
mobile phones. Iband is also a similar application in which two
ibands exchange information during a handshake. Wireless networks
and mobile computing CSI-5169
Slide 23
Applications Location Based Services Location based services is
one of the prominent application of mobile social networks. It
provides information specific to a location for mobile devices
using GPS or signal triangulation of cellular towers. It helps to
find location od friends, nearest banking cash machine or
restaurant. Google latitude and foursquare are one of the popular
location based services. Wireless networks and mobile computing
CSI-5169
Slide 24
Question 1 Why Intrusion detection is a challenge to implement
in mobile social networks ? Answer: Intrusion detection is a
software implementation that monitors a system for malicious
activities and produces real time reports. It is difficult to
implement because the mobile social networks are not fixed.
Intrusion detection depends on real time traffic for analysis and
difficult to generate reports due to mobility of user as compare to
wired networks which are fixed and traffic monitoring is done on
routers,switches and gateways.Secondly, slow links compared to
wired networks,Limited bandwidth and battery power are also the
limitations that makes this implementation a challenge. Wireless
networks and mobile computing CSI-5169
Slide 25
Question 2 Why wormhole attack is called tunneling attack ?
Answer: It is one of the most sophisticated attack in which a
malicious node captures the packets from one location in a network
and tunnels them through other out off band channel to another
malicious node located several hops away as shown in an example
below. The link between the malicious nodes is faster and the
packets arrive more faster then the regular network thats why it is
called tunneling attack. Wireless networks and mobile computing
CSI-5169
Slide 26
Question 3 Consider two mobile social networks. Compute and
compare the delivery ratio for each network such that in network A
50 packets has been sent from source while the destination receives
40 packets however in network B destination node only receives 35
packets? What is the impact of increase in no of nodes in network
B? Answer: Delivery ratio= Packets received/Packets sent For
network A DR=40/50=0.8 For network B DR=35/50=0.7 From the values
above we conclude that packets in network A are arriving faster as
compare to network B.The lower the value of delivery ratio
indicates the packet loss in a social network here in the above
example the value of network B is lower then network A. The low
delivery ratio in network B indicates that many packets are not
arriving to their destinations which is due to increase in no of
nodes, more hops are needed for packets to reach destination as the
no of nodes increases which also requires high memory for
computation. The mobile social network is considered to be more
efficient which has high delivery ratio and minimum memory
requirements. Wireless networks and mobile computing CSI-5169
Slide 27
Reference Mobile Social Networks: Architectures, Social
properties and Key research challenges by Nikolaos Vastardis,
Student Member, IEEE and Kun Yang, Senior Member, IEEE IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 3, THIRD
QUARTER 2013 Survey of Routing Attacks and Countermeasures in
Mobile Ad Hoc Networks by Amara korba Abdelaziz, Mehdi Nafaa,
Ghanemi Salim,Networks and Systems Laboratory University of Badji
Mokhtar Annaba, Algeria -2013 UKSim 15th International Conference
on Computer Modelling and Simulation Applications, Architectures,
and Protocol Design Issues for Mobile Social Networks: A Survey by
N. Kayastha, D. Niyato, and P. Wang are with the Nanyang
Technological University, Singapore & E. Hossain is with the
Department of Electrical and Computer Engineering, University of
Manitoba - Proceedings of the IEEE | Vol. 99, No. 12, December 2011
Safety Challenges and Solutions in Mobile Social Networks by Yashar
Najaflou, Behrouz Jedari, Feng Xia, Senior Member, IEEE,Laurence T.
Yang, and Mohammad S. Obaidat, Fellow, IEEE- This article has been
accepted for inclusion in a future issue of this journal. Content
is final as presented, with the exception of pagination Wireless
networks and mobile computing CSI-5169
Slide 28
Thanks ! Wireless networks and mobile computing CSI-5169