• No results found

Sustainability research of the secure wireless communication system with channel reservation

N/A
N/A
Protected

Academic year: 2022

Share "Sustainability research of the secure wireless communication system with channel reservation"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

http://www.diva-portal.org

Postprint

This is the accepted version of a paper presented at 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2020, Lviv-Slavske, Ukraine, 25 February 2020 through 29 February 2020.

Citation for the original published paper:

Carlsson, A., Ageyev, D., Sadykov, Y., Sokolov, V. (2020)

Sustainability research of the secure wireless communication system with channel reservation

In: 15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN

RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 9088514 (pp. 973-977). Institute of Electrical and Electronics

Engineers Inc.

https://doi.org/10.1109/TCSET49122.2020.235583

N.B. When citing this work, cite the original published paper.

Permanent link to this version:

http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20017

(2)

Conference Proceedings

15th International Conference on

Advanced Trends in Radioelectronics, Telecommunications and Computer

Engineering (TCSET - 2020)

in partnership with

Lviv-Slavske, Ukraine February 25-29, 2020

(3)

Paper

ID Paper Page

264 Mykola Beshley, Mykhailo Klymash, Myroslav Hamal and Yura Shkoropad.

Method for Estimating Service Delay in Edge and Cloud Computing Architecture 915

266

Vugar Hacimahmud Abdullayev, Hanna Khakhanova, Ivan Hahanov, Vladimir Hahanov, Svetlana Chumachenko, Eugenia Litvinova and Olga Shevchenko.

Structure and Metrics of Emerging Computing 920

267

Stepan Ivasiev, Ihor Yakymenko, Mykhailo Kasianchuk, Oksana Gomotiuk, Grygorii Tereshchuk and Pavlo Basistyi. Elgamal Cryptoalgorithm on the Basis of

the Vector-module Method of Modular Exponentiation and Multiplication 926 268 Iurii Krak, Anatolii Pashko, Oleg Khorozov, Oleg Stelia and Mykola Efremov.

Electrocardiogram Classification using Wavelet Transformations 930

269

Valerii Koval, Dmytro Kalian, Oleksandr Osinskiy, Oleksandr Samkov, Mykola Khudyntsev and Vitaliy Lysenko. Diagnostics of Time Synchronization Means of the Integrated Power Grid of SMART Technologies by Using an Optimal

Performance System of Automatic Frequency Adjustment 934

270

Mykhailo Seheda, Oksana Hoholyuk, Petro Gogolyuk and Yurii Blyznak.

Mathematical Model of Periodic Wave Processes in the High-Frequency

Transformer Windings of Power Sources 939

271 Vladimir Krizhanovski, Volodymyr Kryzhanovskyi and Andrei Grebennikov. Class

E oscillator with Two Switchable Frequencies 944

272 Ivan Lesovoy and Igor Makarov. Variation Approach to Signal Synthesis with

Minimal Energy Outside the Operating Frequency Band 948

273

Sergii Ubizskii, Denis Afanassyev, Yaroslav Zhydachevskii, Vasyl Rabyk and Andriy Luchechko. Concept Development of a Portable Reader for Personal

Dosimetry based on the OSL in YAP:Mn 952

274

Volodymyr Pelishok, Ihor Tchaikovskyi, Bohdan Koval and Gennadi

Malaschonok. Optimization of Digital Modulation of Radio Systems Based on

Generalized Characteristics 957

275 Roman Melnyk and Ruslan Tushnytskyy. Detection of Defects in Printed Circuit

Boards by Clustering the Etalon and Defected Samples 961

276

Iryna Fefelova, Andrey Fefelov, Mariia Voronenko, Alexander Kornelyuk, Anatoliy Sachenko, Eduard Ryzhkov and Volodymyr Lytvynenko. Predicting the Protein Tertiary Structure by Hybrid Clonal Selection Algorithms on 3D Square

Lattice 965

277

Pavel Fastykovsky, Мichael Glauberman and Yaroslav Lepikh. Autonomous Compact Seismic Device for Detection and Recognition of Moving Person and

Vehicles 969

278

Yaroslav Sadykov, Volodymyr Sokolov, Dmytro Ageyev and Anders Carlsson.

Sustainability Research of the Secure Wireless Communication System with

Channel Reservation 973

(4)

973

978-1-7281-5566-1/20/$31.00 ©2020 IEEE

Sustainability Research of the Secure Wireless Communication System with Channel Reservation

Anders Carlsson Department of Computer Science

Blekinge Institute of Technology Karlskrona, Sweden anders.carlsson@bth.se

Yaroslav Sadykov Information Technology Department

Helsi Ltd.

Kyiv, Ukraine y.sadykov@helsi.me

Dmytro Ageyev

Infocommunication Engineering Department Kharkiv National University of Radioelectronics

Kharkiv, Ukraine dmytro.aheiev@nure.ua

Volodymyr Sokolov

Department of Information and Cyber Security Borys Grinchenko Kyiv University

Kyiv, Ukraine v.sokolov@kubg.edu.ua

Abstract—The paper presents the research of the stability of the system with a redundancy of communication channels. For this, two prototypes have been developed that are built (1) according to the classical circuit-switched scheme and (2) with an aggregation of several virtual channels. Prototyping, installation on various vehicles and measurements of the stability of the entire system as a whole were carried out. The paper also presents structural diagrams, hardware, and a list of problems and difficulties that the authors encountered during the practical implementation and implementation of these systems. In the future, it is planned to expand the study of these systems when working with high-level channel virtualization and the search for methods to accelerate its work.

Keywords—channel reservation; wireless; sustainability.

I. INTRODUCTION

The work of modern wireless public access systems contains a number of vulnerabilities. Therefore, solutions to the problem of simultaneous transmission of secret data and at the same time maintaining a stable connection require the use of special network solutions. These solutions are possible due to the switching of virtual channels, which can be distributed among different telecommunication service providers. The problem of reservation of communication channels can be solved by the aggregation of several virtual channels. The more mobile operators work in the same territory, the higher the chances of getting uninterrupted access to remote services. For high-quality channel switching, an external subsystem for monitoring the signal level in each of the wireless systems can be used [1].

The paper is structured as follows. Section II gives an overview of related works. In section III, our requirements for the secure wireless communication system with a channel reservation are presented. Section IV gives an overview of the software and related hardware used during the development of two prototypes. Section V presents the results of the testing of

our developed complex. This paper ends with section VI that concludes the current state of development of this system and describes the directions of future development.

II. RELATED WORKS

Virtualization in various sources is considered from different angles. For example, in [2] channel reservation is defined to reserve several fixed channels only for primary users which will lead to less frequency spectrum handoffs comparing with no reservation mechanism. To manage the queue in [3], it is proposed to use FIFO scheduling aggregates flows into a single flow just prior to the wireless link, channel-state dependent schedulers maintain a queue for each flow.

For the formation of the organization of the virtual environment, groups of researchers suggest using different protocols: Adaptive Genetic Algorithm for identifying the shortest path [4]; Multi-Step Channel Reservation based on Multi-Channel MAC protocol for solving the bottleneck problem [5]; Backup Channel Reservation Protocol for reconstructing of the second communication if forced termination occurred [6] and Secured Traffic Priority Differentiation (at MAC sublayer) for support any application [7]. General principles for protecting wireless networks with virtualization are presented in [8]. And in [9] it is shown that clustering of the sensor network can be used as a client network.

III. RESERVATION LOSS

The probability of k packets arriving in time T is modeled as:

(1) where λ is the packet arrival rate in a station [10].

2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) 978-1-7281-5566-1/20/$31.00 ©2020 IEEE 10.1109/TCSET49122.2020.235583

(5)

974

February 25-29, 2020 TCSET-2020 Lviv-Slavske, Ukraine

System requirements contain mutually exclusive clauses;

therefore, a solution can only be a compromise:

• Work in mobile public networks.

• Use of available hardware base.

• The data transfer speed is sufficient for video teleconferencing.

• Ensuring the stability of work on moving objects.

• System mobility.

• Minimal use of mobile traffic in standby mode.

• Minimum visibility of additional antennas when placed on vehicles.

• Electricity consumption from regular vehicle power sources.

• Scalability and ease of configuration.

IV. PROTOTYPING

The first prototype of the device was assembled according to the simplified scheme shown in Fig. 1.

Fig. 1. Structural scheme of the first prototype.

To solve the problem of a stable Internet channel for transport, the classical channel reservation scheme was used, i.e. a router with two WANs and switching between them when the main channel is broken. The following equipment was selected:

• Two Huawei B880-75 modems

• Cisco RV042 router

• Mikrotik Wi-Fi hotspot

Modems are connected by Ethernet ports to WAN1 and WAN2 of the Cisco router, and the access point is connected directly to the router (Fig. 2).

The channel switching logic is as follows: WAN1 acts as the primary channel, WAN2 as the backup. Through WAN1, Google DNS is periodically requested by the IP address 8.8.8.8, and in case of ICMP packet loss, the router reconnects to the Internet through WAN2.

Fig. 2. The first prototype portable client station with two LTE modems.

The main problems of this implementation:

• Unstable switching speed (from 20 to 60 s).

• Frequent false positives. When the car was moving, the loss of ICMP packets was periodically recorded, due to which the Internet was constantly switching from one WAN to another.

• Due to the change of mobile providers, the external IP address also changed, because of which there were problems with sessions in some online programs on clients. For example, messengers lost contact with the server and switched after a few minutes, and sometimes completely hung in standby mode until they were manually restarted.

Huawei B880 modems are not designed for mobile movement, so if the base station was lost, they could not always correctly find another and connect. As a result, when turned on, the modem refused to find the base station (in some cases, a reboot helped).

These problems have become a decisive factor in the search for other channel redundancy solutions.

The next implementation involves the use of wired aggregation logic through mobile operators. This approach solves the problem of connection stability (Fig. 3). After analyzing coverage maps of various mobile operators, it was decided to expand the number of backup connections to four to ensure more stable operation.

The following equipment was selected:

• Four Huawei B880-75 modems

• Mikrotik RB951Ui-2Hnd router

• Apple Airport Express Wi-Fi hotspot

(6)

975

February 25-29, 2020 TCSET-2020 Lviv-Slavske, Ukraine

Fig. 3. Structural scheme of the secure wireless communication system with channel reservation.

The algorithm for starting services and connections:

1. Four VPN connections with the server are launched.

2. Each VPN connection is routed through its WAN.

3. Based on the assigned IP addresses of the VPN connections, four EoIP tunnels are launched on the server-side and client-side.

4. Bonding service is launched, which aggregates four EoIP tunnels from the server and client.

As a result, the server and the client see each other as if they are connected by the same cable to each other. For connected end devices, the gateway is the Mikrotik server, which routes traffic through NAT to the Internet (Fig. 4).

The advantages of this implementation:

• Stable connection while running at least one VPN channel.

• There are no switches for clients since the same external IP address is always used.

• The ability to raise OpenVPN on top of Bonding and encrypt all traffic from the car to the server.

• Remote traffic monitoring, aggregation management, and VPN connections.

Fig. 4. Portable client station industrial design.

Among the design flaws remain:

• Low-speed Internet traffic, no more than 5–6 Mbps, which does not depend on the speed of the mobile connection.

• The need to use a server with a white IP address.

• High power consumption of the equipment (more than 50 watts), which necessitates high-quality switching of power supply and cooling devices.

• The bulkiness of the equipment and the complexity of its placement on the vehicle.

• The need to install antennas on the roof of the car and lay the cable to them.

The total cost of the second prototype exceeded the first three times.

V. IMPLEMENTATION

The implementation of this system was carried out on three vehicles that were used within the access network. Each assembly was individual and implied the use of different buildings, as it was installed on vehicles of different brands.

Huawei B880-75 devices were used to connect to the Mobile Network Operator (MNO). The maximum download speed in 4G mode was 70 Mbps (with a theoretical of 150 Mbps).

Client hardware was installed on fixed and moving objects.

The maximum data transfer rate was 6 Mbps for stationary

(7)

976

February 25-29, 2020 TCSET-2020 Lviv-Slavske, Ukraine

objects, and when installed on a vehicle at a speed of 160 km/h, the speed sagged up to 1 Mbps.

This switching device can be installed on armored vehicles, the metal thickness does not affect the quality of communication since external antennas were used during operation: two stationary LTE/3G antennas (800/900/1800/

2100/2600 MHz) with a gain of 5 dB and vertical polarization and two additional GSM/3G antennas (850/900/1800/1900/

2200 MHz) with a gain of 5.5 dB, vertical polarization, standing wave ratio less than 1.5:1 and a maximum input power of 20 watts.

In conditions of poor communication quality, an accelerating lens can be used to focus the antennas towards the base station [11, 12].

Partially resolved the problem with the modems freezing when turning on the power. The equipment was connected to the cigarette lighter socket, which was disconnected through the ignition system. When the car stopped, the ignition was turned off and at the next start, the modems worked.

Nevertheless, there was no guarantee that all modems would still start correctly.

Aggregation required constant ping (sending of ICMP packets), therefore small traffic of mobile operators was constantly spent.

An additional power switch is required if the equipment is unconnected through the vehicle’s ignition system.

To connect end-users, you can use access points that solve the “last mile” problem. In this case, we used a Wi-Fi access point Apple airport express with a redo matching the input voltage for 12 V (Fig. 5).

Fig. 5. Adaptation of the access point to an autonomous power source.

To increase the speed of work, the simplest protocols should be used. One of these protocols is the Point-to-Point Tunneling Protocol (PPTP), using which there is minimal loss in transmission speed.

This system can be used as part of a virtual network in which virtualization is used at a higher level, for example,

using OpenVPN. Thus, this switching system is encapsulated inside another virtual system.

Keep in mind that each virtualization layer reduces the final data transfer rate. It is necessary to prevent a decrease in speed below the minimum value that ensures the operation of a set of services.

VI. CONCLUSION AND FUTURE WORK

Redundancy in wireless communication channels increases stability but does not lead to a three to four-fold increase in the cost of such a system. In addition, due to the aggregation of channels, the speed of the entire system decreases by an order of magnitude and usually does not exceed the speed of the slowest channel. As practice has shown, this system with redundant channels allows you to implement a secure communication channel on the basis of the existing commercial cellular infrastructure, which will be simultaneously distributed among several communication channels, encrypted and stable.

A data transfer rate of 5–6 Mbps allows you to transfer secret data (documents and media files), as well as produce voice and video teleconferences in real time.

In the future, the authors intend conducting experimental studies of the stability of this system in conditions of poor quality wireless systems. In the future, it is planned to use additional virtualization on top of the system with redundancy.

ACKNOWLEDGMENT

This scientific work was partially supported by RAMECS and self-determined research funds of CCNU from the colleges’ primary research and operation of MOE (CCNU19TS022). The experiments were conducted with the assistance of the company Helsi Ltd. [13].

REFERENCES

[1] V. Yu. Sokolov, “Comparison of Possible Approaches for the Development of Low-Cost Spectrum Analyzers for 2.4-2.5 GHz Sensor Networks [Porivnyannya mozhlyvykh pidkhodiv shchodo rozrobky nyz'kobyudzhetnykh analizatoriv spektru dlya sensornykh merezh diapazonu 2,4–2,5 HHts],” Cybersecurity: Education, Science, Technology, no. 2, pp. 31–46, 2018. doi: 10.28925/2663-4023.2018.2.

3146.

[2] W. Yafeng, L. Chao, W. Tianwei, and W. Xiang, “Dynamic Channel Reservation for Cognitive Radio Networks,” 2015 IEEE International Conference on Computational Intelligence & Communication Technology, pp. 339–343, Feb. 2015. doi: 10.1109/cict.2015.151.

[3] R. Rom and H. P. Tan, “Performance Tradeoffs in Wireless Scheduling with Flow Aggregration,” 2003 IEEE Wireless Communications and Networking, pp. 1633–1638, 2003. doi: 10.1109/wcnc.2003.1200631.

[4] I. K. Ibraheem and A. A.-H. Al-Hussainy, “A Multi QoS Genetic-based Adaptive Routing in Wireless Mesh Networks with Pareto Solutions,”

International Journal of Computer Network and Information Security, vol. 10, no. 9, pp. 1–9, Sep. 2018. doi: 10.5815/ijcnis.2018.09.01.

[5] B. Yang, B. Li, Q. Qu, and Z. Yan, “A New Multi-Channel MAC Protocol based on Multi-Step Channel Reservation,” 2014 IEEE International Conference on Signal Processing, Communications and Computing, pp. 603–607, 2014. doi: 10.1109/icspcc.2014.6986264.

[6] S. M. Eljack, M. A. Igbal, and W. Furong, “A Multi Channel Cognitive MAC Protocol with Efficient Channel Reservation and Collision Avoidance Method,” 2009 International Conference on Multimedia Information Networking and Security, pp. 115–119, 2009. doi: 10.1109/

mines.2009.44.

(8)

977

February 25-29, 2020 TCSET-2020 Lviv-Slavske, Ukraine

[7] H. Qushtom and K. Rabaya’h, “Enhancing the QoS of IoT Networks with Lightweight Security Protocol using Contiki OS,” International Journal of Computer Network and Information Security, vol. 9, no. 11, pp. 27–35, Nov. 2017. doi: 10.5815/ijcnis.2017.11.03.

[8] M. N. Riaz, A. Buriro, and A. Mahboob, “Classification of Attacks on Wireless Sensor Networks: A Survey,” International Journal of Wireless and Microwave Technologies, vol. 8, no. 6, pp. 15–39, Nov. 2018. doi:

10.5815/ijwmt.2018.06.02.

[9] M. N. Riaz, “Clustering Algorithms of Wireless Sensor Networks: A Survey,” International Journal of Wireless and Microwave Technologies, vol. 8, no. 4, pp. 40–53, Jul. 2018. doi: 10.5815/ijwmt.

2018.04.03.

[10] Z. Chen and A. A. Khokhar, “A Channel Reservation Procedure for Fading Channels in Wireless Local Area Networks,” IEEE Transactions on Wireless Communications, vol. 4, no. 2, pp. 689–699, Mar. 2005.

doi: 10.1109/twc.2004.842954.

[11] V. M. Astapenya and V. Y. Sokolov, “Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane,” 2017 XI International Conference on Antenna Theory and Techniques (ICATT), pp. 389–391, May 2017. doi: 10.1109/icatt.2017.7972671.

[12] V. Astapenya, V. Sokolov, and M. TajDini, “Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless Networks [Rezul'taty ta zasoby otsinky efektyvnosti system fokusuvannya dlya pidvyshchennya dostupnosti v bezprovodovykh merezhakh],” Cybersecurity: Education Science Technique, no. 4, pp. 90–103, 2019. doi: 10.28925/2663- 4023.2019.4.90103.

[13] Helsi. (2019). “Electronic Medical System for Patients and Doctors.”

[Online]. https://helsi.me [Jan. 24, 2019].

References

Related documents

Stöden omfattar statliga lån och kreditgarantier; anstånd med skatter och avgifter; tillfälligt sänkta arbetsgivaravgifter under pandemins första fas; ökat statligt ansvar

Generally, a transition from primary raw materials to recycled materials, along with a change to renewable energy, are the most important actions to reduce greenhouse gas emissions

För att uppskatta den totala effekten av reformerna måste dock hänsyn tas till såväl samt- liga priseffekter som sammansättningseffekter, till följd av ökad försäljningsandel

Från den teoretiska modellen vet vi att när det finns två budgivare på marknaden, och marknadsandelen för månadens vara ökar, så leder detta till lägre

Generella styrmedel kan ha varit mindre verksamma än man har trott De generella styrmedlen, till skillnad från de specifika styrmedlen, har kommit att användas i större

I regleringsbrevet för 2014 uppdrog Regeringen åt Tillväxtanalys att ”föreslå mätmetoder och indikatorer som kan användas vid utvärdering av de samhällsekonomiska effekterna av

På många små orter i gles- och landsbygder, där varken några nya apotek eller försälj- ningsställen för receptfria läkemedel har tillkommit, är nätet av

Det har inte varit möjligt att skapa en tydlig överblick över hur FoI-verksamheten på Energimyndigheten bidrar till målet, det vill säga hur målen påverkar resursprioriteringar