Thank you for your interest. Given below are links to some of my ongoing research projects. If you have any comments, please send me an email.

Also see a list of representative publications.


On Setting up a WiFi Ad Hoc Network Testbed

We implemented an eight-node ad hoc network using off-the-shelf WiFi routers and publicly available software. The hardware cost of the network is about $50/node. We reprogrammed these WiFi routers with the openwrt distribution of Linux kernel and added AODV routing module to create an ad hoc network. To gather data from wireless experiments without perturbing wireless communications, we set up a second network based on the fast Ethernet. The Ethernet is used to start and stop experiments, monitor  individual node status, and send experimental data to a chosen desktop computer for analysis and processing. We modified AODV software and developed C programs to
generate UDP load on the wireless network and gather network status on-the-fly. We modified a Java visualization tool to display nodes’ statuses and network throughput gathered. Though small, the testbed proved to be valuable in evaluating some of the security attacks and solutions to the same.  [Details]

WDS protocol at the MAC level can also be set up on this cluster. [Link to WDS Setup].

Mitigating Denial of Service Attack on Ad Hoc Networks

We investigated the impact of hacker attacks by malicious nodes on the overall network performance. These malicious nodes mimic normal nodes in all aspects except that they do route discoveries much more frequently than the other nodes. We proposed an adaptive statistical packet dropping mechanism to mitigate such situations and reduce the loss of throughput. The proposed mechanism works even when the identity of the malicious nodes is unknown and does not use any additional network bandwidth. It is simple to implement and maintains or improves network throughput when there are no malicious nodes but the network is congested with excess traffic. Previously, we evaluated the impact of such attacks and the effectiveness of our solution using simulations conducted with Glomosim simulator. In this project, we implemented the solution in Kernel AODV code for Linux machines and evaluated it on the ad hoc network testbed. [Details]

 


Rajendra V. Boppana
Mail: CS Department, UT San Antonio, San Antonio TX 78249, USA
Phone: 210-458-5692  Fax: 210-458-4437   Email: boppana[at]cs.utsa.edu