Skip to main content
Top
Published in: Wireless Networks 6/2018

04-02-2017

Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks

Authors: André Zúquete, José Vieira

Published in: Wireless Networks | Issue 6/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article describes and evaluates the performance of DETIboot, a system conceived for securely deploying temporary Linux systems into countless receiving hosts close enough to a Wi-Fi DETIboot server. This system was created with the ultimate goal of installing, in numerous students’ laptops and just-in-time, special Linux distributions for being temporarily used in practical classes. In this document we present an overview of DETIboot, a comprehensive description of the coding used in the broadcast communication and a detailed performance evaluation in a spacious auditorium. This evaluation did not involve security features to reduce the amount of variables influencing the final results. However, previous experiments allow us to extrapolate a maximum of 5% increase in the download time due to security. On average, it took us 50.1 s to download a 225 MiB Slax Linux over 802.11g, taking on average 15% more time than the theoretical lower bound of our setup (43.4 s). The influence of the position of receivers in the auditorium was not prominent.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
3
A ramdisk is portion of RAM used as disk; a ramdisk distribution is a distribution that installs itself on such a disk, therefore in a non-permanent way (disappears after a reboot).
 
4
In order to minimize interferences, the most frequently chosen channels happen to be 1, 6 and 11.
 
Literature
1.
go back to reference Byers, J. W., Luby, M., Mitzenmacher, M., & Rege, A. (1998). A digital fountain approach to reliable distribution of bulk data. In Proceedings of the ACM SIGCOMM ’98 conference on applications, technologies, architectures, and protocols for computer communication, SIGCOMM ’98 (pp. 56–67). Vancouver: ACM. Byers, J. W., Luby, M., Mitzenmacher, M., & Rege, A. (1998). A digital fountain approach to reliable distribution of bulk data. In Proceedings of the ACM SIGCOMM ’98 conference on applications, technologies, architectures, and protocols for computer communication, SIGCOMM ’98 (pp. 56–67). Vancouver: ACM.
2.
go back to reference Luby, M. (2002). LT codes. In Proceedings of the 43rd annual IEEE symposium on foundations of computer science (pp. 271–280). Vancouver: IEEE Computer Society. Luby, M. (2002). LT codes. In Proceedings of the 43rd annual IEEE symposium on foundations of computer science (pp. 271–280). Vancouver: IEEE Computer Society.
3.
go back to reference Rossi, M., Zanca, G., Stabellini, L., Crepaldi, R., Harris, A. F., & Zorzi, M. (2008). SYNAPSE: A network reprogramming protocol for wireless sensor networks using fountain codes. In 5th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc communications and networks (SECON ’08) (pp. 188–196) San Francisco, CA: IEEE Computer Society. Rossi, M., Zanca, G., Stabellini, L., Crepaldi, R., Harris, A. F., & Zorzi, M. (2008). SYNAPSE: A network reprogramming protocol for wireless sensor networks using fountain codes. In 5th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc communications and networks (SECON ’08) (pp. 188–196) San Francisco, CA: IEEE Computer Society.
4.
go back to reference Hankins, D. (2007). Dynamic host configuration protocoloptions used by PXELINUX. Internet engineering task force, request for comments 5071. Hankins, D. (2007). Dynamic host configuration protocoloptions used by PXELINUX. Internet engineering task force, request for comments 5071.
5.
go back to reference Sollins, K. (1992). The TFTP Protocol (Revision 2). Internet engineering task force, request for comments 1350. Sollins, K. (1992). The TFTP Protocol (Revision 2). Internet engineering task force, request for comments 1350.
7.
go back to reference Jeanvoine, E., Sarzyniec, L., & Nussbaum, L. (2013). Kadeploy3: Efficient and scalable operating system provisioning for clusters. USENIX; Login, 38(1), 38–44. Jeanvoine, E., Sarzyniec, L., & Nussbaum, L. (2013). Kadeploy3: Efficient and scalable operating system provisioning for clusters. USENIX; Login, 38(1), 38–44.
8.
go back to reference Lee, K. M., Teng, W. G., Wu, J. N., Huang, K. M., Ko, Y. H., & Hou, T. W. (2012). Multicast deployment of cloud operating systems. In IEEE 12th International conference on computer and information technology (CIT) (pp. 163–168). Chengdu: IEEE Computer Society. Lee, K. M., Teng, W. G., Wu, J. N., Huang, K. M., Ko, Y. H., & Hou, T. W. (2012). Multicast deployment of cloud operating systems. In IEEE 12th International conference on computer and information technology (CIT) (pp. 163–168). Chengdu: IEEE Computer Society.
9.
go back to reference Chen, H., Maunder, R., & Hanzo, L. (2009). Fountain-code aided file transfer in 802.11 WLANs. In IEEE 70th Vehicular technology conference fall (VTC 2009-Fall) (pp. 1–5). Anchorage: IEEE Computer Society. Chen, H., Maunder, R., & Hanzo, L. (2009). Fountain-code aided file transfer in 802.11 WLANs. In IEEE 70th Vehicular technology conference fall (VTC 2009-Fall) (pp. 1–5). Anchorage: IEEE Computer Society.
10.
go back to reference Luby, M., Shokrollahi, A., Watson, M., & Stockhammer, T. (2007). Raptor forward error correction scheme for object delivery. Internet engineering task force, request for comments 5053. Luby, M., Shokrollahi, A., Watson, M., & Stockhammer, T. (2007). Raptor forward error correction scheme for object delivery. Internet engineering task force, request for comments 5053.
11.
go back to reference Luby, M., Shokrollahi, A., Watson, M., Stockhammer, T., & Minder, L. (2011). RaptorQ forward error correction scheme for object delivery. Internet engineering task force, request for comments 6330. Luby, M., Shokrollahi, A., Watson, M., Stockhammer, T., & Minder, L. (2011). RaptorQ forward error correction scheme for object delivery. Internet engineering task force, request for comments 6330.
12.
go back to reference Abdullah, N. F., Doufexi, A., & Piechocki, R. J. (2011). Raptor Codes for infrastructure-to-vehicular broadcast services. In Proceedings of the IEEE wireless communications & networking conference (WCNC’11) (pp. 1–5). San Francisco, CA: IEEE Computer Society. Abdullah, N. F., Doufexi, A., & Piechocki, R. J. (2011). Raptor Codes for infrastructure-to-vehicular broadcast services. In Proceedings of the IEEE wireless communications & networking conference (WCNC’11) (pp. 1–5). San Francisco, CA: IEEE Computer Society.
14.
go back to reference Cataldi, P., Tomatis, A., Grilli, G., & Gerla, M. (2009). A novel data dissemination method for vehicular networks with Rateless codes. In Proceedings of the IEEE wireless communications & networking conference (WCNC’09) (pp. 1–6). Budapest: IEEE Computer Society. Cataldi, P., Tomatis, A., Grilli, G., & Gerla, M. (2009). A novel data dissemination method for vehicular networks with Rateless codes. In Proceedings of the IEEE wireless communications & networking conference (WCNC’09) (pp. 1–6). Budapest: IEEE Computer Society.
15.
go back to reference Reis, S., Zúquete, A., Faneca, C., & Vieira, J. (2015). Authenticated file broadcast protocol. In International conference on ICT systems security and privacy protection (IFIP SEC 2015). Hamburg. Reis, S., Zúquete, A., Faneca, C., & Vieira, J. (2015). Authenticated file broadcast protocol. In International conference on ICT systems security and privacy protection (IFIP SEC 2015). Hamburg.
16.
go back to reference Cardoso, J. (2013). DETIboot: Distribuição e arranque de sistemas Linux com redes WiFi. Master’s thesis, University of Aveiro, Portugal. Cardoso, J. (2013). DETIboot: Distribuição e arranque de sistemas Linux com redes WiFi. Master’s thesis, University of Aveiro, Portugal.
17.
go back to reference Faneca, C., Vieira, J., & Zúquete, A. (2014). Fast image file distribution with Fountain codes via a Wi-Fi Ad-Hoc network, using low power processors. In 16th International telecommunications network strategy and planning symposium (NETWORKS, 2014). Funchal. Portugal: Madeira. Faneca, C., Vieira, J., & Zúquete, A. (2014). Fast image file distribution with Fountain codes via a Wi-Fi Ad-Hoc network, using low power processors. In 16th International telecommunications network strategy and planning symposium (NETWORKS, 2014). Funchal. Portugal: Madeira.
18.
go back to reference Faneca, C., Vieira, J., Zúquete, A., & Cardoso, J. (2014). DETIboot: A fast, wireless system to install operating systems on students laptops. In: 2nd International conference on advances in computing, electronics and communication (ACEC 2014), Zurich, Switzerland. Faneca, C., Vieira, J., Zúquete, A., & Cardoso, J. (2014). DETIboot: A fast, wireless system to install operating systems on students laptops. In: 2nd International conference on advances in computing, electronics and communication (ACEC 2014), Zurich, Switzerland.
19.
go back to reference MacKay, D. J. C. (2005). Fountain codes. IEE Proceedings Communications, 152(6), 1062–1068.CrossRef MacKay, D. J. C. (2005). Fountain codes. IEE Proceedings Communications, 152(6), 1062–1068.CrossRef
20.
go back to reference Luby, M., Vicisano, L., Gemmell, J., Rizzo, L., Handley, M., & Crowcroft, J. (2002). The use of forward error correction (FEC) in reliable multicast. Internet engineering task force, request for comments 3453. Luby, M., Vicisano, L., Gemmell, J., Rizzo, L., Handley, M., & Crowcroft, J. (2002). The use of forward error correction (FEC) in reliable multicast. Internet engineering task force, request for comments 3453.
21.
go back to reference Yuan, X., & Ping, L. (2008). On systematic LT codes. IEEE Communications Letters, 12(9), 681–683.CrossRef Yuan, X., & Ping, L. (2008). On systematic LT codes. IEEE Communications Letters, 12(9), 681–683.CrossRef
22.
go back to reference Chen, Z., & Zhou, Q. (2010). Implementation of LT codes with a revised robust soliton distribution by using kent chaotic map. In International workshop on chaos-fractals theories and applications (IWCFTA), Kunming, China. Chen, Z., & Zhou, Q. (2010). Implementation of LT codes with a revised robust soliton distribution by using kent chaotic map. In International workshop on chaos-fractals theories and applications (IWCFTA), Kunming, China.
23.
go back to reference Ferreira, P. J. S. G., Jesus, B., Vieira, J., & Pinho, A. J. (2011). Random block-angular matrices for distributed data storage. In: IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 3180–3183). Ferreira, P. J. S. G., Jesus, B., Vieira, J., & Pinho, A. J. (2011). Random block-angular matrices for distributed data storage. In: IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 3180–3183).
24.
go back to reference Almesberger, W. (2006). kboot—A boot loader based on Kexec. In: Proceedings of the Linux symposium (OLS 2006) (vol. 1, pp. 27–38). Ottawa, ON. Almesberger, W. (2006). kboot—A boot loader based on Kexec. In: Proceedings of the Linux symposium (OLS 2006) (vol. 1, pp. 27–38). Ottawa, ON.
25.
go back to reference IEEE Std 802.11e. (2005). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 8: Medium access control (MAC) enhancements for quality of service (QoS). IEEE Std 802.11e. (2005). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 8: Medium access control (MAC) enhancements for quality of service (QoS).
Metadata
Title
Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks
Authors
André Zúquete
José Vieira
Publication date
04-02-2017
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2018
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1450-0

Other articles of this Issue 6/2018

Wireless Networks 6/2018 Go to the issue