Skip to main content
Log in

Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This article describes and evaluates the performance of DETIboot, a system conceived for securely deploying temporary Linux systems into countless receiving hosts close enough to a Wi-Fi DETIboot server. This system was created with the ultimate goal of installing, in numerous students’ laptops and just-in-time, special Linux distributions for being temporarily used in practical classes. In this document we present an overview of DETIboot, a comprehensive description of the coding used in the broadcast communication and a detailed performance evaluation in a spacious auditorium. This evaluation did not involve security features to reduce the amount of variables influencing the final results. However, previous experiments allow us to extrapolate a maximum of 5% increase in the download time due to security. On average, it took us 50.1 s to download a 225 MiB Slax Linux over 802.11g, taking on average 15% more time than the theoretical lower bound of our setup (43.4 s). The influence of the position of receivers in the auditorium was not prominent.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Notes

  1. http://www.symantec.com/ghost-solution-suite

  2. http://www.udpcast.linux.lu

  3. A ramdisk is portion of RAM used as disk; a ramdisk distribution is a distribution that installs itself on such a disk, therefore in a non-permanent way (disappears after a reboot).

  4. In order to minimize interferences, the most frequently chosen channels happen to be 1, 6 and 11.

References

  1. Byers, J. W., Luby, M., Mitzenmacher, M., & Rege, A. (1998). A digital fountain approach to reliable distribution of bulk data. In Proceedings of the ACM SIGCOMM ’98 conference on applications, technologies, architectures, and protocols for computer communication, SIGCOMM ’98 (pp. 56–67). Vancouver: ACM.

  2. Luby, M. (2002). LT codes. In Proceedings of the 43rd annual IEEE symposium on foundations of computer science (pp. 271–280). Vancouver: IEEE Computer Society.

  3. Rossi, M., Zanca, G., Stabellini, L., Crepaldi, R., Harris, A. F., & Zorzi, M. (2008). SYNAPSE: A network reprogramming protocol for wireless sensor networks using fountain codes. In 5th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc communications and networks (SECON ’08) (pp. 188–196) San Francisco, CA: IEEE Computer Society.

  4. Hankins, D. (2007). Dynamic host configuration protocoloptions used by PXELINUX. Internet engineering task force, request for comments 5071.

  5. Sollins, K. (1992). The TFTP Protocol (Revision 2). Internet engineering task force, request for comments 1350.

  6. Augerat, P., Billot, W., Derr, S., & Martin, C. (2001). A scalable file distribution and operating system installation toolkit for clusters. (unpublished). http://ka-tools.sourceforge.net/publications/file-distribution.pdf.

  7. Jeanvoine, E., Sarzyniec, L., & Nussbaum, L. (2013). Kadeploy3: Efficient and scalable operating system provisioning for clusters. USENIX; Login, 38(1), 38–44.

    Google Scholar 

  8. Lee, K. M., Teng, W. G., Wu, J. N., Huang, K. M., Ko, Y. H., & Hou, T. W. (2012). Multicast deployment of cloud operating systems. In IEEE 12th International conference on computer and information technology (CIT) (pp. 163–168). Chengdu: IEEE Computer Society.

  9. Chen, H., Maunder, R., & Hanzo, L. (2009). Fountain-code aided file transfer in 802.11 WLANs. In IEEE 70th Vehicular technology conference fall (VTC 2009-Fall) (pp. 1–5). Anchorage: IEEE Computer Society.

  10. Luby, M., Shokrollahi, A., Watson, M., & Stockhammer, T. (2007). Raptor forward error correction scheme for object delivery. Internet engineering task force, request for comments 5053.

  11. Luby, M., Shokrollahi, A., Watson, M., Stockhammer, T., & Minder, L. (2011). RaptorQ forward error correction scheme for object delivery. Internet engineering task force, request for comments 6330.

  12. Abdullah, N. F., Doufexi, A., & Piechocki, R. J. (2011). Raptor Codes for infrastructure-to-vehicular broadcast services. In Proceedings of the IEEE wireless communications & networking conference (WCNC’11) (pp. 1–5). San Francisco, CA: IEEE Computer Society.

  13. Shokrollahi, A. (2006). Raptor codes. IEEE Transactions on Information Theory, 52(6), 2551–2567.

    Article  MathSciNet  MATH  Google Scholar 

  14. Cataldi, P., Tomatis, A., Grilli, G., & Gerla, M. (2009). A novel data dissemination method for vehicular networks with Rateless codes. In Proceedings of the IEEE wireless communications & networking conference (WCNC’09) (pp. 1–6). Budapest: IEEE Computer Society.

  15. Reis, S., Zúquete, A., Faneca, C., & Vieira, J. (2015). Authenticated file broadcast protocol. In International conference on ICT systems security and privacy protection (IFIP SEC 2015). Hamburg.

  16. Cardoso, J. (2013). DETIboot: Distribuição e arranque de sistemas Linux com redes WiFi. Master’s thesis, University of Aveiro, Portugal.

  17. Faneca, C., Vieira, J., & Zúquete, A. (2014). Fast image file distribution with Fountain codes via a Wi-Fi Ad-Hoc network, using low power processors. In 16th International telecommunications network strategy and planning symposium (NETWORKS, 2014). Funchal. Portugal: Madeira.

  18. Faneca, C., Vieira, J., Zúquete, A., & Cardoso, J. (2014). DETIboot: A fast, wireless system to install operating systems on students laptops. In: 2nd International conference on advances in computing, electronics and communication (ACEC 2014), Zurich, Switzerland.

  19. MacKay, D. J. C. (2005). Fountain codes. IEE Proceedings Communications, 152(6), 1062–1068.

    Article  Google Scholar 

  20. Luby, M., Vicisano, L., Gemmell, J., Rizzo, L., Handley, M., & Crowcroft, J. (2002). The use of forward error correction (FEC) in reliable multicast. Internet engineering task force, request for comments 3453.

  21. Yuan, X., & Ping, L. (2008). On systematic LT codes. IEEE Communications Letters, 12(9), 681–683.

    Article  Google Scholar 

  22. Chen, Z., & Zhou, Q. (2010). Implementation of LT codes with a revised robust soliton distribution by using kent chaotic map. In International workshop on chaos-fractals theories and applications (IWCFTA), Kunming, China.

  23. Ferreira, P. J. S. G., Jesus, B., Vieira, J., & Pinho, A. J. (2011). Random block-angular matrices for distributed data storage. In: IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 3180–3183).

  24. Almesberger, W. (2006). kboot—A boot loader based on Kexec. In: Proceedings of the Linux symposium (OLS 2006) (vol. 1, pp. 27–38). Ottawa, ON.

  25. IEEE Std 802.11e. (2005). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 8: Medium access control (MAC) enhancements for quality of service (QoS).

Download references

Acknowledgements

We would like to thank all the researchers that contributed to the design and development of DETIboot, namely João Cardoso, Carlos Faneca, Simão Reis and Cláudio Patrício. This work was partially funded by FCT (Foundation for Science and Technology), in the context of the projects PEst-OE/EEI/UI0127/2014 and CodeStream (PTDC/EEI-TEL/3006/2012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to André Zúquete.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zúquete, A., Vieira, J. Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks. Wireless Netw 24, 2043–2060 (2018). https://doi.org/10.1007/s11276-017-1450-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1450-0

Keywords

Navigation