987 research outputs found
Design & Evaluation of Path-based Reputation System for MANET Routing
Most of the existing reputation systems in mobile ad hoc networks (MANET) consider only node reputations when selecting routes. Reputation and trust are therefore generally ensured within a one-hop distance when routing decisions are made, which often fail to provide the most reliable, trusted route. In this report, we first summarize the background studies on the security of MANET. Then, we propose a system that is based on path reputation, which is computed from reputation and trust values of each and every node in the route. The use of path reputation greatly enhances the reliability of resulting routes. The detailed system architecture and components design of the proposed mechanism are carefully described on top of the AODV (Ad-hoc On-demand Distance Vector) routing protocol. We also evaluate the performance of the proposed system by simulating it on top of AODV. Simulation experiments show that the proposed scheme greatly improves network throughput in the midst of misbehavior nodes while requires very limited message overhead. To our knowledge, this is the first path-based reputation system proposal that may be implemented on top of a non-source based routing scheme such as AODV
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42
Recommended from our members
Multimedia delivery in the future internet
The term âNetworked Mediaâ implies that all kinds of media including text, image, 3D graphics, audio
and video are produced, distributed, shared, managed and consumed on-line through various networks,
like the Internet, Fiber, WiFi, WiMAX, GPRS, 3G and so on, in a convergent manner [1]. This white
paper is the contribution of the Media Delivery Platform (MDP) cluster and aims to cover the Networked
challenges of the Networked Media in the transition to the Future of the Internet.
Internet has evolved and changed the way we work and live. End users of the Internet have been confronted
with a bewildering range of media, services and applications and of technological innovations concerning
media formats, wireless networks, terminal types and capabilities. And there is little evidence that the pace
of this innovation is slowing. Today, over one billion of users access the Internet on regular basis, more
than 100 million users have downloaded at least one (multi)media file and over 47 millions of them do so
regularly, searching in more than 160 Exabytes1 of content. In the near future these numbers are expected
to exponentially rise. It is expected that the Internet content will be increased by at least a factor of 6, rising
to more than 990 Exabytes before 2012, fuelled mainly by the users themselves. Moreover, it is envisaged
that in a near- to mid-term future, the Internet will provide the means to share and distribute (new)
multimedia content and services with superior quality and striking flexibility, in a trusted and personalized
way, improving citizensâ quality of life, working conditions, edutainment and safety.
In this evolving environment, new transport protocols, new multimedia encoding schemes, cross-layer inthe
network adaptation, machine-to-machine communication (including RFIDs), rich 3D content as well as
community networks and the use of peer-to-peer (P2P) overlays are expected to generate new models of
interaction and cooperation, and be able to support enhanced perceived quality-of-experience (PQoE) and
innovative applications âon the moveâ, like virtual collaboration environments, personalised services/
media, virtual sport groups, on-line gaming, edutainment. In this context, the interaction with content
combined with interactive/multimedia search capabilities across distributed repositories, opportunistic P2P
networks and the dynamic adaptation to the characteristics of diverse mobile terminals are expected to
contribute towards such a vision.
Based on work that has taken place in a number of EC co-funded projects, in Framework Program 6 (FP6)
and Framework Program 7 (FP7), a group of experts and technology visionaries have voluntarily
contributed in this white paper aiming to describe the status, the state-of-the art, the challenges and the way
ahead in the area of Content Aware media delivery platforms
Evaluation of an awareness distribution mechanism: a simulation approach
In distributed software engineering, the role of informal communication is frequently overlooked. Participants simply employ their own ad-hoc methods of informal communication. Consequently such communication is haphazard, irregular, and rarely recorded as part of the project documentation. Thus, a need for tool support to facilitate more systematic informal communication via awareness has been identified. The tool proposed is based on the provision of awareness support that recognises the complete context of the evolution of software artefacts rather than single events.
Peer-to-Peer (P2P) networking has been successfully
employed to develop various distributed software engineering support tools. However, there are scalability problems inherent in naive P2P networks. To this end a semantic overlay network organisation algorithm has been developed and tested in simulation prior to deployment as part of a forthcoming awareness extension to the Eclipse environment.
The simulation verified that the self-organisation algorithm was suitable for arranging a P2P network, but several unexpected behaviours were observed. These included
wandering nodes, starved nodes, and local maxima. Each
of these problems required modification of the original algorithm design to solve or ameliorate them
Survey on QoE/QoS Correlation Models for Video Streaming over Vehicular Ad-hoc Networks
Vehicular Ad-hoc Networks (VANETs) are a new emerging technology which has attracted enormous interest over the last few years. It enables vehicles to communicate with each other and with roadside infrastructures for many applications. One of the promising applications is multimedia services for traffic safety or infotainment. The video service requires a good quality to satisfy the end-user known as the Quality of Experience (QoE). Several models have been suggested in the literature to measure or predict this metric. In this paper, we present an overview of interesting researches, which propose QoE models for video streaming over VANETs. The limits and deficiencies of these models are identified, which shed light on the challenges and real problems to overcome in the future
A QoE based performance study of mobile peer-to-peer live video streaming
Peer-to-peer (P2P) Mobile Ad Hoc Networks (MANETs) are widely envisioned to be a practical platform to mobile live video streaming applications (e.g., mobile IPTV). However, the performance of such a streaming solution is still largely unknown. As such, in this paper, we aim to quantify the streaming performance using a Quality of Experience (QoE) based approach. Our simulation results indicate that video streaming performance is highly sensitive to the video chunk size. Specifically, if the chunk size is small, performance, in terms of both QoE and QoS, is guaranteed but at the expense of a higher overhead. On the other hand, if chunk size is increased, performance can degrade quite rapidly. Thus, it needs some careful fine tuning of chunk size to obtain satisfactory QoE performance. © 2012 IEEE.published_or_final_versio
A trust framework for peer-to-peer interaction in ad hoc networks
PhDAs a wider public is increasingly adopting mobile devices with diverse applications,
the idea of who to trust while on the move becomes a crucial one. The need to find
dependable partners to interact is further exacerbated in situations where one finds
oneself out of the range of backbone structures such as wireless base stations or
cellular networks. One solution is to generate self-started networks, a variant of
which is the ad hoc network that promotes peer-to-peer networking. The work in
this thesis is aimed at defining a framework for such an ad hoc network that provides
ways for participants to distinguish and collaborate with their most trustworthy
neighbours.
In this framework, entities create the ability to generate trust information by directly
observing the behaviour of their peers. Such trust information is also shared in order
to assist those entities in situations where prior interactions with their target peers
may not have existed.
The key novelty points of the framework focus on aggregating the trust evaluation
process around the most trustworthy nodes thereby creating a hierarchy of nodes that
are distinguished by the class, defined by cluster heads, to which they belong.
Furthermore, the impact of such a framework in generating additional overheads for
the network is minimised through the use of clusters. By design, the framework also
houses a rule-based mechanism to thwart misbehaving behaviour or non-cooperation.
Key performance indicators are also defined within this work that allow a framework
to be quickly analysed through snapshot data, a concept analogous to those used
within financial circles when assessing companies. This is also a novel point that
may provide the basis for directly comparing models with different underlying
technologies.
The end result is a trust framework that fully meets the basic requirements for a
sustainable model of trust that can be developed onto an ad hoc network and that
provides enhancements in efficiency (using clustering) and trust performance
- âŠ