19,258 research outputs found

    Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols

    Get PDF
    Secure routing protocols for mobile ad hoc networks provide the required functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers, such as authentication, cannot be obtained. Threat models drive analysis capabilities, affecting how we evaluate trust. Current attacker threat models limit the results obtained during protocol security analysis over ad hoc routing protocols. Developing a proper threat model to evaluate security properties in mobile ad hoc routing protocols presents a significant challenge. If the attacker strength is too weak, we miss vital security flaws. If the attacker strength is too strong, we cannot identify the minimum required attacker capabilities needed to break the routing protocol. In this paper we present an adaptive threat model to evaluate route discovery attacks against ad hoc routing protocols. Our approach enables us to evaluate trust in the ad hoc routing process and allows us to identify minimum requirements an attacker needs to break a given routing protocol

    Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks

    Full text link
    [EN] Mobile ad hoc networks (MANETs) are generally created for temporary scenarios. In such scenarios, where nodes are in mobility, efficient routing is a challenging task. In this paper, we propose an adaptive and cross-layer multipath routing protocol for such changing scenarios. Our routing mechanisms operate keeping in view the type of applications. For simple applications, the proposed protocol is inspired from traditional on-demand routing protocols by searching shortest routes from source to destination using default parameters. In case of multimedia applications, the proposed mechanism considers such routes which are capable of providing more data rates having less packet loss ratio. For those applications which need security, the proposed mechanism searches such routes which are more secure in nature as compared to others. Cross-layer methodology is used in proposed routing scheme so as to exchange different parameters across the protocol stack for better decision-making at network layer. Our approach is efficient and fault tolerant in a variety of scenarios that we simulated and tested.The authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University for funding this research group no. 037-1435-RG.Iqbal, Z.; Khan, S.; Mehmood, A.; Lloret, J.; Alrajeh, NA. (2016). Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks. Journal of Sensors. 2016:1-18. https://doi.org/10.1155/2016/5486437S1182016Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile Ad Hoc routing protocols. IEEE Communications Surveys & Tutorials, 10(4), 78-93. doi:10.1109/surv.2008.080407Murthy, S., & Garcia-Luna-Aceves, J. J. (1996). An efficient routing protocol for wireless networks. Mobile Networks and Applications, 1(2), 183-197. doi:10.1007/bf01193336Toh, C.-K. (1997). Wireless Personal Communications, 4(2), 103-139. doi:10.1023/a:1008812928561Pearlman, M. R., & Haas, Z. J. (1999). Determining the optimal configuration for the zone routing protocol. IEEE Journal on Selected Areas in Communications, 17(8), 1395-1414. doi:10.1109/49.779922ZHEN, Y., WU, M., WU, D., ZHANG, Q., & XU, C. (2010). Toward path reliability by using adaptive multi-path routing mechanism for multimedia service in mobile Ad-hoc network. The Journal of China Universities of Posts and Telecommunications, 17(1), 93-100. doi:10.1016/s1005-8885(09)60431-3Sivakumar, R., Sinha, P., & Bharghavan, V. (1999). CEDAR: a core-extraction distributed ad hoc routing algorithm. IEEE Journal on Selected Areas in Communications, 17(8), 1454-1465. doi:10.1109/49.779926Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106-107. doi:10.1145/581291.581312Khan, S., & Loo, J. (2010). Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks. Wireless Personal Communications, 62(1), 201-214. doi:10.1007/s11277-010-0048-ySharma, V., & Alam, B. (2012). Unicaste Routing Protocols in Mobile Ad Hoc Networks: A Survey. International Journal of Computer Applications, 51(14), 9-18. doi:10.5120/8108-1714Tarique, M., Tepe, K. E., Adibi, S., & Erfani, S. (2009). Survey of multipath routing protocols for mobile ad hoc networks. Journal of Network and Computer Applications, 32(6), 1125-1143. doi:10.1016/j.jnca.2009.07.002Shiwen Mao, Shunan Lin, Yao Wang, Panwar, S. S., & Yihan Li. (2005). Multipath video transport over ad hoc networks. IEEE Wireless Communications, 12(4), 42-49. doi:10.1109/mwc.2005.1497857Li, Z., Chen, Q., Zhu, G., Choi, Y., & Sekiya, H. (2015). A Low Latency, Energy Efficient MAC Protocol for Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 11(8), 946587. doi:10.1155/2015/946587Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Shen, X. (2016). Energy and memory efficient clone detection in wireless sensor networks. IEEE Transactions on Mobile Computing, 15(5), 1130-1143. doi:10.1109/tmc.2015.2449847Dong, M., Ota, K., Liu, A., & Guo, M. (2016). Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 27(1), 225-236. doi:10.1109/tpds.2015.2388482Hamrioui, S., Lorenz, P., Lloret, J., & Lalam, M. (2013). A Cross Layer Solution for Better Interactions Between Routing and Transport Protocols in MANET. Journal of Computing and Information Technology, 21(3), 137. doi:10.2498/cit.1002136Sanchez-Iborra, R., & Cano, M.-D. (2014). An approach to a cross layer-based QoE improvement for MANET routing protocols. Network Protocols and Algorithms, 6(3), 18. doi:10.5296/npa.v6i3.5827Cho, J.-H., Swami, A., & Chen, I.-R. (2011). A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Communications Surveys & Tutorials, 13(4), 562-583. doi:10.1109/surv.2011.092110.0008

    Reliable Multicast in Heterogeneous Mobile Ad-hoc Networks

    Get PDF
    In disaster scenarios, communication infrastructure could be damaged orcompletely failed. Mobile Ad-hoc Networks (MANETs) can be used to substitutefailed communication devices and thus to enable communication. As group communicationis an important part in disaster scenarios, multicast will be used to addressseveral nodes. In this paper, we propose our new reliable multicast protocol RMDA(Reliable Multicast over Delay Tolerant Mobile Ad hoc Networks). We introducean efficient group management approach and a new method for reliable multicastdelivery over Delay Tolerant Networks. We show, that our protocol is adaptive todifferent kinds of MANETs, e.g. with or without clusterheads, respectively. Forthose without, we use our name resolution over adaptive routing approach

    TCP over geo-routing for high mobility: vehicle grids and airborne swarms

    Get PDF
    Ad hoc wireless networks have become the architecture of choice for peer to peer communications in areas where the telecommunications infrastructure is inadequate or has failed. A major challenge is the reliable delivery of data when nodes move. The reliable Internet protocol is TCP. However, TCP performs poorly in mobile ad hoc networks, mainly because of route breakage. To overcome this problem, a robust routing protocol must be used. To this effect, Geo-routing has recently received attention in large scale, mobile systems as it does not require end- to-end path establishment and pre-computed packet forwarding routing structure at nodes. These properties make Geo-routing robust to highly dynamic route changes. For best performance, however, several parameters must be carefully tuned. In this paper we study the joint optimization of TCP and Geo-routing parame- ters to handle high speeds. We first introduce two highly mobile ad hoc scenarios that require reliable delivery, namely the vehicle urban grid and the airborne swarms. Then, we study the impact of critical system parameters (e.g., hello message ex- change rate, delay timer in TCP for out-of-order delivery, etc) on the performance of both UDP and TCP. We improve hello message effciency in Geo-routing by using an adaptive hello exchange scheme. Then, we fix the out-of-order problem in TCP by using a receiver-side out-of-order detection and delayed ack strategy. We show that these parameter adjustments are critical for effcient TCP over Geo-routing in highly mobile applications. With these enhancements our TCP with Geo-routing solution easily outperforms TCP over traditional ad hoc routing schemes, such as AODV.1st IFIP International Conference on Ad-Hoc NetWorkingRed de Universidades con Carreras en Informática (RedUNCI

    ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK

    Get PDF
    Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency

    Reliable multicast in heterogeneous mobile ad-hoc networks

    Get PDF
    In disaster scenarios, communication infrastructure could be damaged or completely failed. Mobile Ad-hoc Networks (MANETs) can be used to substitute failed communication devices and thus to enable communication. As group communication is an important part in disaster scenarios, multicast will be used to address several nodes. In this paper, we propose our new reliable multicast protocol RMDA (Reliable Multicast over Delay Tolerant Mobile Ad hoc Networks). We introduce an efficient group management approach and a new method for reliable multicast delivery over Delay Tolerant Networks. We show, that our protocol is adaptive to different kinds of MANETs, e.g. with or without clusterheads, respectively. For those without, we use our name resolution over adaptive routing approach

    Geocasting and Multicasting Routing Operation in Mobile Ad Hoc Network

    Get PDF
    Abstract: The paper considers, the different multicasting routing protocols in wireless mobile Ad hoc network (MANET).An Ad hoc network is composed of mobile nodes without the presence of a wired support infrastructure .In this environment routing/multicasting protocols are faced with the challenge of producing multihop router under host mobility and band constraints. Various approaches and routing protocol have been proposed to address Ad hoc networking problems and multiple standardization effort within the Internet Engineering Task Force, along with academic and industrial research projects. In recent year, a number of new multicast protocols of different styles have been proposed for Ad hoc networks. Geocast Adaptive Mesh Environment for Routing [GAMER] is one which provides geocast communication in an Ad hoc network and it adapts to the correct network environment by dynamically changing the density of the mesh. Forwarding Group Multicast Protocol [FGMP] is based on the forward group concept and it dynamically refreshes the forward group member using a procedure to On-Demand routing. The relative strengths, weakness and applicability of each multicast protocol to diverse situations have considered and analyzed. Index Terms: FGMP Protocol, GAMER Protocol, MANETs, multicast, routing. An Ad hoc networks [1] [2] , is a dynamically reconfigurable wireless network with no fixed infrastructure (or) central administration. Due to the limited radio propagation range of wireless devices, routers are often "multihop". Applications such as disaster recovery, crowd control, search, rescue and automated battlefields are typical examples of where Ad hoc networks are deployed. Nodes in these networks more arbitrary thus network topology changes frequently and unpredictably. Moreover, bandwidth and battery power are limited. These constraints, in combination with the dynamic network topology make routing and multicasting in Ad hoc networks extremely challenging. Various multicast protocols have been newly proposed to perform multicasting in Ad hoc network. However, no operation study between them has yet been performed. The comparative analysis of Ad hoc unicast routing protocols has been reported. This paper gives a comparison study of two protocols with different characteristics: GAMER [3] and FGMP The rest of the paper is organized as follows. Section I presents an overview of the multicast protocols. The section II discusses the future enhancements, and concluding remarks are made in section III.

    FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Get PDF
    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms

    ADMP: an adaptive multicast routing protocol for mobile ad hoc networks

    Get PDF
    We present ADMP, the adaptive mesh-based multicast routing protocol, in which nodes are able to independently tune the amount of redundancy used to transmit data packets with the goal of improving the overall packet delivery ratio while keeping the retransmission overhead as low as possible. ADMP is based on a novel distributed algorithm for computing connected dominating sets. ADMP uses a single type of control packet, called multicast announcement, which is used to build the meshes of multicast groups, elect the core of each mesh and obtain two-hop neighborhood information. Using detailed simulations for different scenarios, we show that ADMP achieves similar or better reliability than two mesh-based multicast protocols that are very resilient (ODMRP and PUMA) while inducing low packet retransmission overhead.1st IFIP International Conference on Ad-Hoc NetWorkingRed de Universidades con Carreras en Informática (RedUNCI

    ICSNC 1: Mobility and Ad Hoc

    Get PDF
    Page 1. Page 2. ICSNC 1: Mobility and Ad Hoc Energy Aware Topology Management in Ad Hoc Wireless Networks T. Shiv Prakash, GS Badrinath, KR Venugopal and LM Patnaik T Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks T. Srinivasan, V. Mahadevan, A. Meyyappan, A. Manikandan, M. Nivedita and N. Pavithra T An Enhanced Gnutella for Ad-Hoc Networks Hyun-Duk Choi, Ho-Hyun Park and Miae Woo T A New EAAODV Routing Protocol Based on Mobile Agent Chenchen Zhao and Zhen Yang T The Case of Multi-Hop Peer-to-Peer Implementation of Mobile Social Applications Panayotis Antoniadis and Costas Courcoubetis T Mobile Agent Communication Scheme: An Evolving Canvas Mâamoun Bernich and Fabrice Mourlin T Page 3. ICSNC 2: High Speed Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering
    corecore