87 research outputs found

    STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY

    Get PDF
    Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. Game Theory acts as a suitable tool offering promising solutions to securityrelated concerns in Mobile Ad-Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. Coordination among nodes during communication and working without control of any central manager truly ensembles them to be applied in IoT. However, the identification and later mitigation of malicious nodes becomes an immensely difficult task especially when Selfish/Erroneous nodes exist along with normal Collaborative nodes in the Regular camp. Game Theory approach has been manipulated in the current study to achieve an analytical view while addressing the security concerns in MANETs. This study considers selfish nodes in the regular node camp while modelling the Regular versus Malicious node game and thereby enhancing the prior mathematical schema of strategical decision making to accommodate for the same. The proposed study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. The simulation of the model has proved that the Perfect Bayesian Equilibrium outshines other approaches used in this study, specifically pure strategy and mixed strategy. The utility of both regular and malicious node has improved noticeably when nodes adopt PBE strategy. The framework tries to effectively represent the various unpredictable actions of node cooperation, node declination, node attacks as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater extent

    Ant-based evidence distribution with periodic broadcast in attacked wireless network

    Get PDF
    In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so, searching for trust certicates will still become highly cost and delay especially when wireless network is suering CTS jamming attack. We believe the individual solution can lead us to solve this combination problems in the future. Therefore, in this work, we investigate the delay and cost of searching a distributed certicate and the adverse eects of fabiricated control packet attacks on channel throughput and delivery ratio respectively, and propose two techniques that can improve the eciency of searching for such certicates in the network and mitigate the CTS jamming attack's eect. Evidence Distribution based on Periodic Broadcast (EDPB) is the rst solution we presented to help node to quickly locate trust certicates in a large wireless sensor network. In this solution, we not only take advantages from swarm intelligence alogrithm, but also allow nodes that carrying certicates to periodically announce their existence. Such announcements, together with a swarm-intelligence pheromone pdate procedure, will leave traces on the nodes to lead query packets toward the certicate nodes. We then investigate the salient features of this schema and evaluate its performance in both static and mobile networks. This schema can also be used for other essential information dissemination in mobile ad hoc networks. The second technqiue, address inspection schema (AIS) xes vulnerabilities exist in distribution coordinating function (DCF) dened in IEEE 802.11 standard so that each node has the ability to beat the impact of CTS jamming attack and furthermore, benets network throughput. We then perform ns-2 simulations to evaluate the benet of AIS

    Resource Allocation for Multiple Access and Broadcast Channels under Quality of Service Requirements Based on Strategy Proof Pricing

    Get PDF
    The efficient allocation of power is a major concern in today’s wireless communications systems. Due to the high demand in data rate and the scarcity of wireless resources such as power, the multi-user communication systems like the multiple access channel (MAC) and broadcast channel (BC) have become highly competitive environments for the users as well as the system itself. Theory of microeconomics and game theory provide the good analytical manner for the selfish and social welfare conflict problems. Instead of maximizing the system sum rate, our proposed system deals with fulfilling the utility (rate) requirement of all the users with efficient power allocation. The users formulate the signal to interference-plus-noise ratio (SINR) based quality-of-service (QoS) requirements. We propose the framework to allocate the power to each user with universal pricing mechanisms. The prices act as the control signal and are assumed to be some virtual currency in the wireless system. They can influence the physical layer operating points to meet the desired utility requirements. Centralized and distributed power allocation frameworks are discussed separately in the thesis with different pricing schemes. In wireless systems we have users that are rational in the game theoretic sense of making decisions consistently in pursuit of their own individual objectives. Each user’s objective is to maximize the expected value of its own payoff measured on a certain utility scale. Selfishness or self-interest is an important implication of rationality. Therefore, the mobiles which share the same spectrum have incentives to misinterpret their private information in order to obtain more utility. They might behave selfishly and show also malicious behavior by creating increased interference for other mobiles. Therefore, it is important to supervise and influence the operation of the system by pricing and priority (weights) optimization. In the centralized resource allocation, we study the general MAC and BC (with linear and nonlinear receiver) with three types of agents: the regulator, the system optimizer and the mobile users. The regulator ensures the QoS requirements of all users by clever pricing and prevents cheating. The simple system optimizer solves a certain system utility maximization problem to allocate the power with the given prices and weights (priorities). The linear and nonlinear pricing mechanisms are analyzed, respectively. It is shown that linear pricing is a universal pricing only if successive interference cancellation (SIC) for uplink transmission or dirty paper coding (DPC) for downlink transmission is applied at the base station (BS). For MAC without SIC, nonlinear pricing which is logarithmic in power and linear in prices is a universal pricing scheme. The prices, the resulting cost terms, the optimal power allocation to achieve the QoS requirement of each user in the feasible rate region are derived in closed form solutions for MAC with and without SIC using linear and nonlinear pricing frameworks, respectively. The users are willing to maximize their achievable rate and minimize their cost on power by falsely reporting their channel state information (CSI). By predicting the best cheating strategy of the malicious users, the regulator is able to detect the misbehavior and punish the cheaters. The infinite repeated game (RG) is proposed as a counter mechanism with the trigger strategy using the trigger price. We show that by anticipating the total payoff of the proposed RG, the users have no incentive to cheat and therefore our framework is strategy-proof. In the distributed resource allocation, each user allocates its own power by optimizing the individual utility function. The noncooperative game among the users is formulated. The individual prices are introduced to the utility function of each user to shift the Nash equilibrium (NE) power allocation to the desired point. We show that by implicit control of the proposed prices, the best response (BR) power allocation of each user converges rapidly. The Shannon rate-based QoS requirement of each user is achieved with minimum power at the unique NE point. We analyse different behavior types of the users, especially the malicious behavior of misrepresenting the user utility function. The resulting NE power allocation and achievable rates of all users are derived when malicious behavior exists. The strategy-proof mechanism is designed using the punishment prices when the types of the malicious users are detected. The algorithm of the strategy-proof noncooperative game is proposed. We illustrate the convergence of the BR dynamic and the Price of Malice (PoM) by numerical simulations. The uplink transmission within the single cell of heterogeneous networks is exactly the same model as MAC. Therefore, the results of the pricing-based power allocation for MAC can be implemented into heterogeneous networks. Femtocells deployed in the Macrocell network provide better indoor coverage to the user equipments (UEs) with low power consumption and maintenance cost. The industrial vendors show great interest in the access mode, called the hybrid access, in which the macrocell UEs (MUEs) can be served by the nearby Femtocell Access Point (FAP). By adopting hybrid access in the femtocell, the system energy efficiency is improved due to the short distance between the FAP and MUEs while at the same time, the QoS requirements are better guaranteed. However, both the Macrocell base station (MBS) and the FAP are rational and selfish, who maximize their own utilities. The framework to successively apply the hybrid access in femtocell and fulfill the QoS requirement of each UE is important. We propose two novel compensation frameworks to motivate the hybrid access of femtocells. To save the energy consumption, the MBS is willing to motivate the FAP for hybrid access with compensation. The Stackelberg game is formulated where the MBS serves as the leader and the FAP serves as the follower. The MBS maximizes its utility by choosing the compensation prices. The FAP optimizes its utility by selecting the number of MUEs in hybrid access. By choosing the proper compensation price, the optimal number of MUEs served by the FAP to maximize the utility of the MBS coincides with that to maximize the utility of the FAP. Numerous simulation results are conducted, showing that the proposed compensation frameworks result in a win-win solution. In this thesis, based on game theory, mechanism design and pricing framework, efficient power allocation are proposed to guarantee the QoS requirements of all users in the wireless networks. The results are applicable in the multi-user systems such as heterogeneous networks. Both centralized and distributed allocation schemes are analyzed which are suitable for different communication scenarios.Aufgrund der hohen Nachfrage nach Datenrate und wegen der Knappheit an Ressourcen in Funknetzen ist die effiziente Allokation von Leistung ein wichtiges Thema in den heutigen Mehrnutzer-Kommunikationssystemen. Die Spieltheorie bietet Methoden, um egoistische und soziale Konfliktsituationen zu analysieren. Das vorgeschlagene System befasst sich mit der Erfüllung der auf Signal-zu-Rausch-und-Interferenz-Verhältnis (SINR) basierenden Quality-of-Service (QoS)-Anforderungen aller Nutzer mittels effizienter Leistungsallokation, anstatt die Übertragungsrate zu maximieren. Es wird ein Framework entworfen, um die Leistungsallokation mittels universellen Pricing-Mechanismen umzusetzen. In der Dissertation werden zentralisierte und verteilte Leistungsallokationsalgorithmen unter Verwendung verschiedener Pricing-Ansätze diskutiert. Die Nutzer in Funksystemen handeln rational im spieltheoretischen Sinne, indem sie ihre eigenen Nutzenfunktionen maximieren. Die mobilen Endgeräte, die dasselbe Spektrum nutzen, haben den Anreiz durch bewusste Fehlinterpretation ihrer privaten Informationen das eigene Ergebnis zu verbessern. Daher ist es wichtig, die Funktionalität des Systems zu überwachen und durch Optimierung des Pricings und Priorisierungsgewichte zu beeinflussen. Für den zentralisierten Ressourcenallokationsansatz werden der allgemeine Mehrfachzugriffskanal (Multiple Access Channel, MAC) und der Broadcastkanal (BC) mit linearen bzw. nichtlinearen Empfängern untersucht. Die Preise, die resultierenden Kostenterme und die optimale Leistungsallokation, mit der die QoS-Anforderungen in der zulässigen Ratenregion erfüllt werden, werden in geschlossener Form hergeleitet. Lineare und nichtlineare Pricing-Ansätze werden separat diskutiert. Das unendlich oft wiederholte Spiel wird vorgeschlagen, um Spieler vom Betrügen durch Übermittlung falscher Kanalinformationen abzuhalten. Für die verteilten Ressourcenvergabe wird das nichtkooperative Spiel in Normalform verwendet und formuliert. Die Nutzer wählen ihre Sendeleistung zur Maximierung ihrer eigenen Nutzenfunktion. Individuelle Preise werden eingeführt und so angepasst, dass die QoS-Anforderungen mit der Leistungsallokation im eindeutigen Nash-Gleichgewicht erfüllt werden. Verschiedene Arten des Nutzerverhaltens werden bezüglich der Täuschung ihrer Nutzenfunktion analysiert, und ein Strategy-Proof-Mechanismus mit Strafen wird entwickelt. Die Ergebnisse für den MAC sind anwendbar auf heterogene Netzwerke, wobei zwei neuartige Ansätze zur Kompensation bereitgestellt werden, die den hybriden Zugang zu Femtozell-Netzwerken motivieren. Mithilfe des Stackelberg-Spiels wird gezeigt, dass die vorgeschlagenen Ansätze in einer Win-Win-Situation resultieren

    A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs

    Get PDF

    Design and Evaluation of Efficient Medium Access Control Solutions for Vehicular Environments

    Full text link
    [EN] In recent years, advances in wireless technologies and improved sensing and computational capabilities have led to a gradual transition towards Intelligent Transportation Systems (ITS) and related applications. These applications aim at improving road safety, provide smart navigation, and eco-friendly driving. Vehicular Ad hoc Networks (VANETs) provide a communication structure for ITS by equipping cars with advanced sensors and communication devices that enable a direct exchange of information between vehicles. Different types of ITS applications rely on two types of messages: periodic beacons and event-driven messages. Beacons include information such as geographical location, speed, and acceleration, and they are only disseminated to a close neighborhood. Differently from beacons, event-driven messages are only generated when a critical event of general interest occurs, and it is spread within a specific target area for the duration of the event. The reliability of information exchange is one of the main issues for vehicularcommunications since the safety of people on the road is directly related to the effectiveness of these transmissions. A Medium Access Control (MAC) protocol must guarantee reliable beacon broadcasting within deadline bounds to all vehicles in the neighbourhood, thereby providing them timely notifications about unsafe driving conditions or other hazardous events. Moreover, infotainment and comfort applications require reliable unicast transmissions that must be taken into account. However, high node mobility, highly dynamic topology, and lack of a central control unit, are issues that make the design of a reliable MAC protocol for vehicular environments a very difficult and challenging task, especially when efficient broadcasting strategies are required. The IEEE 802.11p MAC protocol, an approved amendment to the IEEE 802.11 standard, is a random access protocol that is unable to provide guaranteed delay bounds with sufficient reliability in vehicular scenarios, especially under high channel usage. This problem is particularly serious when implementing (semi-) automated driving applications such as platooning, where inter-vehicle spacing is drastically reduced, and the control loop that manages and maintains the platoon requires frequent, timely and reliable exchange of status information (beacons). In this thesis novel protocols compatible with the IEEE 802.11 and 802.11p standards are proposed in order to optimally adjust the contention window size for unicast applications in Mobile Ad hoc Networks (MANETs) and VANETs. Experimental tests comparing our proposals to existing solutions show that the former are able to improve the packet delivery ratio and the average end-to-end delay for unicast applications. Concerning efficient message diffusion (broadcast) in VANET environments, we proposed token-based MAC solutions to improve the performance achieved by existing 802.11p driving safety applications in different vehicular environments, including highway, urban, and platooning scenarios. Experimental results show that the proposed solutions clearly outperform 802.11p when delay-bounded beacons and event notifications must be delivered.[ES] Recientemente, los avances en las tecnologías inalámbricas y las mejoras en términos de capacidades de sensorización y computación de los dispositivos electrónicos, han dado lugar a una transición gradual hacia servicios y aplicaciones de los Sistemas Inteligentes de Transporte (ITS). Estas aplicaciones tienen como objetivo mejorar la seguridad vial, proporcionar una navegación inteligente, y promover la conducción eco-eficiente. Las redes vehiculares ad hoc (VANETs) proporcionan una infraestructura de comunicaciones para ITS al equipar los coches con sensores avanzados y dispositivos de comunicación que permiten el intercambio directo de información entre vehículos. Los diferentes tipos de aplicaciones ITS se basan en dos tipos de mensajes: mensajes periódicos conocidos como beacons y mensajes asociados a eventos. Los mensajes periódicos incluyen información relativa a la ubicación geográfica, la velocidad y la aceleración, entre otros, y sólo son distribuidos entre los vehículos vecinos. A diferencia de estos beacons, los mensajes asociados a eventos sólo se generan cuando se produce un evento crítico de interés general, el cual se propaga dentro del área de interés de dicho evento y mientras éste siga activo. La fiabilidad del intercambio de información es uno de los principales problemas para las comunicaciones vehiculares, debido principalmente a que las aplicaciones de seguridad dependen directamente de la eficacia de estas transmisiones. Un protocolo de Control de Acceso al Medio (MAC) debe garantizar la difusión fiable de información a todos los vehículos vecinos dentro de unos límites máximos de retardo, proporcionándoles las notificaciones oportunas respecto a condiciones de conducción inseguras y otros eventos peligrosos. Por otra parte, las aplicaciones de información y entretenimiento, así como las aplicaciones orientadas al confort, también requieren transmisiones fiables extremoa-extremo. Sin embargo, la alta movilidad de los vehículos, la variabilidad de la topología, así como la falta de una unidad central de control, son factores que hacen que el diseño de un protocolo MAC fiable para entornos vehiculares sea una tarea especialmente compleja, especialmente cuando son necesarias estrategias de difusión eficientes. El protocolo MAC IEEE 802.11p, una modificación ya aprobada al estándar IEEE 802.11 original para entornos de comunicación vehiculares, es un protocolo de acceso que no es capaz de garantizar unos límites de retardo con la fiabilidad necesaria para estos entornos, especialmente en escenarios de alta utilización del canal inalámbrico. Este problema es particularmente importante a la hora de implementar aplicaciones de conducción (semi-)automática, como el caso de grupos de vehículos donde la separación entre vehículos se reduce drásticamente, y el sistema de control que gestiona y mantiene el grupo requiere de un intercambio frecuente de información fiable y acotado en retardo. En esta tesis se proponen nuevos protocolos MAC compatibles con los estándares IEEE 802.11 y 802.11p basados en el ajuste del tamaño de la ventana de contención para aplicaciones unicast en rede MANETs y VANETs. Los resultados experimentales obtenidos comparando nuestras propuestas con las soluciones existentes muestran que los protocolos propuestos son capaces de mejorar la tasa de entrega de paquetes y el retardo medio extremo-a-extremo para aplicaciones unicast. En lo que respecta a la difusión eficiente de mensajes broadcast en entornos VANET, se han propuesto soluciones MAC basadas en el uso de tokens que mejoran las prestaciones de aplicaciones de conducción segura basadas en el estándar 802.11p, tanto en autopistas, zonas urbanas, y escenarios con grupos de vehículos. Los resultados experimentales muestran que las soluciones propuestas superan claramente al protocolo 802.11p cuando es necesario entregar mensajes y notificaciones de eventos con restricc[CA] Recentment, els avan en les tecnologies sense fils i les millores en termes de capacitats de sensorització i computació dels dispositius electrònics, han donat lloc a una transició gradual cap a serveis i aplicacions dels sistemes intelligents de transport (ITS). Aquestes aplicacions tenen com a objectiu millorar la seguretat vial, proporcionar una navegació intelligent, i promoure la conducció ecoeficient. Les xarxes vehiculars ad hoc (VANET) proporcionen una infraestructura de comunicacions per a ITS, ja que equipen els cotxes amb sensors avançats i dispositius de comunicació que permeten l'intercanvi directe d'informació entre vehicles. Els diversos tipus d'aplicacions ITS es basen en dos classes de missatges: missatges periòdics coneguts com a beacons i missatges associats a esdeveniments. Els missatges periòdics inclouen informació relativa a la ubicació geogràfica, la velocitat i l'acceleració, entre uns altres, i només són distribuïts entre els vehicles veïns. A diferència d'aquests beacons, els missatges associats a esdeveniments només es generen quan es produeix un esdeveniment crític d'interès general, el qual es propaga dins de l àrea d'interès d'aquest esdeveniment i mentre aquest seguisca actiu. La fiabilitat de l'intercanvi d'informació és un dels principals problemes per a les comunicacions vehicular, principalment perquè les aplicacions de seguretat depenen directament de l'eficàcia d'aquestes transmissions. Un protocol de control d'accés al medi (MAC) ha de garantir la difusió fiable d'informació a tots els vehicles veïns dins d'uns límits màxims de retard, i proporcionar-los les notificacions oportunes respecte a condicions de conducció insegures i altres esdeveniments perillosos. D'altra banda, les aplicacions d'informació i entreteniment, com també les aplicacions orientades al confort, també requereixen transmissions fiables extrema-extrem. No obstant això, l'alta mobilitat dels vehicles, la variabilitat de la topologia, i la falta d'una unitat central de control, són factors que fan que el disseny d'un protocol MAC fiable per a entorns vehiculars siga una tasca especialment complexa, especialment quan són necessàries estratègies de difusió eficients. El protocol MAC IEEE 802.11p, una modificació ja aprovada a l'estàndard IEEE 802.11 original per a entorns de comunicació vehiculars, és un protocol d'accés que no és capa garantir uns límits de retard amb la fiabilitat necessària per a aquests entorns, especialment en escenaris d'alta utilització del canal sense fil. Aquest problema és particularment important a l'hora d'implementar aplicacions de conducció (semi)automàtica, com el cas de grups de vehicles en què la separació entre vehicles es redueix dràsticament, i el sistema de control que gestiona i manté el grup requereix un intercanvi freqüent d'informació fiable i delimitat en retard. En aquesta tesi es proposen nous protocols MAC compatibles amb els estàndards IEEE 802.11 i 802.11p basats en l'ajust de les dimensions de la finestra de contenció per a aplicacions unicast en xarxes MANET i VANET. Els resultats experimentals obtinguts comparant les nostres propostes amb les solucions existents mostren que els protocols proposats són capa de millorar la taxa de lliurament de paquets i el retard mitjà extrem-a-extrem per a aplicacions unicast. Pel que fa a la difusió eficient de missatges broadcast en entorns VANET, s'han proposat solucions MAC basades en l'ús de tokens que milloren les prestacions d'aplicacions de conducció segura basades en l'estàndard 802.11p, tant en autopistes, zones urbanes, i escenaris amb grups de vehicles. Els resultats experimentals mostren que les solucions proposades superen clarament el protocol 802.11p quan cal lliurar missatges i notificacions d'esdeveniments amb restriccions de latència.Balador, A. (2016). Design and Evaluation of Efficient Medium Access Control Solutions for Vehicular Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/64073TESI
    corecore