291 research outputs found

    Impact of misbehaviour on QoS in wireless mesh networks

    Get PDF
    Proceedings of: 8th International IFIP-TC 6 Networking Conference (Networking 2009), Aachen, Germany, May 11-15, 2009This paper analyzes the impact of misbehaviour on QoS provisioning in wireless mesh networks. Misbehaviour occurs when a network participant decides not to cooperate. Since cooperation is fundamental for distributed environments such as mesh networks, misbehaviour can be a serious threat to them. In this work, the authors focus on the IEEE 802.11 EDCA medium access function which provides QoS in mesh networks. Simulation studies have been performed to determine what realistic forms of misbehaviour can occur and what their impact is. From these results the most beneficial forms of MAC layer misbehaviour in multihop mesh networks are derived.European Community's Seventh Framework ProgramThe research leading to these results has received funding from the European Community's Sixth Framework Programme under grant agreement n° 0384239 (NoE CONTENT). The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 214994.Publicad

    Collaboration Enforcement In Mobile Ad Hoc Networks

    Get PDF
    Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost

    Study of Performance of Security Protocols in Wireless Mesh Network

    Get PDF
    Wireless Mesh Networks (WMNs) represent a good solution to providing wireless Internet connectivity in a sizable geographic area; this new and promising paradigm allows for network deployment at a much lower cost than with classic WiFi networks. Standards-based wireless access takes advantage of the growing popularity of inexpensive Wi-Fi clients,enabling new service opportunities and applications that improve user productivity and responsiveness. The deployment of WMNs, are suffered by : (i) All, the communications being wireless and therefore prone to interference, present severe capacity and delay constraints, (ii) The second reason that slows down the deployment of WMNs is the lack of security guarantees. Wireless mesh networks mostly susceptible to routing protocol threats and route disruption attacks. Most of these threats require packet injection with a specialized knowledge of the routing protocol; the threats to wireless mesh networks and are summarized as (i) External attacks: in which attackers not belonging to the network jam the communication or inject erroneous information, and (ii) Internal attacks: in which attackers are internal, compromised nodes that are difficult to be detected. The MAC layers of WMN are subjected to the attacks like Eavesdropping, Link Layer Jamming Attack, MAC Spoofing Attack, and Replay Attack. The attacks in Network Layer are: Control Plane Attacks, Data Plane Attacks, Rushing attack, Wormhole attack, and Black Hole Attack. In this project work we are concern with the threats related to Network layer of WMN based upon 802.11i and analysis the performance of secure routing protocols and their performance against the intrusion detection

    A reactive algorithm for deducing nodal forwarding behavior in a multihop ad hoc wireless network in the presence of errors

    Get PDF
    A novel algorithm is presented to deduce individual nodal forwarding behavior from standard end to end acknowledgments. The algorithm is based on a well-established mathematical method and is robust to network related errors and nodal behavior changes. The proposed solution was verified in a network simulation, in which it performed well in a difficult environment and achieved sound results

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Network Node Authentication by Wireless Signal Overhearing

    Get PDF
    Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node
    corecore