274 research outputs found
Context-Aware Configuration and Management of WiFi Direct Groups for Real Opportunistic Networks
Wi-Fi Direct is a promising technology for the support of device-to-device
communications (D2D) on commercial mobile devices. However, the standard
as-it-is is not sufficient to support the real deployment of networking
solutions entirely based on D2D such as opportunistic networks. In fact, WiFi
Direct presents some characteristics that could limit the autonomous creation
of D2D connections among users' personal devices. Specifically, the standard
explicitly requires the user's authorization to establish a connection between
two or more devices, and it provides a limited support for inter-group
communication. In some cases, this might lead to the creation of isolated
groups of nodes which cannot communicate among each other. In this paper, we
propose a novel middleware-layer protocol for the efficient configuration and
management of WiFi Direct groups (WiFi Direct Group Manager, WFD-GM) to enable
autonomous connections and inter-group communication. This enables
opportunistic networks in real conditions (e.g., variable mobility and network
size). WFD-GM defines a context function that takes into account heterogeneous
parameters for the creation of the best group configuration in a specific time
window, including an index of nodes' stability and power levels. We evaluate
the protocol performances by simulating three reference scenarios including
different mobility models, geographical areas and number of nodes. Simulations
are also supported by experimental results related to the evaluation in a real
testbed of the involved context parameters. We compare WFD-GM with the
state-of-the-art solutions and we show that it performs significantly better
than a Baseline approach in scenarios with medium/low mobility, and it is
comparable with it in case of high mobility, without introducing additional
overhead.Comment: Accepted by the IEEE 14th International Conference on Mobile Ad Hoc
and Sensor Systems (MASS), 201
Let the Tree Bloom: Scalable Opportunistic Routing with ORPL
Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks. However, applications are now considered where nodes are not only periodic data sources, but rather addressable end points generating traffic with arbitrary patterns.
We present ORPL, an opportunistic routing protocol that supports any-to-any, on-demand traffic. ORPL builds upon RPL, the standard protocol for low-power IPv6 networks. By combining RPL's tree-like topology with opportunistic routing, ORPL forwards data to any destination based on the mere knowledge of the nodes' sub-tree. We use bitmaps and Bloom filters to represent and propagate this information in a space-efficient way, making ORPL scale to large networks of addressable nodes. Our results in a 135-node testbed show that ORPL outperforms a number of state-of-the-art solutions including RPL and CTP, conciliating a sub-second latency and a sub-percent duty cycle. ORPL also increases robustness and scalability, addressing the whole network reliably through a 64-byte Bloom filter, where RPL needs kilobytes of routing tables for the same task
Exploring Link Correlation for Performance Improvements in Wireless Networks
University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Tian He. 1 computer file (PDF); x, 96 pages.In wireless communication, many technologies, such as Wi-Fi, BlueTooth and ZigBee, operate in the same ISM band. With the exponential growth of wireless devices, the ISM band becomes more and more crowded. These wireless devices compete with each other to access spectrum resources, generating cross-technology interference (CTI). Since cross-technology interference may destroy wireless communication, the field is facing an urgent and challenging need to investigate the packet reception quality of wireless links under CTI. In this dissertation, we propose an in-depth systematic study from empirical measurement, theoretical analysis, modeling, to design and implementation of protocols that exploit packet reception patterns of wireless links under cross-technology interference. Based on extensive measurements, we exploit link correlation phenomenon that packet receptions from a transmitter to multiple receivers are correlated. We then propose link correlation model which contradicts the widely made link independent assumption. The proposed model has a broad impact on network designs that utilize concurrent wireless links, which include (i) traditional network protocols such as broadcast, and (ii) diversity-based protocols such as network coding and opportunistic routing. In the study of the impact of link correlation model on traditional network protocols, we present the design and implementation of CorLayer, a general supporting layer for energy efficient reliable broadcast that carefully blacklists certain poorly correlated wireless links. We integrate CorLayer transparently with sixteen state-of-the-art broadcast protocols specified in thirteen publications on three physical testbeds running TelosB, MICAz, and GreenOrbs nodes, respectively. The experimental results show that CorLayer remarkably improves energy efficiency across a wide spectrum of broadcast protocols and that the total number of packet transmissions can be reduced consistently by 47% on average. In the study of the impact of link correlation model on diversity-based protocols, we propose link correlation aware network coding and link correlation aware opportunistic routing. In link correlation aware network coding, we introduce Correlated Coding which seeks to optimize the transmission efficiency by maximizing necessary coding opportunities. In link correlation aware opportunistic routing, we propose a novel candidate forwarder selection algorithm to help opportunistic routing fully exploit the diversity benefit of the wireless broadcast medium. Testbed evaluation and extensive simulation show that the traditional network coding and opportunistic routing protocols’ transmission efficiency is significantly improved with our link correlation model
Recommended from our members
Discovering Network Control Vulnerabilities and Policies in Evolving Networks
The range and number of new applications and services are growing at an unprecedented rate. Computer networks need to be able to provide connectivity for these services and meet their constantly changing demands. This requires not only support of new network protocols and security requirements, but often architectural redesigns for long-term improvements to efficiency, speed, throughput, cost, and security. Networks are now facing a drastic increase in size and are required to carry a constantly growing amount of heterogeneous traffic. Unfortunately such dynamism greatly complicates security of not only the end nodes in the network, but also of the nodes of the network itself. To make matters worse, just as applications are being developed at faster and faster rates, attacks are becoming more pervasive and complex. Networks need to be able to understand the impact of these attacks and protect against them.
Network control devices, such as routers, firewalls, censorship devices, and base stations, are elements of the network that make decisions on how traffic is handled. Although network control devices are expected to act according to specifications, there can be various reasons why they do not in practice. Protocols could be flawed, ambiguous or incomplete, developers could introduce unintended bugs, or attackers may find vulnerabilities in the devices and exploit them. Malfunction could intentionally or unintentionally threaten the confidentiality, integrity, and availability of end nodes and the data that passes through the network. It can also impact the availability and performance of the control devices themselves and the security policies of the network. The fast-paced evolution and scalability of current and future networks create a dynamic environment for which it is difficult to develop automated tools for testing new protocols and components. At the same time, they make the function of such tools vital for discovering implementation flaws and protocol vulnerabilities as networks become larger and more complex, and as new and potentially unrefined architectures become adopted. This thesis will present the design, implementation, and evaluation of a set of tools designed for understanding implementation of network control nodes and how they react to changes in traffic characteristics as networks evolve. We will first introduce Firecycle, a test bed for analyzing the impact of large-scale attacks and Machine-to-Machine (M2M) traffic on the Long Term Evolution (LTE) network. We will then discuss Autosonda, a tool for automatically discovering rule implementation and finding triggering traffic features in censorship devices.
This thesis provides the following contributions:
1. The design, implementation, and evaluation of two tools to discover models of network control nodes in two scenarios of evolving networks, mobile network and censored internet
2. First existing test bed for analysis of large-scale attacks and impact of traffic scalability on LTE mobile networks
3. First existing test bed for LTE networks that can be scaled to arbitrary size and that deploys traffic models based on real traffic traces taken from a tier-1 operator
4. An analysis of traffic models of various categories of Internet of Things (IoT) devices
5. First study demonstrating the impact of M2M scalability and signaling overload on the packet core of LTE mobile networks
6. A specification for modeling of censorship device decision models
7. A means for automating the discovery of features utilized in censorship device decision models, comparison of these models, and their rule discover
Emergency warning messages dissemination in vehicular social networks: A trust based scheme
To ensure users' safety on the road, a plethora of dissemination schemes for Emergency Warning Messages (EWMs) have been proposed in vehicular networks. However, the issue of false alarms triggered by malicious users still poses serious challenges, such as disruption of vehicular traffic especially on highways leading to precarious effects. This paper proposes a novel Trust based Dissemination Scheme (TDS) for EWMs in Vehicular Social Networks (VSNs) to solve the aforementioned issue. To ensure the authenticity of EWMs, we exploit the user-post credibility network for identifying true and false alarms. Moreover, we develop a reputation mechanism by calculating a trust-score for each node based on its social-utility, behavior, and contribution in the network. We utilize the hybrid architecture of VSNs by employing social-groups based dissemination in Vehicle-to-Infrastructure (V2I) mode, whereas nodes' friendship-network in Vehicle-to-Vehicle (V2V) mode. We analyze the proposed scheme for accuracy by extensive simulations under varying malicious nodes ratio in the network. Furthermore, we compare the efficiency of TDS with state-of-the-art dissemination schemes in VSNs for delivery ratio, transmission delay, number of transmissions, and hop-count. The experimental results validate the significant efficacy of TDS in accuracy and aforementioned network parameters. © 2019 Elsevier Inc
Performance of management solutions and cooperation approaches for vehicular delay-tolerant networks
A wide range of daily-life applications supported by vehicular networks attracted the interest,
not only from the research community, but also from governments and the automotive
industry. For example, they can be used to enable services that assist drivers on the roads (e.g.,
road safety, traffic monitoring), to spread commercial and entertainment contents (e.g., publicity),
or to enable communications on remote or rural regions where it is not possible to have
a common network infrastructure. Nonetheless, the unique properties of vehicular networks
raise several challenges that greatly impact the deployment of these networks.
Most of the challenges faced by vehicular networks arise from the highly dynamic network
topology, which leads to short and sporadic contact opportunities, disruption, variable
node density, and intermittent connectivity. This situation makes data dissemination an interesting
research topic within the vehicular networking area, which is addressed by this study.
The work described along this thesis is motivated by the need to propose new solutions to deal
with data dissemination problems in vehicular networking focusing on vehicular delay-tolerant
networks (VDTNs).
To guarantee the success of data dissemination in vehicular networks scenarios it is important
to ensure that network nodes cooperate with each other. However, it is not possible
to ensure a fully cooperative scenario. This situation makes vehicular networks suitable to the
presence of selfish and misbehavior nodes, which may result in a significant decrease of the
overall network performance. Thus, cooperative nodes may suffer from the overwhelming load
of services from other nodes, which comprises their performance.
Trying to solve some of these problems, this thesis presents several proposals and studies
on the impact of cooperation, monitoring, and management strategies on the network performance
of the VDTN architecture. The main goal of these proposals is to enhance the network
performance. In particular, cooperation and management approaches are exploited to improve
and optimize the use of network resources. It is demonstrated the performance gains attainable
in a VDTN through both types of approaches, not only in terms of bundle delivery probability,
but also in terms of wasted resources.
The results and achievements observed on this research work are intended to contribute
to the advance of the state-of-the-art on methods and strategies for overcome the challenges
that arise from the unique characteristics and conceptual design of vehicular networks.O vasto número de aplicações e cenários suportados pelas redes veiculares faz com que
estas atraiam o interesse não só da comunidade científica, mas também dos governos e da indústria
automóvel. A título de exemplo, estas podem ser usadas para a implementação de serviços
e aplicações que podem ajudar os condutores dos veículos a tomar decisões nas estradas, para
a disseminação de conteúdos publicitários, ou ainda, para permitir que existam comunicações
em zonas rurais ou remotas onde não é possível ter uma infraestrutura de rede convencional.
Contudo, as propriedades únicas das redes veiculares fazem com que seja necessário ultrapassar
um conjunto de desafios que têm grande impacto na sua aplicabilidade.
A maioria dos desafios que as redes veiculares enfrentam advêm da grande mobilidade dos
veículos e da topologia de rede que está em constante mutação. Esta situação faz com que este
tipo de rede seja suscetível de disrupção, que as oportunidades de contacto sejam escassas e de
curta duração, e que a ligação seja intermitente. Fruto destas adversidades, a disseminação dos
dados torna-se um tópico de investigação bastante promissor na área das redes veiculares e por
esta mesma razão é abordada neste trabalho de investigação. O trabalho descrito nesta tese é
motivado pela necessidade de propor novas abordagens para lidar com os problemas inerentes
à disseminação dos dados em ambientes veiculares.
Para garantir o sucesso da disseminação dos dados em ambientes veiculares é importante
que este tipo de redes garanta a cooperação entre os nós da rede. Contudo, neste tipo de ambientes
não é possível garantir um cenário totalmente cooperativo. Este cenário faz com que
as redes veiculares sejam suscetíveis à presença de nós não cooperativos que comprometem
seriamente o desempenho global da rede. Por outro lado, os nós cooperativos podem ver o seu
desempenho comprometido por causa da sobrecarga de serviços que poderão suportar.
Para tentar resolver alguns destes problemas, esta tese apresenta várias propostas e estudos
sobre o impacto de estratégias de cooperação, monitorização e gestão de rede no desempenho
das redes veiculares com ligações intermitentes (Vehicular Delay-Tolerant Networks
- VDTNs). O objetivo das propostas apresentadas nesta tese é melhorar o desempenho global
da rede. Em particular, as estratégias de cooperação e gestão de rede são exploradas para
melhorar e optimizar o uso dos recursos da rede. Ficou demonstrado que o uso deste tipo de
estratégias e metodologias contribui para um aumento significativo do desempenho da rede,
não só em termos de agregados de pacotes (“bundles”) entregues, mas também na diminuição
do volume de recursos desperdiçados.
Os resultados observados neste trabalho procuram contribuir para o avanço do estado
da arte em métodos e estratégias que visam ultrapassar alguns dos desafios que advêm das
propriedades e desenho conceptual das redes veiculares
Security Improvements for Connected Vehicles Position-Based Routing
The constant growing on the number of vehicles is increasing the complexity of traffic in urban and highway environments. It is paramount to improve traffic management to guarantee better road usage and people’s safety. Through efficient communications, Vehicular Ad hoc Networks (VANETs) can provide enough information for traffic safety initiatives, daily traffic data processing, and entertainment information. However, VANETs are vulnerable to malicious nodes applying different types of net-work attacks, where an attacker can, for instance, forge its position to receive the data packet and drop the message. This can lead vehicles and authorities to make incorrect assumptions and decisions, which can result in dangerous situations. Therefore, any data dissemination protocol designed for VANET should consider security issues when selecting the next-hop forwarding node. In this paper, we propose a security scheme designed for position-based routing algorithms, which analyzes nodes position, transmission range, and hello packet interval. The scheme deals with malicious nodes performing network attacks, faking their positions forcing packets to be dropped. We used the Simulation of Urban MObility (SUMO) and Network Simulator-version 3 (NS-3) to compare our proposed scheme integrated with two well-known position-based algorithms. The results were collected in an urban Manhattan grid environment varying the number of nodes, the number of malicious nodes, as well as the number of source-destination pairs. The results show that the proposed security scheme can successfully improve the packet delivery ratio while maintaining low average end-to-end delay of the algorithms.
Architectures for the Future Networks and the Next Generation Internet: A Survey
Networking research funding agencies in the USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms. Delay/Disruption tolerant networks, which allow communications even when complete end-to-end path is not available, are also discussed
- …