4,292 research outputs found
Performance evaluation of an efficient counter-based scheme for mobile ad hoc networks based on realistic mobility model
Flooding is the simplest and commonly used mechanism for broadcasting in mobile ad hoc networks (MANETs). Despite its simplicity, it can result in high redundant retransmission, contention and collision in the network, a phenomenon referred to as broadcast storm problem. Several probabilistic broadcast schemes have been proposed to mitigate this problem inherent with flooding. Recently, we have proposed a hybrid-based scheme as one of the probabilistic scheme, which combines the advantages of pure probabilistic and counter-based schemes to yield a significant performance improvement. Despite these considerable numbers of proposed broadcast schemes, majority of these schemes’ performance evaluation was based on random waypoint model. In this paper, we evaluate the performance of our broadcast scheme using a community based mobility model which is based on social network theory and compare it against widely used random waypoint mobility model. Simulation results have shown that using unrealistic movement pattern does not truly reflect on the actual performance of the scheme in terms of saved-rebroadcast, reachability and end to end delay
A Case for Time Slotted Channel Hopping for ICN in the IoT
Recent proposals to simplify the operation of the IoT include the use of
Information Centric Networking (ICN) paradigms. While this is promising,
several challenges remain. In this paper, our core contributions (a) leverage
ICN communication patterns to dynamically optimize the use of TSCH (Time
Slotted Channel Hopping), a wireless link layer technology increasingly popular
in the IoT, and (b) make IoT-style routing adaptive to names, resources, and
traffic patterns throughout the network--both without cross-layering. Through a
series of experiments on the FIT IoT-LAB interconnecting typical IoT hardware,
we find that our approach is fully robust against wireless interference, and
almost halves the energy consumed for transmission when compared to CSMA. Most
importantly, our adaptive scheduling prevents the time-slotted MAC layer from
sacrificing throughput and delay
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Analysis of Secure Routing Scheme for MANET
Mobile ad hoc networks pose various kinds of security problems, caused by their nature of collaborative and open systems and by limited availability of resources. In our work we look at AODV in detail, study and analyses various attacks that can be possible on it. Then we look into some existing mechanism for securing AODV protocol. Our proposed work is an extension to Adaptive-SAODV of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance. In A-SAODV an intermediate node makes an adaptive reply decision for an incoming request that helps to balance its load that is over-burdened by signing and verification task of incoming messages. Namely, we propose a modification to adaptive mechanism that tunes SAODV behavior. In our paper we have proposed an extension to Adaptive-SAODV of the secure AODV protocol extension, which includes further filtering strategies aimed at further improving its network performance. We have analyzed the how our proposed algorithm can help in further improvement of performance in adaptive SAODV and also compared its performance with existing mechanisms using simulation
Electronically-switched Directional Antennas for Low-power Wireless Networks: A Prototype-driven Evaluation
We study the benefits of electronically-switched directional antennas in low-power wireless networks. This antenna technology may improve energy efficiency by increasing the communication range and by alleviating contention in directions other than the destination, but in principle requires a dedicated network stack. Unlike most existing works, we start by characterizing a real-world antenna prototype, and apply this to an existing low-power wireless stack, which we adapt with minimal changes. Our results show that: i) the combination of a low-cost directional antenna and a conventional network stack already brings significant performance improvements, e.g., nearly halving the radio-on time per delivered packet; ii) the margin of improvement available to alternative clean-slate protocol designs is similarly large and concentrated in the control rather than the data plane; iii) by artificially modifying our antenna's link-layer model, we can point at further potential benefits opened by different antenna designs
Determining the representative factors affecting warning message dissemination in VANETs
In this paper, we present a statistical analysis based on the 2k factorial methodology
to determine the representative factors affecting traffic safety applications in Vehicular
ad hoc networks (VANETs). Our purpose is to determine what are the key factors affecting
Warning Message Dissemination (WMD) in order to concentrate on such parameters,
thus reducing the amount of required simulation time when evaluating VANETs. Simulation
results show that the key factors affecting warning messages delivery are: (i) the transmission
range, (ii) the radio propagation model used, and (iii) the density of vehicles. Based on this
statistical analysis, we evaluate a compound key factor: neighbor density. This factor combines
the above-mentioned factors into a single entity, reducing the number of factors that
must be taken into account for VANET researchers to evaluate the benefits of their proposals.This work was partially supported by the Ministerio de Educacion y Ciencia, Spain, under Grant TIN2008-06441-C02-01, and by the Fundacion Antonio Gargallo, under Grant 2009/B001.Martínez Domínguez, FJ.; Toh, CK.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P. (2012). Determining the representative factors affecting warning message dissemination in VANETs. Wireless Personal Communications. 67(2):295-314. https://doi.org/10.1007/s11277-010-9989-4S295314672Eichler, S. (2007). Performance evaluation of the IEEE 802.11p WAVE communication standard. In Proceedings of the vehicular technology conference (VTC-2007 Fall), USA.Fall, K., & Varadhan, K. (2000). ns notes and documents. The VINT Project. UC Berkeley, LBL, USC/ISI, and Xerox PARC. Available at http://www.isi.edu/nsnam/ns/ns-documentation.html .Fasolo, E., Zanella, A., & Zorzi, M. (2006). An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In Proceedings of the IEEE International Conference on Communications, Istambul, Turkey.Korkmaz, G., Ekici, E., Ozguner, F., & Ozguner, U. (2004). Urban multi-hop broadcast protocols for inter-vehicle communication systems. In Proceedings of First ACM Workshop on Vehicular Ad Hoc Networks (VANET 2004).Martinez, F. J., Toh, C.-K., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2009). Realistic radio propagation models (RPMs) for VANET simulations. In IEEE wireless communications and networking conference (WCNC), Budapest, Hungary.Martinez, F. J., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2008). CityMob: A mobility model pattern generator for VANETs. In IEEE vehicular networks and applications workshop (Vehi-Mobi, held with ICC), Beijing, China.Martinez, F. J., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2009). A performance evaluation of warning message dissemination in 802.11p based VANETs. In IEEE local computer networks conference (LCN 2009), Zürich, Switzerland.Torrent-Moreno, M., Santi, P., & Hartenstein, H. (2005). Fair sharing of bandwidth in VANETs. In Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks, Germany.Tseng Y.-C., Ni S.-Y., Chen Y.-S., Sheu J.-P. (2002) The broadcast storm problem in a mobile ad hoc network. Wireless Networks 8: 153–167Wisitpongphan N., Tonguz O., Parikh J., Mudalige P., Bai F., Sadekar V. (2007) Broadcast storm mitigation techniques in vehicular ad hoc networks. Wireless Communications IEEE 14(6): 84–94. doi: 10.1109/MWC.2007.4407231Yang, X., Liu, J., Zhao, F., & Vaidya, N. H. (2004). A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of the first annual international conference on mobile and ubiquitous systems: Networking and services (MobiQuitous’04).Yoon, J., Liu, M., & Noble, B. (2003). Random waypoint considered harmful. Proceedings of IEEE INFOCOMM 2003, San Francisco, California, USA.Zang, Y., Stibor, L., Cheng, X., Reumerman, H.-J., Paruzel, A., & Barroso, A. (2007). Congestion control in wireless networks for vehicular safety applications. In Proceedings of the 8th European Wireless Conference, Paris, France
- …