4,292 research outputs found

    Performance evaluation of an efficient counter-based scheme for mobile ad hoc networks based on realistic mobility model

    Get PDF
    Flooding is the simplest and commonly used mechanism for broadcasting in mobile ad hoc networks (MANETs). Despite its simplicity, it can result in high redundant retransmission, contention and collision in the network, a phenomenon referred to as broadcast storm problem. Several probabilistic broadcast schemes have been proposed to mitigate this problem inherent with flooding. Recently, we have proposed a hybrid-based scheme as one of the probabilistic scheme, which combines the advantages of pure probabilistic and counter-based schemes to yield a significant performance improvement. Despite these considerable numbers of proposed broadcast schemes, majority of these schemes’ performance evaluation was based on random waypoint model. In this paper, we evaluate the performance of our broadcast scheme using a community based mobility model which is based on social network theory and compare it against widely used random waypoint mobility model. Simulation results have shown that using unrealistic movement pattern does not truly reflect on the actual performance of the scheme in terms of saved-rebroadcast, reachability and end to end delay

    A Case for Time Slotted Channel Hopping for ICN in the IoT

    Full text link
    Recent proposals to simplify the operation of the IoT include the use of Information Centric Networking (ICN) paradigms. While this is promising, several challenges remain. In this paper, our core contributions (a) leverage ICN communication patterns to dynamically optimize the use of TSCH (Time Slotted Channel Hopping), a wireless link layer technology increasingly popular in the IoT, and (b) make IoT-style routing adaptive to names, resources, and traffic patterns throughout the network--both without cross-layering. Through a series of experiments on the FIT IoT-LAB interconnecting typical IoT hardware, we find that our approach is fully robust against wireless interference, and almost halves the energy consumed for transmission when compared to CSMA. Most importantly, our adaptive scheduling prevents the time-slotted MAC layer from sacrificing throughput and delay

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Analysis of Secure Routing Scheme for MANET

    Get PDF
    Mobile ad hoc networks pose various kinds of security problems, caused by their nature of collaborative and open systems and by limited availability of resources. In our work we look at AODV in detail, study and analyses various attacks that can be possible on it. Then we look into some existing mechanism for securing AODV protocol. Our proposed work is an extension to Adaptive-SAODV of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance. In A-SAODV an intermediate node makes an adaptive reply decision for an incoming request that helps to balance its load that is over-burdened by signing and verification task of incoming messages. Namely, we propose a modification to adaptive mechanism that tunes SAODV behavior. In our paper we have proposed an extension to Adaptive-SAODV of the secure AODV protocol extension, which includes further filtering strategies aimed at further improving its network performance. We have analyzed the how our proposed algorithm can help in further improvement of performance in adaptive SAODV and also compared its performance with existing mechanisms using simulation

    Electronically-switched Directional Antennas for Low-power Wireless Networks: A Prototype-driven Evaluation

    Get PDF
    We study the benefits of electronically-switched directional antennas in low-power wireless networks. This antenna technology may improve energy efficiency by increasing the communication range and by alleviating contention in directions other than the destination, but in principle requires a dedicated network stack. Unlike most existing works, we start by characterizing a real-world antenna prototype, and apply this to an existing low-power wireless stack, which we adapt with minimal changes. Our results show that: i) the combination of a low-cost directional antenna and a conventional network stack already brings significant performance improvements, e.g., nearly halving the radio-on time per delivered packet; ii) the margin of improvement available to alternative clean-slate protocol designs is similarly large and concentrated in the control rather than the data plane; iii) by artificially modifying our antenna's link-layer model, we can point at further potential benefits opened by different antenna designs

    Determining the representative factors affecting warning message dissemination in VANETs

    Full text link
    In this paper, we present a statistical analysis based on the 2k factorial methodology to determine the representative factors affecting traffic safety applications in Vehicular ad hoc networks (VANETs). Our purpose is to determine what are the key factors affecting Warning Message Dissemination (WMD) in order to concentrate on such parameters, thus reducing the amount of required simulation time when evaluating VANETs. Simulation results show that the key factors affecting warning messages delivery are: (i) the transmission range, (ii) the radio propagation model used, and (iii) the density of vehicles. Based on this statistical analysis, we evaluate a compound key factor: neighbor density. This factor combines the above-mentioned factors into a single entity, reducing the number of factors that must be taken into account for VANET researchers to evaluate the benefits of their proposals.This work was partially supported by the Ministerio de Educacion y Ciencia, Spain, under Grant TIN2008-06441-C02-01, and by the Fundacion Antonio Gargallo, under Grant 2009/B001.Martínez Domínguez, FJ.; Toh, CK.; Cano Escribá, JC.; Tavares De Araujo Cesariny Calafate, CM.; Manzoni, P. (2012). Determining the representative factors affecting warning message dissemination in VANETs. Wireless Personal Communications. 67(2):295-314. https://doi.org/10.1007/s11277-010-9989-4S295314672Eichler, S. (2007). Performance evaluation of the IEEE 802.11p WAVE communication standard. In Proceedings of the vehicular technology conference (VTC-2007 Fall), USA.Fall, K., & Varadhan, K. (2000). ns notes and documents. The VINT Project. UC Berkeley, LBL, USC/ISI, and Xerox PARC. Available at http://www.isi.edu/nsnam/ns/ns-documentation.html .Fasolo, E., Zanella, A., & Zorzi, M. (2006). An effective broadcast scheme for alert message propagation in vehicular ad hoc networks. In Proceedings of the IEEE International Conference on Communications, Istambul, Turkey.Korkmaz, G., Ekici, E., Ozguner, F., & Ozguner, U. (2004). Urban multi-hop broadcast protocols for inter-vehicle communication systems. In Proceedings of First ACM Workshop on Vehicular Ad Hoc Networks (VANET 2004).Martinez, F. J., Toh, C.-K., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2009). Realistic radio propagation models (RPMs) for VANET simulations. In IEEE wireless communications and networking conference (WCNC), Budapest, Hungary.Martinez, F. J., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2008). CityMob: A mobility model pattern generator for VANETs. In IEEE vehicular networks and applications workshop (Vehi-Mobi, held with ICC), Beijing, China.Martinez, F. J., Cano, J.-C., Calafate, C. T., & Manzoni, P. (2009). A performance evaluation of warning message dissemination in 802.11p based VANETs. In IEEE local computer networks conference (LCN 2009), Zürich, Switzerland.Torrent-Moreno, M., Santi, P., & Hartenstein, H. (2005). Fair sharing of bandwidth in VANETs. In Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks, Germany.Tseng Y.-C., Ni S.-Y., Chen Y.-S., Sheu J.-P. (2002) The broadcast storm problem in a mobile ad hoc network. Wireless Networks 8: 153–167Wisitpongphan N., Tonguz O., Parikh J., Mudalige P., Bai F., Sadekar V. (2007) Broadcast storm mitigation techniques in vehicular ad hoc networks. Wireless Communications IEEE 14(6): 84–94. doi: 10.1109/MWC.2007.4407231Yang, X., Liu, J., Zhao, F., & Vaidya, N. H. (2004). A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of the first annual international conference on mobile and ubiquitous systems: Networking and services (MobiQuitous’04).Yoon, J., Liu, M., & Noble, B. (2003). Random waypoint considered harmful. Proceedings of IEEE INFOCOMM 2003, San Francisco, California, USA.Zang, Y., Stibor, L., Cheng, X., Reumerman, H.-J., Paruzel, A., & Barroso, A. (2007). Congestion control in wireless networks for vehicular safety applications. In Proceedings of the 8th European Wireless Conference, Paris, France
    corecore