874 research outputs found

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted

    Link Quality Driven Multipath Routing for Mobile Ad Hoc Networks

    Get PDF
    In Mobile Ad Hoc Networks (MANETs) routing protocols are used to discover routes between a source-destination pair. The traditional routing protocols in MANETs discovery routes based on the shortest hop count metric due to which the routes selected for data transmission may be of low quality. A link on a selected route is low considered as low quality link if it requires more number of re-transmissions to transmit a data packet to next hop. This can be happen due to interference and contention on the link caused by nearby data sessions of high distance between the communication nodes which weakens the signal strength due to which the probability of frame error rate increases. Therefore, we require a routing protocol which uses a route discovery process which is based on other metrics than the shortest hop count to improve the communication process in wireless MANETs. In this thesis, we propose a multipath route discovery algorithm which considers the quality of an intermediate link as a metric for its inclusion in the possible routes selected between a source-destination pair. We can now use the secondary route without causing a new route discovery process due to this the network overhead caused by a route discovery process will be avoided. This increases the network communication performance greatly. The proposed LQMR routing protocol is implemented in the trail version of network simulator called EXata. The simulation results are taken on various network scenarios which are created with varying network loads and network mobility to check the effectiveness of our proposed method. Various performance metrics are used to evaluate the simulation results obtained such as end-to-end network delay, network routing overhead and packet delivery ratio. The performance metrics evaluation and analysis show that the proposed LQMR protocol greatly improves the performance of data transmission in MANETs while effectively handle the topology changes caused by the network mobility

    Requirement analysis for building practical accident warning systems based on vehicular ad-hoc networks

    Get PDF
    An Accident Warning System (AWS) is a safety application that provides collision avoidance notifications for next generation vehicles whilst Vehicular Ad-hoc Networks (VANETs) provide the communication functionality to exchange these notifi- cations. Despite much previous research, there is little agreement on the requirements for accident warning systems. In order to build a practical warning system, it is important to ascertain the system requirements, information to be exchanged, and protocols needed for communication between vehicles. This paper presents a practical model of an accident warning system by stipulating the requirements in a realistic manner and thoroughly reviewing previous proposals with a view to identify gaps in this area

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    FILE SHARING IN AD HOC NETWORKS

    Get PDF
    mobile ad-hoc network (MANET) is a self-configuring network of mobile routers and associated hosts connected by wireless links, the union of which form an arbitrary topology. The routers are free to move randomly and organise themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. The network is currently applied in many areas suchas for military purposes, in hospitals, campuses and offices. First of all, the scope of study of this projectwas to understand current wireless standards, the nature of mobile ad hoc networks, the advantages and disadvantages to it. The next step was to understand the requirements of file sharing application in such networks. One of the challenges in MANET is the routing protocol. The Ad Hoc On Demand Distance Vector (AODV) routing protocol was chosen and simulated in a hospital scenario whereby patients' records are constantly uploaded and downloaded by doctors and nurses using mobile devices. The scenario was simulated usingOMNeT++ which is an open source software

    High-Performance Broadcast and Multicast Protocols for Multi-Radio Multi-Channel Wireless Mesh Networks

    Get PDF
    Recently, wireless mesh networks (WMNs) have attracted much attention. A vast amount of unicast, multicast and broadcast protocols has been developed for WMNs or mobile ad hoc networks (MANETs). First of all, broadcast and multicast in wireless networks are fundamentally different from the way in which wired networks function due to the well-known wireless broadcast/multicast advantage. Moreover, most broadcast and multicast protocols in wireless networks assume a single-radio single-channel and single-rate network model, or a generalized physical model, which does not take into account the impact of interference. This dissertation focuses on high-performance broadcast and multicast protocols designed for multi-radio multi-channel (MRMC) WMNs. MRMC increases the capacity of the network from different aspects. Multi-radio allows mesh nodes to simultaneously send and receive through different radios to its neighbors. Multi-channel allows channels to be reused across the network, which expands the available spectrum and reduces the interference. Unlike MANETs, WMNs are assumed to be static or with minimal mobility. Therefore, the main design goal in WMNs is to achieve high throughput rather than to maintain connectivity. The capacity of WMNs is constrained by the interference caused by the neighbor nodes. One direct design objective is to minimize or reduce the interference in broadcast and multicast. This dissertation presents a set of broadcast and multicast protocols and mathematical formulations to achieve the design goal in MRMC WMNs. First, the broadcast problem is addressed with full consideration of both inter-node and intra-node interference to achieve efficient broadcast. The interference-aware broadcast protocol simultaneously achieves full reliability, minimum broadcast or multicast latency, minimum redundant transmissions, and high throughput. With an MRMC WMN model, new link and channel quality metrics are defined and are suitable for the design of broadcast and multicast protocols. Second, the minimum cost broadcast problem (MCBP), or minimum number of transmissions problem, is studied for MRMC WMNs. Minimum cost broadcast potentially allows more effective and efficient schedule algorithms to be designed. The proposed protocol with joint consideration of channel assignment reduces the interference to improve the throughput in the MCBP. Minimum cost broadcast in MRMC WMNs is very different from that in the single radio single channel scenario. The channel assignment in MRMC WMNs is used to assign multiple radios of every node to different channels. It determines the actual network connectivity since adjacent nodes have to be assigned to a common channel. Transmission on different channels makes different groups of neighboring nodes, and leads to different interference. Moreover, the selection of channels by the forward nodes impacts on the number of radios needed for broadcasting. Finally, the interference optimization multicast problem in WMNs with directional antennas is discussed. Directional transmissions can greatly reduce radio interference and increase spatial reuse. The interference with directional transmissions is defined for multicast algorithm design. Multicast routing found by the interference-aware algorithm tends to have fewer channel collisions. The research work presented in this dissertation concludes that (1) new and practical link and channel metrics are required for designing broadcast and multicast in MRMC WMNs; (2) a small number of radios is sufficient to significantly improve throughput of broadcast and multicast in WMNs; (3) the number of channels has more impact on almost all performance metrics, such as the throughput, the number of transmission, and interference, in WMNs
    • …
    corecore