295 research outputs found

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements

    Investigating Open Issues in Swarm Intelligence for Mitigating Security Threats in MANET

    Get PDF
    The area of Mobile Adhoc Network (MANET) has being a demanded topic of research for more than a decade because of its attractive communication features associated with various issues. This paper primarily discusses on the security issues, which has been still unsolved after abundant research work. The paper basically stresses on the potential features of Swarm Intelligence (SI) and its associated techniques to mitigate the security issues. Majority of the previous researches based on SI has used Ant Colony Optimization (ACO) or Particle Swarm Optimization (PSO) extensively. Elaborated discussion on SI with respect to trust management, authentication, and attack models are made with support of some of the recent studies done in same area. The paper finally concludes by discussing the open issues and problem identification of the review

    Manifestation and mitigation of node misbehaviour in adhoc networks

    Get PDF
    Mobile adhoc network is signified as a boon for advance and future wireless communication system. Owing to its self-establishing network features and decentralization, the system can actually establish a wireless communication with vast range of connectivity with the other nodes. However, the system of MANET is also beheld with various technical impediments owing to its inherent dynamic topologies. Although there are abundant volume of research work, but very few have been able to effectively address the node misbehavior problems in MANET. The paper initially tries to draw a line between different types of nodes in MANETs based on their behavior characteristics, then reviews some of the significant contribution of the prior researches for addressing node misbehavior issues. A major emphasis is laid on is the researches which use game theory as a tool to study and address the misbehavior problems. The manuscript is developed considering some of the latest and standard evidences of past 5 years and finally discusses the open issues related to the problems

    A comparative analysis for Detecting Uncertain Deterioration of Node Energy in MANET through Trust Based Solution

    Get PDF
    Energy is consumed in MANET during the transmission and reception of data, propagation of control packets, retransmission and overhearing. We concentrate in reducing the energy consumption during the transmission and reception of data. Each node in MANET transmits data with the maximum energy regardless of the distance between the nodes. Also the mobile nodes expend some energy in transmission and reception of data. We have utilized the metrics received signal strength, link quality and the distance between the nodes to compute the energy required to transmit the data from a node to its neighboring node. The energy computed is involved in the selection of the optimal path which requires minimum energy to route the data from source to destination. Nodes within an ad hoc network generally rely on batteries (or exhaustive energy sources) for energy. Since these energy sources have a limited lifetime, power availability is one of the most important constraints for the operation of the ad hoc network

    Distributed Hybrid Simulation of the Internet of Things and Smart Territories

    Full text link
    This paper deals with the use of hybrid simulation to build and compose heterogeneous simulation scenarios that can be proficiently exploited to model and represent the Internet of Things (IoT). Hybrid simulation is a methodology that combines multiple modalities of modeling/simulation. Complex scenarios are decomposed into simpler ones, each one being simulated through a specific simulation strategy. All these simulation building blocks are then synchronized and coordinated. This simulation methodology is an ideal one to represent IoT setups, which are usually very demanding, due to the heterogeneity of possible scenarios arising from the massive deployment of an enormous amount of sensors and devices. We present a use case concerned with the distributed simulation of smart territories, a novel view of decentralized geographical spaces that, thanks to the use of IoT, builds ICT services to manage resources in a way that is sustainable and not harmful to the environment. Three different simulation models are combined together, namely, an adaptive agent-based parallel and distributed simulator, an OMNeT++ based discrete event simulator and a script-language simulator based on MATLAB. Results from a performance analysis confirm the viability of using hybrid simulation to model complex IoT scenarios.Comment: arXiv admin note: substantial text overlap with arXiv:1605.0487

    Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory

    Get PDF
    Ubiquitous Computing and Internet of Things (IOT) are extremely popular in recent age and therefore imparting high level security mechanism is highly indispensable for such advanced technical systems. However, the security problems in Mobile Adhoc Networks (MANETs) are a constant topic of interest and have been drawing attention of research community from the past decade, where massive study has already been witnessed for addressing the security affairs. One of the precarious problems encountered in MANET is that of identifying the malicious nodes. This is because nodes in MANET are equally influential to take accountability during transmission. Coordination among nodes during communication and working without control of any central manager truly ensembles them to be applied in IoT. However, the identification and later mitigation of malicious nodes becomes an immensely difficult task especially when Selfish/Erroneous nodes exist along with normal Collaborative nodes in the Regular camp. The presence of selfish nodes is potentially harmful as similar behaviour can be imitated by malicious nodes which are the point of concern of many security aspects. While reviewing some techniques on the security system in MANET, it was found that game theory had a prime contribution in the past few years due to potential accuracy in its probabilistic approach and computational efficiency. Therefore, this study accentuates the use of game theory and probability theory considering selfish nodes in the regular node camp while modelling the Regular versus Malicious node game and thereby enhancing the prior mathematical schema of strategical decision making to accommodate for the same. The proposed study performs statistical analysis and presents a mathematical model to mimic the multi-stage game between regular and malicious node using Game Theory. Furthermore, it does not use any complex cryptographic protocols that tend to increase network overhead. The framework tries to effectively represent the various unpredictable actions of node cooperation, node declination, node attacks as well as node reporting that can model the strategic profiling of various mobile nodes. Understanding the patterns and then deploying the algorithms in security products can reduce intrusion to a greater exten

    Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobil Ad Hoc Networks

    Get PDF
    This research effort examines the theory, application, and results for a Reputation-based Internet Protocol Security (RIPSec) framework that provides security for an ad-hoc network operating in a hostile environment. In RIPSec, protection from external threats is provided in the form of encrypted communication links and encryption-wrapped nodes while internal threats are mitigated by behavior grading that assigns reputations to nodes based on their demonstrated participation in the routing process. Network availability is provided by behavior grading and round-robin multipath routing. If a node behaves faithfully, it earns a positive reputation over time. If a node misbehaves (for any number of reasons, not necessarily intentional), it earns a negative reputation. Each member of the MANET has its own unique and subjective set of Reputation Indexes (RI) that enumerates the perceived reputation of the other MANET nodes. Nodes that desire to send data will eliminate relay nodes they perceive to have a negative reputation during the formulation of a route. A 50-node MANET is simulated with streaming multimedia and varying levels of misbehavior to determine the impact of the framework on network performance. Results of this research were very favorable. Analysis of the simulation data shows the number of routing errors sent in a MANET is reduced by an average of 52% when using RIPSec. The network load is also reduced, decreasing the overall traffic introduced into the MANET and permitting individual nodes to perform more work without overtaxing their limited resources. Finally, throughput is decreased due to larger packet sizes and longer round trips for packets to traverse the MANET, but is still sufficient to pass traffic with high bandwidth requirements (i.e., video and imagery) that is of interest in military networks

    Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks

    Get PDF
    Wireless networks are becoming the most popular in today communication systems, where users prefer to have wireless connectivity regardless of its geographic location. But the open environment of wireless communication increasing threat on the wireless networks under diverse network circumstances. The random and dynamic activity increases the  vulnerability due to the complete dependency on the intermediate nodes which frequently join and leave the network. It is extremely significant to have a secure routing in such a dynamic network to preserve the data privacy. In this paper, we propose a secure and privacy routing based on Node Activities Learning (NAL) approach. This approach knows the runtime activities of the node to predict the probability of activity transformation for the intentional and unintentional activities which interrupt the data communication and affects the privacy. The mean of privacy is decided based on the node individual trust factor. It also suggests a method for the node which loses their trust due to the unintentional activities. A simulation-based evaluation study shows positive improvisation in secure routing in different malicious node environment

    QoS Routing Solutions for Mobile Ad Hoc Network

    Get PDF
    corecore