46 research outputs found

    Dinamička distribucija sigurnosnih ključeva i koalicijski protokol IP adresa za mobilne ad hoc mreže

    Get PDF
    In mobile adhoc networks (MANETs) a tree-based dynamic address auto-configuration protocol (T-DAAP) is one of the best protocols designed for address assignment as far as the network throughput and packet delays are concerned. Moreover, MANET security is an important factor for many applications given that any node can listen to the channel and overhear the packets being transmitted. In this paper, we merge the address assignment with the security key delivery into one protocol, such that a node in the MANET is configured with IP address and security key simultaneously. To the best of our knowledge, no single protocol provides concurrent assignment of IP addresses and security keys for MANET nodes. The proposed method, which is based on T-DAAP, shows significant enhancements in the required control packets needed for assigning network nodes IP addresses and security keys, MAC layer packets, total end-to-end delay, and channel throughput over those obtained when using separate protocols. Additionally, it provides not only efficient security keys to the nodes from the first moment they join the network, but also secure delivery of the address and security key to all participating nodes. It is noteworthy to mention that providing a complete security model for MANET to detect and countermeasure network security threats and attacks is beyond the scope of our proposed protocol.Kod mobilnih ad hoc mreža (MANET) dinamički protokol za autokonfiguraciju adresa baziran na stablu (T-DAAP) je jedan od najboljih protokola dizajniranih za dodjelu adresa iz perspektive propusnosti mreže i i kašnjenja paketa. štoviše, sigurnost MANET-a je važan faktor za mnoge aplikacije s obzirom da bilo koji čvor može osluškivati kanal i slučajno čuti pakete koji se šalju. U ovom radu, dodjela adresa i dostava sigurnosnih ključeva spojeni su u jedan protokol tako da je čvor u MANET-u konfiguriran simultano s IP adresom i sigurnosnim ključem. Prema saznanjima autora, niti jedan postojeći protokol ne pruža istovremeno dodjeljivanje IP adrese i sigurnosnog ključa za MANET čvorove. Predložena metoda, koja se bazira na T-DAAP-u, pokazuje značajna poboljšanja u odnosu na metode koje koriste odvojene porotokole, kod traženih kontrolnih paketa koji su potrebni za dodjeljivanje IP adresa i sigurnosnih ključeva čvorovima mreže, MAC paketa, ukupnog end-to-end kašnjenja i propusnosti kanala. Dodatno pruža ne samo efikasne sigurnosne ključeve čvorovima od trenutka kad se priključe mreži, nego i sigurno dostavljanje adrese i sigurnosnog ključa svim čvorovima koji sudjeluju u mreži. Važno je spomenuti da je pružanje cjelokupnog sigurnosnog modela za MANET koji detektira dodatno i protumjere prijetnjama i napadima na sigurnost mreže izvan dosega predloženog protokola

    An Adaptive Multimedia-Oriented Handoff Scheme for IEEE 802.11 WLANs

    Full text link
    Previous studies have shown that the actual handoff schemes employed in the IEEE 802.11 Wireless LANs (WLANs) do not meet the strict delay constraints placed by many multimedia applications like Voice over IP. Both the active and the passive supported scan modes in the standard handoff procedure have important delay that affects the Quality of Service (QoS) required by the real-time communications over 802.11 networks. In addition, the problem is further compounded by the fact that limited coverage areas of Access Points (APs) occupied in 802.11 infrastructure WLANs create frequent handoffs. We propose a new optimized and fast handoff scheme that decrease both handoff latency and occurrence by performing a seamless prevent scan process and an effective next-AP selection. Through simulations and performance evaluation, we show the effectiveness of the new adaptive handoff that reduces the process latency and adds new context-based parameters. The Results illustrate a QoS delay-respect required by applications and an optimized AP-choice that eliminates handoff events that are not beneficial.Comment: 20 pages, 14 figures, 4 table

    Application of Wireless Sensor Networks to Healthcare Promotion

    Get PDF
    Born on military applications, wireless sensor networks(WSNs) application grew on the promise of environment sensing and data processing capability at low cost. These networks can hold hundreds or even thousands of smart sensing nodes with processing and sensing capabilities and even integrated power through a dedicated battery. This paper surveys on the application of wireless sensor networks to healthcare promotion, namely with the use of biosensor technology applied to body sensor networks. On a wireless body sensor network, a person wears biosensors to gather data, while doing their daily activities. Currently, engineers and medical staff are cooperating on findingnew ways to properly gather meaningful data on-site and achieve a convenient way to process these data for research and on-site medical decision. New challenges that such approach brings are also considered. Moreover, it is shown that wireless sensor networks provide the technology to built wireless sensing and create a convenient infrastructure for multiple data gathering in healthcare applications. Together with real successful examples, we demonstrate the great usefulness of wireless sensor networks in healthcare promotion. The paper concludes with some guidelines for future work

    An Algorithm based on VANET Technology to Count Vehicles Stopped at a Traffic Light

    Get PDF
    Vehicular Ad hoc Networks (VANETs) have gained considerable attention in the past few years due to their promising applicability in relation to the Intelligent Transportation Systems (ITSs). This emerging new technology will provide timely information to develop adaptive traffic light control systems that will allow a significant optimization of the vehicular traffic flow. In this paper, we introduce a novel algorithm for counting vehicles stopped at a traffic light using VANET technology. The algorithm is based on the idea of the propagation of a count request message from the RSU (originating unit) toward the vehicles that are at the end of the waiting line, and the propagation of a response message (with the number of vehicles counted) in the opposite direction, that is, from the vehicles at the end of the line toward the RSU. For this, our algorithm uses BEACON messages periodically to exchange the necessary information between any two 1-hop neighbors. Using the data received from BEACON messages, each vehicle can maintain its own neighbors list. To validate and evaluate the performance of our proposal, we use Veins (Vehicle in Network Simulation) and TraCI (Traffic Control Interface). The former is a framework that ties together a network simulator (OMNeT++) with a road traffic simulator (SUMO), and the latter is an API for the communications between both simulators by providing TCP connections between each other. The results of the simulations performed in different scenarios are encouraging since they indicate that the proposed algorithm efficiently computes a number of vehicles very close to the real one, using a few control messages

    Ubiquitous Computing for Mobile Environments

    Get PDF
    The increasing role and importance of ubiquitous computing and mobile environments in our daily lives implies the need for new solutions. The characteristics of agents and multi-agent systems make them very appropriate for constructing ubiquitous and mobile systems. This chapter presents some of the advances in practical and theoretical applications of multi-agent systems in the fields of ubiquitous computing and mobile environments carried out by several AgentCities.ES research groups

    Performance Evaluation of the LAR-1P Route Discovery Algorithm

    Full text link

    Interim research assessment 2003-2005 - Computer Science

    Get PDF
    This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio
    corecore