312 research outputs found

    Trusted and secure clustering in mobile pervasive environment

    Get PDF

    Report on a Working Session on Security in Wireless Ad Hoc Networks

    Get PDF
    No abstrac

    Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels

    Get PDF
    Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design. In this paper, we investigate two fundamental questions Does cooperative transmission provide new opportunities to malicious parties to undermine the network performance? Are there new ways to defend wireless networks through physical layer cooperation? Particularly, we study the security vulnerabilities of the traditional cooperative transmission schemes and show the performance degradation resulting from the misbehaviors of relay nodes. Then, we design a trust-assisted cooperative scheme that can detect attacks and has self-healing capability. The proposed scheme performs much better than the traditional schemes when there are malicious/selfish nodes or severe channel estimation errors. Finally, we investigate the advantage of cooperative transmission in terms of defending against jamming attacks. A reduction in link outage probability is achieved

    Securing Weight-Based AODV (WBAODV) Routing Protocol in MANETs: Towards Efficient and Secure Routing Protocol

    Get PDF
    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. There are number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secured routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. After the evaluation of these protocols the results refer that they do not give complete protection against possible attacks and have some disadvantages on their performance. In this research, we examined a new routing protocol called Weight-Based Ad hoc On-demand Distance Vector (WBAODV) routing protocol which is efficient and superior of the standard Ad hoc On-demand Distance Vector (AODV) routing protocol in performance, but is not secure. So we proposed a new secure routing protocol based on WBAODV which will be efficient and also immune against the most commonly possible routing attacks. Finally we analyzed the proposed protocol against many attacks to ensure its security and also subject it to extensive simulation tests using JiST/SWAN simulation tool with the most commonly well-known ad hoc performance metrics to ensure its efficiency

    On the impact of selfish behaviors in wireless packet scheduling

    Get PDF
    In many practical scenarios, wireless devices are autonomous and thus, may exhibit non-cooperative behaviors due to self-interests. For instance, a wireless user may report bogus channel information to gain resource allocation advantages. Such non-cooperative behaviors are practicable as the device's software could be modified by the user. In this paper, we first analyze the impact of these rationally selfish behaviors on the performance of packet scheduling algorithms in time-slotted wireless networks. Using a mixed strategy game theoretic model, we show that the traditional Maximum Rate packet scheduling algorithm can lead non-cooperative users to undesirable Nash equilibriums, in which the wireless channels are used inefficiently. By using repeated game to enforce cooperation, we further propose a novel game theoretic approach that can lead to an efficient equilibrium. ©2008 IEEE.published_or_final_versio
    • …
    corecore