1,460 research outputs found

    The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks

    Full text link
    We consider the question of determining the scaling of the n2n^2-dimensional balanced unicast and the n2nn 2^n-dimensional balanced multicast capacity regions of a wireless network with nn nodes placed uniformly at random in a square region of area nn and communicating over Gaussian fading channels. We identify this scaling of both the balanced unicast and multicast capacity regions in terms of Θ(n)\Theta(n), out of 2n2^n total possible, cuts. These cuts only depend on the geometry of the locations of the source nodes and their destination nodes and the traffic demands between them, and thus can be readily evaluated. Our results are constructive and provide optimal (in the scaling sense) communication schemes.Comment: 37 pages, 7 figures, to appear in IEEE Transactions on Information Theor

    Optimizing QOS in Mobile Ad Hoc Networks Through Advanced Routing Protocols Under Wormhole Attack Scenarios

    Get PDF
     A Mobile Ad hoc Network (MANET) is a wireless network that may autonomously reconfigure itself without relying on a centralised structure. This type of network does not have a fixed quantity and arrangement, but rather, it self-organizes and enables the automatic connection of diverse nodes. Due to its adaptive and strong character, this network is very susceptible to attacks, which may be easily rectified. Consequently, the attacker would then function as a transmitter or recipient for forged packets. The wormhole attack is considered one of the most perilous attacks on this network. A wormhole attack involves the unauthorised movement of data packets from one node to another, which may be a harmful node located either within or outside the network. In this study, we want to investigate the impact of a wormhole attack on two specific routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The comparison will be conducted based on two primary network performance metrics: throughput and end-to-end delay. The simulation tests in this work will be conducted using Network Simulator-2 (NS-2) to calculate the impacts. This paper provides an alternative contribution to the realm of network attacks. The proposed Worm Hole Attack Model (WHAM) serves as an alternative for MANET routing in NS-2. WHAM has utilised the aforementioned tests to assess their resilience and durability when subjected to an attack

    SDN-AAA: Towards the standard management of AAA infrastructures

    Full text link
    Software Defined Networking (SDN) is a widely deployed technology enabling the agile and flexible management of networks and services. This paradigm represents an appropriate candidate to address the dynamic and secure management of large and complex Authentication, Authorization and Accounting (AAA) infrastructures. In those infrastructures, there are several nodes which must exchange information securely to interconnect different realms. This article describes a novel SDN-based framework with a data model-driven approach following the standard YANG, named SDN-AAA, which can be used to dynamically manage routing and security configuration in AAA scenarios.Comment: 7 pages, 5 figure
    corecore