1,460 research outputs found
The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks
We consider the question of determining the scaling of the -dimensional
balanced unicast and the -dimensional balanced multicast capacity
regions of a wireless network with nodes placed uniformly at random in a
square region of area and communicating over Gaussian fading channels. We
identify this scaling of both the balanced unicast and multicast capacity
regions in terms of , out of total possible, cuts. These cuts
only depend on the geometry of the locations of the source nodes and their
destination nodes and the traffic demands between them, and thus can be readily
evaluated. Our results are constructive and provide optimal (in the scaling
sense) communication schemes.Comment: 37 pages, 7 figures, to appear in IEEE Transactions on Information
Theor
Optimizing QOS in Mobile Ad Hoc Networks Through Advanced Routing Protocols Under Wormhole Attack Scenarios
A Mobile Ad hoc Network (MANET) is a wireless network that may autonomously reconfigure itself without relying on a centralised structure. This type of network does not have a fixed quantity and arrangement, but rather, it self-organizes and enables the automatic connection of diverse nodes. Due to its adaptive and strong character, this network is very susceptible to attacks, which may be easily rectified. Consequently, the attacker would then function as a transmitter or recipient for forged packets. The wormhole attack is considered one of the most perilous attacks on this network. A wormhole attack involves the unauthorised movement of data packets from one node to another, which may be a harmful node located either within or outside the network. In this study, we want to investigate the impact of a wormhole attack on two specific routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The comparison will be conducted based on two primary network performance metrics: throughput and end-to-end delay. The simulation tests in this work will be conducted using Network Simulator-2 (NS-2) to calculate the impacts. This paper provides an alternative contribution to the realm of network attacks. The proposed Worm Hole Attack Model (WHAM) serves as an alternative for MANET routing in NS-2. WHAM has utilised the aforementioned tests to assess their resilience and durability when subjected to an attack
SDN-AAA: Towards the standard management of AAA infrastructures
Software Defined Networking (SDN) is a widely deployed technology enabling
the agile and flexible management of networks and services. This paradigm
represents an appropriate candidate to address the dynamic and secure
management of large and complex Authentication, Authorization and Accounting
(AAA) infrastructures. In those infrastructures, there are several nodes which
must exchange information securely to interconnect different realms. This
article describes a novel SDN-based framework with a data model-driven approach
following the standard YANG, named SDN-AAA, which can be used to dynamically
manage routing and security configuration in AAA scenarios.Comment: 7 pages, 5 figure
- …