4,237 research outputs found
Correlated survivability analysis model for manets
Mobile ad hoc networks (MANETs) rely on collective nodes effort which requires node to be in cooperative behavior to continuously offer network services. Furthermore, node in MANETs shows correlated node behavior due to topology changes, node misbehavior or security attacks in which poses a significant impact on network survivability. However, correlated node behavior is not reflected as one of the metric in analyzing network survivability with current survivability models. The models did not represent real life scenario with the assumption made on individual node behavior. This limitation resulted inaccuracy when analyzing network survivability. To overcome the limitation of current research, this thesis presents a new network survivability analysis model which captures correlated node behavior to depict node behavior in MANETs and proposed a way to minimize the impact of correlated node behavior. Firstly, before network survivability analysis is modeled, a better understanding of dynamic characteristics of node behavior and its correlated behavior need to be studied and modeled. In this thesis, a merging of semi Markov process and Susceptible-Infection-Remove (SIR) epidemic theory is proposed to stochastically model correlated node behavior. To capture correlated node behavior, correlated degree is proposed in the model as a new metric to measure the impact of network survivability under correlated node behavior. Correlated node behavior model leads to a better understanding and prediction of the critical condition and the speed of spreading correlated node behavior to entire network. Network survivability under correlated node behavior is analyzed based on statistical method of multivariate survival analysis in medical research. The modification of Cox Proportional Hazard regression model in particular correlated hazard function is proposed to analyze the probability of correlated node behavior and to determine variables that significantly influence network survivability. The result on regression analysis shows energy consumption and correlated degree are the most significant variables that influence network survivability. Furthermore, probability of network survivability also can be determined. A new algorithm of topology formation is proposed with correlated degree metric to mitigate the impact of correlated node behavior on network performances. The simulation result shows that, with the new algorithm, energy consumption in MANETs can be balance which prolong node life time and increase network survivability. In addition, new algorithm also prevents network topology from partitioning. With new survivability analysis model, the status of network can be precisely measured and countermeasure can be done earlier to prevent network disruption
Survivability in Time-varying Networks
Time-varying graphs are a useful model for networks with dynamic connectivity
such as vehicular networks, yet, despite their great modeling power, many
important features of time-varying graphs are still poorly understood. In this
paper, we study the survivability properties of time-varying networks against
unpredictable interruptions. We first show that the traditional definition of
survivability is not effective in time-varying networks, and propose a new
survivability framework. To evaluate the survivability of time-varying networks
under the new framework, we propose two metrics that are analogous to MaxFlow
and MinCut in static networks. We show that some fundamental
survivability-related results such as Menger's Theorem only conditionally hold
in time-varying networks. Then we analyze the complexity of computing the
proposed metrics and develop several approximation algorithms. Finally, we
conduct trace-driven simulations to demonstrate the application of our
survivability framework to the robust design of a real-world bus communication
network
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less
networks comprised of mobile nodes that communicate over wireless links without
any central control on a peer-to-peer basis. These individual nodes act as
routers to forward both their own data and also their neighbours' data by
sending and receiving packets to and from other nodes in the network. The
relatively easy configuration and the quick deployment make ad hoc networks
suitable the emergency situations (such as human or natural disasters) and for
military units in enemy territory. Securing data dissemination between these
nodes in such networks, however, is a very challenging task. Exposing such
information to anyone else other than the intended nodes could cause a privacy
and confidentiality breach, particularly in military scenarios. In this paper
we present a novel framework to enhance the privacy and data confidentiality in
mobile ad hoc networks by attaching the originator policies to the messages as
they are sent between nodes. We evaluate our framework using the Network
Simulator (NS-2) to check whether the privacy and confidentiality of the
originator are met. For this we implemented the Policy Enforcement Points
(PEPs), as NS-2 agents that manage and enforce the policies attached to packets
at every node in the MANET.Comment: 12 page
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil
and military jobs. However, security is one of the significant challenges for
sensor network because of their deployment in open and unprotected environment.
As cryptographic mechanism is not enough to protect sensor network from
external attacks, intrusion detection system needs to be introduced. Though
intrusion prevention mechanism is one of the major and efficient methods
against attacks, but there might be some attacks for which prevention method is
not known. Besides preventing the system from some known attacks, intrusion
detection system gather necessary information related to attack technique and
help in the development of intrusion prevention system. In addition to
reviewing the present attacks available in wireless sensor network this paper
examines the current efforts to intrusion detection system against wireless
sensor network. In this paper we propose a hierarchical architectural design
based intrusion detection system that fits the current demands and restrictions
of wireless ad hoc sensor network. In this proposed intrusion detection system
architecture we followed clustering mechanism to build a four level
hierarchical network which enhances network scalability to large geographical
area and use both anomaly and misuse detection techniques for intrusion
detection. We introduce policy based detection mechanism as well as intrusion
response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap
with arXiv:1111.1933 by other author
Resilience and survivability in MANET: Discipline, issue and challenge
The wireless technology has become essential part in modern life, and thus the consequences of network disruption is becoming severe.It is widely known that wireless network is not sufficiently resilience, survive and dependable and significant research and development is necessary to improve the situation. This paper provide a survey of vast disciplines in
MANET, a resilience strategy is also presented on how to defend, detect and countermeasures malicious node. Current issues and challenges to achieve resilience and survivability is also presented for future direction
- …