4,237 research outputs found

    Correlated survivability analysis model for manets

    Get PDF
    Mobile ad hoc networks (MANETs) rely on collective nodes effort which requires node to be in cooperative behavior to continuously offer network services. Furthermore, node in MANETs shows correlated node behavior due to topology changes, node misbehavior or security attacks in which poses a significant impact on network survivability. However, correlated node behavior is not reflected as one of the metric in analyzing network survivability with current survivability models. The models did not represent real life scenario with the assumption made on individual node behavior. This limitation resulted inaccuracy when analyzing network survivability. To overcome the limitation of current research, this thesis presents a new network survivability analysis model which captures correlated node behavior to depict node behavior in MANETs and proposed a way to minimize the impact of correlated node behavior. Firstly, before network survivability analysis is modeled, a better understanding of dynamic characteristics of node behavior and its correlated behavior need to be studied and modeled. In this thesis, a merging of semi Markov process and Susceptible-Infection-Remove (SIR) epidemic theory is proposed to stochastically model correlated node behavior. To capture correlated node behavior, correlated degree is proposed in the model as a new metric to measure the impact of network survivability under correlated node behavior. Correlated node behavior model leads to a better understanding and prediction of the critical condition and the speed of spreading correlated node behavior to entire network. Network survivability under correlated node behavior is analyzed based on statistical method of multivariate survival analysis in medical research. The modification of Cox Proportional Hazard regression model in particular correlated hazard function is proposed to analyze the probability of correlated node behavior and to determine variables that significantly influence network survivability. The result on regression analysis shows energy consumption and correlated degree are the most significant variables that influence network survivability. Furthermore, probability of network survivability also can be determined. A new algorithm of topology formation is proposed with correlated degree metric to mitigate the impact of correlated node behavior on network performances. The simulation result shows that, with the new algorithm, energy consumption in MANETs can be balance which prolong node life time and increase network survivability. In addition, new algorithm also prevents network topology from partitioning. With new survivability analysis model, the status of network can be precisely measured and countermeasure can be done earlier to prevent network disruption

    Survivability in Time-varying Networks

    Get PDF
    Time-varying graphs are a useful model for networks with dynamic connectivity such as vehicular networks, yet, despite their great modeling power, many important features of time-varying graphs are still poorly understood. In this paper, we study the survivability properties of time-varying networks against unpredictable interruptions. We first show that the traditional definition of survivability is not effective in time-varying networks, and propose a new survivability framework. To evaluate the survivability of time-varying networks under the new framework, we propose two metrics that are analogous to MaxFlow and MinCut in static networks. We show that some fundamental survivability-related results such as Menger's Theorem only conditionally hold in time-varying networks. Then we analyze the complexity of computing the proposed metrics and develop several approximation algorithms. Finally, we conduct trace-driven simulations to demonstrate the application of our survivability framework to the robust design of a real-world bus communication network

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Full text link
    In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other author

    Resilience and survivability in MANET: Discipline, issue and challenge

    Get PDF
    The wireless technology has become essential part in modern life, and thus the consequences of network disruption is becoming severe.It is widely known that wireless network is not sufficiently resilience, survive and dependable and significant research and development is necessary to improve the situation. This paper provide a survey of vast disciplines in MANET, a resilience strategy is also presented on how to defend, detect and countermeasures malicious node. Current issues and challenges to achieve resilience and survivability is also presented for future direction
    • …
    corecore