7 research outputs found

    Umpiring security Models for MANETS

    Get PDF
    In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing the packets through unintended routes and so on. The work presented in this thesis attempts to improve the performance of wireless mobile ad hoc networks by protecting the network layer. Five studies are presented.Resumen de tesis doctoral presentada por el autor.Facultad de Informátic

    Temporary Redundant Transmission Mechanism for SCTP Multihomed Hosts

    Get PDF
    In SCTP’s Concurrent Multipath Transfer, if data is sent to the destined IP(s) without knowledge of the paths condition, packets may be lost or delayed. This is because of the bursty nature of IP traffic and physical damage to the network. To offset these problems, network path status is examined using our new mechanism Multipath State Aware Concurrent Multipath Transfer using redundant transmission (MSACMT-RTv2). Here the status of multiple paths is analyzed, initially and periodically thereafter transmitted. After examination, paths priority is assigned before transmission. One path is temporarily employed as redundant path for the failure-expected path (FEP); this redundant path is used for transmitting redundant data. At the end of predefined period, reliability of the FEP is confirmed. If FEP is ensured to be reliable, temporary path is transformed into normal CMT path. MSACMT-RTv2 algorithm is simulated using the Delaware University ns-2 SCTP/CMT module (ns-2; V2.29). We present and discuss MSACMT-RTv2 performance in asymmetric path delay and with finite receiver buffer (rbuf) size. We extended our experiment to test robustness of this algorithm and inferred exhaustive result. It is inferred that our algorithm outperforms better in terms of increasing the throughput and reducing the latency than existing system

    Self Umpiring System for Security in Wireless Mobile Ad Hoc Network

    No full text
    corecore