scispace - formally typeset
Search or ask a question

Showing papers on "Optimized Link State Routing Protocol published in 2003"


01 Jul 2003
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

11,490 citations


01 Oct 2003
TL;DR: The Optimized Link State Routing protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN and provides optimal routes (in terms of number of hops).
Abstract: This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN. The key concept used in the protocol is that of multipoint relays (MPRs). MPRs are selected nodes which forward broadcast messages during the flooding process. This technique substantially reduces the message overhead as compared to a classical flooding mechanism, where every node retransmits each message when it receives the first copy of the message. In OLSR, link state information is generated only by nodes elected as MPRs. Thus, a second optimization is achieved by minimizing the number of control messages flooded in the network. As a third optimization, an MPR node may chose to report only links between itself and its MPR selectors. Hence, as contrary to the classic link state algorithm, partial link state information is distributed in the network. This information is then used for route calculation. OLSR provides optimal routes (in terms of number of hops). The protocol is particularly suitable for large and dense networks as the technique of MPRs works well in this context.

5,442 citations


Journal ArticleDOI
11 May 2003
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Abstract: We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.

2,946 citations


Journal ArticleDOI
TL;DR: This work is proposing APS – a localized, distributed, hop by hop positioning algorithm, that works as an extension of both distance vector routing and GPS positioning in order to provide approximate position for all nodes in a network where only a limited fraction of nodes have self positioning capability.
Abstract: Many ad hoc network protocols and applications assume the knowledge of geographic location of nodes. The absolute position of each networked node is an assumed fact by most sensor networks which can then present the sensed information on a geographical map. Finding position without the aid of GPS in each node of an ad hoc network is important in cases where GPS is either not accessible, or not practical to use due to power, form factor or line of sight conditions. Position would also enable routing in sufficiently isotropic large networks, without the use of large routing tables. We are proposing APS --- a localized, distributed, hop by hop positioning algorithm, that works as an extension of both distance vector routing and GPS positioning in order to provide approximate position for all nodes in a network where only a limited fraction of nodes have self positioning capability.

1,700 citations


Proceedings ArticleDOI
09 Jul 2003
TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Abstract: As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

1,667 citations


Journal ArticleDOI
01 Jul 2003
TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Abstract: Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANETs characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future. � 2003 Elsevier B.V. All rights reserved.

1,430 citations


Proceedings ArticleDOI
09 Jul 2003
TL;DR: In this paper, a simple, cheat-proof, credit-based system for stimulating cooperation among selfish nodes in mobile ad hoc networks is proposed, which does not require any tamper-proof hardware at any node.
Abstract: Mobile ad hoc networking has been an active research area for several years. How to stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In this paper, we propose Sprite, a simple, cheat-proof, credit-based system for stimulating cooperation among selfish nodes in mobile ad hoc networks. Our system provides incentive for mobile nodes to cooperate and report actions honestly. Compared with previous approaches, our system does not require any tamper-proof hardware at any node. Furthermore, we present a formal model of our system and prove its properties. Evaluations of a prototype implementation show that the overhead of our system is small. Simulations and analysis show that mobile nodes can cooperate and forward each other's messages, unless the resource of each node is extremely low.

1,330 citations


Proceedings ArticleDOI
09 Jul 2003
TL;DR: This study examines the random waypoint model widely used in the simulation studies of mobile ad hoc networks and shows that this model fails to provide a steady state in that the average nodal speed consistently decreases over time, and should not be directly used for simulation.
Abstract: This study examines the random waypoint model widely used in the simulation studies of mobile ad hoc networks. Our findings show that this model fails to provide a steady state in that the average nodal speed consistently decreases over time, and therefore should not be directly used for simulation. We show how unreliable results can be obtained by using this model. In particular, certain ad hoc routing metrics can drop by as much as 40% over the course of a 900-second simulation using the random waypoint model. We give both an intuitive and a formal explanation for this phenomenon. We also propose a simple fix of the problem and discuss a few alternatives. Our modified random waypoint model is able to reach a steady state and simulation results are presented.

1,268 citations


Journal ArticleDOI
TL;DR: This paper proposes a simple mechanism based on a counter in each node to stimulate the nodes for packet forwarding and studies the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.
Abstract: In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes This problem may arise in civilian applications of mobile ad hoc networks In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse

1,188 citations


01 Jan 2003
TL;DR: This article considers a generalization of the random waypoint model in which the pause time of the mobile nodes is chosen arbitrarily in each waypoint and a fraction of nodes may remain static for the entire simulation time and derives an exact equation of the asymptotically stationary distribution for movement on a line segment and an accurate approximation for a square area.

1,104 citations


Proceedings ArticleDOI
09 Jul 2003
TL;DR: This framework aims to evaluate the impact of different mobility models on the performance of MANET routing protocols, and attempts to decompose the routing protocols into mechanistic "building blocks" to gain a deeper insight into the performance variations across protocols in the face of mobility.
Abstract: A mobile ad hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Since not many MANETs are currently deployed, research in this area is mostly simulation based. Random waypoint is the commonly used mobility model in these simulations. Random waypoint is a simple model that may be applicable to some scenarios. However, we believe that it is not sufficient to capture some important mobility characteristics of scenarios in which MANETs may be deployed. Our framework aims to evaluate the impact of different mobility models on the performance of MANET routing protocols. We propose various protocol independent metrics to capture interesting mobility characteristics, including spatial and temporal dependence and geographic restrictions. In addition, a rich set of parameterized mobility models is introduced including random waypoint, group mobility, freeway and Manhattan models. Based on these models several 'test-suite' scenarios are chosen carefully to span the metric space. We demonstrate the utility of our test-suite by evaluating various MANET routing protocols, including DSR, AODV and DSDV. Our results show that the protocol performance may vary drastically across mobility models and performance rankings of protocols may vary with the mobility models used. This effect can be explained by the interaction of the mobility characteristics with the connectivity graph properties. Finally, we attempt to decompose the routing protocols into mechanistic "building blocks" to gain a deeper insight into the performance variations across protocols in the face of mobility.

Proceedings ArticleDOI
09 Jun 2003
TL;DR: This paper analyzes a position-based routing approach that makes use of the navigational systems of vehicles and compares this approach with non-position-based ad hoc routing strategies (dynamic source routing and ad-hoc on-demand distance vector routing).
Abstract: Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. Recently, it was shown for the case of highway traffic that position-based routing approaches can very well deal with the high mobility of network nodes. However, baseline position-based routing has difficulties to handle two-dimensional scenarios with obstacles (buildings) and voids as it is the case for city scenarios. In this paper we analyze a position-based routing approach that makes use of the navigational systems of vehicles. By means of simulation we compare this approach with non-position-based ad hoc routing strategies (dynamic source routing and ad-hoc on-demand distance vector routing). The simulation makes use of highly realistic vehicle movement patterns derived from Daimler-Chrysler's Videlio traffic simulator. While DSR's performance is limited due to problems with scalability and handling mobility, both AODV and the position-based approach show good performances with the position-based approach outperforming AODV.

Journal ArticleDOI
TL;DR: This work proposes a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services.
Abstract: In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.

Journal ArticleDOI
01 Jul 2003
TL;DR: The Secure Efficient Ad hoc Distance vector routing protocol (SEAD) is designed and evaluated, a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol that performs well over the range of scenarios and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node.
Abstract: An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vector approaches, they have generally assumed a trusted environment. In this paper, we design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol (SEAD), a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol. In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and do not use asymmetric cryptographic operations in the protocol. SEAD performs well over the range of scenarios we tested, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node, even in spite of any active attackers or compromised nodes in the network.


Proceedings ArticleDOI
19 Sep 2003
TL;DR: The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols.
Abstract: In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many of the proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad~hoc networks, including a number of secure on-demand routing protocols, that defend against a variety of possible attacks on network routing. In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, ARAN, and SAODV, are unable to discover routes longer than two hops when subject to this attack. This attack is also particularly damaging because it can be performed by a relatively weak attacker. We analyze why previous protocols fail under this attack. We then develop Rushing Attack Prevention (RAP), a generic defense against the rushing attack for on-demand protocols. RAP incurs no cost unless the underlying protocol fails to find a working route, and it provides provable security properties even against the strongest rushing attackers.

Proceedings ArticleDOI
14 Sep 2003
TL;DR: Simulation results show that the use of obstacles and pathways has a significant impact on the performance of ad hoc network protocols.
Abstract: One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number of significant benefits, including repeatable scenarios, isolation of parameters, and exploration of a variety of metrics. The topology and movement of the nodes in the simulation are key factors in the performance of the network protocol under study. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. Because the mobility of the nodes directly impacts the performance of the protocols, simulation results obtained with unrealistic movement models may not correctly reflect the true performance of the protocols. The majority of existing mobility models for ad hoc networks do not provide realistic movement scenarios; they are limited to random walk models without any obstacles. In this paper, we propose to create more realistic movement models through the incorporation of obstacles. These obstacles are utilized to both restrict node movement as well as wireless transmissions. In addition to the inclusion of obstacles, we construct movement paths using the Voronoi diagram of obstacle vertices. Nodes can then be randomly distributed across the paths, and can use shortest path route computations to destinations at randomly chosen obstacles. Simulation results show that the use of obstacles and pathways has a significant impact on the performance of ad hoc network protocols.

Journal ArticleDOI
TL;DR: Numerical results indicate thatMultihop routing, the ability for concurrent transmissions, and SIC significantly increase the capacity of ad hoc and multihop cellular networks and energy-constraint networks.
Abstract: We define and study capacity regions for wireless ad hoc networks with an arbitrary number of nodes and topology. These regions describe the set of achievable rate combinations between all source-destination pairs in the network under various transmission strategies, such as variable-rate transmission, single-hop or multihop routing, power control, and successive interference cancellation (SIC). Multihop cellular networks and networks with energy constraints are studied as special cases. With slight modifications, the developed formulation can handle node mobility and time-varying flat-fading channels. Numerical results indicate that multihop routing, the ability for concurrent transmissions, and SIC significantly increase the capacity of ad hoc and multihop cellular networks. On the other hand, gains from power control are significant only when variable-rate transmission is not used. Also, time-varying flat-fading and node mobility actually improve the capacity. Finally, multihop routing greatly improves the performance of energy-constraint networks.

Proceedings ArticleDOI
09 Jul 2003
TL;DR: This work considers two different routing strategies and study the scaling behavior of the throughput capacity of a hybrid network, finding that if m grows asymptotically slower than √n, the benefit of adding base stations on capacity is insignificant, however, ifm grows faster than ∞, the throughputcapacity increases linearly with the number of base stations, providing an effective improvement over a pure ad hoc network.
Abstract: This paper involves the study of the throughput capacity of hybrid wireless networks. A hybrid network is formed by placing a sparse network of base stations in an ad hoc network. These base stations are assumed to be connected by a high-bandwidth wired network and act as relays for wireless nodes. They are not data sources nor data receivers. Hybrid networks present a tradeoff between traditional cellular networks and pure ad hoc networks in that data may be forwarded in a multihop fashion or through the infrastructure. It has been shown that the capacity of a random ad hoc network does not scale well with the number of nodes in the system. In this work, we consider two different routing strategies and study the scaling behavior of the throughput capacity of a hybrid network. Analytical expressions of the throughput capacity are obtained. For a hybrid network of n nodes and m base stations, the results show that if m grows asymptotically slower than √n, the benefit of adding base stations on capacity is insignificant. However, if m grows faster than √n, the throughput capacity increases linearly with the number of base stations, providing an effective improvement over a pure ad hoc network. Therefore, in order to achieve nonnegligible capacity gain, the investment in the wired infrastructure should be high enough.

Journal ArticleDOI
01 Feb 2003
TL;DR: This work introduces a resource reservation-based routing and signaling algorithm, Ad hoc Qos on-demand routing (AQOR), that provides end-to-end quality of service (QoS) support in mobile ad hoc networks (MANETs).
Abstract: We introduce a resource reservation-based routing and signaling algorithm, Ad hoc Qos on-demand routing (AQOR), that provides end-to-end quality of service (QoS) support, in terms of bandwidth and end-to-end delay, in mobile ad hoc networks (MANETs). The increasing use of MANETs for transferring multimedia applications such as voice, video and data, leads to the need to provide QoS support. To perform accurate admission control and resource reservation in AQOR, we have developed detailed computations that allow us to estimate the available bandwidth and end-to-end delay in unsynchronized wireless environment. AQOR also includes efficient mechanisms for QoS maintenance, including temporary reservation and destination-initiated recovery processes. The performance of AQOR is studied in detail by simulation using OPNET Modeler. The results validate that AQOR provides QoS support in ad hoc wireless networks with high reliability and low overhead.

Proceedings ArticleDOI
09 Jul 2003
TL;DR: A modified version of the popular AODV protocol that allows us to discover multiple node-disjoint paths from a source to a destination and shows that the probability of establishing a reliable path between a random source and destination pair increases considerably even with a low percentage of reliable nodes.
Abstract: Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. We first propose a modified version of the popular AODV protocol that allows us to discover multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network for efficient operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases considerably even with a low percentage of reliable nodes when we control their positions and trajectories in accordance with our algorithm.

Journal ArticleDOI
01 Nov 2003
TL;DR: This framework aims to evaluate the impact of different mobility models on the performance of MANET routing protocols, and attempts to decompose the reactive routing protocols into mechanistic ‘‘building blocks’’ to gain a deeper insight into the performance variations across protocols in the face of mobility.
Abstract: A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Since not many MANETs are currently deployed, research in this area is mostly simulation based. Random Waypoint is the commonly used mobility model in these simulations. Random Waypoint is a simple model that may be applicable to some scenarios. However, we believe that it is not sufficient to capture some important mobility characteristics of scenarios in which MANETs may be deployed. Our framework aims to evaluate the impact of different mobility models on the performance of MANET routing protocols. We propose various protocol independent metrics to capture interesting mobility characteristics, including spatial and temporal dependence and geographic restrictions. In addition, a rich set of parameterized mobility models is introduced including Random Waypoint, Group Mobility, Freeway and Manhattan models. Based on these models several test-suite scenarios are chosen carefully to span the metric space. We demonstrate the utility of our test-suite by evaluating various MANET routing protocols, including DSR, AODV and DSDV. Our results show that the protocol performance may vary drastically across mobility models and performance rankings of protocols may vary with the mobility models used. This effect can be explained by the interaction of the mobility characteristics with the connectivity graph properties. Finally, we attempt to decompose the reactive routing protocols into mechanistic ‘‘building blocks’’ to gain a deeper insight into the performance variations across protocols in the face of mobility. � 2003 Elsevier B.V. All rights reserved.

Proceedings ArticleDOI
31 Oct 2003
TL;DR: This paper investigates how to improve the anomaly detection approach to provide more details on attack types and sources and addresses the run-time resource constraint problem using a cluster-based detection scheme where periodically a node is elected as the ID agent for a cluster.
Abstract: Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. Building on our prior work on anomaly detection, we investigate how to improve the anomaly detection approach to provide more details on attack types and sources. For several well-known attacks, we can apply a simple rule to identify the attack type when an anomaly is reported. In some cases, these rules can also help identify the attackers. We address the run-time resource constraint problem using a cluster-based detection scheme where periodically a node is elected as the ID agent for a cluster. Compared with the scheme where each node is its own ID agent, this scheme is much more efficient while maintaining the same level of effectiveness. We have conducted extensive experiments using the ns-2 and MobiEmu environments to validate our research.

Proceedings ArticleDOI
01 Jun 2003
TL;DR: This work derives an analytical formula for the distribution of end-to-end delays and calculates the storage requirements of the Shared Wireless Infostation Model (SWIM), a networking model that allows additional improvement in the capacity-delay tradeoff through a moderate increase in thestorage requirements.
Abstract: In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizing the delay or maximizing the capacity. However, in between these extremes, there are schemes that allow instantiations of various degrees of this tradeoff. Infostations, which offer geographically intermittent coverage at high speeds, are one such an example. Indeed, through the use of the Infostation networking paradigm, the capacity of a mobile network can be increased at the expense of delay. We propose to further extend the Infostation concept by integrating it with the ad hoc networking technology. We refer to this networking model as the Shared Wireless Infostation Model (SWIM). SWIM allows additional improvement in the capacity-delay tradeoff through a moderate increase in the storage requirements. To demonstrate how SWIM can be applied to solve a practical problem, we use the example of a biological information acquisition system - radio-tagged whales - as nodes in an ad hoc network. We derive an analytical formula for the distribution of end-to-end delays and calculate the storage requirements. We further extend SWIM by allowing multi-tiered operation; which in our biological information acquisition system could be realized through seabirds acting as mobile data collection nodes.

Proceedings ArticleDOI
14 Sep 2003
TL;DR: Ad hoc-VCG is proposed, a reactive routing protocol that achieves the design objectives of truthfulness and cost-efficiency and guarantees that routing is done along the most cost-efficient path by paying to the intermediate nodes a premium over their actual costs for forwarding data packets.
Abstract: We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this setting, we propose Ad hoc-VCG, a reactive routing protocol that achieves the design objectives of truthfulness (i.e., it is in the agents' best interest to reveal their true costs for forwarding data) and cost-efficiency (i.e., it guarantees that routing is done along the most cost-efficient path) in a game-theoretic sense by paying to the intermediate nodes a premium over their actual costs for forwarding data packets. We show that the total overpayment (i.e., the sum of all premiums paid) is relatively small by giving a theoretical upper bound and by providing experimental evidence. Our routing protocol implements a variation of the well-known mechanism by Vickrey, Clarke, and Groves in a mobile network setting. Finally, we analyze a very natural routing protocol that is an adaptation of the Packet Purse Model [8] with auctions in our setting and show that, unfortunately, it does not achieve cost-efficiency or truthfulness.

Proceedings ArticleDOI
01 Jun 2003
TL;DR: This work considers arbitrary networks and random networks where nodes are assumed to be static and hybrid beamform patterns that are a mix of omnidirectional/directional and a better model of real directional antennas.
Abstract: The capacity of ad hoc wireless networks is constrained by the interference between concurrent transmissions from neighboring nodes. Gupta and Kumar have shown that the capacity of an ad hoc network does not scale well with the increasing number of nodes in the system when using omnidirectional antennas [6]. We investigate the capacity of ad hoc wireless networks using directional antennas. In this work, we consider arbitrary networks and random networks where nodes are assumed to be static.In arbitrary networks, due to the reduction of the interference area, the capacity gain is proven to be √2π/α when using directional transmission and omni reception. Because of the reduced probability of two neighbors pointing to each other, the capacity gain is √2π/β when omni transmission and directional reception are used. Although these two expressions look similar, the proof technique is different. By taking advantage of the above two approaches, the capacity gain is 2π/√αβ when both transmission and reception are directional.For random networks, interfering neighbors are reduced due to the decrease of interference area when directional antennas are used for transmission and/or reception. The throughput improvement factor is 2π/α, 2π/β and 4π2/αβ for directional transmission/omni reception, omni transmission/direc-tional reception, and directional transmission/directional reception, respectively.We have also analyzed hybrid beamform patterns that are a mix of omnidirectional/directional and a better model of real directional antennas.

Book ChapterDOI
12 Oct 2003
TL;DR: The issues of multipath routing in MANETs are examined to support application constraints such as reliability, load-balancing, energy-conservation, and Quality-of-Service (QoS).
Abstract: Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network MANET nodes are typically distinguished by their limited power, processing, and memory resources as well as high degree of mobility In such networks, the wireless mobile nodes may dynamically enter the network as well as leave the network Due to the limited transmission range of wireless network nodes, multiple hops are usually needed for a node to exchange information with any other node in the network Thus routing is a crucial issue to the design of a MANET In this paper, we specifically examine the issues of multipath routing in MANETs Multipath routing allows the establishment of multiple paths between a single source and single destination node It is typically proposed in order to increase the reliability of data transmission (ie, fault tolerance) or to provide load balancing Load balancing is of especial importance in MANETs because of the limited bandwidth between the nodes We also discuss the application of multipath routing to support application constraints such as reliability, load-balancing, energy-conservation, and Quality-of-Service (QoS)

Proceedings ArticleDOI
01 Jun 2003
TL;DR: ANODR, an anonymous on-demand routing protocol for mobile ad hoc networks deployed in hostile environments, addresses two closely related problems: for route anonymity, ANODR prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, AN ODR ensures that adversaries cannot discover the real identities of local transmitters.
Abstract: In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to trace network routes and infer the motion pattern of nodes at the end of those routes may pose a serious threat to covert operations. We propose ANODR, an anonymous on-demand routing protocol for mobile ad hoc networks deployed in hostile environments. We address two closely related problems: For route anonymity, ANODR prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, ANODR ensures that adversaries cannot discover the real identities of local transmitters. The design of ANODR is based on "broadcast with trapdoor information", a novel network security concept which includes features of two existing network and security mechanisms, namely "broadcast" and "trapdoor information". We use simulations and implementation to validate the effectiveness of our design.

Proceedings ArticleDOI
27 Jan 2003
TL;DR: The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways.
Abstract: Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.

Journal ArticleDOI
TL;DR: Simulation results show that several adaptive schemes, which can dynamically adjust thresholds based on local connectivity information can offer better reachability as well as efficiency as compared to the previous results.
Abstract: In a multihop mobile ad hoc network, broadcasting is an elementary operation to support many applications. Previously, it is shown that naively broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which we refer to as the broadcast storm problem. Several threshold-based schemes are shown to perform better than flooding in that work. However, how to choose thresholds also poses a dilemma between reachability and efficiency under different host densities. In this paper, we propose several adaptive schemes, which can dynamically adjust thresholds based on local connectivity information. Simulation results show that these adaptive schemes can offer better reachability as well as efficiency as compared to the previous results.