scispace - formally typeset
Search or ask a question

Showing papers on "Optimized Link State Routing Protocol published in 2006"


Journal ArticleDOI
TL;DR: This article captures the state of the art in routing protocols in DTNs with three main approaches: the tree approach, the space and time approach, and the modified shortest shortest path approach.
Abstract: n the last few years, there has been much research activity in mobile, wireless, ad hoc networks (MANET). MANETs are infrastructure-less, and nodes in the networks are constantly moving. In MANETs, nodes can directly communicate with each other if they enter each others' communication range. A node can terminate packets or forward packets (serve as a relay). Thus, a packet traverses an ad hoc network by being relayed from one node to another, until it reaches its destination. As nodes are moving, this becomes a challenging task, since the topology of the network is in constant change. How to find a destination, how to route to that destination, and how to insure robust communication in the face of constant topology change are major challenges in mobile ad hoc networks. Routing in mobile ad hoc networks is a well-studied topic. To accommodate the dynamic topology of mobile ad hoc networks, an abundance of routing protocols have recent-For all these routing protocols, it is implicitly assumed that the network is connected and there is a contemporaneous end-to-end path between any source and destination pair. However, in a physical ad hoc network, the assumption that there is a contemporaneous end-to-end path between any source and destination pair may not be true, as illustrated below. In MANETs, when nodes are in motion, links can be obstructed by intervening objects. When nodes must conserve power, links are shut down periodically. These events result in intermittent connectivity. At any given time, when no path exists between source and destination, network partition is said to occur. Thus, it is perfectly possible that two nodes may never be part of the same connected portion of the network. Figure 1 illustrates the time evolving behavior in intermittent-ABSTRACT Recently there has been much research activity in the emerging area of intermittently connected ad hoc networks and delay/disruption tolerant networks (DTN). There are different types of DTNs, depending on the nature of the network environment. Routing in DTNs is one of the key components in the DTN architecture. Therefore, in the last few years researchers have proposed different routing protocols for different types of DTNs. In this article we capture the state of the art in routing protocols in DTNs. We categorize these routing protocols based on information used. For deter-ministic time evolving networks, three main approaches are discussed: the tree approach, the space and time approach, and the modified shortest …

861 citations


Journal ArticleDOI
TL;DR: Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.
Abstract: The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this paper, we present an information theoretic framework to quantitatively measure trust and model trust propagation in ad hoc networks. In the proposed framework, trust is a measure of uncertainty with its value represented by entropy. We develop four Axioms that address the basic understanding of trust and the rules for trust propagation. Based on these axioms, we present two trust models: entropy-based model and probability-based model, which satisfy all the axioms. Techniques of trust establishment and trust update are presented to obtain trust values from observation. The proposed trust evaluation method and trust models are employed in ad hoc networks for secure ad hoc routing and malicious node detection. A distributed scheme is designed to acquire, maintain, and update trust records associated with the behaviors of nodes' forwarding packets and the behaviors of making recommendations about other nodes. Simulations show that the proposed trust evaluation system can significantly improve the network throughput as well as effectively detect malicious behaviors in ad hoc networks.

649 citations


Journal ArticleDOI
TL;DR: AOMDV as discussed by the authors is an on-demand, multipath distance vector routing protocol for mobile ad hoc networks, which guarantees loop freedom and disjointness of alternate paths.
Abstract: We develop an on-demand, multipath distance vector routing protocol for mobile ad hoc networks. Specifically, we propose multipath extensions to a well-studied single path routing protocol known as ad hoc on-demand distance vector (AODV). The resulting protocol is referred to as ad hoc on-demand multipath distance vector (AOMDV). The protocol guarantees loop freedom and disjointness of alternate paths. Performance comparison of AOMDV with AODV using ns-2 simulations shows that AOMDV is able to effectively cope with mobility-induced route failures. In particular, it reduces the packet loss by up to 40% and achieves a remarkable improvement in the end-to-end delay (often more than a factor of two). AOMDV also reduces routing overhead by about 30% by reducing the frequency of route discovery operations. Copyright © 2006 John Wiley & Sons, Ltd.

625 citations


Journal ArticleDOI
TL;DR: A hybrid approach (HybridCache) is proposed, which can further improve the performance by taking advantage of CacheData and CachePath while avoiding their weaknesses, and can significantly reduce the query delay and message complexity when compared to other caching schemes.
Abstract: Most researches in ad hoc networks focus on routing and not much work has been done on data access. A common technique used to improve the performance of data access is caching. Cooperative caching, which allows the sharing and coordination of cached data among multiple nodes, can further explore the potential of the caching techniques. Due to mobility and resource constraints of ad hoc networks, cooperative caching techniques designed for wired networks may not be applicable to ad hoc networks. In this paper, we design and evaluate cooperative caching techniques to efficiently support data access in ad hoc networks. We first propose two schemes: CacheData, which caches the data, and CachePath, which caches the data path. After analyzing the performance of those two schemes, we propose a hybrid approach (HybridCache), which can further improve the performance by taking advantage of CacheData and CachePath while avoiding their weaknesses. Cache replacement policies are also studied to further improve the performance. Simulation results show that the proposed schemes can significantly reduce the query delay and message complexity when compared to other caching schemes.

573 citations


Proceedings ArticleDOI
21 Jun 2006
TL;DR: A comprehensive study of challenges in vehicle ad hoc networking and the research trends in this area is provided.
Abstract: Vehicular Ad hoc Network (VANET), a subclass of mobile Ad Hoc networks (MANETs), is a promising approach for future intelligent transportation system (ITS). These networks have no fixed infrastructure and instead rely on the vehicles themselves to provide network functionality. However, due to mobility constraints, driver behavior, and high mobility, VANETs exhibit characteristics that are dramatically different from many generic MANETs. This article provides a comprehensive study of challenges in these networks, which we concentrate on the problems and proposed solutions. Then we outline current state of the research and future perspectives. With this article, readers can have a more thorough understanding of vehicle ad hoc networking and the research trends in this area.

561 citations


Proceedings ArticleDOI
22 May 2006
TL;DR: This study studies the behavior of routing protocols in VANETs by using mobility information obtained from a microscopic vehicular traffic simulator that is based on the on the real road maps of Switzerland, and investigates two improvements that increase the packet delivery ratio and reduce the delay until the first packet arrives.
Abstract: Vehicular ad hoc networks (VANETs) using WLAN tech-nology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since management and operation of a large number of real vehicular nodes is expensive. We study the behavior of routing protocols in VANETs by using mobility information obtained from a microscopic vehicular traffic simulator that is based on the on the real road maps of Switzerland. The performance of AODV and GPSR is significantly in uenced by the choice of mobility model, and we observe a significantly reduced packet delivery ratio when employing the realistic traffic simulator to control mobility of nodes. To address the performance limitations of communication pro-tocols in VANETs, we investigate two improvements that increase the packet delivery ratio and reduce the delay until the first packet arrives. The traces used in this study are available for public download.

549 citations


Journal ArticleDOI
TL;DR: A link layer protocol to manage multiple channels is proposed, and it can be implemented over existing IEEE 802.11 hardware and a new routing metric for multi-channel multi-interface networks is incorporated into an on-demand routing protocol that operates over the link layer Protocol.
Abstract: Wireless technologies, such as IEEE 802.11a, that are used in ad hoc networks provide for multiple non-overlapping channels. Most ad hoc network protocols that are currently available are designed to use a single channel. However, the available network capacity can be increased by using multiple channels. This paper presents new protocols specifically designed to exploit multiple channels. Our protocols simplify the use of multiple channels by using multiple interfaces, although the number of interfaces per host is typically smaller than the number of channels. We propose a link layer protocol to manage multiple channels, and it can be implemented over existing IEEE 802.11 hardware. We also propose a new routing metric for multi-channel multi-interface networks, and the metric is incorporated into an on-demand routing protocol that operates over the link layer protocol. Simulation results demonstrate the effectiveness of the proposed approach in significantly increasing network capacity, by utilizing all the available channels, even when the number of interfaces per host is smaller than the number of channels.

512 citations


Journal ArticleDOI
01 May 2006
TL;DR: This work presents a classification of MAC protocols and their brief description, based on their operating principles and underlying features, and presents a brief summary of key ideas and a general direction for future work.
Abstract: Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work.

458 citations



06 Sep 2006
TL;DR: The Secure Ad hoc On-Demand Distance Vector is an extension of the AODV routing protocol that can be used to protect the route discovery mechanism providing security features like integrity and authentication.
Abstract: The Secure Ad hoc On-Demand Distance Vector (SAODV) is an extension of the AODV routing protocol that can be used to protect the route discovery mechanism providing security features like integrity and authentication.

394 citations


Journal ArticleDOI
TL;DR: The goals of this article are to survey basic cooperative communications and outline two potential architectures for cooperative MANETs, which provide modified wireless link abstractions and suggest tradeoffs in complexity at the physical and higher layers.
Abstract: he motivation of this article is to clarify and help resolve the gap between the link abstraction used in traditional wireless networking and its much broader definition used in the context of cooperative communications, which has received significant interest as an untapped means for improving performance of relay transmission systems operating over the ever-challenging wireless medium. The common theme of most research in this area is to optimize physical layer performance measures without considering in much detail how cooperation interacts with higher layers and improves network performance measures. Because these issues are important for enabling cooperative communications to practice in real-world networks, especially for the increasingly important class of mobile ad hoc networks (MANETs), the goals of this article are to survey basic cooperative communications and outline two potential architectures for cooperative MANETs. The first architecture relies on an existing clustered infrastructure: cooperative relays are centrally controlled by cluster heads. In another architecture without explicit clustering, cooperative links are formed by request of a source node in an ad hoc, decentralized fashion. In either case, cooperative communication considerably improves the network connectivity. Although far from a complete study, these architectures provide modified wireless link abstractions and suggest tradeoffs in complexity at the physical and higher layers. Many opportunities and challenges remain, including distributed synchronization, coding, and signal processing among multiple radios; modeling of new link abstractions at higher layers; and multiaccess and routing protocols for networks of cooperative links.

Proceedings ArticleDOI
22 May 2006
TL;DR: This paper derives accurate closed form expressions for the expected encounter time between different nodes, under ommonly used mobility models, and demonstrates that derivative results oncerning the delay of various routing schemes are very accurate, under all the mobility models examined.
Abstract: Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established.Mobility was considered a necessary evil that invalidates paths and needs to be overcome in an intelligent way to allow for seamless ommunication between nodes.However, it has recently been recognized that mobility an be turned into a useful ally, by making nodes carry data around the network instead of transmitting them. This model of routing departs from the traditional paradigm and requires new theoretical tools to model its performance. A mobility-assisted protocol forwards data only when appropriate relays encounter each other, and thus the time between such encounters, called hitting or meeting time, is of high importance.In this paper, we derive accurate closed form expressions for the expected encounter time between different nodes, under ommonly used mobility models. We also propose a mobility model that can successfully capture some important real-world mobility haracteristics, often ignored in popular mobility models, and alculate hitting times for this model as well. Finally, we integrate this results with a general theoretical framework that can be used to analyze the performance of mobility-assisted routing schemes. We demonstrate that derivative results oncerning the delay of various routing s hemes are very accurate, under all the mobility models examined. Hence, this work helps in better under-standing the performance of various approaches in different settings, and an facilitate the design of new, improved protocols.

Proceedings ArticleDOI
29 Sep 2006
TL;DR: The results show that a decentralized parking place information system works efficiently even with 5% of vehicles equipped with Wireless-LAN and without the help of any message relaying infrastructure, which makes such a non-safety driver assistance application very interesting, especially in the rollout phase of vehicular ad hoc networks.
Abstract: This paper proposes a topology independent, scalable information dissemination algorithm for spatio-temporal traffic information such as parking place availability using vehicular ad hoc networks (VANET) based on Wireless-LAN IEEE 802.11.The algorithm uses periodic broadcasts for information dissemination. Broadcast redundancy is minimized by evaluation of application layer information and aggregation. Due to the spatio-temporal characteristics of parking place information, the spatial distribution of information is limited by utilizing techniques, which take the local relevance and age of information into account.Based on a realistic model of a german city with up to 10000 vehicles, our results show that a decentralized parking place information system works efficiently even with 5% of vehicles equipped with Wireless-LAN and without the help of any message relaying infrastructure. This fact makes such a non-safety driver assistance application very interesting, especially in the rollout phase of vehicular ad hoc networks.

Proceedings ArticleDOI
25 Sep 2006
TL;DR: It is argued that file swarming protocols in VANET should deal with typical mobile network issues such as dynamic topology and intermittent connectivity as well as various other issues that have been disregarded in previous mobile peer-to-peer researches such as addressing, node/user density, non-cooperativeness, and unreliable channel.
Abstract: Mobile peer-to-peer systems have recently got in the lime-light of the research community that is striving to build efficient and effective mobile content addressable networks. Along this line of research, we propose a network coding based file swarming protocol targeting vehicular ad hoc net-works (VANET). We argue that file swarming protocols in VANET should deal with typical mobile network issues such as dynamic topology and intermittent connectivity as well as various other issues that have been disregarded in previous mobile peer-to-peer researches such as addressing, node/user density, non-cooperativeness, and unreliable channel. Through simulation, we show that the efficiency and effectiveness of our protocol allows shorter file downloading time compared to an existing VANET file swarming protocol.

Journal ArticleDOI
01 Jan 2006
TL;DR: The issues and challenges in providing QoS for AWNs are described, a layer-wise classification of the existing QoS solutions are provided, and some of the proposed solutions are reviewed.
Abstract: An ad hoc wireless network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. Characteristics of AWNs such as lack of central coordination, mobility of hosts, dynamically varying network topology, and limited availability of resources make QoS provisioning very challenging in such networks. In this paper, we describe the issues and challenges in providing QoS for AWNs and review some of the QoS solutions proposed. We first provide a layer-wise classification of the existing QoS solutions, and then discuss each of these solutions.

Proceedings ArticleDOI
23 Apr 2006
TL;DR: This paper investigates the impacts of variable transmission ranges and receiver sensitivities for different channel rates and the impact of multihop forwarding as well as several other important factors, such as SINR, node topology, hidden/exposed terminal problems and bidirectional handshakes, on determining the optimum carrier sensing range to maximize the throughput.
Abstract: Physical carrier sensing is an effective mechanism of medium access control (MAC) protocols to reduce collisions in wireless networks, and the size of the carrier sensing range has a great impact on the system performance. Previous studies have shown that the MAC layer overhead plays an important role in determining the optimal carrier sensing range. However, variable transmission ranges and receiver sensitivities for different channel rates and the impact of multihop forwarding have been ignored. In this paper, we investigate the impacts of these factors as well as several other important factors, such as SINR (signal to interference plus noise ratio), node topology, hidden/exposed terminal problems and bidirectional handshakes, on determining the optimum carrier sensing range to maximize the throughput through both analysis and simulations. The results show that if any one of these factors is not addressed properly, the system performance may suffer a significant degradation. Furthermore, considering both multirate capability and carrier sensing ranges, we propose to use bandwidth distance product as a routing metric, which improves end-to-end throughput by up to 27% in the simulated scenario.

Book
09 Jun 2006
TL;DR: This monograph addresses questions of how much information transfer they can support, as well as what the appropriate architectures and protocols are for operating them by presenting various models and results that quantify the information transport capability of wireless networks.
Abstract: In recent years there has been significant and increasing interest in ad hoc wireless networks. The design, analysis and deployment of such wireless networks necessitate a fundamental understanding of how much information transfer they can support, as well as what the appropriate architectures and protocols are for operating them. This monograph addresses these questions by presenting various models and results that quantify the information transport capability of wireless networks, as well as shed light on architecture design from a high level point of view. The models take into consideration important features such as the spatial distribution of nodes, strategies for sharing the wireless medium, the attenuation of signals with distance, and how information is to be transferred, whether it be by encoding, decoding, choice of power level, spatio-temporal scheduling of transmissions, choice of multi-hop routes, or other modalities of cooperation between nodes. An important aspect of the approach is to characterize how the information hauling capacity scales with the number of nodes in the network.

Journal ArticleDOI
TL;DR: A new price-based resource allocation framework in wireless ad hoc networks to achieve optimal resource utilization and fairness among competing end-to-end flows is proposed and a two-tier iterative algorithm is presented.
Abstract: The shared-medium multihop nature of wireless ad hoc networks poses fundamental challenges to the design of effective resource allocation algorithms that are optimal with respect to resource utilization and fair across different network flows. None of the existing resource allocation algorithms in wireless ad hoc networks have realistically considered end-to-end flows spanning multiple hops. Moreover, strategies proposed in wireline networks are not applicable in the context of wireless ad hoc networks, due to their unique characteristics of location-dependent contention. In this paper, we propose a new price-based resource allocation framework in wireless ad hoc networks to achieve optimal resource utilization and fairness among competing end-to-end flows. We build our pricing framework on the notion of maximal cliques in wireless ad hoc networks, as compared to individual links in traditional wide-area wireline networks. Based on such a price-based theoretical framework, we present a two-tier iterative algorithm. Distributed across wireless nodes, the algorithm converges to a global network optimum with respect to resource allocations. We further improve the algorithm toward asynchronous network settings and prove its convergence. Extensive simulations under a variety of network environments have been conducted to validate our theoretical claims.

Proceedings ArticleDOI
01 Oct 2006
TL;DR: This paper explores how serious the broadcast storm problem is in both MANET and VANET by examining how broadcast packets propagate in a 2-dimensional open area and on a straight road or highway scenarios and proposes three novel distributed broadcast suppression techniques; i.e., weighted p-persistence, slotted 1- Persistence, and slotted p- persistence schemes.
Abstract: Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing protocols has to flood the network with a route request (RREQ) message in order to find an optimal route to the destination. Several applications developed for vehicular ad hoc wireless networks (VANET), which is a subset of MANET, rely on broadcast to propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem. In this paper, we explore how serious the broadcast storm problem is in both MANET and VANET by examining how broadcast packets propagate in a 2-dimensional open area and on a straight road or highway scenarios. In addition, we propose three novel distributed broadcast suppression techniques; i.e., weighted p-persistence, slotted 1-persistence, and slotted p- persistence schemes. Our simulation results show that the proposed schemes can achieve up to 90% reduction in packet loss rate while keeping the end-to-end delay at acceptable levels for most VANET applications. They can also be used together with the route discovery process to guide the routing protocols to select routes with fewer hop counts.

01 Jan 2006
TL;DR: AODV and OLSR performance in realistic urban scenarios is evaluated under varying metrics such as node mobility and vehicle density, and with varying traffic rates to provide a qualitative assessment of the applicability of the protocols in different vehicular scenarios.
Abstract: A Vehicular Ad Hoc Network (VANET) is an instance of MANETs that establishes wireless connections between cars. In VANETs, routing protocols and other techniques must be adapted to vehicular-specific capabilities and requirements. As many previous works have shown, routing performance is greatly dependent to the availability and stability of wireless links, which makes it a crucial parameter that should not be neglected in order to obtain accurate performance measurements in VANETs. Although routing protocols have already been analyzed and compared in the past, simulations and comparisons have almost always been done considering random motions. But could we assess that those results hold if performed using realistic urban vehicular motion patterns ? In this paper, we evaluate AODV and OLSR performance in realistic urban scenarios. We study those protocols under varying metrics such as node mobility and vehicle density, and with varying traffic rates. We show that clustering effects created by cars aggregating at intersections have remarkable impacts on evaluation and performance metrics. Our objective is to provide a qualitative assessment of the applicability of the protocols in different vehicular scenarios.

Journal ArticleDOI
TL;DR: In this paper, the authors propose a mathematical framework in which security can be precisely defined and routing protocols for mobile ad hoc networks can be proved to be secure in a rigorous manner.
Abstract: Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary can easily paralyze the operation of the network by attacking the routing protocol. This has been realized by many researchers and several "secure" routing protocols have been proposed for ad hoc networks. However, the security of those protocols has mainly been analyzed by informal means only. In this paper, we argue that flaws in ad hoc routing protocols can be very subtle, and we advocate a more systematic way of analysis. We propose a mathematical framework in which security can be precisely defined and routing protocols for mobile ad hoc networks can be proved to be secure in a rigorous manner. Our framework is tailored for on-demand source routing protocols, but the general principles are applicable to other types of protocols too. Our approach is based on the simulation paradigm, which has already been used extensively for the analysis of key establishment protocols, but, to the best of our knowledge, it has not been applied in the context of ad hoc routing so far. We also propose a new on-demand source routing protocol, called endairA, and we demonstrate the use of our framework by proving that it is secure in our model

Proceedings ArticleDOI
18 Apr 2006
TL;DR: This paper presents a novel anonymous on demand routing scheme for MANETs and identifies a number of problems of previously proposed works and proposes an efficient solution that provides anonymity in a stronger adversary model.
Abstract: Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired networks such as the Internet often cannot be applied to mobile ad hoc networks (MANETs). In this paper we present a novel anonymous on demand routing scheme for MANETs. We identify a number of problems of previously proposed works and propose an efficient solution that provides anonymity in a stronger adversary model.

Journal ArticleDOI
TL;DR: A novel anonymous on-demand routing protocol, termed MASK, which can accomplish both MAC-layer and network-layer communications without disclosing real IDs of the participating nodes under a rather strong adversary model and is resistant to a wide range of attacks.
Abstract: The shared wireless medium of mobile ad hoc networks facilitates passive, adversarial eavesdropping on data communications whereby adversaries can launch various devastating attacks on the target network. To thwart passive eavesdropping and the resulting attacks, we propose a novel anonymous on-demand routing protocol, termed MASK, which can accomplish both MAC-layer and network-layer communications without disclosing real IDs of the participating nodes under a rather strong adversary model. MASK offers the anonymity of senders, receivers, and sender-receiver relationships in addition to node unlocatability and untrackability and end-to-end flow untraceability. It is also resistant to a wide range of attacks. Moreover, MASK preserves the high routing efficiency as compared to previous proposals. Detailed simulation studies have shown that MASK is highly effective and efficient

Proceedings ArticleDOI
11 Jun 2006
TL;DR: A distributed position-based broadcast protocol, named Smart Broadcast (SB), is proposed that aims at i) maximizing the progress of the message along the propagation line, and ii) minimizing the re-broadcast delay.
Abstract: In this paper, we focus on a vehicular ad hoc network (VANET) that makes use of 802.11?like wireless interfaces for Inter Vehicular Communication (IVC). We propose a distributed position?based broadcast protocol, named Smart Broadcast (SB), that aims at i) maximizing the progress of the message along the propagation line, and ii) minimizing the re?broadcast delay. The protocol is analyzed through a mathematical model that permits to determine the optimal parameter setting for a given scenario. Simulations are then used to validate the mathematical model and to compare SB with other broadcast algorithms.

Book
21 Apr 2006
TL;DR: This book presents a new Perspective for the Design of Ad Hoc Wireless Networks: A Physical Layer Perspective from a Communication-Theoretic Framework: Realistic Scenario, which addresses the problem of routing in a multi-hop environment.
Abstract: Preface. List of Acronyms. 1 Related Work and Preliminary Considerations. 1.1 Introduction. 1.2 Related Work. 1.3 A New Perspective for the Design of Ad Hoc Wireless Networks. 1.4 Overview of the Underlying Assumptions in the Following Chapters. 1.5 The Main Philosophy Behind the Book. 2 A Communication-Theoretic Framework for Multi-hop Ad Hoc Wireless Networks: Ideal Scenario. 2.1 Introduction. 2.2 Preliminaries. 2.3 Communication-Theoretic Basics. 2.4 BER Performance Analysis. 2.5 Network Behaviour. 2.6 Concluding Remarks. 3 A Communication-Theoretic Framework for Multi-hop Ad Hoc Wireless Networks: Realistic Scenario. 3.1 Introduction. 3.2 Preliminaries. 3.3 Communication-Theoretic Basics. 3.4 Inter-node Interference. 3.5 RESGOMAC Protocol. 3.6 RESLIGOMAC Protocol. 3.7 Network Behavior. 3.8 Conclusions. 4 Connectivity in Ad Hoc Wireless Networks: A Physical Layer Perspective. 4.1 Introduction. 4.2 Quasi-regular Topology. 4.3 Random Topology. 4.4 Concluding Remarks and Discussion. 5 Effective Transport Capacity in Ad Hoc Wireless Networks. 5.1 Introduction. 5.2 Modeland Assumptions. 5.3 Preliminaries. 5.4 Single-Route Effective Transport Capacity. 5.5 Aggregate Effective Transport Capacity. 5.6 Comparison of the RESGO and RESLIGOMAC Protocols. 5.7 Spread-RESGO: Improved RESGOMAC Protocol with Per-route Spreading Codes. 5.8 Discussion. 5.9 Concluding Remarks. 6 Impact of Mobility on the Performance of Multi-hop Ad Hoc Wireless Networks. 6.1 Introduction. 6.2 Preliminaries. 6.3 Switching Models. 6.4 Mobility Models. 6.5 Numerical Results. 6.6 Conclusions. 7 Route Reservation in Ad Hoc Wireless Networks. 7.1 Introduction. 7.2 Related Work. 7.3 Network Models and Assumptions. 7.4 The Two Switching Schemes. 7.5 Analysis of the Two Switching Techniques. 7.6 Results and Discussion. 7.7 Concluding Remarks. 8 Optimal Common Transmit Power for Ad Hoc Wireless Networks. 8.1 Introduction. 8.2 Modeland Assumptions. 8.3 Connectivity. 8.4 BER at the End of a Multi-hop Route. 8.5 Optimal Common Transmit Power. 8.6 Performance Metrics. 8.7 Results and Discussion. 8.8 Related Work. 8.9 Conclusions. 9 Routing Problem in Ad Hoc Wireless Networks: A Cross-Layer Perspective. 9.1 Introduction. 9.2 Experimental Evidence. 9.3 Preliminaries: Analytical Models and Assumptions. 9.4 Route Selection: Simulation Study. 9.5 Network Performance Evaluation. 9.6 Discussion. 9.7 Related Work. 9.8 Conclusions. 10 Concluding Remarks. 10.1 Introduction. 10.2 Extensions of the Theoretical Framework: Open Problems. 10.3 Network Architectures. 10.4 Network Application Architectures. 10.5 Standards. 10.6 Applications. 10.7 Conclusions. Appendix A. Appendix B. Appendix C. Appendix D. Appendix E. References. Index.

Proceedings ArticleDOI
10 Apr 2006
TL;DR: An efficient detection method called delay per hop indication (DelPHI), by observing the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks.
Abstract: In mobile ad hoc networks, data transmission is performed within an untrusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. Wormhole attack is one of the serious attacks which forms a serious threat in the networks, especially against many ad hoc wireless routing protocols and location-based wireless security system. We identify two types of wormhole attacks. In the first type, malicious nodes do not take part in finding routes, meaning that, legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the existence of malicious nodes, just do not know they are malicious. Some researchers have proposed detection mechanisms for the first type. In this paper, we propose an efficient detection method called delay per hop indication (DelPHI). By observing the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks. This method requires neither synchronized clocks nor special hardware equipped mobile nodes. The performance of DelPHI is justified by simulations.

Proceedings ArticleDOI
22 May 2006
TL;DR: In this article, the problem of an attacker disrupting an encrypted victim wireless ad hoc network through jamming is considered and a sensor is developed and tested on live data and the classification is found to be highly reliable for many packet types.
Abstract: This paper considers the problem of an attacker disrupting an encrypted victim wireless ad hoc network through jamming. Jamming is broken down into layers and this paper focuses on jamming at the Transport/Network layer. Jamming at this layer exploits AODV and TCP protocols and is shown to be very effective in simulated and real networks when it can sense victim packet types, but the encryption is assumed to mask the entire header and contents of the packet so that only packet size, timing, and sequence is available to the attacker for sensing. A sensor is developed and tested on live data. The classification is found to be highly reliable for many packet types. The relative roles of size, timing, and sequence are discussed along with the implications for making networks more secure.

Journal ArticleDOI
TL;DR: This work proposes detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons and successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating.
Abstract: Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks (VANETs) have special requirements in terms of node mobility and position-dependent applications, which are well met by geographic routing protocols. Functional research on geographic routing has already reached a considerable level, whereas security aspects have been vastly neglected so far. Since position dissemination is crucial for geographic routing, forged position information has severe impact regarding both performance and security. In this work, we first analyze the problems that may arise from falsified position data. Then, in order to lessen these problems, we propose detection mechanisms that are capable of recognizing nodes cheating about their location in position beacons. In contrast to other position verification approaches, our solution does not rely on special hardware or dedicated infrastructure. Evaluation based on simulations shows that our position verification system successfully discloses nodes disseminating false positions and thereby widely prevents attacks using position cheating

Journal ArticleDOI
TL;DR: SCAN is a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach and exploits localized collaboration and information cross-validation to protect the network in a self-organized manner.
Abstract: Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to the malicious nodes. In SCAN, local neighboring nodes collaboratively monitor each other and sustain each other, while no single node is superior to the others. SCAN also adopts a novel credit strategy to decrease its overhead as time evolves. In essence, SCAN exploits localized collaboration and information cross-validation to protect the network in a self-organized manner. Through both analysis and simulation results, we demonstrate the effectiveness of SCAN even in a highly mobile and hostile environment.

Proceedings ArticleDOI
03 Apr 2006
TL;DR: This paper considers skyline querying in a mobile and distributed setting, where each mobile device is capable of holding only a portion of the whole dataset; where devices communicate through mobile ad hoc networks.
Abstract: Skyline queries are well suited when retrieving data according to multiple criteria. While most previous work has assumed a centralized setting this paper considers skyline querying in a mobile and distributed setting, where each mobile device is capable of holding only a portion of the whole dataset; where devices communicate through mobile ad hoc networks; and where a query issued by a mobile user is interested only in the user’s local area, although a query generally involves data stored on many mobile devices due to the storage limitations. We present techniques that aim to reduce the costs of communication among mobile devices and reduce the execution time on each single mobile device. For the former, skyline query requests are forwarded among mobile devices in a deliberate way, such that the amount of data to be transferred is reduced. For the latter, specific optimization measures are proposed for resource-constrained mobile devices. We conduct extensive experiments to show that our proposal performs efficiently in real mobile devices and simulated wireless ad hoc networks.