Share

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Download Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks PDF Online Free

Author :
Release : 2011-10-28
Genre : Computers
Kind : eBook
Book Rating : 024/5 ( reviews)

GET EBOOK


Book Synopsis Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks by : Soufiene Djahel

Download or read book Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks written by Soufiene Djahel. This book was released on 2011-10-28. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.

MAC and Routing Protocols for Multi-hop Wireless Networks

Download MAC and Routing Protocols for Multi-hop Wireless Networks PDF Online Free

Author :
Release : 2004
Genre : Computer network protocols
Kind : eBook
Book Rating : /5 ( reviews)

GET EBOOK


Book Synopsis MAC and Routing Protocols for Multi-hop Wireless Networks by : Chih-Yuan Liao

Download or read book MAC and Routing Protocols for Multi-hop Wireless Networks written by Chih-Yuan Liao. This book was released on 2004. Available in PDF, EPUB and Kindle. Book excerpt: Abstract: "Wireless systems for industry have mostly used cellular-phone-style radio links, using point-to-point or point-to-multipoint transmission. Past research has indicated that these network architectures are not suitable for several industrial applications because of their rigid structure, meticulous planning requirements, and dropped signals. In contrast, wireless mesh networks are multi-hop systems in which devices assist each other in transmitting packets through the network, and they provide a reliable, flexible system that can be extended to thousands of devices. Some inherent advantages with mesh networks are scalability, non line-of-sight communications, high data rates, and low-cost deployment. Mesh networks have been deployed by MIT researchers and a few companies on a small scale. Mesh networks have not been deployed widely, in part because of some fundamental problems with the current protocols with regards to QoS support and scalability. To meet these requirements, the MAC protocol should be able to guarantee near constant capacity for networks of different sizes, and the routing protocol should perform admission control. Current CSMA-based MAC protocols have been shown to perform inadequately in terms of throughput and scalability in multi-hop deployments. The key problem with using protocols like IEEE 802.11 is that the link throughput is affected severely due to the exposed terminal problem, uncoordinated contentions, and wasteful backoffs. With the 802.11 MAC protocol, our results show that the capacity falls to about 1/10th for a chain and below 1/20th for a grid with horizontal constant bit rate flows. We have developed the WisperNet MAC and routing protocols, which provide end-to-end QoS guarantees over a multi-hop mesh network. By exploiting the topology information and the fact that fixed wireless nodes separated by 3 hops or more can transmit simultaneously, we eliminate collisions and maximize network utilization. The WisperNet routing protocol performs admission control. We show that the WisperNet MAC protocol can guarantee up to 9 times more capacity than IEEE 802.11, and this capacity remains nearly constant as the network grows. Also included is a performance analysis of different routing policies, and their effect on network utilization."

Security for Multihop Wireless Networks

Download Security for Multihop Wireless Networks PDF Online Free

Author :
Release : 2014-04-15
Genre : Computers
Kind : eBook
Book Rating : 033/5 ( reviews)

GET EBOOK


Book Synopsis Security for Multihop Wireless Networks by : Shafiullah Khan

Download or read book Security for Multihop Wireless Networks written by Shafiullah Khan. This book was released on 2014-04-15. Available in PDF, EPUB and Kindle. Book excerpt: Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

AD HOC NETWORKS

Download AD HOC NETWORKS PDF Online Free

Author :
Release : 2006-01-16
Genre : Technology & Engineering
Kind : eBook
Book Rating : 907/5 ( reviews)

GET EBOOK


Book Synopsis AD HOC NETWORKS by : Prasant Mohapatra

Download or read book AD HOC NETWORKS written by Prasant Mohapatra. This book was released on 2006-01-16. Available in PDF, EPUB and Kindle. Book excerpt: AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area. AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks

Download Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks PDF Online Free

Author :
Release : 2013
Genre :
Kind : eBook
Book Rating : /5 ( reviews)

GET EBOOK


Book Synopsis Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks by : Afef Sayadi

Download or read book Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks written by Afef Sayadi. This book was released on 2013. Available in PDF, EPUB and Kindle. Book excerpt: Wireless multi-hop ad hoc and sensor networks provide a promising solution to ensure ubiquitous connectivity for the Future Internet. Good network connectivity requires designing a reliable Medium Access Control (MAC) protocol, which is a challenging task in the ad hoc and sensor environments. The broadcast and shared nature of the wireless channel renders the bandwidth resources limited and expose the transmissions to relatively high collisions and loss rates. The necessity to provide guaranteed Quality of Service (QoS) to the upper layers triggered the design of conflict-free MAC protocols. The TDMA synchronization constraint is basically behind the rush of MAC protocol design based on a fixed frame size. This design shows inflexibility towards network variations and creates a network dimensioning issue that leads to a famine risk in case the network is under-dimensioned, and to a waste of resources, otherwise. Moreover, the alternative dynamic protocols provide more adaptive solutions to network topology variations at the expense of a fair access to the channel. Alongside with the efficient channel usage and the fair medium access, reducing the energy consumption represents another challenge for ad hoc and sensor networks. Solutions like node activity scheduling tend to increase the network lifetime while fulfilling the application requirements in terms of throughput and delay, for instance. Our contributions, named OSTR and S-OSTR, address the shortcomings of the medium access control protocol design in the challenging environment of wireless multi-hop ad hoc and sensor networks, respectively. For OSTR the idea consists in adopting a dynamic TDMA frame size that increases slot-by-slot according to the nodes arrival/departure to/from the network, and aiming to achieve a minimum frame size. For this end, OSTR couples three major attributes: (1) performing slot-by-slot frame size increase, (2) providing a spatial reuse scheme that favors the reuse of the same slot if possible, (3) and ensuring an on-demand frame size increase only according to the node requirements in terms of throughput. To tackle different frame sizes co-existence in the network, OSTR brings a cooperative solution that consists in fixing an appointment, a date when the frame size in the network is increased. Concerning S-OSTR, it is an amendment of OSTR for wireless sensor networks. It brings the idea of a dynamic active period, since it deploys a dynamic frame size that is built slot-by-slot according to nodes arrival to the network. S-OSTR enforces the slot-by-slot frame size increase by a node activity scheduling to prolong the inactivity period in the network, and hence prolong the overall network lifetime for wireless sensor networks. Our contributions are both based on the new dynamic TDMA frame size increase that consists in increasing the frame size slot-by-slot aiming to achieve a shorter frame size, and hence improve the channel utilization, and reduce the energy consumption. The performance analysis of OSTR and S-OSTR shows that they present good potentials to support QoS requirements, to provide energy-efficiency, to ensure fair medium access, to accommodate network topology changes and finally, to enhance robustness against scalability. The impact of this new TDMA frame size increase technique on the medium access control protocol performance is highlighted through multiple simulations of OSTR and S-OSTR. Multiple comparative studies are also handled to point out the effectiveness of this new technique and the soundness of our contributions.

You may also like...