{"title":"Secure Multipath Routing for Mobile Ad Hoc Networks","authors":"P. Kotzanikolaou, Rosa Mavropodi, C. Douligeris","doi":"10.1109/WONS.2005.31","DOIUrl":"https://doi.org/10.1109/WONS.2005.31","url":null,"abstract":"Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols more vulnerable than it is expected, to collaborating malicious nodes. We propose a novel on-demand multipath routing protocol, the Secure Multipath Routing protocol (SecMR) and we analyze its security properties. The SecMR protocol can be easily integrated in a wide range of on-demand routing protocols, such as DSR and AODV.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"35 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130927530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadcasting in hybrid ad hoc networks","authors":"F. Ingelrest, D. Simplot-Ryl, I. Stojmenovic","doi":"10.1109/WONS.2005.5","DOIUrl":"https://doi.org/10.1109/WONS.2005.5","url":null,"abstract":"In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multihop cellular and wireless Internet networks consist of static or mobile nodes and fixed access points which provide an access to an infrastructure. In such a network, each node may use direct or multihop link to connect to an access point, allowing a greater mobility. The goal of this paper is to provide protocols for broadcasting data in such an environment, by taking advantage of the presence of access points to optimize the broadcast, either from an energy consumption or from a latency point of view. We thus consider known protocols for pure ad hoc networks and adapt them to hybrid ad hoc networks. These protocols are the blind flooding, the neighbor elimination scheme, the multipoint relay protocol and the generalized self-pruning rule (algorithm that elects some dominant nodes to relay messages). We give some experimental data for these modified protocols to compare them to their original version, so that we are able to emphasize the gain obtained thanks to our proposed modifications.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rodrigo M. Passos, C. Coelho, A. Loureiro, R. Mini
{"title":"Dynamic Power Management in Wireless Sensor Networks: An Application-Driven Approach","authors":"Rodrigo M. Passos, C. Coelho, A. Loureiro, R. Mini","doi":"10.1109/WONS.2005.13","DOIUrl":"https://doi.org/10.1109/WONS.2005.13","url":null,"abstract":"Energy is a limited resource in wireless sensor networks. In fact, the reduction of power consumption is crucial to increase the lifetime of low power sensor networks. Several approaches on dynamic power management have contributed to reduce the power consumption, but few of them consider the application constraints to optimize it. In this paper, we propose a new application-driven power management approach, where we model the sensor node operation and the application constraints using the hybrid automata framework. We also model a real sensor network application for fire detection and we show the performance of our approach in terms of energy drop, comparing it to an Ideal Model and a Naive approach.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130747448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Tsetsos, George Alyfantis, Tilemahos Hasiotis, O. Sekkas, S. Hadjiefthymiades
{"title":"Commercial wireless sensor networks: technical and business issues","authors":"V. Tsetsos, George Alyfantis, Tilemahos Hasiotis, O. Sekkas, S. Hadjiefthymiades","doi":"10.1109/WONS.2005.8","DOIUrl":"https://doi.org/10.1109/WONS.2005.8","url":null,"abstract":"In this paper we study the opportunities of commercial exploitation of applications based on sensor networks. Such applications are quite famous nowadays in many different domains of everyday life (e.g., health monitoring, traffic monitoring). We introduce a new business model for sensor based services. Such business model involves entities like the mobile network operator and capitalizes on existing standards for application service providers (e.g., the OSA/Parlay standard). We also present the required technical framework that would facilitate the introduction and rapid adoption of the proposed business schemes.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pérez, Vicente Matellán Olivera, Luis Rodero-Merino, G. Robles
{"title":"Abbreviated Dynamic Source Routing: Source Routing with Non-Unique Network Identifiers","authors":"M. Pérez, Vicente Matellán Olivera, Luis Rodero-Merino, G. Robles","doi":"10.1109/WONS.2005.2","DOIUrl":"https://doi.org/10.1109/WONS.2005.2","url":null,"abstract":"Current ad-hoc network protocols are designed for hosts similar to the ones that are used in fixed networks. These protocols are not suitable for some applications of ad-hoc networks, where resources are very scarce. One point is the size of the network addresses, which may be a critical issue, specially with the use of IPv6 in the DSR protocol. This is because this protocol uses source routing, and, therefore, each datagram must carry the addresses of all the machines in its path. In this paper a new protocol named ADSR is proposed to solve this problem. This new protocol is a modified version of DSR based on the use of abbreviated addresses. The abbreviation procedure can lead to two different nodes having the same address, which we will term collision. ADSR allows rather than averts collisions, as analysed in this paper. Some results on the performance of this new protocol are shown. These results have been obtained by simulations implemented on an ns-2 network simulator.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Common gateway architecture for mobile ad-hoc networks","authors":"M. Michalak, T. Braun","doi":"10.1109/WONS.2005.9","DOIUrl":"https://doi.org/10.1109/WONS.2005.9","url":null,"abstract":"Ad-hoc networks are by definition created on demand, without any infrastructure. On the other hand, they are often considered as an extension of the range of Internet access points, providing multihop wireless access to them. This paper tries to examine the situation where there exist several Internet access points in a single ad-hoc network. We present a common gateway architecture which allows to use multiple access points and send traffic using the closest one.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks","authors":"P. Engelstad, Yan Zheng","doi":"10.1109/WONS.2005.15","DOIUrl":"https://doi.org/10.1109/WONS.2005.15","url":null,"abstract":"Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery architectures are distinguished by the extent that service coordinators (SCs) are implemented in the network. SCs are nodes that hold a central repository for the caching of service attributes and bindings of servers located in its neighborhood. This paper describes and investigates the performance of different architectures in terms of service availability, messaging overhead and latency. The architectures are analyzed and evaluated based on a large range of parameters. The paper also shows that in an on-demand MANET, where the service discovery mechanism will have a direct impact on the reactive routing protocol, the routing effects influence the evaluation result. It also demonstrates the benefits of combining the service discovery with route discovery, especially in on-demand MANETs where reactive routing protocols are being used.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133934290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ant agents for hybrid multipath routing in mobile ad hoc networks","authors":"F. Ducatelle, G. D. Caro, L. Gambardella","doi":"10.1109/WONS.2005.3","DOIUrl":"https://doi.org/10.1109/WONS.2005.3","url":null,"abstract":"In this paper we describe AntHocNet, an algorithm for routing in mobile ad hoc networks based on ideas from the nature-inspired ant colony optimization framework. The algorithm consists of both reactive and proactive components. In a reactive path setup phase, multiple paths are built between the source and destination of a data session. Data are stochastically spread over the different paths, according to their estimated quality. During the course of the session, paths are continuously monitored and improved in a proactive way. Link failures are dealt with locally. The algorithm makes extensive use of ant-like mobile agents which sample full paths between source and destination nodes in a Monte Carlo fashion. We report results of simulation experiments in which we have studied the behavior of AntHocNet and AODV as a function of node mobility, terrain size and number of nodes. According to the observed results, AntHocNet outperforms AODV both in terms of end-to-end delay and delivery ratio.","PeriodicalId":120653,"journal":{"name":"Second Annual Conference on Wireless On-demand Network Systems and Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116127838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}