{"title":"Trusted Greedy Perimeter Stateless Routing","authors":"A. Pirzada, C. McDonald","doi":"10.1109/ICON.2007.4444087","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444087","url":null,"abstract":"Ad-hoc networks generally comprise of mobile wireless nodes having limited communication and computation resources. These nodes execute special routing protocols, which help to establish multi-hop communication despite a dynamic topology. The greedy perimeter stateless routing (GPSR) protocol is one such routing protocol that is frequently used to establish routes in an ad-hoc or sensor network. However, for its precise execution, it is imperative that all nodes depict sustained benevolent behaviour. However, such an altruistic setting would never work in a wireless environment, which is intrinsically physically insecure. Consequently, participating malicious nodes may launch an array of attacks against the routing protocol leading to route severing, elongation or loop creation. In this paper, we present an improved variant of the GPSR protocol that uses the inherent characteristics of the routing process to assess the trust in the network nodes. These trust levels are then used to influence the routing decisions so as to circumvent malevolent nodes in the network. Extensive simulations indicate that the packet delivery ratio of the trusted GPSR protocol surpasses that of the standard GPSR by as much as 30% when as many as 50% of the nodes are acting maliciously in the network.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Karim, David Philip Green, M. Rumsewicz, N. Bean
{"title":"Flexible Throughput Management in IEEE 802.11e Wireless LANs","authors":"S. Karim, David Philip Green, M. Rumsewicz, N. Bean","doi":"10.1109/ICON.2007.4444102","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444102","url":null,"abstract":"The IEEE 802.11e standard has been developed to provide quality of service (QoS) support to a wireless local area network (WLAN). The framework for the standard is defined such that the precise configuration details are left open to allow a variety of possible implementations. Therefore the challenge lies in implementing a configuration to provide specific QoS requirements in a WLAN. In this paper, we propose a control scheme to provide flexible, throughput management. This scheme is evaluated using simulations and is shown to perform very well.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Balakrishnan, V. Varadharajan, U. Tupakula, Phillip Lucs
{"title":"TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks","authors":"V. Balakrishnan, V. Varadharajan, U. Tupakula, Phillip Lucs","doi":"10.1109/ICON.2007.4444083","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444083","url":null,"abstract":"Security is paramount in mobile ad-hoc networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed for MANET in the areas of key management, secure routing, nodal cooperation, and trust management. Nevertheless, MANET lacks a unified architecture to take advantage of the deployed security models. In this paper, we propose trust enhanced security architecture for MANET (TEAM), in which a trust model is overlaid on the following security models - key management mechanism, secure routing protocol, and cooperation model. We briefly present the operation of our architecture and then we detail the system operation of our novel trust and cooperation model, which we call as secure MANET routing with trust intrigue (SMRTI) and fellowship respectively. SMRTI captures the evidence of trustworthiness for other nodes from the security models, and in return assists them to make better security decisions. Unlike related trust models, SMRTI captures recommendations in such a way that it eliminates both free-riding and honest-elicitation problems. In comparison with related cooperation models, fellowship model defends against both flooding and packet drop attacks. It can efficiently identify and isolate both malicious and selfish nodes that fail to share the communication channel or forward packets for other nodes. Furthermore, our models do not rely on any centralized authority or tamper-proof hardware. Simulation results confirm that our models enhance the performance of TEAM.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129987541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows","authors":"G. Rizzo, J. Boudec","doi":"10.1109/ICON.2007.4444118","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444118","url":null,"abstract":"We consider networks of FIFO aggregate schedulers. Quite surprisingly, the natural condition (node utilization inferior to one) in general is not sufficient in these networks to ensure stability (boundedness of delay and backlog at each node). Deriving good sufficient conditions for stability and delay bounds for these networks is of fundamental importance if we want to offer quality of service guarantees in such networks as DiffServ networks, high speed switches and network-on-chips. The main existing sufficient conditions for stability in these networks are the \"DiffServ bound\" and the route interference number (RIN) result. We use an algebraic approach. First, we develop a model of the network as a dynamical system, and we show how the problem can be reduced to properties of the state transition function. Second, we obtain new sufficient conditions for stability valid without any of the restrictions of the \"RIN result\". We show that in practical cases, when flows are leaky bucket constrained, the new sufficient conditions perform better than existing results. We also prove that the \"RIN result\" can be derived as a special case from our approach. We finally derive an expression for a bound to delay at all nodes.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132939284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-series Modelling of Server to Client IP Packet Length in First Person Shooter Games","authors":"A. Cricenti, P. Branch, G. Armitage","doi":"10.1109/ICON.2007.4444138","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444138","url":null,"abstract":"Modelling traffic generated by Internet based multiplayer computer games has attracted a great deal of attention in the past few years. In part this has been driven by a need to simulate correctly the network impact of highly interactive online game genres such as the first person shooter (FPS). Time-series models are important elements in the creation of realistic traffic generators for network simulators such as ns-2 and OMNeT++ as they account for the correlation between packets. In this paper we show that the time-series behaviour of FPS server-to-client packet lengths is well modelled by ARMA(1,1) processes. We report on data from six popular FPS games of the past 10 years including Half-Life, Half-Life Counter-Strike, Half-Life 2, Half-Life 2 Counter-Strike, Quake III Arena and Wolfenstein Enemy Territory. For each of these games we analyse sessions each comprising 2 to 9 players. In all cases ARMA(1,1) is an effective model. We also show that AR models of order 1 and higher fail to capture the packet size variance as effectively as ARMA(1,1). Finally we show that higher order ARMA models are no more effective in describing the time-series behaviour than the simpler ARMA(1,1) models.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132955635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jayasuriya, S. Aust, P. Davis, Akira Yamaguchi, S. Obana
{"title":"Aggregation of Wi-Fi Links: When Does it Work?","authors":"A. Jayasuriya, S. Aust, P. Davis, Akira Yamaguchi, S. Obana","doi":"10.1109/ICON.2007.4444106","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444106","url":null,"abstract":"We conducted a systematic experimental and simulation study on the behaviour of aggregated Wi-Fi links for WLAN access. The Wi-Fi links were aggregated by bonding multiple Wi-Fi interfaces. We demonstrated a close to linear improvement in maximum throughput with the number of aggregated links. We analyse unstable behaviour which appears in both UDP and TCP based applications when flows are split over multiple Wi-Fi links, even when the links are statistically symmetric. We show that this unstable behaviour is due to the short term variations in packet latencies, and occurs in distinct regimes, starting before the saturation of throughput. Our analysis suggests that since the origin of the instability is local, it could be suppressed by intelligent control applied locally at the wireless interfaces.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing Li
{"title":"Myth: An Accurate and Scalable Network Coordinate System under High Node Churn Rate","authors":"Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing Li","doi":"10.1109/ICON.2007.4444076","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444076","url":null,"abstract":"Network coordinate (NC) system is an efficient mechanism to predict Internet distance (latency) with limited times of measurement. In this paper, we focus on the node churn problem in distributed NC systems. Our study on Vivaldi, a representative distributed NC system, shows that under high node churn rate the prediction accuracy of the system will be seriously impaired, which renders the system unusable in many potential application scenarios. As remedy, we propose the idea and implementation of Myth, an accurate and scalable NC system even under high node churn rate. Myth introduces the merit of Landmark-based NC system to shorten convergence time in Simulation-based NC system with negligible extra overhead. We evaluate the performance of Myth system with two typical real-world data sets measured in Internet. The experimental results show that Myth outperforms Vivaldi in relative error, relative rank loss and closest neighbor absolute error under high node churn rate, without compromising the performance under stable environment.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uplink Intercell Interference and Capacity in 3G LTE systems","authors":"S. Elayoubi, O. B. Haddada","doi":"10.1109/ICON.2007.4444143","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444143","url":null,"abstract":"In this paper, we study the inter-cell interference in the uplink of 3G LTE systems. The multiple access is based on SC-FDMA. This is an orthogonal access (no intra-cell interference). However, inter-cell interference remains as there is no orthogonality between cells. We then model the inter-cell interference by calculating the distribution of the number of collisions, taking into account the impact of power control. We then use this model to calculate the user capacity of the system, by mean of a Markovian analysis. We finally use the developed model to evaluate and compare different interference mitigation schemes.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Synthetic Streaming Quality Measurement System on IP Networks","authors":"Linghong Ji, Xia Yin, Xingang Shi, Zhiliang Wang","doi":"10.1109/ICON.2007.4444061","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444061","url":null,"abstract":"Streaming media services, including both audio and video applications, have been widely used on corporation and public IP networks. To quantify the quality of these streaming services on the specific network it is necessary to execute actual measurement activities and analyze the results, so the design and implementation of appropriate streaming measurement systems is very critical. For this reason, this paper proposes a synthetic streaming quality measurement system, which can support the assessment of both audio and video services, generate representative traffic in various ways, simultaneously transmit multiple different kinds of streaming media flows at distributed nodes on the measured IP network and analyze the streaming quality using both network and user level metrics.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122797645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks","authors":"Hongxun Liu, J. Delgado-Frías, S. Medidi","doi":"10.1109/ICON.2007.4444053","DOIUrl":"https://doi.org/10.1109/ICON.2007.4444053","url":null,"abstract":"This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer software and reports the misbehavior of the software to other mobile nodes in the network. The hardware cache stores the identity information of recently received packets. The detection mechanism uses the cache to detect packet dropping and packet misrouting. The simulation results show that the cache scheme can detect nearly 100% misbehaving nodes with nearly 0% false positive in the packet dropping scenario. In the packet misrouting scenario, the detection has nearly 0% false positive and more than 90% detection rate. The detection result could be used by other nodes to protect the network.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131498548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}