{"title":"PriorityCast: Efficient and Time-Critical Decision Making in First Responder Ad-Hoc Networks","authors":"V. Bhandari, Indranil Gupta","doi":"10.1109/MOBHOC.2006.278563","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278563","url":null,"abstract":"First responders equipped with PDAs in disaster recovery scenarios may need to make decisions that select the best out of multiple options. Each of these options may originate from different parts of the network (e.g., risk assessment of various entrances to a collapsed building). Yet the highest priority option needs to be spread to all nodes within a time deadline and in an efficient manner, i.e., by preventing lower priority options from spreading too far. We define this problem as PriorityCast, and study a wide range of possible solutions. The emphasis is on solutions that are scalable, and resilient to unreliability and unpredictability. Our basic scheme, called flood and suppress, suppresses lower priority options from being forwarded by a node that has seen other higher priority options. We then augment this basic scheme using probabilistic approaches, background gossiping techniques, and delayed propagation. We quantify the impact of using various combinations of the mentioned approaches, by presenting mathematical analysis for the flood and suppress protocol, and evaluating a suite of composable PriorityCast protocols via simulations. The results provide insight into the feasibility and scalability of this class of solutions. While the focus of this paper is on the PriorityCast problem, these solutions are also relevant as potential building blocks for other distributed operations in ad-hoc networks","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115412811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Standards for Rigorous MANET Routing Protocol Evaluation","authors":"S. Kurkowski, T. Camp, W. Navidi","doi":"10.1109/MOBHOC.2006.278564","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278564","url":null,"abstract":"In this paper we look at issues with the simulation of generic mobile ad hoc network (MANET) routing protocols. MANET simulation-based research is an involved process driven by the scenarios used in the simulations. Scenarios must be properly constructed in order to be effective in evaluating the performance of generic MANET routing protocols. For example, in scenarios with a low average hop count, little routing is needed, and poor protocols might appear successful. On the other hand, in scenarios with a high degree of partitioning, many pairs of nodes have no usable route between them, and good protocols might appear unsuccessful. Many standards are needed to establish rigorous evaluations for MANET simulation research, from simulation scenario standards to random number generator standards to results analysis standards. We do not attempt to standardize all of these areas. We do, however, propose two standards that should be employed to ensure long routes are available and used in the evaluation of generic MANET routing protocols. That is, we qualify a simulation scenario to be used for rigorous generic MANET routing protocol evaluation, based on the scenario's average shortest-path hop count and its amount of network partitioning. We construct several simulation scenarios that meet our two standards, using example metric values for our two standards. We note that our method can be modified to generate scenarios with different metric values that a researcher finds appropriate","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116830741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simple and Effective Carrier Sensing Adaptation for Multi Rate Ad-Hoc MESH Networks","authors":"Hui Ma, Sumit Roy","doi":"10.1109/MOBHOC.2006.278653","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278653","url":null,"abstract":"Adaptive physical carrier sensing (PCS) based on tuning the PCS threshold has been shown to be an effective mechanism for improving aggregate network throughput. However, earlier work assumed a single link rate and a common PCS threshold for the entire network, as appropriate for a regular 2-D lattice grid of nodes with constant link (1-hop) distances. In an ad-hoc network topology, the 1-hop link distances vary significantly and a single PCS threshold is no longer suitable. Because IEEE 802.11 a/b/g networks provide multiple data rates over any link, joint tuning of the link rate and PCS threshold is thus desirable for achieving optimal aggregate throughput for ad-hoc networks. In this work, we first propose a simple yet effective principle for the above optimization. Next, we use the intuition offered by these formulations to suggest run-time adaptive solutions in OPNET simulations. We restrict ourselves to 1-dimensional random linear networks primarily to corroborate analysis with simulations and defer results with other topologies for future work","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128826134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-layer Optimal Decision Policies for Spatial Diversity Forwarding in Wireless Ad Hoc Networks","authors":"J. Ai, A. Abouzeid, Z. Ye","doi":"10.1109/MOBHOC.2006.278552","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278552","url":null,"abstract":"In order to adapt to the time-varying nature of wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in wireless ad hoc networks where there are usually alternate forwarding nodes available at a given forwarding node. However, existing schemes along this line are designed based on heuristics, implying room for performance enhancement. Thereby, to seek a theoretical foundation for improving spatial diversity gain, we formulate the selection of the next-hop relay as a sequential decision problem and derive a general \"optimal stopping relaying (OSR)\" framework for designing such spatial-diversity schemes. As a particular example, assuming Rayleigh fading channels, we implement an OSR strategy to optimize information efficiency (IE) in a protocol stack consisting of greedy perimeter stateless routing (GPSR) and IEEE 802.11 MAC protocols. We present an analysis of the algorithm for a single node. In addition, we perform extensive simulations (using QualNet) to evaluate the end-to-end performance of the proposed forwarding strategy. The results demonstrate the superiority of OSR over other existing schemes","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Authentication-Key Re-assignment for Reliable Report Delivery","authors":"Weijia Li, Youtao Zhang, Jun Yang","doi":"10.1109/MOBHOC.2006.278587","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278587","url":null,"abstract":"Sensor networks deployed in hostile environments are subject to various types of attacks. While multipath routing and en-route authentication schemes have been proposed to defend packet dropping and injection attacks respectively, it is challenging to defend both at the same time. The paper addresses this problem through an annulus based authentication-key reassignment scheme in multipath routing with en-route authentication. Our experimental results show that the proposed scheme achieves better trade-offs in true report delivery, false report filtering and energy consumption","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134012110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks","authors":"Xiaomei Cao, Guihai Chen, Bo Yu","doi":"10.1109/MOBHOC.2006.278642","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278642","url":null,"abstract":"Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such as uneven resources and in-network processing. In this paper, we provide a resource oriented security solution (ROSS) to protect the network connectivity of HCSNs. ROSS is a robust security solution that is embedded into network layer operations, resulting in in-depth defense against attacks from both external attackers and compromised nodes. Through security analysis and performance simulation, we demonstrate that ROSS not only achieves the predefined security goals, but also allows a tradeoff between security and performance cost","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localized Hybrid Data Delivery Scheme using K-hop Clustering Algorithm in Ad Hoc Networks","authors":"A. Derhab, N. Badache","doi":"10.1109/MOBHOC.2006.278631","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278631","url":null,"abstract":"In mobile ad hoc networks, as nodes move freely, network partitions occur frequently, which significantly degrades the performance of data access. Data replication is a promising approach to improve data availability in mobile ad hoc networks. In this paper, we propose a localized hybrid data delivery scheme that combines the push-based and the pull-based approaches. This scheme is constructed by implementing a localized clustering algorithm that constructs groups, in which each node is at most K hops away from a group leader. This construction permits to bind the query access delay by K hops. The localized clustering algorithm dynamically creates groups to adapt to topology changes. It can also predict when the group will partition. So, it can replicate data items on nodes of the future separate group before the partitioning occurs. The proposed localized scheme helps to increase data availability while improving query delay and update cost","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temporal Analysis of Routing Activity for Anomaly Detection in Ad hoc Networks","authors":"Haitao Liu, Rajiv Gupta","doi":"10.1109/MOBHOC.2006.278595","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278595","url":null,"abstract":"Mobile ad hoc network (MANET) faces serious security threat due to lack of consideration of security in design and inherent weaknesses. Anomaly detection techniques as well as preventive measures are in urgent need to protect ad hoc network. We propose an innovative anomaly detection technique based on temporal analysis of routing activities. Our approach uses data mining techniques to discover the underlying patterns of routing behavior and detect anomaly by comparing routing activities with the patterns. We tested the approach with two common attacks targeted at routing protocols and the experiment results show it is effective to detect routing disruption","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126800109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC","authors":"S. Eichler, Christian Roman","doi":"10.1109/MOBHOC.2006.278589","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278589","url":null,"abstract":"In this paper we present a new secure routing protocol for mobile ad hoc networks (MANETs) based on AODV called AODV-SEC. Our security approach is using certificates and a public key infrastructure as trust anchor. To verify the correct functionality of the protocol we implemented it in the NS-2 simulator using genuine cryptography and performed extensive simulations and performance evaluations. In addition we present the need for a new certificate type for secure routing in MANETs called mCert. In our opinion the results point out the current difficulties of secure routing protocol design. The paper contains two main sections, one presenting the protocol implementation, the other presenting the simulation settings and the simulation results. The paper closes with a conclusion","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130488783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"S2RP: a Secure and Scalable Rekeying Protocol for Wireless Sensor Networks","authors":"G. Dini, I. M. Savino","doi":"10.1109/MOBHOC.2006.278586","DOIUrl":"https://doi.org/10.1109/MOBHOC.2006.278586","url":null,"abstract":"Nowadays, small, low-cost sensor nodes are being widely used to build self-organizing, large-scale, wireless networks for various applications, such as environmental surveillance, health monitoring and so on. Given its unique features, protecting a wireless sensor network is a difficult challenge. In this paper, we present S2RP, a secure and scalable rekeying protocol for sensor networks. S2RP aims at a trade-off between security and resource consumption while it guarantees an authentic distribution of keys that preserves both forward and backward security. The proposed protocol is efficient in terms of communication overhead as it reduces the number and the size of rekeying messages. It is efficient in terms of computation overhead as it guarantees the necessary level of confidentiality and authenticity of rekeying messages by only using symmetric ciphers and one-way hash functions. It follows that S2 RP meets the reduced capabilities of sensor nodes, results scalable, and particularly attractive for large and/or highly dynamic groups","PeriodicalId":345003,"journal":{"name":"2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}