Managing Trust in Self-organized Mobile Ad Hoc Networks
|
|
- Daniella York
- 7 years ago
- Views:
Transcription
1 Managing Trust in Self-organized Mobile Ad Hoc Networks John S. Baras and Tao Jiang Electrical and Computer Engineering Department Computer Science Department and the Institute for Systems Research University of Maryland College Park College Park, MD wireless and mobile security workshop 1
2 Trust Management in MANETs Lack of trust in mobile ad-hoc networks No trusted centralized authority Resource (power, bandwidth, computation etc.) constraints Rapidly and dynamically changing topology and connectivity Essential and unique properties Uncertainty and incompleteness Local information exchange Distributed computation 2
3 Trust Management System Previous work Public key infrastructure PGP Trust management is a multifunctional control mechanism Security credentials: direct observations or IDS Evidence distribution Evaluation policies 3
4 Trust Management System Previous work Public key infrastructure PGP Trust management is a multifunctional control mechanism Security credentials Evidence distribution Evaluation policies 4
5 Trust Evidence Distribution Swarm Intelligence based: Biologically inspired: biological swarms like ants, bees, etc. Evidence requests are delivered by sending out multiple but simple ant agents that travel the network and try to fetch information for the request. Properties Indirect communications between the agents (ants) (efficiency) Dynamic online optimization using local information (adaptability, scalability) Advantages: Preserve the diversity of evidence Reinforce good quality trust paths by feedback Discover new sources of evidence via random exploration of the network SI scheme can be used both for route discovery and trust evidence discovery (leads to methods for secure routing) 5
6 Ant-Based Evidence Distribution (ABED) -- Certificate Table The certificate table is similar with the distance-vector routing table. The main differences are: Each entry corresponds to a specific certificate instead of destination nodes Values are the probabilities of choosing the corresponding neighbors as the next hop rather than the hop counts to destinations Probability value P ji represents the chance of choosing i as the next node when searching for cert j at node k and n k = 1 P ji = 1 Neighbors Certs Cert 1 Cert 2 Cert m N 1 P 11 P 21 P m1 N 2 P 12 P 22 P m2 N n P 1n P 2n P mn Certificate table of a node k 6
7 ABED -- Types of ants Forward ants Unicast ants: sent out to the neighbor with the highest probability in the certificate table. Broadcast ants: sent out when either no path to the certificate has been explored the information the node has is outdated based on the density of pheromone Backward ants generated by source of requested certificate retraces the path of the forward ant back to the source induces certificate table modifications at each intermediate node according to some learning rule reinforcement 7
8 ABED Simulation Results (I) Delay: the time elapsed from sending out the forward ant to receipt of the first backward ant. Success rate: the percentage of requests for which the requester successfully obtains the certificate. ABED finds the best solution very fast because of randomness in the searching phase. Fast convergence property highly desirable in mobile scenarios. Multiple paths are inherent for swarm intelligence. If only one path is used for request routing, a single failure leads to the failure of the whole request. The multiple path scheme is more resilient. 8
9 Trust Management System Previous work Public key infrastructure PGP Trust management is a multifunctional control mechanism Security credentials Evidence distribution Evaluation policies: on trust establishment and trust revocation Policies that use only local interactions Impact of local interactions on the global characteristics Conditions under which trust spreads to a maximum set, as well as the parameters that speed up or slow down this transition 9
10 Distributed Trust Computation Model Web of Trust Recommendation and delegation Transitivity of trust Two categories Path computation Local interaction The network is modeled as an undirected graph G(V, E) Vertex set V: set of all nodes in the network Edge set E: set of nodes pairs with trust connections Neighbor set N i = {node j e ij in E}, which consists of nodes that are one hop away from i, i.e. they have direct trust relations nodes that are allowed to exchange trust information logical interconnection network nodes that are able to sense, transit or receive information physical wireless links 10
11 Trust computation Trust Computation and Cooperative Games It s restricted to only local interactions Trust decision is made by each node individually Nodes are self-interested Game theoretic methods Provide a framework for modeling individual interactions Understand complex global structures and dynamics of a system composed of a large number of agents with simple local interactions Guide for analytical approach Examples: Ising model, prisoner s dilemma game 11
12 Ising Model A model in physics for the behavior of simple magnets The orientation of each spin in a magnet only depends on its neighbors In Ising model, spins are located on a lattice Math interpretation: s = {s 1,s 2,,s n } is a configuration of n spins in the Ising model, where s j = 1 or -1 indicating spin j is up or down respectively A Hamiltonian, or energy for a configuration s is 1 mh H( s) = - J ss - s T T i V j N i ij i j i i The ground states achieve the minimum of energy 12
13 Ising Model (cont ) For distributed model, spins reduce their own energy individually. This can be interpreted as a game with payoff of each spin equal to 1 π = Jss T i ij i j j N This model can be directly used for distributed trust computation s i be the trust value assigned by i Node i will be assigned a trust value according to the opinion of the majority of its neighbors 1 Let J ij = 1, payoff of i is π i = si sj T To maximize π i, s i will be the same sign as s, which is actually the sign assigned by the majority of the neighbors i j N i j N i j 13
14 Phase Transitions Phase transition is a common phenomenon that takes place in any combinatorial structure Key idea: a large combinatorial structure can be modeled as a system consisting of many locally interacting components Phase transitions are observed in: Ising model: critical temperature T c Evolutionary prisoner s dilemma games on graphs Random graph zero-one law Percolation theory in physics Distributed trust computation? N 0 -N M = N M si T c i =1 Phase transition of total magnetization in Ising model with H = 0 T 14
15 A Simple Computation Policy Based on simple voting methods Voters: Nodes that qualified as legitimate voters by certificates signed by offline servers (have trust evidence about node i) Assume uniformly distributed in the network Policy: decision based on threshold trusted, if Vi > η Ni Node i is neutral, if Vi η Ni V i is the sum of votes node i received (signed sum) η is the decision threshold is the number of i s neighbors N i 15
16 Simple Voting Scheme Trusted nodes Neutral nodes Positive votes Negative votes Number of positive votes on node i: V p,i = 3 Number of negative votes on node i: V n,i = 1 Effective (signed sum) votes: V i = V p,i -V n,i = 2 Given η = 0.3, V i > η N i = 1.8, node i is designated trusted 16
17 Random Graph Model Erdös and Rényi random graphs P sp : percentage of trusted pairs that are connected by at least one secure path, which are composed of trusted nodes As η is small Most of nodes are considered to be trusted P sp is dominated by the edge present probability p in ER random graphs Zero-one law in random graph theory is present (right figure) 17
18 2-D D Lattice 2-D lattices with periodic boundary and 4 exact neighbors or each node Site percolation theory in statistical mechanics Simulation results for P sp vs. decision threshold η In site percolation theory, the critical probability p c = Theoretic analysis: η (0,0.25], p = η (0.25,0.5], p = where p is the probability that a site is voted to be trusted Phase transition happens when η = ε, ε is a small postive number 18
19 Trust Revocation The trust revocation process is initiated: when topology, membership or secure paths change when referees or trust evidence for a node changes when positive votes are timeout or new negative votes are received Decision policy of the revocation process Revocation on a specific node, say j, usually starts from few nodes that have negative observations on j; A node i accepts the revocation on j, if it finds that more than a threshold fraction Φ of its neighbors revoke node j; Question: can a revocation be accepted by a large fraction of nodes in the network? i Trust Revoke 19
20 Phase Transition of Revocation Revocation is launched from a randomly chosen node in an Erdös- Rényi random graph with average degree set as the Y-axis. Global cascade: area that lie inside of the contour represents the percentage of nodes, which accept the revocation, is greater than the value corresponding to the contour The steep of the contours is very sharp, which represents phase transitions 20
21 Dynamics of Trust Spreading Initial islands of trusts Trust spreads Trust-connected network 21
22 Dynamics of Trust Spreading (cont ) Suppose the voting rule is a weighted average 1 ti( n) = ( v jitj( n 1) ) + bi di + bi j Ni n: the discrete time; t i [0,1] : the trust value of node i; v ji [0,1] : the vote value of j on i; d i : the degree of node i; b i : the number of headers that trust node i. Headers are fully trusted nodes and their votes are either with value 1 or with value 0 Suppose η is the threshold for the trustworthiness of nodes, we have our theorem: Trust relationships can be established in the network if and only if for every node i, η bi di v ji ; 1 η j Ni otherwise, none of trust relationships is established 22
23 Spreading Speed and Topology Algebraic graph theory predicts that the second largest eigenvalue has crucial effect on the convergence speed Small-world model by randomly adding new edges on a lattice By adding just 1% more edges, the spreading finishes in ten times less period 23
24 Conclusions A swarm-intelligence based trust evidence distribution scheme is suitable for distributed mobile networks, and provide better performance compared to previous methods Strong connections of distributed trust models and computation to cooperative game theory on graphs Phenomena of phase transitions in distributed trust model link to analytical methods from mathematical physics The effects of topology in distributed computation 24
25 Future work Integrate trust document distribution and distributed trust computation models Apply cooperative game theory in the computation part Evaluate different statistical detection and estimation methods Relate Markov random field methodologies (MRF) with statistical inference methods for trust Further mathematical analysis of swarm intelligence scheme in relation to MRF and simulated annealing Analytical approach to evaluation of distributed trust scheme; random models on graphs, cooperative games, mathematical physics of phase transitions Specify trust computation policies with respect to logic and formal methods; analyze effects on performance Need to incorporate non-monotonic logic along with negative evidence or false evidence; trust revocation Develop fully analytical work using this advanced form of the probabilistic method ; investigate effects of dynamic topologies 25
26 PUBLICATIONS Tao Jiang and John S. Baras, Ant-based Adaptive Trust Evidence Distribution in MANET, Proceedings of 2 nd International Workshop on Mobile Distributed Computing, in conjunction with the International Conference on Distributed Computing Systems, Tokyo, Japan, March John S. Baras and Tao Jiang, Cooperative Games, Phase Transitions on Graphs and Distributed Trust In MANET, invited paper, Proceedings 2004 IEEE Conference on Decision and Control, December Tao Jiang and John S. Baras, Autonomous Trust Establishment, 2 nd International Network Optimization Conference (INOC), 2005, Lisbon, Portugal 26
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationPerformance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
More informationAntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks
: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationA SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationSecurity Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network
Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Bondu Raja PG Scholar, Vignana Bharathi Institute of Technology, Hyderabad, Telngana, India. Ch.Suneetha AssociateProfessor, Vignana
More informationA networking framework for spontaneous interactions in MANETs
A networking framework for spontaneous interactions in MANETs BACKGROUND AND MOTIVATIONS Promoting interactions Socializing Group wise Transforming places Ephemeral Ad hoc Minimal Application driven User
More information1. Write the number of the left-hand item next to the item on the right that corresponds to it.
1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationD A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
More informationBatCave: Adding Security to the BATMAN Protocol
BatCave: Adding Security to the BATMAN Protocol Anne G. Bowitz, Espen G. Graarud, Lawrie Brown, Martin G. Jaatun September 2011 ITEM, NTNU, Trondheim, Norway UNSW@ADFA, Canberra, Australia Research Problem
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationEffects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
More informationSelf-Organized Public-Key Management for Mobile Ad Hoc Networks
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Srdjan Čapkun, Levente Buttyán, and Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) School of Information
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationOn Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationProposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationGraph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003
Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationA PKI over Ant Colony based Routing Algorithms for MANETs AntPKI
International Journal of Network Security, Vol.15, No.1, PP.42-49, Jan. 2013 42 A PKI over Ant Colony based Routing Algorithms for MANETs AntPKI Benamar Kadri, Djilalli Moussaoui, and Mohammed Feham (corresponding
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationAd hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationGraph Theory Applications in Network Security
Graph Theory Applications in Network Security Jonathan Webb1, Fernando Docemmilli2, and Mikhail Bonin3 Theory Lab - Central Queensland University Wayville SA 5034 E-mail addresses: (1) jonwebb@cqu.edu.au
More informationAnalysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationA Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks
JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 200 3 A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks Shahab Kamali, Jaroslav Opatrny Department of Computer Science and Software Engineering,
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationGreedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationPart 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationLoad Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
More informationInternet Sustainability and Network Marketing Safety
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationSwanLink: Mobile P2P Environment for Graphical Content Management System
SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes
More informationOPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationA Hierarchical Structure based Coverage Repair in Wireless Sensor Networks
A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationII RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationLecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationCurrent Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
More informationLocation-Aided Routing (LAR) in mobile ad hoc networks
Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile
More informationTechnology Longowal, Punjab, India
An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science
More informationDSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
More informationA Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More information3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
More informationLecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
More informationMapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationContent Delivery Network (CDN) and P2P Model
A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing
More informationMultiple Network Marketing coordination Model
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
More informationTORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
More informationGraphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationA Biologically Inspired Routing Algorithm for Mobile Ad Networks
A Biologically Inspired Routing Algorithm for Mobile Ad Networks Zhenyu Liu and Marta Z. Kwiatkowska School of Computer Science The University of Birmingham Birmingham, England B15 2TT @cs.bham.ac.uk Constantinou
More informationHierarchical routing in ad hoc mobile networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. ; :515 53 (DOI: 1.1/wcm.74) Hierarchical routing in ad hoc mobile networks Elizabeth M. Belding-Royer*, Department of Computer Science
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationMAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More information3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
More information6.02 Practice Problems: Routing
1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing
More informationAn Ant Colony Optimization Approach to the Software Release Planning Problem
SBSE for Early Lifecyle Software Engineering 23 rd February 2011 London, UK An Ant Colony Optimization Approach to the Software Release Planning Problem with Dependent Requirements Jerffeson Teixeira de
More informationWeb Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
More informationCompact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
More informationProvisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming
Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science
More informationPerformance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
More informationHosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationControl overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More information