Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Download Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks PDF Online Free

Author :
Release : 2011-10-28
Genre : Computers
Kind :
Book Rating : 024/5 ( reviews)

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks write by Soufiene Djahel. This book was released on 2011-10-28. Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks available in PDF, EPUB and Kindle. Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Download Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks PDF Online Free

Author :
Release : 2011-12
Genre : Computers
Kind :
Book Rating : 44X/5 ( reviews)

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks write by Soufiene Djahel. This book was released on 2011-12. Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks available in PDF, EPUB and Kindle. Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that

MAC and Routing Protocols for Multi-hop Wireless Networks

Download MAC and Routing Protocols for Multi-hop Wireless Networks PDF Online Free

Author :
Release : 2004
Genre : Computer network protocols
Kind :
Book Rating : /5 ( reviews)

MAC and Routing Protocols for Multi-hop Wireless Networks - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook MAC and Routing Protocols for Multi-hop Wireless Networks write by Chih-Yuan Liao. This book was released on 2004. MAC and Routing Protocols for Multi-hop Wireless Networks available in PDF, EPUB and Kindle. Abstract: "Wireless systems for industry have mostly used cellular-phone-style radio links, using point-to-point or point-to-multipoint transmission. Past research has indicated that these network architectures are not suitable for several industrial applications because of their rigid structure, meticulous planning requirements, and dropped signals. In contrast, wireless mesh networks are multi-hop systems in which devices assist each other in transmitting packets through the network, and they provide a reliable, flexible system that can be extended to thousands of devices. Some inherent advantages with mesh networks are scalability, non line-of-sight communications, high data rates, and low-cost deployment. Mesh networks have been deployed by MIT researchers and a few companies on a small scale. Mesh networks have not been deployed widely, in part because of some fundamental problems with the current protocols with regards to QoS support and scalability. To meet these requirements, the MAC protocol should be able to guarantee near constant capacity for networks of different sizes, and the routing protocol should perform admission control. Current CSMA-based MAC protocols have been shown to perform inadequately in terms of throughput and scalability in multi-hop deployments. The key problem with using protocols like IEEE 802.11 is that the link throughput is affected severely due to the exposed terminal problem, uncoordinated contentions, and wasteful backoffs. With the 802.11 MAC protocol, our results show that the capacity falls to about 1/10th for a chain and below 1/20th for a grid with horizontal constant bit rate flows. We have developed the WisperNet MAC and routing protocols, which provide end-to-end QoS guarantees over a multi-hop mesh network. By exploiting the topology information and the fact that fixed wireless nodes separated by 3 hops or more can transmit simultaneously, we eliminate collisions and maximize network utilization. The WisperNet routing protocol performs admission control. We show that the WisperNet MAC protocol can guarantee up to 9 times more capacity than IEEE 802.11, and this capacity remains nearly constant as the network grows. Also included is a performance analysis of different routing policies, and their effect on network utilization."

Security for Multihop Wireless Networks

Download Security for Multihop Wireless Networks PDF Online Free

Author :
Release : 2014-04-15
Genre : Computers
Kind :
Book Rating : 033/5 ( reviews)

Security for Multihop Wireless Networks - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Security for Multihop Wireless Networks write by Shafiullah Khan. This book was released on 2014-04-15. Security for Multihop Wireless Networks available in PDF, EPUB and Kindle. Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

AD HOC NETWORKS

Download AD HOC NETWORKS PDF Online Free

Author :
Release : 2006-01-16
Genre : Technology & Engineering
Kind :
Book Rating : 907/5 ( reviews)

AD HOC NETWORKS - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook AD HOC NETWORKS write by Prasant Mohapatra. This book was released on 2006-01-16. AD HOC NETWORKS available in PDF, EPUB and Kindle. AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area. AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.