The search functionality is under construction.

Keyword Search Result

[Keyword] ad hoc networks(118hit)

1-20hit(118hit)

  • Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks

    Yuki SHIMIZU  Tomotaka KIMURA  Jun CHENG  

     
    PAPER-Network

      Pubricized:
    2021/12/24
      Vol:
    E105-B No:7
      Page(s):
    833-847

    In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which nodes are chronically isolated. In these networks, messages are delivered to their destination nodes using store-carry-forward routing, where they are relayed by some nodes. Therefore, when a node has messages in its buffer, it can falsify the messages easily. When malicious nodes exist in the network, they alter messages to create fake messages, and then they launch fake message attacks, that is, the fake messages are spread over the network. To analyze the negative effects of a fake message attack, we model the system dynamics without attack countermeasures using a Markov chain, and then formalize some performance metrics (i.e., the delivery probability, mean delivery delay, and mean number of forwarded messages). This analysis is useful for designing countermeasures. Moreover, we consider a hash-based countermeasure against fake message attacks using a hash of the message. Whenever a node that has a message and its hash encounters another node, it probabilistically forwards only one of them to the encountered node. By doing this, the message and the hash value can be delivered to the destination node via different relay nodes. Therefore, even if the destination node receives a fake message, it can verify the legitimacy of the received message. Through simulation experiments, we evaluate the effectiveness of the hash-based countermeasure.

  • Information Dissemination Using MANET for Disaster Evacuation Support Open Access

    Tomoyuki OHTA  Masahiro NISHI  Toshikazu TERAMI  Yoshiaki KAKUDA  

     
    INVITED PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    670-678

    To minimize the damage caused by landslides resulting from torrential rain, residents must quickly evacuate to a place of refuge. To make the decision to evacuate, residents must be able to collect and share disaster information. Firstly, this paper introduces the Grass-roots Information Distribution System and a fixed type monitoring system which our research group has been developing. The fixed type monitoring system is deployed at the location of apparent danger, whereas the Grass-roots Information Distribution System distributes disaster information acquired from the fixed type monitoring system through a mobile ad hoc network (MANET) to residents. The MANET is configured using mobile terminals of residents. Next, in this paper, an information dissemination scheme utilizing a MANET and cellular networks to communicate among mobile terminals is proposed and simulated in the area where our research group has been deploying the distribution system. The MANET topology and information distribution obtained from the simulation results for further field experiments are then discussed.

  • A Network-Based Identifier Locator Separation Scheme for VANETs

    Ju-Ho CHOI  Jung-Hwan CHA  Youn-Hee HAN  Sung-Gi MIN  

     
    PAPER-Network

      Pubricized:
    2017/08/24
      Vol:
    E101-B No:3
      Page(s):
    785-794

    The integration of VANETs with Internet is required if vehicles are to access IP-based applications. A vehicle must have an IP address, and the IP mobility service should be supported during the movement of the vehicle. VANET standards such as WAVE or C-ITS use IPv6 address auto configuration to allocate an IP address to a vehicle. In C-ITS, NEMO-BS is used to support IP mobility. The vehicle moves rapidly, so reallocation of IP address as well as binding update occurs frequently. The vehicle' communication, however, may be disrupted for a considerable amount of time, and the packet loss occurs during these events. Also, the finding of the home address of the peer vehicle is not a trivial matter. We propose a network based identifier locator separation scheme for VANETs. The scheme uses a vehicle identity based address generation scheme. It eliminates the frequent address reallocation and simplifies the finding of the peer vehicle IP address. In the scheme, a network entity tracks the vehicles in its coverage and the vehicles share the IP address of the network entity for their locators. The network entity manages the mapping between the vehicle's identifier and its IP address. The scheme excludes the vehicles from the mobility procedure, so a vehicle needs only the standard IPv6 protocol stack, and mobility signaling does not occur on the wireless link. The scheme also supports seamlessness, so packet loss is mitigated. The results of a simulation show that the vehicles experience seamless packet delivery.

  • Home Base-Aware Store-Carry-Forward Routing Using Location-Dependent Utilities of Nodes

    Tomotaka KIMURA  Yutsuki KAYAMA  Tetsuya TAKINE  

     
    PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    17-27

    We propose a home base-aware store-carry-forward routing scheme using location-dependent utilities of nodes, which adopts different message forwarding strategies depending on location where nodes encounter. Our routing scheme first attempts to deliver messages to its home base, the area with the highest potential for the presence of the destination node in the near future. Once a message copy reaches its home base, message dissemination is limited within the home base, and nodes with message copies wait for encountering the destination node. To realize our routing scheme, we use two different utilities of nodes depending on location: Outside the home base of a message, nodes approaching to the home base have high utility values, while within the home base, nodes staying the home base have high utility values. By using these utilities properly, nodes with message copies will catch the destination node “by ambush” in the home base of the destination node. Through simulation experiments, we demonstrate the effectiveness of our routing scheme.

  • A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks

    Dongxu CHENG  Jianwei LIU  Zhenyu GUAN  Tao SHANG  

     
    PAPER-Information Network

      Pubricized:
    2016/07/21
      Vol:
    E99-D No:11
      Page(s):
    2716-2722

    Established in self-organized mode between mobile terminals (MT), mobile Ad Hoc networks are characterized by a fast change of network topology, limited power dissipation of network node, limited network bandwidth and poor security of the network. Therefore, this paper proposes an efficient one round certificateless authenticated group key agreement (OR-CLAGKA) protocol to satisfy the security demand of mobile Ad Hoc networks. Based on elliptic curve public key cryptography (ECC), OR-CLAGKA protocol utilizes the assumption of elliptic curve discrete logarithm problems (ECDLP) to guarantee its security. In contrast with those certificateless authenticated group key agreement (GKA) protocols, OR-CLAGKA protocol can reduce protocol data interaction between group users and it is based on efficient ECC public key infrastructure without calculating bilinear pairings, which involves negligible computational overhead. Thus, it is particularly suitable to deploy OR-CLAGKA protocol on MT devices because of its limited computation capacity and power consumption. Also, under the premise of keeping the forward and backward security, OR-CLAGKA protocol has achieved appropriate optimization to improve the performance of Ad Hoc networks in terms of frequent communication interrupt and reconnection. In addition, it has reduced executive overheads of key agreement protocol to make the protocol more suitable for mobile Ad Hoc network applications.

  • Location-Aware Forwarding and Caching in CCN-Based Mobile Ad Hoc Networks

    Rana Asif REHMAN  Byung-Seo KIM  

     
    LETTER-Information Network

      Pubricized:
    2016/02/17
      Vol:
    E99-D No:5
      Page(s):
    1388-1391

    Content centric network (CCN) is conceived as a good candidate for a futuristic Internet paradigm due to its simple and robust communication mechanism. By directly applying the CCN paradigm in wireless multihop mobile ad hoc networks, we experience various kind of issues such as packet flooding, data redundancy, packet collisions, and retransmissions etc., due to the broadcast nature of the wireless channel. To cope with the problems, in this study, we propose a novel location-aware forwarding and caching scheme for CCN-based mobile ad hoc networks. Extensive simulations are performed by using simulator, named ndnSIM. Experiment results show that proposed scheme does better as compared to other schemes in terms of content retrieval time and the number of Interest retransmissions triggered in the network.

  • Energy Aware Forwarding in Content Centric Based Multihop Wireless Ad Hoc Networks

    Rana Asif REHMAN  Byung-Seo KIM  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E98-A No:12
      Page(s):
    2738-2742

    Content centric networking (CCN) is a newly proposed futuristic Internet paradigm in which communication depends on the decoupling of content names from their locations. In CCN-based multihop wireless ad hoc networks, the participating nodes show dynamic topology, intermittent connectivity, channels fluctuation, and severe constraints such as limited battery power. In the case of traffic congestion, the affected nodes die early owing to the shortage of battery power. Consequently, all pending request entries are also destroyed, which further degrades the network performance as well as the node working lifetime. In this study, we have proposed a novel energy aware transmission scheme in which the forwarding mechanism is based on a node's residual energy. The proposed scheme is evaluated using official ndnSIM. This scheme enhances performance in terms of content retrieval time and total Interest transmission in the network.

  • Throughput Capacity Study for MANETs with Erasure Coding and Packet Replication

    Bin YANG  Yin CHEN  Guilin CHEN  Xiaohong JIANG  

     
    PAPER-Network

      Vol:
    E98-B No:8
      Page(s):
    1537-1552

    Throughput capacity is of great importance for the design and performance optimization of mobile ad hoc networks (MANETs). We study the exact per node throughput capacity of MANETs under a general 2HR-(g, x, f) routing scheme which combines erasure coding and packet replication techniques. Under this scheme, a source node first encodes a group of g packets into x (x ≥ g) distinct coded packets, and then replicates each of the coded packets to at most f relay nodes which help to forward them to the destination node. All original packets can be recovered once the destination node receives any g distinct coded packets of the group. To study the throughput capacity, we first construct two absorbing Markov chain models to depict the complicated packet delivery process under the routing scheme. Based on these Markov models, an analytical expression of the throughput capacity is derived. Extensive simulation and numerical results are provided to verify the accuracy of theoretical results on throughput capacity and to illustrate how system parameters will affect the throughput capacity in MANETs. Interestingly, we find that the replication of coded packets can improve the throughput capacity when the parameter x is relatively small.

  • A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks

    Firoz AHMED  Seokhoon YOON  Hoon OH  

     
    PAPER-Network

      Vol:
    E98-B No:3
      Page(s):
    422-436

    In mobile ad hoc networks, a malicious node can respond with a faked route reply (RREP) message to a source that explores a route in order to make the source establish a false route leading to the malicious node. Then, the malicious node can absorb all transmitted packets like a black hole. This paper proposes a totally secure defense against the black hole attack with low control overhead and high reliability. The proposed approach, named a bullet-proof verification (BPV) method, consists of a detection phase, in which a node detects a suspicious node by analyzing the data routing information of its neighbors and a verification phase, in which a node initiates the verification of a suspicious node conditionally only if it receives RREP from the suspicious node. The crux of this approach lies in using an encrypted verification message that goes straight to the destination through the path that may include some malicious nodes and also in using both destination sequence number and hop distance for verification. In addition, a distributed watchdog mechanism is employed to track down any malicious nodes. Simulation results show that the BPV approach reduces control overhead significantly and defends against black hole attack reliably.

  • Greedy Zone Epidemic Routing in Urban VANETs

    Guangchun LUO  Haifeng SUN  Ke QIN  Junbao ZHANG  

     
    PAPER-Network

      Vol:
    E98-B No:1
      Page(s):
    219-230

    The potential of infrastructureless vehicular ad hoc networks (VANETs) for providing multihop applications is quite significant. Although the Epidemic Routing protocol performs well in highly mobile and frequently disconnected VANETs with low vehicle densities or light packet traffic loads, its performance degrades greatly in environments of high vehicle density together with heavy packet traffic loads that create serious bandwidth contention and frequent collisions. We propose a new epidemic routing protocol in urban environments called Greedy Zone Epidemic Routing (GZER), in which the neighbors of a vehicle are divided into different zones according to their physical locations. Each vehicle maintains a summary vector (SV) of packets buffered locally and zone summary vectors (ZSVs) of all packets buffered in each zone. Whether the infection will be transmitted in each zone is decided by the difference between SV and ZSV. Simulation results show that the proposed GZER protocol outperforms the existing solutions significantly, especially in the environments of high vehicle densities together with heavy packet traffic loads.

  • MPVUS: A Moving Prediction Based Video Streaming Uploading Scheme over Vehicular Networks

    Xiaojin ZHU  Jingping BI  Jianhang LIU  

     
    PAPER

      Vol:
    E98-A No:1
      Page(s):
    304-312

    Video streaming uploading over vehicular ad hoc networks (VANETs) can support many interesting applications. Due to the high mobility and dynamic topology of VANETs, how to support video streaming using wireless communications between vehicles and road-side access points still remains an open issue. In this paper, we propose a geographical uploading scheme, called MPVUS, which uses the moving prediction to keep the stable forwarding and reduce the high link failure probability over VANETs. The scheme also decides the AP switch opportunity by traffic flow estimation, so as to adjust the forwarding direction timely to avoid the short-sighted switch decision. Simulation results demonstrate the effectiveness of our scheme, which can achieve good performance in terms of the start-up delay, playback interruption ratio and video frame distortion.

  • Location-Aware Store-Carry-Forward Routing Based on Node Density Estimation

    Tomotaka KIMURA  Takahiro MATSUDA  Tetsuya TAKINE  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    99-106

    We consider a location-aware store-carry-forward routing scheme based on node density estimation (LA Routing in short), which adopts different message forwarding strategies depending on node density at contact locations where two nodes encounter. To do so, each node estimates a node density distribution based on information about contact locations. In this paper, we clarify how the estimation accuracy affects the performance of LA Routing. We also examine the performance of LA Routing when it applies to networks with homogeneous node density. Through simulation experiments, we show that LA Routing is fairly robust against the accuracy of node density estimation and its performance is comparable with Probabilistic Routing even in the case that that node density is homogeneous.

  • Future Channel Utilization-Aware Routing for Cognitive Radio Ad Hoc Networks

    Celimuge WU  Juan XU  Yusheng JI  Satoshi OHZAHATA  Toshihiko KATO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    107-115

    Cognitive radio ad hoc networks can be used to solve the problems of limited available spectrum and inefficient spectrum usage by adaptively changing their transmission parameters. Routing protocol design has a significant impact on the network performance. However, an efficient protocol that takes account of primary user flows and the long-term channel assignment issue in route selection is still missing. In this paper, we propose AODV-cog, a cognitive routing protocol for CSMA/CA ad hoc networks based on AODV. AODV-cog chooses a route by considering the effect on the primary users, available channel bandwidth and link reliability. AODV-cog also takes account of future channel utilization which is an important but underexplored issue. AODV-cog switches channels for secondary user flows when network congestion occurs. We use theoretical analysis and computer simulations to show the advantage of AODV-cog over existing alternatives.

  • Outage and Density of Transport of Four-Way Handshaking with Imperfect Feedback in a Mobile Multi-Hop Ad Hoc Network

    Thomas BOURGEOIS  Shigeru SHIMAMOTO  

     
    PAPER-Network

      Vol:
    E97-B No:12
      Page(s):
    2720-2728

    In this paper, we present a new mathematical framework based on point process theory for a type of four-way handshake-based medium access control schemes which have so far only been studied by simulation. The theoretical model we present takes into account time-varying channel impairments, the interference inherent to large networks, different decoding requirements for each packet and the influence of the routing protocol. Moreover, in contrast with the majority of the literature, the influence of imperfect feedback is also considered in the analysis. Throughout the paper, we derive in closed forms the average link outage probability as well as the Average Spatial Density of Transport (ASDT) in a mobile multi-hop ad hoc network. All results are confirmed by comparison to simulated data and lead to two general conclusions. In the presence of fading uncorrelated between traffic and control handshakes, we observe the following. 1) Optimal contention is achieved by designing control packets that are decodable even in the presence of strong interference. 2) The impact of imperfect feedback on performance in an interference-limited mobile ad hoc network is not negligible.

  • DYN-MAC: A MAC Protocol for Cognitive Radio Networks with Dynamic Control Channel Assignment

    Zaw HTIKE  Choong Seon HONG  Sungwon LEE  Ilkwon CHO  

     
    PAPER

      Vol:
    E97-B No:8
      Page(s):
    1577-1585

    Cognitive radio is one of the most promising wireless technologies and has been recognized as a new way to improve the spectral efficiency of wireless networks. In a cognitive radio network, secondary users exchange control information for network coordination such as transmitter-receiver handshakes, for sharing spectrum sensing results, for neighbor discovery, to maintain connectivity, and so on. Spectrum utilization and resource optimizations thus rely on information exchange among secondary users. Normally, secondary users exchange the control information via a predefined channel, called a common control channel (CCC). Most of the medium access control (MAC) protocols for cognitive radio networks were designed by assuming the existence of a CCC, and further assuming that it was available for every secondary user. However, the main drawback of using a static CCC is it is susceptible to primary user activities since the channel can be occupied by primary users at any time. In this paper, we propose a MAC protocol for cognitive radio networks with dynamic control channel assignment, called DYN-MAC. In DYN-MAC, a control channel is dynamically assigned based on spectrum availability. Thus, it can tolerate primary user activities. DYN-MAC also supports collision free network-wide broadcasting and addresses other major problems such as primary/secondary user hidden terminal problems.

  • ACK-CAST: ACK-Based Broadcast Protocol for Vehicular Ad Hoc Networks

    Ajmal KHAN  Jae-Choong NAM  You-Ze CHO  

     
    PAPER-Network

      Vol:
    E97-B No:5
      Page(s):
    960-966

    In vehicular ad hoc networks, the efficient and reliable dissemination of emergency messages in a highly mobile environment under dense or sparse network is a significant challenge. This paper proposes a new vehicular broadcast protocol, called ACK-CAST, that can operate effectively in both dense and sparse network scenarios. ACK-CAST relies on acknowledgment messages from one-hop neighbors to select the next rebroadcasting vehicle. Simulation results show that ACK-CAST outperforms the SERVUS protocol in terms of the end-to-end delay, message delivery ratio and network overhead.

  • Geographic Cooperative Routing for Minimum Symbol Error Rate in Wireless Multihop Networks

    Yu TIAN  Linhua MA  Bo SONG  Hong TANG  Song ZHANG  Xing HU  

     
    PAPER-Network

      Vol:
    E97-B No:2
      Page(s):
    441-449

    Much work in cooperative communication has been done from the perspective of the physical and network layers. However, the exact impact of signal error rate performance on cooperative routing discovery still remains unclear in multihop ad hoc networks. In this paper, we show the symbol error rate (SER) performance improvement obtained from cooperative commutation, and examine how to incorporate the factor of SER into the distributed routing discovery scheme called DGCR (Dynamic Geographic Cooperative Routing). For a single cooperative communication hop, we present two types of metric to specify the degree that one node is suitable for becoming the relay node. One metric is the potential of a node to relay with optimal SER performance. The other metric is the distance of a node to the straight line that passes through the last forwarding node and the destination. Based on location knowledge and contention scheme, we combine the two metrics into a composite metric to choose the relay node. The forwarding node is chosen dynamically according to the positions of the actual relay node and the destination. Simulation results show that our approach outperforms non-cooperative geographic routing significantly in terms of symbol error rate, and that DGCR's SER performance is better than traditional geographic cooperative routing with slight path length increase.

  • Cooperative Message Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

    Zaw HTIKE  Choong Seon HONG  Sungwon LEE  

     
    PAPER-Communication Theory and Signals

      Vol:
    E96-A No:11
      Page(s):
    2099-2105

    Broadcasting is an essential function in almost all wireless networks. Because of the dynamic nature of environment, broadcasting in cognitive radio ad hoc networks is a great challenge. Cognitive radio network technology has been well studied for more than a decade as a new way to improve the spectral efficiency of wireless networks and numerous precious works have been proposed. However, very few existing works consider how to broadcast messages in cognitive radio networks that operate in multichannel environments and none of these provides a full broadcast mechanism. Therefore, in this paper, we propose a broadcasting mechanism for multichannel cognitive radio ad hoc networks. Then, we analyze the mechanism regarding the speed of message dissemination, number of transmissions, fraction of the users that receive the broadcast message and so forth.

  • Practical Solution for Broadcasting in VANETs Using Neighbor Information

    Celimuge WU  Satoshi OHZAHATA  Toshihiko KATO  

     
    PAPER-Network

      Vol:
    E96-B No:11
      Page(s):
    2856-2864

    Due to vehicle movement and lossy wireless channels, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks (VANETs) is a well-known challenging problem. In this paper, we propose BR-NB (broadcast with neighbor information), a fuzzy logic based multi-hop broadcast protocol for VANETs. BR-NB achieves a low overhead by using only a subset of neighbor nodes to relay data packets. For the relay node selection, BR-NB jointly considers multiple metrics of the inter-vehicle distance, vehicle mobility and link quality by employing fuzzy logic. Since the expected coverage and vehicle mobility are inferred from the two-hop neighbor information which can be acquired from the hello message exchange, BR-NB is independent of position information. BR-NB provides a practical and portable solution for broadcast services in VANETs. We use computer simulations and real-world experiments to evaluate the performance of BR-NB.

  • Time-Delayed Collaborative Routing and MAC Protocol for Maximizing the Network Lifetime in MANETs

    Woncheol CHO  Daeyoung KIM  

     
    PAPER-Network

      Vol:
    E96-B No:9
      Page(s):
    2213-2223

    This paper proposes T-CROM (Time-delayed Collaborative ROuting and MAC) protocol, that allows collaboration between network and MAC layers in order to extend the lifetime of MANETs in a resources-limited environment. T-CROM increases the probability of preventing energy-poor nodes from joining routes by using a time delay function that is inversely proportional to the residual battery capacity of intermediate nodes, making a delay in the route request (RREQ) packets transmission. The route along which the first-arrived RREQ packet traveled has the smallest time delay, and thus the destination node identifies the route with the maximum residual battery capacity. This protocol leads to a high probability of avoiding energy-poor nodes and promotes energy-rich nodes to join routes in the route establishment phase. In addition, T-CROM controls the congestion between neighbors and reduces the energy dissipation by providing an energy-efficient backoff time by considering both the residual battery capacity of the host itself and the total number of neighbor nodes. The energy-rich node with few neighbors has a short backoff time, and the energy-poor node with many neighbors gets assigned a large backoff time. Thus, T-CROM controls the channel access priority of each node in order to prohibit the energy-poor nodes from contending with the energy-rich nodes. T-CROM fairly distributes the energy consumption of each node, and thus extends the network lifetime collaboratively. Simulation results show that T-CROM reduces the number of total collisions, extends the network lifetime, decreases the energy consumption, and increases the packet delivery ratio, compared with AOMDV with IEEE 802.11 DCF and BLAM, a battery-aware energy efficient MAC protocol.

1-20hit(118hit)