Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Author: Soufiene Djahel

Publisher: GRIN Verlag

Published: 2011-10-28

Total Pages: 170

ISBN-13: 3656041024

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.


Routing for Wireless Multi-Hop Networks

Routing for Wireless Multi-Hop Networks

Author: Sherin Abdel Hamid

Publisher: Springer Science & Business Media

Published: 2013-01-18

Total Pages: 81

ISBN-13: 1461463572

DOWNLOAD EBOOK

The focus of this brief is to identify what unifies and what distinguishes the routing functions in four wireless multi-hop network paradigms. The brief introduces a generic routing model that can be used as a foundation of wireless multi-hop routing protocol analysis and design. It demonstrates that such model can be adopted by any wireless multi-hop routing protocol. Also presented is a glimpse of the ideal wireless multi-hop routing protocol along with several open issues.


Security and Routing in Wireless Networks

Security and Routing in Wireless Networks

Author: Yang Xiao

Publisher: Nova Publishers

Published: 2005

Total Pages: 336

ISBN-13: 9781594543166

DOWNLOAD EBOOK

With the advance of wireless networks, building reliable and secured network connections is becoming extremely important. On the other hand, ad hoc networks become especially important and have many useful applications. The primary focus of this book is to present these two hot and rapidly evolving areas in wireless networks. Security and scheduling/routing in wireless networks remain challenging research problems due to the complexity involved. How to develop more efficient and reliable wireless networks remains a hot research area. It is this realisation that has motivated the editing of this book. The goal of the book is to serve as a reference for both security in wireless networks and channel access, scheduling, and routing in ad hoc networks. In this book, the authors review important developments and new strategies for these topics. Important features and limitations of methods and models are identified. Consequently, this book can serve as a useful reference for researchers, educators, graduate students, and practitioners in the field of wireless networks. This book contains 14 invited chapters from prominent researchers working in this area around the world. All of the cha


Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications

Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications

Author: Yan Zhang

Publisher: CRC Press

Published: 2006-10-25

Total Pages: 634

ISBN-13: 1420013610

DOWNLOAD EBOOK

Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks, and ex


Wireless Mesh Networks

Wireless Mesh Networks

Author: Ekram Hossain

Publisher: Springer Science & Business Media

Published: 2007-11-20

Total Pages: 351

ISBN-13: 0387688390

DOWNLOAD EBOOK

This book collects articles featuring recent advances in the theory and applications of wireless mesh networking technology. The contributed articles, from the leading experts in the field, cover both theoretical concepts and system-level implementation issues. The book starts with the essential background on the basic concepts and architectures of wireless mesh networking and then presents advanced level materials in a step-by-step fashion.


IEEE 802 Wireless Systems

IEEE 802 Wireless Systems

Author: Bernhard H. Walke

Publisher: John Wiley & Sons

Published: 2007-01-11

Total Pages: 402

ISBN-13: 9780470058794

DOWNLOAD EBOOK

Throughout the next decade, 802 wireless systems will become an integral part of fourth generation (4G) cellular communication systems, where the convergence of wireless and cellular networks will materialize through support of interworking and seamless roaming across dissimilar wireless and cellular radio access technologies. IEEE 802 Wireless Systems clearly describes the leading systems, covering IEEE 802.11 WLAN, IEEE 802.15 WPAN, IEEE 802.16 WMAN systems’ architecture, standards and protocols (including mesh) with an instructive approach allowing individuals unfamiliar with wireless systems to follow and understand these technologies. Ranging from digital radio transmission fundamentals, duplex, multiplexing and switching to medium access control, radio spectrum regulation, coexistence and spectrum sharing, this book also offers new solutions to broadband multi-hop networking for cellular and ad hoc operation. The book Gives a comprehensive overview and performance evaluation of IEEE 802.11, 802.15 and 802.16 Includes a tutorial like introduction to the basics of wireless communication Discusses challenges in mesh/multi-hop relaying networks and provides profound solutions for their realization with 802 Wireless Systems Covers spectrum sharing on different levels and provides solutions for coexistence, cooperation and interworking of 802 Wireless Systems that are following the same or different standards, but share the same spectrum Includes a detailed overview and introduction on cognitive radio and dynamic spectrum access Accompanying website contains simulation software and provides slides of the figures and tables from the book ready for course presentation This book is an essential text for advanced undergraduate students with a basic working knowledge of wireless communication, graduate students and engineers working in the field of wireless communications.


Ad Hoc Wireless Networks

Ad Hoc Wireless Networks

Author: C. Siva Ram Murthy

Publisher: Pearson Education

Published: 2004-05-24

Total Pages: 1050

ISBN-13: 0132465698

DOWNLOAD EBOOK

Practical design and performance solutions for every ad hoc wireless network Ad Hoc Wireless Networks comprise mobile devices that use wireless transmission for communication. They can be set up anywhere and any time because they eliminate the complexities of infrastructure setup and central administration-and they have enormous commercial and military potential. Now, there's a book that addresses every major issue related to their design and performance. Ad Hoc Wireless Networks: Architectures and Protocols presents state-of-the-art techniques and solutions, and supports them with easy-to-understand examples. The book starts off with the fundamentals of wireless networking (wireless PANs, LANs, MANs, WANs, and wireless Internet) and goes on to address such current topics as Wi-Fi networks, optical wireless networks, and hybrid wireless architectures. Coverage includes: Medium access control, routing, multicasting, and transport protocols QoS provisioning, energy management, security, multihop pricing, and much more In-depth discussion of wireless sensor networks and ultra wideband technology More than 200 examples and end-of-chapter problems Ad Hoc Wireless Networks is an invaluable resource for every network engineer, technical manager, and researcher designing or building ad hoc wireless networks.


Security for Multi-hop Wireless Networks

Security for Multi-hop Wireless Networks

Author: Mohamed M. E. A. Mahmoud

Publisher: Springer Science & Business Media

Published: 2014-02-20

Total Pages: 110

ISBN-13: 3319046039

DOWNLOAD EBOOK

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.


Ad Hoc Wireless Networking

Ad Hoc Wireless Networking

Author: Xiuzhen Cheng

Publisher: Springer Science & Business Media

Published: 2004

Total Pages: 638

ISBN-13: 9781402077128

DOWNLOAD EBOOK

Ad Hoc Wireless Networking is the next big thing in communication. This volume reveals the state-of-the-art of ad hoc wireless networking in addition to giving the fundamentals of routing protocols. It covers the topics of security, TCP performance over wireless links, power conservation, location discovery, scalability, proactivity, routing protocols, computational geometry, and more. The 15 self-contained chapters are authored by experts in wireless networking and mobile computing. Audience: Both specialists and uninformed readers will find this volume stimulating and helpful.