PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Multiobjective Design of Wireless Ad Hoc Networks: Security, Real-Time and Lifetime

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper deals with the tradeoffs between security, real-time and lifetime performance. Due to the multihop nature of communication wireless ad hoc networks are very vulnerable to attacks. Malicious nodes included in a routing path may misbehave and organize attacks such as black holes. Scaling the number of hops for a packet delivery we trade off energy efficiency against security and real-time communication. To study the multihop communication we propose a hierarchical communication model. The REWARD (receive, watch, redirect) algorithm for secure routing is employed as a main example for corrective actions. Symmetrical routing is a distinguish feature of protocols such as REWARD and we outline the threshold of conflict between power-efficient partitioning of communication links and symmetrical routing.
Rocznik
Tom
Strony
13--21
Opis fizyczny
Bibliogr. 29 poz., rys.
Twórcy
autor
  • Department of Computer Systems, Technical University of Sofia, Kliment Ohridski st 8, Sofia 1000, Bulgaria, zgk@tu-sofia.bg
Bibliografia
  • [1] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks”, ACM Wirel. Netw. J., vol. 8, no. 5, pp. 481–494, 2002.
  • [2] W. Ye, J. Heidemann, and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks”, IEEE/ACM Trans. Netw., vol. 12, no. 3, pp. 493–506, 2004.
  • [3] S. Biswas and R. Morris, “Opportunistic routing in multi-hop wireless networks”, ACM SIGCOMM Comput. Commun. Rev., vol. 34, iss. 1, pp. 69–74, 2004.
  • [4] D. Dewasurendra and A. Mishra, “Design challenges in energy-efficient medium access control for wireless sensor networks”, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 28-1–28-25.
  • [5] V. Zadorozhny, D. Sharma, P. Krishnmurthy, and A. Labrinidis, “Tuning query performance in mobile sensor databases”, in Proc. 6th Int. Conf. Mob. Data Manage., Ayia Napa, Cyprus, 2005, pp. 247–251.
  • [6] Z. Karakehayov and N. Andersen, “Energy-efficient medium ac- cess for data intensive wireless sensor networks”, in Proc. Int. Worksh. Data Intens. Sens. Netw. 8th Int. Conf. Mob. Data Manage., Mannheim, Germany, 2007, pp. 116–120.
  • [7] J. L. Gao, “Energy efficient routing for wireless sensor networks”, Ph.D. thesis, University of California, Los Angeles, 2000.
  • [8] J. M. Rabaey, M. J. Ammer, J. L. Silva, D. Patel, and S. Roundy, “PicoRadio supports ad hoc ultra-low power wireless networking”, IEEE Computer, vol. 33, pp. 42–48, July 2000.
  • [9] I. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and actor networks: research challenges”, Ad Hoc Netw., no. 2, pp. 351–367, 2004.
  • [10] Z. Karakehayov, “Low-power communication for wireless sensoractuator networks”, in Proc. Fifth IASTED Int. Conf. Commun. Syst. Netw., Palma de Mallorca, Spain, 2006, pp. 1–6.
  • [11] T.Moscibroda, R. O’Dell, M.Wattenhofer, and R.Wattenhofer, “Virtual coordinates for ad hoc and sensor networks”, in Proc. ACM Joint Worksh. Found. Mob. Comp., Philadelphia, USA, 2004.
  • [12] D. Puccinelli and M. Haenggi. “Wireless sensor networks: applications and challenges of ubiquitous sensing”, IEEE Circ. Syst. Mag., pp. 19–29, 3rd quart. 2005.
  • [13] Z. Karakehayov, K. S. Christensen, and O. Winther, Embedded Systems Design with 8051 Microcontrollers. New York: Dekker, 1999.
  • [14] T. Stoyanova, F. Kerasiotis, A. Prayati, and G. Papadopoulos, “Evaluation of impact factors on RSS accuracy for localization and tracking applications”, in Proc. 5th ACM Int. Worksh. Mob. Manage. Wirel. Acc., Chania, Greece, 2007, pp. 9–16.
  • [15] V. Swaminathan, Y. Zou, and K. Chakrabarty, “Techniques to reduce communication and computation energy in wireless sensor networks”, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 29-1–29-34.
  • [16] M. T. Schmitz, B. M. Al-Hashimi, and P. Eles, System-Level Design Techniques for Energy-Efficient Embedded Systems. Boston: Kluwer, 2004.
  • [17] Z. Karakehayov, “Dynamic clock scaling for energy-aware embedded systems”, in Proc. IEEE Fourth Int. Worksh. Intell. Data Acquis. Adv. Comp. Syst., Dortmund, Germany, 2007, pp. 96–99.
  • [18] H. Takagi and L. Kleinrock, “Optimal transmission ranges for randomly distributed packet radio terminals”, IEEE Trans. Commun., vol. 32, no. 3, pp. 246–257, 1984.
  • [19] I. Stojmenovic and X. Lin, “Power aware localized routing in wireless networks”, IEEE Trans. Parall. Distr. Syst., vol. 12, no. 11, pp. 1122–1133, 2001.
  • [20] Z. Karakehayov, “Low-power design for Smart Dust networks”, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 37-1–37-12.
  • [21] F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, “An Aloha protocol for multihop mobile wireless networks”, in Proc. ITC Spec. Sem. Perform. Eval. Wirel. Mob. Syst., Antwerp, Belgium, 2004.
  • [22] Z. Karakehayov, “Security – lifetime tradeoffs for wireless sensor networks”, in Proc. 12th IEEE Int. Conf. Emerg. Technol. Fact. Autom., Patras, Greece, 2007, pp. 646–650.
  • [23] E. M. Royer and C. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, IEEE Pers. Commun., vol. 6, no. 2, pp. 46–55, 1999.
  • [24] G. Zhou, T. He, S. Krishnamurthy, and J. Stankovic, “Models and solutions for radio irregularity in wireless sensor networks”, ACM Trans. Sens. Netw., vol. 2, no. 2, pp. 221–262, 2006.
  • [25] Z. Karakehayov and Z. Monov, “Target-aware timing modelling for wireless ad-hoc networks”, in Proc. Int. Sci. Conf. Comput. Sci. 2006, Istanbul, Turkey, 2006, pp. 54–59.
  • [26] N. Sastry, U. Shankar, and D. Wagner. “Secure verification of location claims”, in Proc. 2003 ACM Works. Wirel. Secur., San Diego, USA. 2003.
  • [27] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Netw., no. 1, pp. 293–315, 2003.
  • [28] H. Qi, S. S. Iyengar, and K. Chakrabarty, “Multiresolution data integration using mobile agents in distributed sensor networks”, IEEE Trans. Syst. Man Cyber. Part C: Appl. Rev., vol. 31, no. 3, pp. 383–391, 2001.
  • [29] Q. Wu, N. S. V. Rao, R. R. Brooks, S. S. Iyengar, and M. Zhu, “Computational and networking problems in distributed sensor networks”, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 25-1–25-17.
  • [10] Z. Karakehayov, “Low-power communication for wireless sensoractuator networks”, in Proc. Fifth IASTED Int. Conf. Commun. Syst. Netw., Palma de Mallorca, Spain, 2006, pp. 1–6.
  • [11] T.Moscibroda, R. O’Dell, M.Wattenhofer, and R.Wattenhofer, “Virtual coordinates for ad hoc and sensor networks”, in Proc. ACM Joint Worksh. Found. Mob. Comp., Philadelphia, USA, 2004.
  • [12] D. Puccinelli and M. Haenggi. “Wireless sensor networks: applications and challenges of ubiquitous sensing”, IEEE Circ. Syst. Mag., pp. 19–29, 3rd quart. 2005.
  • [13] Z. Karakehayov, K. S. Christensen, and O. Winther, Embedded Sys- tems Design with 8051 Microcontrollers. New York: Dekker, 1999.
  • [14] T. Stoyanova, F. Kerasiotis, A. Prayati, and G. Papadopoulos, “Evaluation of impact factors on RSS accuracy for localization and tracking applications”, in Proc. 5th ACM Int. Worksh. Mob. Manage. Wirel. Acc., Chania, Greece, 2007, pp. 9–16.
  • [15] V. Swaminathan, Y. Zou, and K. Chakrabarty, “Techniques to re- duce communication and computation energy in wireless sensor networks”, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 29-1–29-34.
  • [16] M. T. Schmitz, B. M. Al-Hashimi, and P. Eles, System-Level Design Techniques for Energy-Efficient Embedded Systems. Boston: Kluwer, 2004.
  • [17] Z. Karakehayov, “Dynamic clock scaling for energy-aware embedded systems”, in Proc. IEEE Fourth Int. Worksh. Intell. Data Acquis. Adv. Comp. Syst., Dortmund, Germany, 2007, pp. 96–99.
  • [18] H. Takagi and L. Kleinrock, “Optimal transmission ranges for ran- domly distributed packet radio terminals”, IEEE Trans. Commun., vol. 32, no. 3, pp. 246–257, 1984.
  • [19] I. Stojmenovic and X. Lin, “Power aware localized routing in wireless networks”, IEEE Trans. Parall. Distr. Syst., vol. 12, no. 11, pp. 1122–1133, 2001.
  • [20] Z. Karakehayov, “Low-power design for Smart Dust networks”, In Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 37-1–37-12.
  • [21] F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, “An Aloha protocol for multihop mobile wireless networks”, in Proc. ITC Spec. Sem. Perform. Eval. Wirel. Mob. Syst., Antwerp, Belgium, 2004.
  • [22] Z. Karakehayov, “Security – lifetime tradeoffs for wireless sensor networks”, in Proc. 12th IEEE Int. Conf. Emerg. Technol. Fact. Autom., Patras, Greece, 2007, pp. 646–650.
  • [23] E. M. Royer and C. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, IEEE Pers. Commun., vol. 6, no. 2, pp. 46–55, 1999.
  • [24] G. Zhou, T. He, S. Krishnamurthy, and J. Stankovic, “Models and solutions for radio irregularity in wireless sensor networks”, ACM Trans. Sens. Netw., vol. 2, no. 2, pp. 221–262, 2006.
  • [25] Z. Karakehayov and Z. Monov, “Target-aware timing modelling for wireless ad-hoc networks”, in Proc. Int. Sci. Conf. Comput. Sci. 2006, Istanbul, Turkey, 2006, pp. 54–59.
  • [26] N. Sastry, U. Shankar, and D. Wagner. “Secure verification of location claims”, in Proc. 2003 ACM Works. Wirel. Secur., San Diego, USA. 2003.
  • [27] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Netw., no. 1, pp. 293–315, 2003.
  • [28] H. Qi, S. S. Iyengar, and K. Chakrabarty, “Multiresolution data integration using mobile agents in distributed sensor networks”, IEEE Trans. Syst. Man Cyber. Part C: Appl. Rev., vol. 31, no. 3, pp. 383–391, 2001.
  • [29] Q. Wu, N. S. V. Rao, R. R. Brooks, S. S. Iyengar, and M. Zhu, “Computational and networking problems in distributed sensor networks”, in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, Eds. Boca Raton: CRC Press LLC, 2005, pp. 25-1–25-17.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT8-0016-0014
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.