Loading...
Search for: ad-hoc-networks
0.011 seconds
Total 208 records

    An identity-based network access control scheme for single authority MANETs

    , Article Proceedings - 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010, 6 December 2010 through 10 December 2010 ; December , 2010 , Pages 462-468 ; 9780769543055 (ISBN) Aghakazem Jourabbaf, N ; Movaghar, A ; Institute of Electrical and Electronics Engineers; IEEE Computer Society; IEEE Comput. Soc. Tech. Comm. Serv. Comput. (TCSC); Natural Science Foundation of China; Hangzhou Dianzi University ; Sharif University of Technology
    2010
    Abstract
    Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of how securely extend the network. In this paper, we present INAC, an identity-based network access control scheme for MANETs. In INAC, each node in the network must have an identity-based membership token in order to take part in network activities. Membership tokens have special formats, which not only guarantee security of non-compromised nodes, but also enable that nodes obtain identity-based membership tokens based on their trustworthiness. Through simulations we... 

    A network model for vehicular Ad hoc networks: an introduction to obligatory attachment rule

    , Article IEEE Transactions on Network Science and Engineering ; Volume 3, Issue 2 , 2016 , Pages 82-94 ; 23274697 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Kavousi, K ; Sharif University of Technology
    Abstract
    In the past few years, the study of complex networks has attracted the attention of researchers. Many real networks, ranging from technological networks such as the Internet to biological networks, have been considered as special types of complex networks. Through application of the network science, important structural properties of such networks have been analyzed and the mechanisms that form such characteristics have been introduced. In this paper, we address the structural characteristics of a technological network called Vehicular Ad hoc Networks (VANETs). Recent studies reveal that the communication graph of VANETs has some interesting characteristics including: the Gaussian degree... 

    Flopcoin: a cryptocurrency for computation offloading

    , Article IEEE Transactions on Mobile Computing ; Volume 17, Issue 5 , 2018 , Pages 1062-1075 ; 15361233 (ISSN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    During the last years, researche'rs have proposed solutions to help smartphones improve execution time and reduce energy consumption by offloading heavy tasks to remote entities. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices, giving birth to the Device-to-Device offloading paradigm. None of these strategies, though, offers any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that... 

    An Approach for Security Improvement in VANETs

    , M.Sc. Thesis Sharif University of Technology Ranjbar Bafqi, Vahid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Vehicular ad hoc networks are types of mobile ad hoc networks in which each automobile acts as an intelligent node and can have links to other automobiles and with equipments that are beside the road. The main difference between vehicular ad hoc networks and mobile ad hoc networks are in terms of higher speed of their components, extent, span and scale. One of the main concerns about designing vehicular ad hoc networks is users' security and protection of their privacy policy. Althoug a lot of protocols have been suggested for improvement of securities in these networks up to now, many research challenges regarding users' security and their privacy have been left and need to be considered... 

    Evaluation and design of beaconing in mobile wireless networks

    , Article Ad Hoc Networks ; Vol. 9, issue. 3 , 2011 , p. 368-386 ; ISSN: 15708705 Nayebi, A ; Karlsson, G ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, such as hello packets. Although a poorly designed beaconing scheme may lead to unnecessary energy usage or poor throughput, a systematic approach to analyze and select beaconing parameters is not provided in the literature. Here, we propose a model to study the beaconing efficiency using some measures such as the link lifetime, the probability of link establishment, and the delay to discover a new neighbor. The model is general and does not adhere to any particular mobility model; the only input from the mobility... 

    Verification of mobile ad hoc networks: An algebraic approach

    , Article Theoretical Computer Science ; Volume 412, Issue 28 , June , 2011 , Pages 3262-3282 ; 03043975 (ISSN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    2011
    Abstract
    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled transition systems (CLTSs), in which each transition label is parameterized with the set of topologies for which this transition is enabled. We illustrate how through model checking on CLTSs one can analyze mobility scenarios of MANET protocols. Furthermore, we show how by equational theory one can reason about MANETs consisting of a finite but unbounded set of nodes, in which all nodes deploy the same... 

    Equational reasoning on mobile ad hoc networks

    , Article Fundamenta Informaticae ; Volume 105, Issue 4 , 2010 , Pages 375-415 ; 01692968 (ISSN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    Abstract
    We provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. We exploit an extended algebra called Computed Network Theory to axiomatize restricted broadcast. It allows one to define the behavior of an ad hoc network with respect to the underlying topologies. We give a sound and ground-complete axiomatization for CNT terms with finite-state behavior, modulo what we call rooted branching computed network bisimilarity  

    Mobility analyzer: A framework for analysis and recognition of mobility traces in mobile Ad-Hoc networks

    , Article 3rd International Conference on New Technologies, Mobility and Security, 20 December 2009 through 23 December 2009 ; 2009 ; 9781424462735 (ISBN) Khaledi, M. J ; Hemmatyar, A. M. A ; Rabiee, H. R ; Mousavi, S. M ; Khaledi, M. H ; Sharif University of Technology
    Abstract
    Mobility is one of the most challenging issues in mobile Ad-Hoc networks which has a significant impact on performance of network protocols. To cope with this issue, the protocol designers should be able to analyze the movement of mobile nodes in a particular wireless network. In this paper, a new framework called Mobility Analyzer has been introduced for analysis and recognition of mobility traces. At first, the Mobility Analyzer acquires some mobility traces collected by GPS or generated with mobility simulators; then it calculates some mobility metrics which represent the movement behavior of the mobile nodes; finally it attempts to classify mobility traces into particular mobility models... 

    Truthful and secure routing in Ad Hoc networks with malicious and selfish nodes

    , Article International Journal of Security and its Applications ; Volume 3, Issue 1 , 2009 , Pages 117-128 ; 17389976 (ISSN) Kargar, M ; Ghodsi, M ; Sharif University of Technology
    Abstract
    Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are... 

    A cross layered scheme for broadcasting at intersections in vehicular ad hoc networks

    , Article Proceedings - 2009 International Conference on Future Networks, ICFN 2009, 7 March 2009 through 9 March 2009, Bangkok ; 2009 , Pages 13-17 ; 9780769535678 (ISBN) Nasri, A ; Fathy, M ; Hajisheykhi, R ; Sharif University of Technology
    2009
    Abstract
    In this paper, we illustrate the design of a cross layered MAC and routing solution for supporting the fast propagation of broadcast messages at intersections in a Vehicular Ad Hoc Network (VANET). One of the fundamental services in VANET is broadcasting, that is a challenging task due to different road topologies and network conditions. One of its challenges is broadcasting at intersections, because vehicles in different roads constituting an intersections can affect on broadcast process of other roads, message may not be propagated in some directions. In this paper we propose a cross layered method that by classifying vehicles based on their location and the road they move in, solves this... 

    Performance evaluation of mobile ad hoc networks in the presence of energy-based selfishness

    , Article 2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006, San Jose, CA, 1 October 2006 through 5 October 2006 ; 2006 ; 1424404258 (ISBN); 9781424404254 (ISBN) Ataie, E ; Movaghar, A ; Sharif University of Technology
    2006
    Abstract
    Cooperation of nodes for routing and packet forwarding is inevitable in a mobile ad hoc network. Selfishness in such networks is a significant challenge and can cause network performance to noticeably degrade. In this paper, we propose some new selfishness models elicited from psychological behavior of human beings. We also evaluate performance of MANET in the presence of different percentages of selfish nodes that act based on our selfishness models. Results show that energy-based selfishness is a serious problem that could affect performance depends on mobility of nodes, density of network, and time of simulation. This kind of selfishness needs a comprehensive mechanism to cope with and we... 

    Analysis and Evaluation of Real Timeliness and Safety of VANET

    , M.Sc. Thesis Sharif University of Technology Ahmadvand, Hossein (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    The increasing number of road accidents and fatalities have yielded the introduction of several solutions by related industries such as automobile manufacture. Proposed solutions can be classified into two categories: passive, such as airbags, and active such as ABS ad ITS-based technologies. Inter vehicles communication let the communication between vehicles(V2V) or between vehicles and road infrastructure (V2I) by relying on DSRC technology and standards. Intelligent Transportation System (ITS) has three main types of applications namely safety, traffic and commercial. Safety applications are the main goal of vehicular communication, and real time guarantee in safety applications is so... 

    Content Distribution Service Analysis in Vehicular Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Kananian, Borna (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    Car accident damages take about 7 percent of GPD of Iran every year. As a result of car accidents, the economy of the country is damaging irreparably. The amount of road casualties equals casualties in a complete war. Considering the aforementioned conditions, the researchers are thinking about new technologies to reduce the cost of the accidents. So the use of Vehicular ad-hoc Networks (VANET) is inevitable in the near future. Content distribution service is one of the emerging services of VANETs. This service is used in both safety and comfort related applications. Content distribution describes delivery of media content such as Video, Audio, Image, Text, Software, and Video Games over... 

    An adaptive contention window control for improving DCF throughput and fairness

    , Article European Journal of Scientific Research ; Volume 45, Issue 2 , 2010 , Pages 310-323 ; 1450216X (ISSN) Balador, A ; Ghasemivand, M ; Movaghar, A ; Jabbehdari, S ; Sharif University of Technology
    Abstract
    The IEEE 802.11 provides a MAC layer protocol for controlling competition among nodes to access the channel in wireless local area network. Recent works show that this standard has not suitable performances in mobile ad-hoc networks and especially in error prone channels. Many researchers proposed many algorithms to improve this standard like HBCWC (History Based Contention Window Control) scheme has significant performances but also has fairness problem. In this paper, we present a novel contentionbased protocol to improve fairness and throughput together. We use an array to keep history of network collision and based on array information, we optimize the contention window. The main point... 

    Security Issues and Challenges in Vehicular Ad hoc Networks (VANET)

    , M.Sc. Thesis Sharif University of Technology Feiz, Mohammad Mehdi (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    Vehicular ad hoc networks (VANETs) are currently attracting the attention of researchers around the world. They offer a wide range of applications improving road safety and driving comfort. Since VANET applications affect safety-of-life, data security in a vehicular system is mandatory. VANET is a special case of Mobile Ad hoc Network (MANET). Routing in VANET is a controversial issue. Furthermore, Security at routing level is so important because if the routing is compromised, other protocol layers on top of the network layer are also compromised. In this thesis, DSDV, DSR and AODV routing protocols are simulated to understand which of these protocols are suitable for VANET. Finding... 

    Real Time Location Finding for Vehicles in Transport Systems

    , M.Sc. Thesis Sharif University of Technology Sorush Arzani, Mohammad (Author) ; Hemmatyar, Afshin (Supervisor)
    Abstract
    In mobile ad hoc networks, having an efficient routing protocol to deal with dynamics in network topology, based on the user behavior learning, has a significant role in generating more accurate results. It is valuable to use a realistic mobility model in such networks so that the results from the simulation will reflect the actual reaction of mobile nodes in the real world. Using a realistic mobility model helps simulation to have more accurate results in comparison with other kinds of mobility models especially in a Vehicular Ad hoc Network (VANET). Before exchanging information between moving vehicles, the destination node should be located. However, the existing location service... 

    Improving Reliability of Routing Protocols in VANETs

    , M.Sc. Thesis Sharif University of Technology Chellisseril, Navid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor) ; Izadi, Mohammad ($item.subfieldsMap.e)
    Abstract
    Vehicular Ad-Hoc Network (VANET) is a special case of Mobile Ad-Hoc Network (MANET) which is rapidly emerging with some unique properties in which vehicles have the ability to communicate with each other without any preexisting centralized infrastructure and coordinator. VANETs help in improving road safety, traffic control and information as well as commercial applications. Performance of such kind of communication between vehicles depends on various routing protocols. Routing may be a great thought employed in VANET. Current routing protocols cannot perform efficient routing in both high and low density of vehicles environments. Therefore, we propose a hybrid reliable routing protocol for... 

    Analysis and Improvement of Cryptographic Protocols in Vehicular Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Aghabagherloo, Alireza (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    Vehicle Ad-hoc Network (VANET) is a type of mobile Ad-hoc network (MANETs) which vehicles are mobile nodes of this network and it can be used for various applications such as secure data sharing between vehicles, sending road information to vehicles, traffic controlling and reducing road accidents, also primary types of these networks are implemented in some systems such as “Waze” and “Balad”. On the other hand, if the security requirments are not provide in these networks, attackers can use this network to cause disruptions in this network, including intentional accidents, so providing security requirements in these networks seems necessary. Data authentication and preserving privacy of the... 

    A self-organizing approach to malicious detection in leader-based mobile ad-hoc networks

    , Article IFIP Wireless Days, Valencia ; 2013 ; 21569711 (ISSN); 9781479905423 (ISBN) Pari, S. M. A ; Noormohammadpour, M ; Salehi, M. J ; Khalaj, B. H ; Bagheri, H ; Katz, M ; Universitat Politecnica de Valencia ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    Task-based self-organizing algorithms have been proposed as a solution for the management of mobile ad-hoc networks (MANETs). Such algorithms assign tasks to nodes by sequentially selecting the best nodes as leaders. Since the correct functionality of such algorithms depends on the truthfulness of participant nodes, any misbehavior can disrupt the operation of the network due to absence of a centralized monitoring unit. In this paper, we consider the problem of malicious behavior in leader-based MANETs. Current solution analyzes the behavior of the leader by means of some checker nodes. This approach is vulnerable since a malicious checker can ruin the character of a normal behaving leader,... 

    Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets

    , Article 2015 6th International Conference on Information and Communication Systems, ICICS 2015, 7 April 2015 through 9 April 2015 ; April , 2015 , Pages 222-227 ; 9781479973491 (ISBN) Jahanian, M. H ; Amin, F ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Authentication is an essential security requirement in safety-related vehicle-to-vehicle applications in VANETs. TESLA is one of the most popular broadcast source authentication protocols proposed and standardized for this purpose. Having strict time constraints and being prone to GPS synchronization errors make the analysis of this protocol challenging. In this paper, we utilize a timed model checking approach based on timed colored Petri nets to model and verify TESLA considering its time-sensitive behaviors. In this way, we show how neglecting timing aspects in protocol design and in protocol modelling can lead to successfully launched attacks and erroneous analyses respectively, and how...