Loading...
Search for: mobile-ad-hoc-networks
0.01 seconds
Total 86 records

    An adaptive contention window control for improving DCF throughput and fairness

    , Article European Journal of Scientific Research ; Volume 45, Issue 2 , 2010 , Pages 310-323 ; 1450216X (ISSN) Balador, A ; Ghasemivand, M ; Movaghar, A ; Jabbehdari, S ; Sharif University of Technology
    Abstract
    The IEEE 802.11 provides a MAC layer protocol for controlling competition among nodes to access the channel in wireless local area network. Recent works show that this standard has not suitable performances in mobile ad-hoc networks and especially in error prone channels. Many researchers proposed many algorithms to improve this standard like HBCWC (History Based Contention Window Control) scheme has significant performances but also has fairness problem. In this paper, we present a novel contentionbased protocol to improve fairness and throughput together. We use an array to keep history of network collision and based on array information, we optimize the contention window. The main point... 

    A self-organizing approach to malicious detection in leader-based mobile ad-hoc networks

    , Article IFIP Wireless Days, Valencia ; 2013 ; 21569711 (ISSN); 9781479905423 (ISBN) Pari, S. M. A ; Noormohammadpour, M ; Salehi, M. J ; Khalaj, B. H ; Bagheri, H ; Katz, M ; Universitat Politecnica de Valencia ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    Task-based self-organizing algorithms have been proposed as a solution for the management of mobile ad-hoc networks (MANETs). Such algorithms assign tasks to nodes by sequentially selecting the best nodes as leaders. Since the correct functionality of such algorithms depends on the truthfulness of participant nodes, any misbehavior can disrupt the operation of the network due to absence of a centralized monitoring unit. In this paper, we consider the problem of malicious behavior in leader-based MANETs. Current solution analyzes the behavior of the leader by means of some checker nodes. This approach is vulnerable since a malicious checker can ruin the character of a normal behaving leader,... 

    An identity-based network access control scheme for single authority MANETs

    , Article Proceedings - 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010, 6 December 2010 through 10 December 2010 ; December , 2010 , Pages 462-468 ; 9780769543055 (ISBN) Aghakazem Jourabbaf, N ; Movaghar, A ; Institute of Electrical and Electronics Engineers; IEEE Computer Society; IEEE Comput. Soc. Tech. Comm. Serv. Comput. (TCSC); Natural Science Foundation of China; Hangzhou Dianzi University ; Sharif University of Technology
    2010
    Abstract
    Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of how securely extend the network. In this paper, we present INAC, an identity-based network access control scheme for MANETs. In INAC, each node in the network must have an identity-based membership token in order to take part in network activities. Membership tokens have special formats, which not only guarantee security of non-compromised nodes, but also enable that nodes obtain identity-based membership tokens based on their trustworthiness. Through simulations we... 

    Key Management for Large Scale Mobile Ad-hoc Networks

    , M.Sc. Thesis Sharif University of Technology Gharib, Mohammed (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    Mobile ad hoc networks have been attracted the attention of many researchers during last years. One of the major concerns faces such networks is the security issue. The root of this concern is the fact that the intermediate nodes have the responsibility of packet transportation and forwarding. The nodes inside the mobile ad hoc networks assumed to be trusty while they can read, change or drop the transported packets. Cryptography as the cornerstone of the security could be play an essential role in such networks. Any cryptosystem need some keys to be able to secure communications. In large scale mobile ad hoc networks storing the whole keys in all nodes is inefficient, if possible, due to... 

    Mobility Prediction in Mobile Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Khaledi, Mehrdad (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    Mobile ad hoc networks (MANETs) are the dynamically reconfigurable wireless networks in which mobile nodes communicate with each other without the need for any fixed infrastructure. In these networks mobile nodes are free to move, therefore, network topology changes rapidly. These changes can lead to significant performance degradations in network protocols. To cope with this, a desired solution is to predict movements of mobile nodes. In this way, we can be prepared for changes. This thesis proposes two mobility prediction methods. In both methods, each node uses the information extracted from its own history of movements to predict its future location. Results obtained by applying two... 

    A New Data Gathering Technique in Delay Tolarant Mobile Ad Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Zolghadr, Mahdi (Author) ; Sarbazi Azad, Hamid (Supervisor)
    Abstract
    Delay Tolerant Networks are a variation of Mobile Ad Hoc Networks, in which low density of nodes in the network area results in global disconnectivity among the nodes. In these networks, communication of data throughout the networks takes place by the means of mobility; nodes store data packets and carry them around the network and forward them to other nodes they encounter along the way. In these situations, a proper selection of data to be exchanged between nodes has a great impact on the quality of data distribution in the whole networks. There is a common assumption among most of the techniques presented in category of Delay Tolerant Networks. They assume the probability of more than two... 

    Improving Anomaly Detection Methods for Intrusion Detection in MANETS

    , M.Sc. Thesis Sharif University of Technology Javanmard,Fahime (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In recent decades, Securing mobile ad hoc networks has attracted much attention. Today, several security tools, such as intrusion detection systems are used in the network. Methods based IDS works on pattern recognition and anomaly detection are divided into two categories. Pattern recognition methods based on known attack patterns work with high detection rate, but do not have the ability to detect new attacks. Anomaly detection techniques have the ability to detect new attacks, but they have high false alarm rate.
    In this thesis, an anomaly detection system based on artificial immune designed, implemented and evaluated.For example, an anomaly detection methods such cases, a variety of... 

    Security Evaluation of Public Key Based Key Management in MANET

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Farzad (Author) ; Mohajeri, Javad (Supervisor)
    Abstract
    Due to popularity of mobile wireless devices, security of mobile ad hoc networks (MANETs) being more important than before. Traditional key management schemes based on symmetric key cryptography are became ineffective because of dynamic and infrastructureless nature of these networks.Recent studies are mainly based on traditional public key cryptography schemes and ID-based cryptography schemes. On the other hand, Contributory schemes seem suitable for MANETs because of their inherent self-organize property. Key update and Key revocation are the fundamental issues of key management schemes in mobile ad hoc networks. Certificateless public key cryptography, in addition to solve those issues,... 

    Mobility Pattern Recognition in Mobile Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Khaledi, Mojgan (Author) ; Afshin Hemmatyar, Ali Mohammad (Supervisor)
    Abstract
    Mobility is one of the most challenging issues in mobile Ad-Hoc networks which has a significant impact on performance of network protocols. To cope with this issue, the protocol designers should be able to analyze the movement of mobile nodes in a particular wireless network. In this thesis, a new framework called Mobility Analyzer has been proposed. At first, Mobility Analyzer categorizes mobility models based on their mobility characteristics; subsequently, it uses mobility metrics for evaluating mobility traces which are collected by GPS or generated by mobility simulators. Finally, Mobility Analyzer recognizes the mobility model of mobility traces based on mobility metrics and measures... 

    Improvement of Context-Based Routing Aproaches in Opportunistic Networks

    , M.Sc. Thesis Sharif University of Technology Rezaei, Maryam (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Along with the huge applications of wireless networks and creation of advanced wireless technologies, such as Bluetooth, WiFi, 3G and 4G, an evolution of Mobile Ad Hoc Networks emerged called opportunistic networks. In these networks, network topology is unpredictable; therefore, to send the message to the destination, moving nodes were used opportunistically. So one of the main challenges in this type of network is the routing problem. Amongst existing methods, methods that apply context information can help greatly to choose the right path. In this thesis a method was presented to gather information applying cell network classification and learning cellular automata, from the location of... 

    Truthful Routing in Mobile Ad Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Shirzad, Fatemeh (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    In Mobile Ad hoc Networks (MANETs), nodes depend on each other for routing and forwarding their packets. However, to save power and other resources, nodes belonging to independent authorities may behave selfishly, and not cooperate in network activities. Such selfish behaviour poses a real threat to the proper functioning of MANETs. To cope with this situation, a motivation stimulation mechanism is required to provide sufficient incentives for nodes to forward other nodes’ packets. One Appropriate approach is to have network nodes paid in order to motivate them to cooperate with protocol. To achieve truthfulness, the payment based on the cost of transmission of packets. Since the mentioned... 

    Trafic Prediction in MANET by Computational Intelligence Techniques

    , M.Sc. Thesis Sharif University of Technology Torkamanian Afshar, Mahsa (Author) ; Manzuri, Mohammad Taghi (Supervisor)
    Abstract
    Mobile Ad-Hoc Networks (MANETs) have been studied as one of the most important technologies in the mid to late 1990s. There are several research works on types of network traffic modeling and prediction. Therefore, a very important issue is to make prediction on traffic-flows that each node handles. Because of this, prediction permits us to improve and increase the performance of the network. This project is a contributing effort to improve the traffic packets prediction by Neural Networks in MANET. The main goal of this thesis is about the recovery of data after crisis in phenomenal roads and highways. Our goal is recognizing phenomenal crisis-points in roads. In this thesis packets are... 

    Evaluation and design of beaconing in mobile wireless networks

    , Article Ad Hoc Networks ; Vol. 9, issue. 3 , 2011 , p. 368-386 ; ISSN: 15708705 Nayebi, A ; Karlsson, G ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, such as hello packets. Although a poorly designed beaconing scheme may lead to unnecessary energy usage or poor throughput, a systematic approach to analyze and select beaconing parameters is not provided in the literature. Here, we propose a model to study the beaconing efficiency using some measures such as the link lifetime, the probability of link establishment, and the delay to discover a new neighbor. The model is general and does not adhere to any particular mobility model; the only input from the mobility... 

    A novel probabilistic key management algorithm for large-scale MANETs

    , Article Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops ; 2013 , Pages 349-356 ; 9780769549521 (ISBN) Gharib, M ; Emamjomeh Zadeh, E ; Norouzi Fard, A ; Movaghar, A ; Sharif University of Technology
    2013
    Abstract
    Mobile ad hoc networks (MANETs) have become very interesting during last years, but the security is the most important problem they suffer from. Asymmetric cryptography is a very useful solution to provide a secure environment in multihop networks where intermediate nodes are able to read, drop or change messages before resending them. However, storing all keys in every node by this approach is inefficient, if practically possible, in large-scale MANETs due to some limitations such as memory or process capability. In this paper, we propose a new probabilistic key management algorithm for large-scale MANETs. To the best of our knowledge, this is the first method which probabilistically uses... 

    An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs)

    , Article IFIP Wireless Days, Valencia ; 2013 ; 21569711 (ISSN) ; 9781479905423 (ISBN) Pari, S. M. A ; Salehi, M. J ; Noormohammadpour, M ; Khalaj, B. H ; Bagheri, H ; Katz, M ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    In this paper, we study the problem of leader selection in the presence of selfish nodes in mobile ad-hoc networks (MANETs). In order to encourage selfish nodes to assume the leadership role, some form of incentive mechanism is required. We present an incentive-based leader selection mechanism in which incentives are incorporated in the form of credit transfer to the leader, which motivates nodes to compete with each other for assuming the leadership role. The competition among nodes is modeled as a series of one-on-one incomplete information, alternating offers bargaining games. Furthermore, we propose an efficient algorithm in order to reduce the communication overhead imposed on the... 

    On the better performance of ADMR versus ODMRP

    , Article 2012 6th International Symposium on Telecommunications, IST 2012 ; 2012 , Pages 621-625 ; 9781467320733 (ISBN) Aghdam, S. M ; Khansari, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents a comparative performance analysis in more realistic scenario and more performance metrics of ADMR and ODMRP, two on-demand multicast routing protocols for Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSNs). There are a few comparison works done between two multicast Ad hoc routing protocols, ADMR and ODMRP; these works are not complete in terms of both performance metrics and realistic scenarios. Simulation results show an unusual low number of control packets transmitted per data packet delivered in ADMR, this low number of control packet transmitted per data packet in ADMR has caused some comparison works to judge to better performance of ADMR than... 

    Effect of traffic-load dependent vehicle routing algorithm on the connectivity in VANETs

    , Article IEEE Vehicular Technology Conference, 15 May 2011 through 18 May 2011 ; May , 2011 , Page(s): 1 - 5 ; 15502252 (ISSN) ; 9781424483310 (ISBN) Kazerooni, A ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we evaluate how traffic-load dependent vehicle routing at intersections is able to improve the connectivity status of all streets. To this end, we consider a VANET scenario, comprised of several streets and intersections. Then, we focus on two vehicle routing algorithms, one based on the distance to destination, i.e., traffic-load independent (TLI) algorithm, and another one based on both distance to destination and traffic load status of the local streets, i.e., traffic-load dependent (TLD) algorithm. By employing a simple mobility model based on an open BCMP queueing network, we derive the spatial traffic distribution at two cases. Afterwards, we propose a simple algorithm... 

    Verification of mobile ad hoc networks: An algebraic approach

    , Article Theoretical Computer Science ; Volume 412, Issue 28 , June , 2011 , Pages 3262-3282 ; 03043975 (ISSN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    2011
    Abstract
    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled transition systems (CLTSs), in which each transition label is parameterized with the set of topologies for which this transition is enabled. We illustrate how through model checking on CLTSs one can analyze mobility scenarios of MANET protocols. Furthermore, we show how by equational theory one can reason about MANETs consisting of a finite but unbounded set of nodes, in which all nodes deploy the same... 

    Improving security issues in MANET AODV routing protocol

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 1 September 2015 through 2 September 2015 ; Volume 155 , November , 2015 , Pages 237-250 ; 18678211 (ISSN) ; 9783319250663 (ISBN) Gharehkoolchian, M ; Hemmatyar, A. M. A ; Izadi, M ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vector (AODV) is one of the on-demand reactive routing protocols in MANET that initially was improved without considering security protection. Significant attempts have been done to secure AODV... 

    A distributed truthful routing protocol for mobile ad hoc networks

    , Article Proceedings of ICCIA 2010 - 2010 International Conference on Computer and Information Application, 2 November 2010 through 4 November 2010, Tianjin ; 2010 , Pages 133-140 ; 9781424485963 (ISBN) Shirzad, F ; Movaghar, A ; Shirzadeh, E ; Sharif University of Technology
    2010
    Abstract
    In Mobile Ad hoc Networks (MANETs), nodes depend on each other for routing and forwarding their packets. However, to save power and other resources, nodes belonging to independent authorities may behave selfishly, and not cooperate in network activities. Such selfish behaviour poses a real threat to the proper functioning of MANETs. To cope with this situation, a motivation stimulation mechanism is required to provide sufficient incentives for nodes to forward other nodes' packets. One appropriate approach is to have network nodes pay in order to motivate them to cooperate with the protocol. To achieve truthfulness, the payment should be based on the cost of transmission of packets. Since...