The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s...The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.展开更多
Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researche...Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET) is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2, NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation. Keywords Adhoc On-Demand Distance Vector (AODV) routing - Dynamic Source routing (DSR) - Mobile Adhoc Networks (MANET) - Wireless Networked Control Systems (WNCS) Mohammad Shahidul Hasan received his BSc and first MSc in Computer Science from the University of Dhaka, Bangladesh. He obtained his 2nd MSc in Computer & Network Engineering from Sheffield Hallam University, Sheffield, UK. Currently he is pursuing his PhD under the Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, UK in Networked Control Systems over MANET.Chris Harding received his BSc in Computing Science and Masters by Research from Staffordshire University, UK. Currently he is pursuing his PhD in Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.Hongnian Yu is Professor of Computer Science at Staffordshire University. He was a lecturer in Control and Systems Engineering at Yanshan University, China in 1985–1990, did his PhD in Robotics at King’s College London (1990–1994), was a research fellow in Manufacturing Systems at Sussex University (1994–1996), a lecturer in Artificial Intelligence at Liver-pool John Moore’s University (1996–1999), a lecturer in Control and Systems Engineering at the University of Exeter (1999–2002), and a Senior Lecturer in Computing at the University of Bradford (2002–2004). He now leads the Mobile Computing and Distributed Systems Research Group at Staffordshire University. He was a founding member of the Modeling Optimisation Scheduling and Intelligent Control research group at the University of Bradford. He has extensive research experience in neural networks, mobile computing, modeling, control of robot manipulators, and modeling, scheduling, planning, and simulations of large discrete event dynamic systems with applications to manufacturing systems, supply chains, transportation networks, and computer networks. He has published over 100 research papers focusing on the following: neural networks, computer networks, adaptive and robust control of robot manipulators, analysis and control of hybrid machines, control of timed delay systems, predictive control, manufacturing system modeling and scheduling, planning, and supply chains. He has held several research grants from EPSRC, the Royal Society, and the EU, as well as from industry. He was awarded the F.C. William Premium for his paper on adaptive and robust control of robot manipulators by the IEE Council in 1997. Professor Yu is an EPSRC college member, a member of IEEE, and a committee member of several conferences and journal editorial boards.Alison Griffiths has been a Senior Lecturer in Telecommunications at Staffordshire University since 2003. She was a lecturer in Computing at Staffordshire University in 2002–2003. She was a Research Associate on an EPSRC funded project whilst doing her PhD on the convergence of Mobile Computing and Telecommunications at Staffordshire University (1999–2003). The investigation consisted of the communication of different types of media (voice, video conferencing, web browsing, and downloading) over a common network, using a mobile device. Problems considered were the complications that occurred when a user moves, and consequently changes their end-point in the network during communication, with respect to the type of service the user is provided with (delays and losses). She obtained both her MEng and 1st Class BEng (Hons) from Staffordshire University in 1999 and 1998 respectively. She is now part of the Mobile Computing and Distributed Systems Research Group at Staffordshire University. She has published 8 research papers focusing on quality of service and access between cellular and IP packet switched networks. Future directions include mobile agents and control of mobile wireless ad-hoc networks. Her current research interests have extended to Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.展开更多
Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.I...Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.In healthcare applications,wireless body area network transmits the data,whereas the security,which is the most important concern to be focused in a flying adhoc network is not satisfactory.Many intruders tamper the network,degrading the overall network performance.To avoid security issues,a unique and secure routing protocol that provides a single solution for five different types of attacks such as,black hole attacks,grey hole attacks,yoyo attacks,conjoint attack and jamming attacks,is proposed.The simulation results analyses the network performance by using the proposed routing table.In comparison to the other solutions rendered to resolve the affected network,this proposed routing protocol has a higher throughput,higher delivery rate,and lower delay.The Unique and Secure Routing Protocol(USRP)provides an integrated solution for an efficient and secure communication in a flying adhoc network.展开更多
The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the thr...The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.展开更多
This paper presents coreagent based clustering (CBC) algorithm,a novel heuristic clustering scheme for interconnection of MANET and Internet using power,movement probability and hop length as constraints.CBC includes ...This paper presents coreagent based clustering (CBC) algorithm,a novel heuristic clustering scheme for interconnection of MANET and Internet using power,movement probability and hop length as constraints.CBC includes two phases as cluster initialization and cluster maintenance.In phase one,the selection of clusterheads obeys the first two constraints,whereas the father node of each clustering node is chosen according to above three ones.Phase two concerns the case of node insertion or removal.Easy access and little alteration of conventional mobile IP are some characters of this algorithm.Simulation results demonstrate that CBC has many advantages as less average hop length,good robustness and less overheads,and the clustered network architecture behaves stably when topology changes.展开更多
基金This project was supported by the National Natural Science Foundation of China (60672068)the National High Technology Development 863 Program of China (2006AA01Z436, 2007AA01Z452.)
文摘The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.
文摘Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET) is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2, NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation. Keywords Adhoc On-Demand Distance Vector (AODV) routing - Dynamic Source routing (DSR) - Mobile Adhoc Networks (MANET) - Wireless Networked Control Systems (WNCS) Mohammad Shahidul Hasan received his BSc and first MSc in Computer Science from the University of Dhaka, Bangladesh. He obtained his 2nd MSc in Computer & Network Engineering from Sheffield Hallam University, Sheffield, UK. Currently he is pursuing his PhD under the Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford, UK in Networked Control Systems over MANET.Chris Harding received his BSc in Computing Science and Masters by Research from Staffordshire University, UK. Currently he is pursuing his PhD in Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.Hongnian Yu is Professor of Computer Science at Staffordshire University. He was a lecturer in Control and Systems Engineering at Yanshan University, China in 1985–1990, did his PhD in Robotics at King’s College London (1990–1994), was a research fellow in Manufacturing Systems at Sussex University (1994–1996), a lecturer in Artificial Intelligence at Liver-pool John Moore’s University (1996–1999), a lecturer in Control and Systems Engineering at the University of Exeter (1999–2002), and a Senior Lecturer in Computing at the University of Bradford (2002–2004). He now leads the Mobile Computing and Distributed Systems Research Group at Staffordshire University. He was a founding member of the Modeling Optimisation Scheduling and Intelligent Control research group at the University of Bradford. He has extensive research experience in neural networks, mobile computing, modeling, control of robot manipulators, and modeling, scheduling, planning, and simulations of large discrete event dynamic systems with applications to manufacturing systems, supply chains, transportation networks, and computer networks. He has published over 100 research papers focusing on the following: neural networks, computer networks, adaptive and robust control of robot manipulators, analysis and control of hybrid machines, control of timed delay systems, predictive control, manufacturing system modeling and scheduling, planning, and supply chains. He has held several research grants from EPSRC, the Royal Society, and the EU, as well as from industry. He was awarded the F.C. William Premium for his paper on adaptive and robust control of robot manipulators by the IEE Council in 1997. Professor Yu is an EPSRC college member, a member of IEEE, and a committee member of several conferences and journal editorial boards.Alison Griffiths has been a Senior Lecturer in Telecommunications at Staffordshire University since 2003. She was a lecturer in Computing at Staffordshire University in 2002–2003. She was a Research Associate on an EPSRC funded project whilst doing her PhD on the convergence of Mobile Computing and Telecommunications at Staffordshire University (1999–2003). The investigation consisted of the communication of different types of media (voice, video conferencing, web browsing, and downloading) over a common network, using a mobile device. Problems considered were the complications that occurred when a user moves, and consequently changes their end-point in the network during communication, with respect to the type of service the user is provided with (delays and losses). She obtained both her MEng and 1st Class BEng (Hons) from Staffordshire University in 1999 and 1998 respectively. She is now part of the Mobile Computing and Distributed Systems Research Group at Staffordshire University. She has published 8 research papers focusing on quality of service and access between cellular and IP packet switched networks. Future directions include mobile agents and control of mobile wireless ad-hoc networks. Her current research interests have extended to Wireless Networked Control Systems, specifically looking at NCS over MANETs, with research interests in this area concentrating on the network routing and effect of routing protocols on the NCS system.
文摘Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.In healthcare applications,wireless body area network transmits the data,whereas the security,which is the most important concern to be focused in a flying adhoc network is not satisfactory.Many intruders tamper the network,degrading the overall network performance.To avoid security issues,a unique and secure routing protocol that provides a single solution for five different types of attacks such as,black hole attacks,grey hole attacks,yoyo attacks,conjoint attack and jamming attacks,is proposed.The simulation results analyses the network performance by using the proposed routing table.In comparison to the other solutions rendered to resolve the affected network,this proposed routing protocol has a higher throughput,higher delivery rate,and lower delay.The Unique and Secure Routing Protocol(USRP)provides an integrated solution for an efficient and secure communication in a flying adhoc network.
基金Supported by the National Network and Informa-tion Secure Guarantee Sustainable Development Plan (2004 Research1-917-C-021)
文摘The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.
文摘This paper presents coreagent based clustering (CBC) algorithm,a novel heuristic clustering scheme for interconnection of MANET and Internet using power,movement probability and hop length as constraints.CBC includes two phases as cluster initialization and cluster maintenance.In phase one,the selection of clusterheads obeys the first two constraints,whereas the father node of each clustering node is chosen according to above three ones.Phase two concerns the case of node insertion or removal.Easy access and little alteration of conventional mobile IP are some characters of this algorithm.Simulation results demonstrate that CBC has many advantages as less average hop length,good robustness and less overheads,and the clustered network architecture behaves stably when topology changes.