The performance of a watchdog protocol for wireless network security

@article{Lee2007ThePO,
  title={The performance of a watchdog protocol for wireless network security},
  author={Jin Wook Lee and Yann-Hang Lee and Violet R. Syrotiuk},
  journal={Int. J. Wirel. Mob. Comput.},
  year={2007},
  volume={2},
  pages={28-36}
}
In wireless networks, a watchdog mechanism can be a part of the security architecture used to identify nodes that fail to forward the packets they agree to forward. In this paper, we propose two protocols to address the ambiguous collision limitation of watchdogs. The Watchdog Alert (WA) and Watchdog Confirmation (WC) protocols are variants of the Carrier Sense Multiple Access with Collision Avoidance Protocol (CSMA/CA). We analyse the trade-offs between throughput and watchdog success… 

A novel secure and multipath routing algorithm in Wireless Sensor Networks

TLDR
The concept of k-connectivity is extended to k-x-Connectivity where x is the value of threshold representing the maximal number of nodes shared between any two paths in the set of the k established paths.

A new hierarchical and scalable group key exchange protocol with XOR operation

TLDR
This paper proposes a GKE protocol originated from a two-participant key exchange protocol and proves that the protocol is secure, representing the protocol as processes in the spi calculus, and state their security properties as queries in ProVerif, an automatic analyser based onSpi calculus.

CONNECTIVITY-AWARE AND ADAPTIVE MULTIPATH ROUTING ALGORITHM FOR MOBILE ADHOC AND SENSOR NETWORKS

TLDR
A connectivity-aware routing algorithm and a set of related theorems that allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets.

Multi-path and Message Trust-Based Secure Routing in Ad Hoc Networks

  • S. K. DhurandherVijeta Mehra
  • Computer Science
    2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
  • 2009
TLDR
This work introduces an approach that can be applied to calculate the trust in a dynamic way, and also protect the message against modification, without significantly increasing the overheads.

Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks

While communicating nodes in Mobile Adhoc and Sensor Networks (MASNets), need to use multipath routing algorithms to tolerate nodes and links failures, it becomes interesting to let them specify to

Study on Data Fusion Techniques in Wireless Sensor Networks

TLDR
A survey is presented in this article studying on the data fusion techniques in WSNs from the aspects of cluster based schemes, chain based schemes to statistics based schemes and their advantages and disadvantages.

A novel hybrid incentive mechanism for node cooperation in mobile cyber-physical systems

TLDR
It is found that when the percentage of selfish nodes is not above 60, RCM can improve the network performance while the necessary payment is lower, and this study presents a novel hybrid incentive mechanism with reputation-formed payment risk, called reputation-based credit mechanism (RCM).

A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks

References

SHOWING 1-10 OF 17 REFERENCES

Mitigating routing misbehavior in mobile ad hoc networks

TLDR
Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.

PAMAS—power aware multi-access protocol with signalling for ad hoc networks

TLDR
A new multiaccess protocol based on the original MACA protocol with the adition of a separate signalling channel that conserves battery power at nodes by intelligently powering off nodes that are not actively transmitting or receiving packets.

Key Management in Wireless Sensor Networks

TLDR
Probabilistic, deterministic and hybrid key management solutions are presented, and a set of metrics are determined to quantify their security properties and resource usage such as processing, storage and communication overheads.

Performance analysis of the CONFIDANT protocol

TLDR
It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.

A Power Control MAC Protocol for Ad hoc Networks

TLDR
A novel power controlled MAC protocol based on SNR in mobile Ad hoc networks is presented and simulation results demonstrate that compared to the IEEE 802.11 MAC protocol, the proposed protocol can decrease the power consumption greatly, and improve the energy utilization of mobile terminals while maintaining the throughput performance.

Performance Analysis of CSMA and BTMA Protocols in Multihop Networks (II), Multiple Channel Case

Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks

TLDR
This paper presents simulation results that show the negative effects which selfish nodes cause in MANET and presents new detection mechanisms, called activity-based overhearing, iterative probing, and unambiguous probing, that are highly effective and can reliably detect a multitude of selfish behaviors.

An energy-efficient MAC protocol for wireless sensor networks

  • W. YeJ. HeidemannD. Estrin
  • Computer Science
    Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
  • 2002
TLDR
S-MAC uses three novel techniques to reduce energy consumption and support self-configuration, and applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data move through the network.

Investigating the energy consumption of a wireless network interface in an ad hoc networking environment

  • L. FeeneyM. Nilsson
  • Computer Science
    Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213)
  • 2001
TLDR
A series of experiments are described which obtained detailed measurements of the energy consumption of an IEEE 802.11 wireless network interface operating in an ad hoc networking environment, and some implications for protocol design and evaluation in ad hoc networks are discussed.

Effect of overhearing transmissions on energy efficiency in dense sensor networks

  • P. BasuJ. Redi
  • Computer Science
    Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004
  • 2004
TLDR
It is observed that in dense sensor networks, overhearing costs constitute a significant fraction of the total energy cost and that computing the minimum spanning tree on the augmented cost metric results in energy savings, especially in networks with non-uniform spatial node distribution.