Wireless Ad hoc Network Security Multi - path Routing Protocol Survivability Modeling Research
نویسندگان
چکیده
Network survivability is the key ability of ad hoc network under all kinds of attacks, which is a foundation to the design and evaluation of wireless ad hoc network routing protocol. The definitions of network survivability are analyzed and compared. We propose a novel survivability model based on Finite State Machine (FSM) and District Time Markov Chain (DTMC) model. DTMC steady-state probabilities are theoretically deduced and computed. Performance Evaluation Process Algebra (PEPA) is used to decribe the state transition model, PEPA Eclipse Plug-in software is used to compute the steady-state probabilities. We find that the steadystate probabilities computed by PEPA software match well with the formula derivation. Experiment results show that G steady-state probability decreases with the increasing transition probability of attack state. Finally, we validate the proposed model by PEPA simulations and numerical analysis. Copyright © 2013 IFSA.
منابع مشابه
LEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks
A wireless ad hoc network typically refers to any set of wireless networks where all devices have equal status on a network and are free to associate with any other wireless ad hoc network devices in their range. As the nature of these networks, they commonly do not have external power supplies, and each node has a limited internal power source. In this paper, we put forward a new routing proto...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملOptimal Routing Service for Wireless Network security and Management
WirelessNetwork Environment poses its unique challenges to the existing Transaction models which are fail to solve. Wireless ad hoc networks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, we present SANA, a Secure Ad hoc Network Arch...
متن کاملImprovement of the mechanism of congestion avoidance in mobile networks
Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology and the joint nature of the wireless network. It also creates significant challenges in mobile ad hoc networks (MANET), density ...
متن کامل