DHYMON: a Continuous Decentralized Hybrid Monitoring Architecture for MANETs
نویسندگان
چکیده
We introduce a novel decentralized monitoring algorithm for mobile ad-hoc networks. This algorithm is a combination of gossip-based and tree-based approaches. Its main feature is on multi root nodes selection which provides an opportunity to obtain more accurate results as it maximizes the coverage of the network. Our proposal relies on a thorough defined algorithm and its efficient and effective implementation. The algorithm is divided in two main parts that are its query procedure and its disseminate procedure. To assess different parameters such as accuracy and convergence time, we conducted experiments with an in-house emulated test bed based on Docker and NS3. To show the effectiveness and scalability of our proposal, we conduct intensive emulations that demonstrate very promising results regarding the gain of accuracy.
منابع مشابه
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption∗
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information sharing is a difficult task especially for highly dynamic military MANETs. To address this requirement, we propose a new multi-tier adaptive military MANET security protocol using hybrid cryptograp...
متن کاملA Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks
We present a decentralized VPN service that can be built over generalized mobile ad-hoc networks (Generalized MANETs), in which topologies can be represented as a time-varying directed multigraph. We address wireless ad-hoc networks and overlay ad-hoc networks as instances of Generalized MANETs. We first propose an architecture to operate on various kinds of networks through a single set of ope...
متن کاملHYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks
The envisioned realization of ubiquity has resulted into the emergence of new kinds of the hybrid networks. The modern hybrid networks, e.g. combination of wireless mesh and Mobile Ad-hoc Networks (MANETs), help realize ubiquity through spontaneous networking. The network management for these hybrid networks is different from conventional and infrastructure based network management. Heterogenei...
متن کاملPeer-to-Peer over Mobile Ad-Hoc Networks
The goal of mobile computing is to provide access to information and resources at anytime, anywhere. The traditional client-server architecture is insufficient to provide these needs, due to various issues like scalability (as the number of nodes grows the server can be overloaded) and link failure (which may lead to server unreachable). To cope with these issues there is a need for an architec...
متن کاملMonitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis
This article proposes a parameterized trust model and security analysis framework for monitoring-based schemes that enables the identification of malicious nodes in mobile ad hoc networks (MANETs) and other decentralized networks. We utilize these results to design a practical decentralized key revocation scheme for MANETs in which nodes monitor their neighbors and securely propagate their obse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1712.01676 شماره
صفحات -
تاریخ انتشار 2017