Abstract
Security mechanisms, such as encryption and authentication protocols, require extra computing resources and therefore, have an adverse effect upon the performance of robotic mobile wireless ad hoc networks (RANETs). Thus, an optimal performance and security trade-off should be one of the main aspects that should be taken into consideration during the design, development, tuning and upgrading of such networks. In this context, an exposition is initially undertaken on the applicability of Petri nets (PNs) and queueing networks (QNs) in conjunction with their generalisations and hybrid integrations as robust quantitative modelling tools for the performance analysis of discrete flow systems, such as computer systems, communication networks and manufacturing systems. To overcome some of the inherent limitations of these models, a novel hybrid modelling framework is explored for the quantitative evaluation of RANETs, where each robotic node is represented by an abstract open hybrid G-GSPN_QN model with head-of-line priorities, subject to combined performance and security metrics (CPSMs). The proposed model focuses on security processing and state-based control and it is based on an open generalised stochastic PN (GSPN) with a gated multi-class ‘On–Off’ traffic and mobility model. Moreover, it employs a power consumption model and is linked in tandem with an arbitrary QN consisting of finite capacity channel queues with blocking for ‘intra’ robot component-to-component communication and ‘inter’ robot-to-robot transmission. Conclusions and future research directions are included.






Similar content being viewed by others
References
Kouvatsos, D. D. (2012). Performance and security trade-offs in robotic mobile wireless ad hoc networks (RANETs). In: PP Presentation in the14th strategic workshop (SW’12) on ‘wireless robotics—research and standardisation: Dronninglund castle, Slotsgade 8, 9330 Dronninglund, Denmark.
Wang, Z., Liu, L., & Zhou, M. C. (2005). Protocols and applications of ad-hoc robot wireless communication networks: An overview. The International Journal of Intelligent Control Systems, 10(4), 296–303.
Kouvatsos, D. D., & Miskeen, G. M. A. (2012). Performance related security modelling and evaluation of RANETs. Wireless Personal Communications, 64, 523–546. doi:10.1007/s11277-012-0599-1.
Zorkadis, V. (1994). Security versus performance requirements in data communication systems. In Third European symposium on research in computer security proceedings, computer security—ESORICS (pp. 19–30).
Chigan, C., Ye, Y., & Li, L. (2004). Balancing security against performance in wireless ad hoc and sensor networks. In IEEE 60th conference on vehicular technology. VTC2004-Fall, (Vol. 7, pp. 4735–4739).
Wolter, K., & Reinecke, P. (2010). Performance and security tradeoff. In A. Aldini, M. Bernardo, A. Di Pierro, & H. Wiklicky (Eds.), Formal methods for quantitative aspects of programming languages (pp. 135–167). Berlin, Heidelberg: Springer.
Chen, L., Jiang, C., Fang, Y., & Liu, F. (2005). Performance evaluation of ad hoc networks based on SPN. In IEEE wireless communications, networking and mobile computing, (Vol. 2, pp. 816–819).
Technical Report (2005). Deploying Wi-Fi Protected access (WPA\({}^{\rm {TM}}\)) and WPA2\({}^{\rm {TM}}\) in the enterprise WPA and WPA2 implementation white paper. http://www.wi-fi.org/files/wp_9_WPA-WPA2%20Implementation2-27-05.pdf.
Guyot, V. (2007). WEP-based security management in IEEE 802.11 wireless sensor networks. In 3rd IEEE/IFIP international conference in central Asia on internet (ICI), (pp. 1–4). doi:10.1109/canet.2007.4401682.
Gupta, R. (2011). Mobile ad hoc network (MANET) proposed solution to security related issues. Indian Journal of Computer Science and Engneering (IJCSE), 2(5), 738–746.
Saleh, M., & Alkhatib, I. (2005). Performance of secure ad hoc sensor networks. In Proceedings of 2005 systems communications ICW’05 (pp. 1–5).
Aldini, A. (2011). Trade-off between performance and security. In PP presentation in foundations of security analysis and design (FOSAD). Bertinoro, Italy: University of Urbino Carlo Bo. http://www.sti.uniurb.it/events/fosad11/slides/fosad11.pdf.
Aldini, A., & Gorrieri, R. (2003). A study about trade-off between performance and security in an internet audio mechanism. In Global computing, programming environments, languages, security, and analysis of systems, (pp. 203–228).
Cho, J. H., Chen, R., & Feng, P. G. (2008). Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile ad hoc networks. In IEEE 22nd international conference on advanced information networking and applications-workshops, AINAW 2008, Okinawa (pp. 644–649). March 25–28, 2008
Cortellessa, V., & Trubiani, C. (2008). Towards a library of composable models to estimate the performance of security solutions. In Proceedings of the 7th international workshop on Software and performance, (pp. 145–156). ACM.
Zibideh, W. Y., & Matalgah, M. M. (2012). An optimized encryption framework based on the modified-DES algorithm: a trade-off between security and throughput in wireless channels. In IEEE Radio and wireless symposium (RWS) (pp. 419–422).
Yau, S. S., Yin, Y., & An, H. G. (2009). An adaptive tradeoff model for service performance and security in service-based systems. In IEEE international conference on web services (ICWS) (pp. 287–294).
Curtmola, R., Dong, J., & Nita-Rotaru, C. (2010). Tradeoffs between security and communication performance in wireless mesh networks. In 2010 IEEE international symposium on world of wireless mobile and multimedia networks (WoWMoM), Montreal, QC, Canada, (pp. 1–6).
Haleem, M. A., Mathur, C. N., Chandramouli, R., & Subbalakshmi, K. P. (2007). Opportunistic encryption: a trade-off between security and throughput in wireless networks. IEEE Transactions on Dependable and Secure Computing, 4(4), 313–324. doi:10.1109/tdsc.2007.70214.
Wente, Z., & Mo-Yuen, C. (2011). A trade-off model for performance and security in secured Networked Control Systems. In IEEE international symposium onIndustrial electronics (ISIE) (pp. 1997–2002). doi:10.1109/isie.2011.5984466.
Wente, Z., & Mo-Yuen, C. (2012). Optimal tradeoff between performance and security in networked control systems based on coevolutionary algorithms. IEEE Transactions on Industrial Electronics, 59(7), 3016–3025. doi:10.1109/tie.2011.2178216.
Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.
Miskeen, G., Kouvatsos, D. D., & Akhlaq, M. (2010). Performance and security trade-off for routers in high speed networks In S. Hammond, S. Jarvis, & M. Leeke (Eds.), UK performance engineering workshop, University of Warwick, (pp. 119–128).
Xu, Y., & Xie, X. (2011). Modeling and analysis of security protocols using colored Petri nets. Journal of Computers, 6(1), 19–27. doi:10.4304/jcp.6.1.19-27.
Al-Khatib, A. (2003). Performance analysis of wireless LAN access points, (Ph.D.). Royal Institute of Technology, Stockholm, Sweden.
Zhang, C. (2005). Ad hoc network security and modeling with stochastic Petri nets. Newark, NJ: New Jersey Institute of Technology.
Zhang, C., & Zhou, M. (2003). A stochastic petri net-approach to modeling and analysis of ad hoc network. In Proceedings of international conference on information technology: research and education (ITRE), (pp. 152–156). doi:10.1109/ITRE.2003.1270592.
Kouvatsos, D. D., & Miskeen, G. (2011). Performance related security trade-off for routers in high speed networks. In UK performance engineering workshop. University of Bradford.
Ardawi, A. M. H. (2010). Performance modeling and evaluation of ad hoc mobile wireless networks (RMWNs), (M.Sc. Thesis), University of Bradford, UK.
Kounev, S., & Buchmann, A. (2006). SimQPN—a tool and methodology for analyzing queueing Petri net models by means of simulation. Performance Evaluation, 63(4), 364–394.
Kounev, S. (2006). Performance modeling and evaluation of distributed component-based systems using queueing Petri nets. IEEE Transactions on Software Engineering, 32(7), 486–502.
Kounev, S., & Buchmann, A. (2008). On the use of queueing Petri nets for modeling and performance analysis of distributed systems. In V. Kordic (Ed.), PetriNet, theory and application (Vol. Petri Net, Theory and Applications, pp. 149–178). Vienna, Austria.
Kouvatsos, D. D., & Mkwawa, I. M. (2003). Multicast communication in grid computing networks with background traffic. In IEE Proceedings on Software (Vol. 150, pp. 257–264, Vol. 4).
Balbo, G., Bruell, S. C., & Ghanta, S. (1988). Combining queueing networks and generalized stochastic Petri nets for the solution of complex models of system behavior. IEEE Transactions on Computers, 37(10), 1251–1268.
Kouvatsos, D., & Awan, I. (2003). Entropy maximisation and open queueing networks with priorities and blocking. Performance Evaluation, 51(2), 191–227.
Kouvatsos, D. D. (1994). Entropy maximisation and queueing network models. Annals of Operations Research, 48(1), 63–126.
Kouvatsos, D. D., Alanazi, J. S., & Smith, K. (2011). A Unified MEalgorithm for arbitrary open QNMs with mixed blocking mechanisms. Numerical Algebra, Control and Optimization (NACO)The American Institute of Mathematical Sciences (AIMS), 1(4), 781–816. doi:10.3934/naco.2011.1.781.
Shah, S., & Lenin, R. (2007). Performance measures of mobile ad hoc networks using queueing models (pp. 1–17). Gandhinagar, India: Dhirubhai Ambani Institute of Information and Communication Technology.
Bhatia, H., Lening, R., Srivastava, S., & Sunitha, V. (2007). Application of QNA to analyze the ‘queueing network mobility model of MANET (pp. 1–6). Gandhinagar, India: Technical Report, Dhirubhai Ambani Insti tute of Information and, Communication Technology (DAIICT).
Alanazi, J. S., & Kouvatsos, D. D. (2011). A Unified ME algorithm for Arbitrary open QNMs with mixed blocking mechanisms. In IEEE 11th international symposium on applications and the internet (SAINT), (pp. 492–496).
Bause, F. (1993) Queueing Petri nets-a formalism for the combined qualitative and quantitative analysis of systems. In Proceedings of 5th international workshop on Petri nets and performance models (pp. 14–23).
Marsan, M. (1990). Stochastic petri nets: an elementary introduction. In G.Rosenburg (Ed.), Advances in Petri Nets 1989. Lecture Notes in Computer Science (Vol. 424, pp.1–29).
Jensen, K. (1998). An introduction to the practical use of coloured petri nets. In G.Rozenburg & W. Reisig (Eds.), Lectures on Petri Nets II: Applications. Lecture Notes in Computer Science, (vol. 1492, pp. 237–292).
Zimmermann, A. (2008). Stochastic discrete event systems: modeling, evaluation and applications. Berlin: Springer.
Marsan, M. A., Balbo, G., Chiola, G., Conte, G., Donatelli, S., & Franceschinis, G. (1991). An introduction to generalized stochastic Petri nets. Microelectronics Reliability, 31(4), 699–725.
Balbo, G. (2001). Lectures on formal methods and performance analysis. Berlin, Heidelberg: Springer-Verlag.
Balbo, G., & Chiola, G. (1989). Stochastic petri net simulation. In 1989 Winter simulation conference proceedings, (pp. 266–276), ACM.
Marsan, M. A., Bobio, A., & Donatell, S. (1998). Petri nets in performance analysis: an introduction. In W. Reisig, & G. Rozenberg (Eds.), (Vol. LNCS1491, pp. 211–256). Berlin (Germany): Springer-Verlag.
Jensen, K. (1997). A brief introduction to coloured Petri Nets. In E. Brinksma (Ed.), Tools and algorithms for the construction and analysis of systems (Vol. 1217, pp. 203–208, Lecture Notes in Computer Science). Berlin, Heidelberg: Springer.
Jensen, K. (1987). Coloured petri nets. In W.Brauer, W. Reisig & Rozenburg (Eds.), Petri Nets: Central Models and Their Properties. Lecture Notes in Computer Science (vol. 254, pp. 248–299).
Jensen, K. (2002). Coloured Petri Nets theory and applications: modeling and verificatinos of protocols. http://www.slideshare.net/ahshatri/colored-petri-nets-theory-and-applications.
Dutta, A., Lyles, B., & Schulzrinne, H. (2011). A formal approach to mobility modeling. In IEEE third international conference on communication systems and networks (COMSNETS 2011), Bangalore (pp. 1–10). doi:10.1109/COMSNETS.2011.5716488.
Dutta, A., Lyles, B., Schulzrinne, H., Chiba, T., Yokota, H., & Idoue, A. (2007). Generalized modeling framework for handoff analysis In The 18 annual IEEE international symposium on personal, indoor and mobile radio communications, Athens, 2007 (pp. 1–5), IEEE.
Becker, M., & Szczerbicka, H. (1999). PNiQ: Integration of queuing networks in generalised stochastic Petri nets. IEE Proceedings, Software, 146(1), 27–32. doi:10.1049/ip-sen:19990153.
Becker, M., & Szczerbicka, H. (2001) Integration of multi-class queueing networks in generalized stochastic petri nets. In IEEE international conference on systems, man, and cybernetics (Vol. 2, pp. 1137–1142). doi:10.1109/icsmc.2001.1309629.
Szczerbicka, H. (1992). A combined queueing network and stochastic Petri net approach for evaluating the performability of fault-tolerant computer systems. Performance Evaluation, 14, 217–226. doi:10.1016/0166-5316(92)90005-2.
Cao, Z., Qiao, F., & Wu, Q. (2007). Queueing generalized stochastic colored timed Petri nets- based approach to modeling for semiconductor wafer fabrication. In IEEE international conference on control and automation, Guangzhou, China (pp. 2834–2838).
Bause, F. (1993). “QN+ PN= QPN”-combining queueing networks and Petri nets. Germany: University of Dortmund.
Bause, F., & Buchholz, P. (1998). Queueing Petri nets with product-form solution. Performance Evaluation, 32(4), 265–299.
Becker, M., & Szczerbicka, H. (1998). Combined modeling with generlized stochastic Petri nets Including queueing nets. In 14th UK computer and telecommunications performance, engineering workshop (pp. 48–62).
Zaki, S. M., Ngadi, M. A., & Razak, S. A. (2009). A review of delay aware routing protocols in MANET. Computer Science Letters, 1(1), 48–60.
Stallings, W. (2002). High speed Networks and Internets: performance and quality of service (2nd ed.), Pearson Education-Prentice Hall, India.
Freiling, F. C. (2008). Introduction to security metrics. In Dependability Metrics. Lecture Notes in Computer Science (Vol. 4909, pp. 129–132).
Asokan, R., & Natarajan, A. (2010). Quality of service (QoS) routing in mobile ad Hoc networks. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management 464–496.
Staling, W. (1998). High-speed networks: TCP/IP and ATM design. Englewood Cliffs: Prentice Hall.
Chowdhury, D. D. (2000). High speed LAN technology handbook. Berlin: Springer.
Wang, Z., Zhou, M. C., & Ansari, N. (2003, October). Ad-hoc robot wireless communication. In Proceedings IEEE conference on systems, man and cybernetics, Washington, (Vol. 4, pp. 4045–4050).
Bertocchi, F., Bergamo, P., Mazzini, G., & Zorzi, M. (2003). MAC and routing solution for energy saving in ad hoc networks: distributed power control. In Proceedings of the 2003 joint conference of the fourth international conference on information, communications and signal processing, 2003 and Fourth Pacific Rim conference on multimedia (Vol. 2, pp. 1061–1065).
Abdul Elminaam, D. S., Abdul Kader, H. M., & Hadhoud, M. M. (2009). Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices. International Journal of Computer Theory and Engineering, 1(4), 1793–8201.
Vaman, D., & Qian, L. (2008). Cognitive radio mixed sensor and Mobile Ad Hoc Networks (SMANET) for dual use applications. In IEEE international conference on systems, man and cybernetics (SMC), (pp. 3304–3310).
Maleki, M., Dantu, K., & Pedram, M. (2002). Power-aware source routing protocol for mobile ad hoc networks. In Proceedings of the 2002 international symposium on low power electronics and design, 2002. ISLPED ’02, 2002 (pp. 72–75).
Madan, B. B., Goseva-Popstojanova, K., Vaidyanathan, K., & Trivedi, K. S. (2002). Modeling and quantification of security attributes of software systems. In Proceedings of the 2002 international conference on dependable systems and networks Washington, USA (pp. 505–514). Los Alamitos: IEEE Computer Society Press.
Yau, S. S., Nong, Y., Sarjoughian, H. S., Dazhi, H., Roontiva, A., Baydogan, M., et al. (2009). Toward development of adaptive service-based software systems. IEEE Transactions on Services Computing, 2(3), 247–260. doi:10.1109/tsc.2009.17.
Jorstad, N., & Landgrave, T. (1997). Cryptographic algorithm metrics. In 20th national information systems security conference, Athens, (pp. 1–38).
Savola, R. M., & Abie, H. (2009). On-line and off-line security measurement framework for mobile ad hoc networks. Journal of Networks, 4(7), 565–579.
Hu, M., Zou, S. (2010). Analysis of cryptographic protocol about wireless LAN base on Petri net. In International conference on computer application and system modeling (ICCASM), Taiyuan (Vol. 8, pp. V8–267-V268-269). doi:10.1109/iccasm.2010.5619304.
Lamprecht, C., Van Moorsel, A., Tomlinson, P., & Thomas, N. (2006). Investigating the efficiency of cryptographic algorithms in online transactions. International Journal of Simulation: Systems, Science and Technology, 7(2), 63–75.
Yau, S. S., Yin, Y., & An, H. G. (2009). An adaptive tradeoff model for service performance and security in service-based systems. In IEEE international conference on web services(ICWS), (pp. 287–294).
Virk, K., Hansen, K., & Madsen, J. (2005). System-level modeling of wireless integrated sensor networks. In International proceedings, symposium on system-on-chip, Tampere, (pp. 179–182).
Balsamo, S. (2000). Product-form queueing networks. In M. Reiser, G. Haring & C. Lindemann (Eds.), Performance Evaluation: Origins and Directions. Lecture Notes in Computer Science (Vol. 1769, pp. 377–401).
Bolch, G., Greiner, S., de Meer, H., & Trivedi, K. S. (2006). Queueing networks and markov chains: modeling and performance evaluation with computer science applications. New Jersey: Wiley-Interscience.
Chandy, K. M., Herzog, U., & Woo, L. (1975). Parametric analysis of queuing networks. IBM Journal of Research and Development, 19(1), 36–42.
Szczerbicka, H., & Ziegler, P. (1994). Simulation with active objects: an approach to combined modelling. Simulation Practice and Theory, 1(6), 267–281.
Bhatia, H., Lenin, R., Munjal, A., Ramaswamy, S., & Srivastava, S. (2008). A queuing-theoretic framework for modeling and analysis of mobility in WSNs. In PerMIS, (pp. 248–253). ACM.
Nogueira, A., & Valadas, R. (2001, July 18–20). Analysing the versatility of the 2-MMPP traffic model. In CSNDSP 2000 Proceedings of the second international symposium on communication systems networks and digital signal processing, Bournemouth, UK, (pp. 261–266).
Nogueira, A., Salvador, P., & Valadas, R. (1999, October 11–13). Fitting algorithms for MMPP ATM traffic models. In Proceedings of the Broadband access conference, Cracow, Poland, (pp. 167–174).
Steindera, M., & Sethib, A. S. (2004). Survey of fault localization techniques in computer networks. Science of Computer Programming, 53, 165–194.
Kouvatsos, D. D., & Miskeen, G. M. A. (2011). Networked mobile wireless robotics (I. R. I. I. U. o. B.pagination Networks and Performance Engineering (NetPEn) Research Group, UK, Trans.). In DDK-NetPEn 15–02-11 (pp. 1–3). Bradford BD7 1DP, UK: University of Bradford.
Mkwawa, I. M., Kouvatsos, D. D. (2011). Broadcasting methods in MANETts: an overview. In D. D. Kouvatsos (Ed.), Network performance engineering—a handbook on convergent multi-service networks and next generation internet, (Vol. 5233, pp. 764–783, Lecture Notes in Computer Science (LNCS)). Springer.
European Commission Call C(2010)4900. (2010). Challenge 2: Cognitive cystems and cobotics, cooperation Theme 3: ICT—Information and Communication Technologies. http://cordis.europa.eu/fp7/ict/cognition/calls-ict-call6-en.html.
Yonglin, R., Boukerche, A., & Mokdad, L. (2011). Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In IEEE wireless communications and networking conference (WCNC), (pp. 1038–1043). doi:10.1109/wcnc.2011.5779278.
Haiwen, Y., Haibin, Y., & Xingshan, L. (2006). Fuzzy Petri nets reasoning for application of electric control system fault diagnosis. In IEEE conference on robotics, automation and mechatronics (pp. 1–6).
Ouchi, Y., & Tazaki, E. (1997). Learning and reasoning method using fuzzy coloured Petri nets under uncertainty. In Computational cybernetics and simulation IEEE international conference on systems, man, and cybernetics, (Vol. 4, pp. 3867–3871).
Cox, E. (1992). Fuzzy fundamentals. Spectrum, 29(10), 58–61. doi:10.1109/6.158640.
Subramanyam, P. V., Chauhan, A., & Singh, Y. (2006). Modeling of a hybrid protocol for a using fuzzy Petri nets MANET. Annual IEEE India conference (pp. 1–4). India: IEEE.
Acknowledgments
The authors would like to acknowledge the University of Sebha, Libya for the funding of this research.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Miskeen, G.M.A., Kouvatsos, D.D. & Habibzadeh, E. An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models. Wireless Pers Commun 70, 1121–1146 (2013). https://doi.org/10.1007/s11277-013-1105-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-013-1105-0