Skip to main content
Log in

An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security mechanisms, such as encryption and authentication protocols, require extra computing resources and therefore, have an adverse effect upon the performance of robotic mobile wireless ad hoc networks (RANETs). Thus, an optimal performance and security trade-off should be one of the main aspects that should be taken into consideration during the design, development, tuning and upgrading of such networks. In this context, an exposition is initially undertaken on the applicability of Petri nets (PNs) and queueing networks (QNs) in conjunction with their generalisations and hybrid integrations as robust quantitative modelling tools for the performance analysis of discrete flow systems, such as computer systems, communication networks and manufacturing systems. To overcome some of the inherent limitations of these models, a novel hybrid modelling framework is explored for the quantitative evaluation of RANETs, where each robotic node is represented by an abstract open hybrid G-GSPN_QN model with head-of-line priorities, subject to combined performance and security metrics (CPSMs). The proposed model focuses on security processing and state-based control and it is based on an open generalised stochastic PN (GSPN) with a gated multi-class ‘On–Off’ traffic and mobility model. Moreover, it employs a power consumption model and is linked in tandem with an arbitrary QN consisting of finite capacity channel queues with blocking for ‘intra’ robot component-to-component communication and ‘inter’ robot-to-robot transmission. Conclusions and future research directions are included.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Kouvatsos, D. D. (2012). Performance and security trade-offs in robotic mobile wireless ad hoc networks (RANETs). In: PP Presentation in the14th strategic workshop (SW’12) on ‘wireless robotics—research and standardisation: Dronninglund castle, Slotsgade 8, 9330 Dronninglund, Denmark.

  2. Wang, Z., Liu, L., & Zhou, M. C. (2005). Protocols and applications of ad-hoc robot wireless communication networks: An overview. The International Journal of Intelligent Control Systems, 10(4), 296–303.

    Google Scholar 

  3. Kouvatsos, D. D., & Miskeen, G. M. A. (2012). Performance related security modelling and evaluation of RANETs. Wireless Personal Communications, 64, 523–546. doi:10.1007/s11277-012-0599-1.

    Article  Google Scholar 

  4. Zorkadis, V. (1994). Security versus performance requirements in data communication systems. In Third European symposium on research in computer security proceedings, computer security—ESORICS (pp. 19–30).

  5. Chigan, C., Ye, Y., & Li, L. (2004). Balancing security against performance in wireless ad hoc and sensor networks. In IEEE 60th conference on vehicular technology. VTC2004-Fall, (Vol. 7, pp. 4735–4739).

  6. Wolter, K., & Reinecke, P. (2010). Performance and security tradeoff. In A. Aldini, M. Bernardo, A. Di Pierro, & H. Wiklicky (Eds.), Formal methods for quantitative aspects of programming languages (pp. 135–167). Berlin, Heidelberg: Springer.

  7. Chen, L., Jiang, C., Fang, Y., & Liu, F. (2005). Performance evaluation of ad hoc networks based on SPN. In IEEE wireless communications, networking and mobile computing, (Vol. 2, pp. 816–819).

  8. Technical Report (2005). Deploying Wi-Fi Protected access (WPA\({}^{\rm {TM}}\)) and WPA2\({}^{\rm {TM}}\) in the enterprise WPA and WPA2 implementation white paper. http://www.wi-fi.org/files/wp_9_WPA-WPA2%20Implementation2-27-05.pdf.

  9. Guyot, V. (2007). WEP-based security management in IEEE 802.11 wireless sensor networks. In 3rd IEEE/IFIP international conference in central Asia on internet (ICI), (pp. 1–4). doi:10.1109/canet.2007.4401682.

  10. Gupta, R. (2011). Mobile ad hoc network (MANET) proposed solution to security related issues. Indian Journal of Computer Science and Engneering (IJCSE), 2(5), 738–746.

    Google Scholar 

  11. Saleh, M., & Alkhatib, I. (2005). Performance of secure ad hoc sensor networks. In Proceedings of 2005 systems communications ICW’05 (pp. 1–5).

  12. Aldini, A. (2011). Trade-off between performance and security. In PP presentation in foundations of security analysis and design (FOSAD). Bertinoro, Italy: University of Urbino Carlo Bo. http://www.sti.uniurb.it/events/fosad11/slides/fosad11.pdf.

  13. Aldini, A., & Gorrieri, R. (2003). A study about trade-off between performance and security in an internet audio mechanism. In Global computing, programming environments, languages, security, and analysis of systems, (pp. 203–228).

  14. Cho, J. H., Chen, R., & Feng, P. G. (2008). Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile ad hoc networks. In IEEE 22nd international conference on advanced information networking and applications-workshops, AINAW 2008, Okinawa (pp. 644–649). March 25–28, 2008

  15. Cortellessa, V., & Trubiani, C. (2008). Towards a library of composable models to estimate the performance of security solutions. In Proceedings of the 7th international workshop on Software and performance, (pp. 145–156). ACM.

  16. Zibideh, W. Y., & Matalgah, M. M. (2012). An optimized encryption framework based on the modified-DES algorithm: a trade-off between security and throughput in wireless channels. In IEEE Radio and wireless symposium (RWS) (pp. 419–422).

  17. Yau, S. S., Yin, Y., & An, H. G. (2009). An adaptive tradeoff model for service performance and security in service-based systems. In IEEE international conference on web services (ICWS) (pp. 287–294).

  18. Curtmola, R., Dong, J., & Nita-Rotaru, C. (2010). Tradeoffs between security and communication performance in wireless mesh networks. In 2010 IEEE international symposium on world of wireless mobile and multimedia networks (WoWMoM), Montreal, QC, Canada, (pp. 1–6).

  19. Haleem, M. A., Mathur, C. N., Chandramouli, R., & Subbalakshmi, K. P. (2007). Opportunistic encryption: a trade-off between security and throughput in wireless networks. IEEE Transactions on Dependable and Secure Computing, 4(4), 313–324. doi:10.1109/tdsc.2007.70214.

    Article  Google Scholar 

  20. Wente, Z., & Mo-Yuen, C. (2011). A trade-off model for performance and security in secured Networked Control Systems. In IEEE international symposium onIndustrial electronics (ISIE) (pp. 1997–2002). doi:10.1109/isie.2011.5984466.

  21. Wente, Z., & Mo-Yuen, C. (2012). Optimal tradeoff between performance and security in networked control systems based on coevolutionary algorithms. IEEE Transactions on Industrial Electronics, 59(7), 3016–3025. doi:10.1109/tie.2011.2178216.

    Article  Google Scholar 

  22. Cho, J. H., Swami, A., & Chen, I. R. (2012). Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 35(3), 1001–1012.

    Article  Google Scholar 

  23. Miskeen, G., Kouvatsos, D. D., & Akhlaq, M. (2010). Performance and security trade-off for routers in high speed networks In S. Hammond, S. Jarvis, & M. Leeke (Eds.), UK performance engineering workshop, University of Warwick, (pp. 119–128).

  24. Xu, Y., & Xie, X. (2011). Modeling and analysis of security protocols using colored Petri nets. Journal of Computers, 6(1), 19–27. doi:10.4304/jcp.6.1.19-27.

    Article  MathSciNet  Google Scholar 

  25. Al-Khatib, A. (2003). Performance analysis of wireless LAN access points, (Ph.D.). Royal Institute of Technology, Stockholm, Sweden.

  26. Zhang, C. (2005). Ad hoc network security and modeling with stochastic Petri nets. Newark, NJ: New Jersey Institute of Technology.

    Google Scholar 

  27. Zhang, C., & Zhou, M. (2003). A stochastic petri net-approach to modeling and analysis of ad hoc network. In Proceedings of international conference on information technology: research and education (ITRE), (pp. 152–156). doi:10.1109/ITRE.2003.1270592.

  28. Kouvatsos, D. D., & Miskeen, G. (2011). Performance related security trade-off for routers in high speed networks. In UK performance engineering workshop. University of Bradford.

  29. Ardawi, A. M. H. (2010). Performance modeling and evaluation of ad hoc mobile wireless networks (RMWNs), (M.Sc. Thesis), University of Bradford, UK.

  30. Kounev, S., & Buchmann, A. (2006). SimQPN—a tool and methodology for analyzing queueing Petri net models by means of simulation. Performance Evaluation, 63(4), 364–394.

    Article  Google Scholar 

  31. Kounev, S. (2006). Performance modeling and evaluation of distributed component-based systems using queueing Petri nets. IEEE Transactions on Software Engineering, 32(7), 486–502.

    Article  Google Scholar 

  32. Kounev, S., & Buchmann, A. (2008). On the use of queueing Petri nets for modeling and performance analysis of distributed systems. In V. Kordic (Ed.), PetriNet, theory and application (Vol. Petri Net, Theory and Applications, pp. 149–178). Vienna, Austria.

  33. Kouvatsos, D. D., & Mkwawa, I. M. (2003). Multicast communication in grid computing networks with background traffic. In IEE Proceedings on Software (Vol. 150, pp. 257–264, Vol. 4).

  34. Balbo, G., Bruell, S. C., & Ghanta, S. (1988). Combining queueing networks and generalized stochastic Petri nets for the solution of complex models of system behavior. IEEE Transactions on Computers, 37(10), 1251–1268.

    Article  MATH  Google Scholar 

  35. Kouvatsos, D., & Awan, I. (2003). Entropy maximisation and open queueing networks with priorities and blocking. Performance Evaluation, 51(2), 191–227.

    Article  Google Scholar 

  36. Kouvatsos, D. D. (1994). Entropy maximisation and queueing network models. Annals of Operations Research, 48(1), 63–126.

    Article  MATH  Google Scholar 

  37. Kouvatsos, D. D., Alanazi, J. S., & Smith, K. (2011). A Unified MEalgorithm for arbitrary open QNMs with mixed blocking mechanisms. Numerical Algebra, Control and Optimization (NACO)The American Institute of Mathematical Sciences (AIMS), 1(4), 781–816. doi:10.3934/naco.2011.1.781.

    Article  MathSciNet  MATH  Google Scholar 

  38. Shah, S., & Lenin, R. (2007). Performance measures of mobile ad hoc networks using queueing models (pp. 1–17). Gandhinagar, India: Dhirubhai Ambani Institute of Information and Communication Technology.

  39. Bhatia, H., Lening, R., Srivastava, S., & Sunitha, V. (2007). Application of QNA to analyze the ‘queueing network mobility model of MANET (pp. 1–6). Gandhinagar, India: Technical Report, Dhirubhai Ambani Insti tute of Information and, Communication Technology (DAIICT).

  40. Alanazi, J. S., & Kouvatsos, D. D. (2011). A Unified ME algorithm for Arbitrary open QNMs with mixed blocking mechanisms. In IEEE 11th international symposium on applications and the internet (SAINT), (pp. 492–496).

  41. Bause, F. (1993) Queueing Petri nets-a formalism for the combined qualitative and quantitative analysis of systems. In Proceedings of 5th international workshop on Petri nets and performance models (pp. 14–23).

  42. Marsan, M. (1990). Stochastic petri nets: an elementary introduction. In G.Rosenburg (Ed.), Advances in Petri Nets 1989. Lecture Notes in Computer Science (Vol. 424, pp.1–29).

  43. Jensen, K. (1998). An introduction to the practical use of coloured petri nets. In G.Rozenburg & W. Reisig (Eds.), Lectures on Petri Nets II: Applications. Lecture Notes in Computer Science, (vol. 1492, pp. 237–292).

  44. Zimmermann, A. (2008). Stochastic discrete event systems: modeling, evaluation and applications. Berlin: Springer.

    Book  MATH  Google Scholar 

  45. Marsan, M. A., Balbo, G., Chiola, G., Conte, G., Donatelli, S., & Franceschinis, G. (1991). An introduction to generalized stochastic Petri nets. Microelectronics Reliability, 31(4), 699–725.

    Article  Google Scholar 

  46. Balbo, G. (2001). Lectures on formal methods and performance analysis. Berlin, Heidelberg: Springer-Verlag.

    Google Scholar 

  47. Balbo, G., & Chiola, G. (1989). Stochastic petri net simulation. In 1989 Winter simulation conference proceedings, (pp. 266–276), ACM.

  48. Marsan, M. A., Bobio, A., & Donatell, S. (1998). Petri nets in performance analysis: an introduction. In W. Reisig, & G. Rozenberg (Eds.), (Vol. LNCS1491, pp. 211–256). Berlin (Germany): Springer-Verlag.

  49. Jensen, K. (1997). A brief introduction to coloured Petri Nets. In E. Brinksma (Ed.), Tools and algorithms for the construction and analysis of systems (Vol. 1217, pp. 203–208, Lecture Notes in Computer Science). Berlin, Heidelberg: Springer.

  50. Jensen, K. (1987). Coloured petri nets. In W.Brauer, W. Reisig & Rozenburg (Eds.), Petri Nets: Central Models and Their Properties. Lecture Notes in Computer Science (vol. 254, pp. 248–299).

  51. Jensen, K. (2002). Coloured Petri Nets theory and applications: modeling and verificatinos of protocols. http://www.slideshare.net/ahshatri/colored-petri-nets-theory-and-applications.

  52. Dutta, A., Lyles, B., & Schulzrinne, H. (2011). A formal approach to mobility modeling. In IEEE third international conference on communication systems and networks (COMSNETS 2011), Bangalore (pp. 1–10). doi:10.1109/COMSNETS.2011.5716488.

  53. Dutta, A., Lyles, B., Schulzrinne, H., Chiba, T., Yokota, H., & Idoue, A. (2007). Generalized modeling framework for handoff analysis In The 18 annual IEEE international symposium on personal, indoor and mobile radio communications, Athens, 2007 (pp. 1–5), IEEE.

  54. Becker, M., & Szczerbicka, H. (1999). PNiQ: Integration of queuing networks in generalised stochastic Petri nets. IEE Proceedings, Software, 146(1), 27–32. doi:10.1049/ip-sen:19990153.

    Article  Google Scholar 

  55. Becker, M., & Szczerbicka, H. (2001) Integration of multi-class queueing networks in generalized stochastic petri nets. In IEEE international conference on systems, man, and cybernetics (Vol. 2, pp. 1137–1142). doi:10.1109/icsmc.2001.1309629.

  56. Szczerbicka, H. (1992). A combined queueing network and stochastic Petri net approach for evaluating the performability of fault-tolerant computer systems. Performance Evaluation, 14, 217–226. doi:10.1016/0166-5316(92)90005-2.

    Article  MATH  Google Scholar 

  57. Cao, Z., Qiao, F., & Wu, Q. (2007). Queueing generalized stochastic colored timed Petri nets- based approach to modeling for semiconductor wafer fabrication. In IEEE international conference on control and automation, Guangzhou, China (pp. 2834–2838).

  58. Bause, F. (1993). “QN+ PN= QPN”-combining queueing networks and Petri nets. Germany: University of Dortmund.

    Google Scholar 

  59. Bause, F., & Buchholz, P. (1998). Queueing Petri nets with product-form solution. Performance Evaluation, 32(4), 265–299.

    Article  Google Scholar 

  60. Becker, M., & Szczerbicka, H. (1998). Combined modeling with generlized stochastic Petri nets Including queueing nets. In 14th UK computer and telecommunications performance, engineering workshop (pp. 48–62).

  61. Zaki, S. M., Ngadi, M. A., & Razak, S. A. (2009). A review of delay aware routing protocols in MANET. Computer Science Letters, 1(1), 48–60.

    Google Scholar 

  62. Stallings, W. (2002). High speed Networks and Internets: performance and quality of service (2nd ed.), Pearson Education-Prentice Hall, India.

  63. Freiling, F. C. (2008). Introduction to security metrics. In Dependability Metrics. Lecture Notes in Computer Science (Vol. 4909, pp. 129–132).

  64. Asokan, R., & Natarajan, A. (2010). Quality of service (QoS) routing in mobile ad Hoc networks. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management 464–496.

  65. Staling, W. (1998). High-speed networks: TCP/IP and ATM design. Englewood Cliffs: Prentice Hall.

    Google Scholar 

  66. Chowdhury, D. D. (2000). High speed LAN technology handbook. Berlin: Springer.

    Book  Google Scholar 

  67. Wang, Z., Zhou, M. C., & Ansari, N. (2003, October). Ad-hoc robot wireless communication. In Proceedings IEEE conference on systems, man and cybernetics, Washington, (Vol. 4, pp. 4045–4050).

  68. Bertocchi, F., Bergamo, P., Mazzini, G., & Zorzi, M. (2003). MAC and routing solution for energy saving in ad hoc networks: distributed power control. In Proceedings of the 2003 joint conference of the fourth international conference on information, communications and signal processing, 2003 and Fourth Pacific Rim conference on multimedia (Vol. 2, pp. 1061–1065).

  69. Abdul Elminaam, D. S., Abdul Kader, H. M., & Hadhoud, M. M. (2009). Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices. International Journal of Computer Theory and Engineering, 1(4), 1793–8201.

    Google Scholar 

  70. Vaman, D., & Qian, L. (2008). Cognitive radio mixed sensor and Mobile Ad Hoc Networks (SMANET) for dual use applications. In IEEE international conference on systems, man and cybernetics (SMC), (pp. 3304–3310).

  71. Maleki, M., Dantu, K., & Pedram, M. (2002). Power-aware source routing protocol for mobile ad hoc networks. In Proceedings of the 2002 international symposium on low power electronics and design, 2002. ISLPED ’02, 2002 (pp. 72–75).

  72. Madan, B. B., Goseva-Popstojanova, K., Vaidyanathan, K., & Trivedi, K. S. (2002). Modeling and quantification of security attributes of software systems. In Proceedings of the 2002 international conference on dependable systems and networks Washington, USA (pp. 505–514). Los Alamitos: IEEE Computer Society Press.

  73. Yau, S. S., Nong, Y., Sarjoughian, H. S., Dazhi, H., Roontiva, A., Baydogan, M., et al. (2009). Toward development of adaptive service-based software systems. IEEE Transactions on Services Computing, 2(3), 247–260. doi:10.1109/tsc.2009.17.

    Article  Google Scholar 

  74. Jorstad, N., & Landgrave, T. (1997). Cryptographic algorithm metrics. In 20th national information systems security conference, Athens, (pp. 1–38).

  75. Savola, R. M., & Abie, H. (2009). On-line and off-line security measurement framework for mobile ad hoc networks. Journal of Networks, 4(7), 565–579.

    Article  Google Scholar 

  76. Hu, M., Zou, S. (2010). Analysis of cryptographic protocol about wireless LAN base on Petri net. In International conference on computer application and system modeling (ICCASM), Taiyuan (Vol. 8, pp. V8–267-V268-269). doi:10.1109/iccasm.2010.5619304.

  77. Lamprecht, C., Van Moorsel, A., Tomlinson, P., & Thomas, N. (2006). Investigating the efficiency of cryptographic algorithms in online transactions. International Journal of Simulation: Systems, Science and Technology, 7(2), 63–75.

    Google Scholar 

  78. Yau, S. S., Yin, Y., & An, H. G. (2009). An adaptive tradeoff model for service performance and security in service-based systems. In IEEE international conference on web services(ICWS), (pp. 287–294).

  79. Virk, K., Hansen, K., & Madsen, J. (2005). System-level modeling of wireless integrated sensor networks. In International proceedings, symposium on system-on-chip, Tampere, (pp. 179–182).

  80. Balsamo, S. (2000). Product-form queueing networks. In M. Reiser, G. Haring & C. Lindemann (Eds.), Performance Evaluation: Origins and Directions. Lecture Notes in Computer Science (Vol. 1769, pp. 377–401).

  81. Bolch, G., Greiner, S., de Meer, H., & Trivedi, K. S. (2006). Queueing networks and markov chains: modeling and performance evaluation with computer science applications. New Jersey: Wiley-Interscience.

    Book  MATH  Google Scholar 

  82. Chandy, K. M., Herzog, U., & Woo, L. (1975). Parametric analysis of queuing networks. IBM Journal of Research and Development, 19(1), 36–42.

    Article  MathSciNet  MATH  Google Scholar 

  83. Szczerbicka, H., & Ziegler, P. (1994). Simulation with active objects: an approach to combined modelling. Simulation Practice and Theory, 1(6), 267–281.

    Article  Google Scholar 

  84. Bhatia, H., Lenin, R., Munjal, A., Ramaswamy, S., & Srivastava, S. (2008). A queuing-theoretic framework for modeling and analysis of mobility in WSNs. In PerMIS, (pp. 248–253). ACM.

  85. Nogueira, A., & Valadas, R. (2001, July 18–20). Analysing the versatility of the 2-MMPP traffic model. In CSNDSP 2000 Proceedings of the second international symposium on communication systems networks and digital signal processing, Bournemouth, UK, (pp. 261–266).

  86. Nogueira, A., Salvador, P., & Valadas, R. (1999, October 11–13). Fitting algorithms for MMPP ATM traffic models. In Proceedings of the Broadband access conference, Cracow, Poland, (pp. 167–174).

  87. Steindera, M., & Sethib, A. S. (2004). Survey of fault localization techniques in computer networks. Science of Computer Programming, 53, 165–194.

    Article  MathSciNet  Google Scholar 

  88. Kouvatsos, D. D., & Miskeen, G. M. A. (2011). Networked mobile wireless robotics (I. R. I. I. U. o. B.pagination Networks and Performance Engineering (NetPEn) Research Group, UK, Trans.). In DDK-NetPEn 15–02-11 (pp. 1–3). Bradford BD7 1DP, UK: University of Bradford.

  89. Mkwawa, I. M., Kouvatsos, D. D. (2011). Broadcasting methods in MANETts: an overview. In D. D. Kouvatsos (Ed.), Network performance engineering—a handbook on convergent multi-service networks and next generation internet, (Vol. 5233, pp. 764–783, Lecture Notes in Computer Science (LNCS)). Springer.

  90. European Commission Call C(2010)4900. (2010). Challenge 2: Cognitive cystems and cobotics, cooperation Theme 3: ICT—Information and Communication Technologies. http://cordis.europa.eu/fp7/ict/cognition/calls-ict-call6-en.html.

  91. Yonglin, R., Boukerche, A., & Mokdad, L. (2011). Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In IEEE wireless communications and networking conference (WCNC), (pp. 1038–1043). doi:10.1109/wcnc.2011.5779278.

  92. Haiwen, Y., Haibin, Y., & Xingshan, L. (2006). Fuzzy Petri nets reasoning for application of electric control system fault diagnosis. In IEEE conference on robotics, automation and mechatronics (pp. 1–6).

  93. Ouchi, Y., & Tazaki, E. (1997). Learning and reasoning method using fuzzy coloured Petri nets under uncertainty. In Computational cybernetics and simulation IEEE international conference on systems, man, and cybernetics, (Vol. 4, pp. 3867–3871).

  94. Cox, E. (1992). Fuzzy fundamentals. Spectrum, 29(10), 58–61. doi:10.1109/6.158640.

    Article  Google Scholar 

  95. Subramanyam, P. V., Chauhan, A., & Singh, Y. (2006). Modeling of a hybrid protocol for a using fuzzy Petri nets MANET. Annual IEEE India conference (pp. 1–4). India: IEEE.

Download references

Acknowledgments

The authors would like to acknowledge the University of Sebha, Libya for the funding of this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guzlan M. A. Miskeen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Miskeen, G.M.A., Kouvatsos, D.D. & Habibzadeh, E. An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models. Wireless Pers Commun 70, 1121–1146 (2013). https://doi.org/10.1007/s11277-013-1105-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1105-0

Keywords

Navigation