ABSTRACT
Ad hoc networks are self-configuring multi-hop wireless networks whose routing protocols are extremely sensitive to the occurrence of accidental and malicious faults. However, the behaviour exhibited by such protocols varies from one to another. This context motivates the importance of using resilience benchmarking strategies to evaluate, compare and select the most suitable routing protocol alternative, among those available, for each application. Experience shows that such selection process is very complex, since requiring the simultaneous consideration a wide set of different performance, resilience, energy consumption and cost measures. This selection can turn into a complex task when the effect of a big number of perturbations (attacks and accidental faults) is considered on a big variety of protocols. The use of general scores, resulting from the aggregation of different measures, provide an interesting way of obtaining a macroscopic view of the behaviour exhibited by evaluated targets. The idea is to reduce the number of candidates, and then use more fine-grained measures in order to compare only the finally retained candidates. This paper works on this idea by proposing the use of the Logic Score Preferences (LSP) technique to combine and aggregate performance, resilience and energy consumption measures into a single global score. The use of this score will be limited to the very first steps of resilience benchmarking, where decision making is hard for benchmark performers due to the number and variety of available measures. The use of the approach is illustrated through a case study where an ad hoc routing protocol, olsrd v. 0.6.0, is evaluated in the presence of accidental faults and attacks. This contribution must not be considered as a replacement of, but rather as a complement to the typical comparison and selection activities deployed during resilience benchmarking.
- Imad Aad. Impact of denial of service attacks on ad hoc networks. IEEE/ACM Trans. Netw., 16(4):791--802, 2008. Google ScholarDigital Library
- I. F. Akyildiz et al. Wireless mesh networks: a survey. IEEE Radio Communications, 43: S23--S30, 2005. Google ScholarDigital Library
- David Andrés, Jesús Friginal, Juan-Carlos Ruiz, and Pedro Gil. An attack injection approach to evaluate the robustness of ad hoc networks. In IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), pages 228--233, 2009. Google ScholarDigital Library
- Jasmeet Chhabra et al. Real-world experiences with an interactive ad hoc sensor network. In Proceedings of the 2002 International Conference on Parallel Processing Workshops, pages 143--151, 2002. Google ScholarDigital Library
- J. J. Dujmovic and R. Elnicki. A DMS Cost/Benefit Decision Model: Mathematical Models for Data Management System Evaluation, Comparison, and Selection. National Bureau of Standards, Washington D. C., No. GCR 82-374. NTIS No. PB 82-170150, 1982.Google Scholar
- Laura Marie Feeney. An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mob. Netw. Appl., 6:239--249, 2001. Google ScholarDigital Library
- Jesus Friginal, David de Andres, Juan-Carlos Ruiz, and Pedro Gil. On selecting representative faultloads to guide the evaluation of ad hoc networks. In Fifth Latin American Symposium on Dependable Computing (LADC), 2011 - On printing.Google ScholarCross Ref
- Hillsdale WMN. {Online}. Available: http://dashboard.open-mesh.com/overview2.php?id=Hillsdale, 2010.Google Scholar
- J. H. James, B. Chen, and L. Garrison. Implementing voip: a voice transmission performance progress report. IEEE Communication Magazine, 42:36--41, 2004. Google ScholarDigital Library
- Hung-Chin Jang, Yao-Nan Lien, and Tzu-Chieh Tsai. Rescue information system for earthquake disasters based on manet emergency communication platform. In International Conference on Wireless Communications and Mobile Computing (IWCMC), pages 623--627, 2009. Google ScholarDigital Library
- Liqun Li, Guoliang Xin, Limin Sun, and Yan Liu. Qvs: Quality-aware voice streaming for wireless sensor networks. In Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, ICDCS '09, pages 450--457, 2009. Google ScholarDigital Library
- Weiquan Lu, Winston K. G. Seah, Edwin W. C. Peh, and Yu Ge. Communications support for disaster recovery operations using hybrid mobile ad-hoc networks. In Proceedings of the 32nd IEEE Conference on Local Computer Networks, pages 763--770, 2007. Google ScholarDigital Library
- Michael F. Morris. Kiviat graphs: conventions and figures of merit. In ACM Sigmetrics Performance Evaluation Review, volume 3, pages 2--8, 1974. Google ScholarDigital Library
- P. Serrano et al. A CARMEN mesh experience: deployment and results. In 10th IEEE WoWMoM, pages 1--8, 2009.Google ScholarCross Ref
- Y. Zhou et al. Balancing the hidden and exposed node problems with power control in csma/cabased wireless networks. In IEEE Wireless Communications and Networking Conference (WCNC), pages 683--688, 2005.Google Scholar
Recommendations
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well with these scenarios. The beacon-less routing algorithm (BLR) presented in ...
Performance evaluation of AODV & DSR for wireless sensor networks
ICCOM'06: Proceedings of the 10th WSEAS international conference on CommunicationsThis paper evaluates the performance of two prominent on-demand routing protocols, which are Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) for wireless sensor networks. Results obtained from simulations demonstrates ...
Performance analysis of ad hoc routing protocols based on selective forwarding node algorithms
Network resources are essential in resource critical environments as ad hoc wireless networks (AWNs) due to their dynamic topology and broadcasting of packets over the wireless medium without a central controller. In order to perform a routing algorithm ...
Comments