Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA)

A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with a well-established cellular network can improve communication and security in ad hoc networks, as well as enrich the cellular services. This research proposes a cellular-aided mobile ad hoc network (CAMA) architecture, in which a CAMA agent in the cellular network manages the control information, while the data is delivered through the mobile terminals (MTs). The routing and security information is exchanged between MTs and the agent through cellular radio channels. A position-based routing protocol, the multi-selection greedy positioning routing (MSGPR) protocol, is proposed. At times due to the complicated radio environment, the position information is not precise. Even in these cases, the MT can still find its reachable neighbors (the association) by exchanging “hello” messages. This association is used in complement with the position information to make more accurate routing decisions. Simulation results show that the delivery ratio in the ad hoc network is greatly improved with very low cellular overhead. The security issues in the proposed architecture and the corresponding solutions are addressed. The experimental study shows that CAMA is much less vulnerable than a pure ad hoc network.

[1]  Bharat Bhargava,et al.  On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[2]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[3]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[4]  Kaveh Pahlavan,et al.  Handoff in hybrid mobile data networks , 2000, IEEE Wirel. Commun..

[5]  P. Mahonen,et al.  Optimization scheme for mobile users performing vertical handoffs between IEEE 802.11 and GPRS/EDGE networks , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[6]  Barry G. Evans,et al.  Satellite UMTS/IMT2000 W-CDMA air interfaces , 1999, IEEE Commun. Mag..

[7]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[8]  Roger Wattenhofer,et al.  Asymptotically optimal geometric mobile ad-hoc routing , 2002, DIALM '02.

[9]  A. Samukic UMTS universal mobile telecommunications system: development of standards for the third generation , 1998 .

[10]  Ivan Stojmenovic,et al.  Location based localized alternate, disjoint, multi-path and component routing schemes for wireless networks , 2001, MobiHoc '01.

[11]  Valtteri Niemi,et al.  UMTS Networks: Architecture, Mobility and Services , 2001 .

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[14]  BhagwatPravin,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994 .

[15]  Yu-Chee Tseng,et al.  GRID: A Fully Location-Aware Routing Protocol for Mobile Ad Hoc Networks , 2001, Telecommun. Syst..

[16]  Chai-Keong Toh,et al.  Associativity-Based Routing for Ad Hoc Mobile Networks , 1997, Wirel. Pers. Commun..

[17]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[18]  David R. Karger,et al.  A scalable location service for geographic ad hoc routing , 2000, MobiCom '00.

[19]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[20]  Michael D. Zoltowski,et al.  Adaptive Anti-Jam Reduced-Rank Space-Time Preprocessor Algorithms for GPS , 2000 .

[21]  Travis Earl Russell,et al.  Signaling System #7 , 1995 .

[22]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[23]  B. Gudmundson UMTS/IMT2000 based on wideband CDMA , 1998, ICCT'98. 1998 International Conference on Communication Technology. Proceedings (IEEE Cat. No.98EX243).

[24]  Erik Dahlman,et al.  UMTS/IMT-2000 based on wideband CDMA , 1998, IEEE Commun. Mag..

[25]  S. Chakrabarti,et al.  QoS issues in ad hoc wireless networks , 2001, IEEE Commun. Mag..

[26]  Jim Binkley,et al.  Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.

[27]  Chunming Qiao,et al.  Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..

[28]  A. Samukic,et al.  UMTS Universal Mobile Telecommunications System: development of standards for the third generation , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[29]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[30]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[31]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[32]  Apostolis K. Salkintzis,et al.  WLAN-GPRS integration for next-generation mobile data networks , 2002, IEEE Wirel. Commun..

[33]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[34]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[35]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[36]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[37]  Michael D. Zoltowski,et al.  Low-sample performance of reduced-rank power minimization based jammer suppression for GPS , 2000, 2000 IEEE Sixth International Symposium on Spread Spectrum Techniques and Applications. ISSTA 2000. Proceedings (Cat. No.00TH8536).

[38]  Bernhard Walke,et al.  IEEE 802.11 Wireless Local Area Networks , 2006 .

[39]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[40]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[41]  C. Schwingenschlögl,et al.  Building Blocks for Secure Communication in Ad-hoc Networks , 2001 .

[42]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[43]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[44]  Indra Widjaja,et al.  IEEE 802.11 Wireless Local Area Networks , 1997, IEEE Commun. Mag..

[45]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[46]  Biswanath Mukherjee,et al.  MACA-an efficient channel allocation scheme in cellular networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[47]  M. Ibnkahla,et al.  EU's R&D activities on third-generation mobile satellite systems (S-UMTS) , 1998, IEEE Commun. Mag..

[48]  Raghupathy Sivakumar,et al.  On using the ad-hoc network model in cellular packet data networks , 2002, MobiHoc '02.

[49]  B.W. Parkinson,et al.  NAVSTAR: Global positioning system—Ten years later , 1983, Proceedings of the IEEE.

[50]  Bharat Bhargava,et al.  Achieving Flexibility and Scalability: A New Architecture for Wireless Network* , 2001 .