Measuring the resilience of mobile ad hoc networks with human walk patterns

MANET (mobile ad hoc network) technology has become increasingly attractive for real-world applications in the past decade. Dynamic and intermittent connectivity caused by node mobility poses a huge challenge to the operation of MANETs that require end-to-end paths for communication. The attacks against critical nodes could result in a more degraded network service. In this paper, we evaluate the network resilience of real-world humans' walking traces under different malicious attacks. We propose a new flexible attack strategy by selecting different centrality metrics to measure node significance according to network topological properties. We employ a resilience quantification approach to evaluate the node pair communication ability spanning a range of network operational states. Resilience of topological robustness is evaluated for different combinations of network parameters, and resilience of application layer service using different routing protocols are compared given a range of states of topological flow robustness. Our results show that flexible attacks impact overall network resilience more than attacks based on any single centrality metric with varying network connectivities.

[1]  Romit Roy Choudhury,et al.  Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents , 2000, MATA.

[2]  James P. G. Sterbenz,et al.  Network design and optimisation based on cost and algebraic connectivity , 2013, 2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[3]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[4]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[5]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[6]  Mauricio Barahona,et al.  Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[7]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[8]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[9]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[10]  Abdul Jabbar,et al.  An approach to quantifying resilience in mobile ad hoc networks , 2011, 2011 8th International Workshop on the Design of Reliable Communication Networks (DRCN).

[11]  Cecilia Mascolo,et al.  Centrality prediction in dynamic human contact networks , 2012, Comput. Networks.

[12]  David Hutchison,et al.  Redundancy, diversity, and connectivity to achieve multilevel network resilience, survivability, and disruption tolerance invited paper , 2014, Telecommunication Systems.

[13]  James P. G. Sterbenz,et al.  Analysis of critical node attacks in mobile ad hoc networks , 2014, 2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM).

[14]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  HutchisonDavid,et al.  Redundancy, diversity, and connectivity to achieve multilevel network resilience, survivability, and disruption tolerance invited paper , 2014 .

[16]  Cory Beard,et al.  Evaluating geographic vulnerabilities in networks , 2011, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).

[17]  James P. G. Sterbenz,et al.  Modelling attacks and challenges to wireless networks , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.

[18]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[19]  James P. G. Sterbenz,et al.  Dynamic source routing (DSR) protocol implementation in ns-3 , 2012, SimuTools.

[20]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[21]  James P. G. Sterbenz,et al.  Robustness analysis of mobile ad hoc networks using human mobility traces , 2015, 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).

[22]  Taieb Znati,et al.  On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.

[23]  Tracy Camp,et al.  Trace-based mobility modeling for multi-hop wireless networks , 2011, Comput. Commun..

[24]  Panos M. Pardalos,et al.  Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..

[25]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[26]  Prashant Krishnamurthy,et al.  Connectivity and critical point behavior in mobile ad hoc and sensor networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[27]  Injong Rhee,et al.  SLAW: A New Mobility Model for Human Walks , 2009, IEEE INFOCOM 2009.

[28]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[29]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[30]  Piet Van Mieghem,et al.  On the Robustness of Complex Networks by Using the Algebraic Connectivity , 2008, Networking.

[31]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[32]  Cecilia Mascolo,et al.  Evaluating Temporal Robustness of Mobile Networks , 2013, IEEE Transactions on Mobile Computing.

[33]  James P. G. Sterbenz,et al.  Destination-sequenced distance vector (DSDV) routing protocol implementation in ns-3 , 2011, SimuTools.

[34]  John Skvoretz,et al.  Node centrality in weighted networks: Generalizing degree and shortest paths , 2010, Soc. Networks.

[35]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[36]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[37]  Abdul Jabbar,et al.  Path diversification: A multipath resilience mechanism , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[38]  Abdul Jabbar,et al.  Path diversification for future internet end-to-end resilience and survivability , 2014, Telecommun. Syst..

[39]  Injong Rhee,et al.  On the levy-walk nature of human mobility , 2011, TNET.

[40]  Pietro Manzoni,et al.  Determination of Critical Transmission Range in Ad-Hoc Networks , 1999 .

[41]  David Hutchison,et al.  Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines , 2010, Comput. Networks.

[42]  James P. G. Sterbenz,et al.  A comparative analysis of geometric graph models for modelling backbone networks , 2014, Opt. Switch. Netw..

[43]  Injong Rhee,et al.  CRAWDAD dataset ncsu/mobilitymodels (v.2009-07-23) , 2009 .

[44]  W. Liu,et al.  Utility of algebraic connectivity metric in topology design of survivable networks , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[45]  Piet Van Mieghem,et al.  Graph Spectra for Complex Networks , 2010 .