Research on Survivability of Mobile Ad Hoc Network

In this paper, we analyze the survivability of Mobile Ad Hoc Network systemically and give a detailed description of the survivability issues related to the MANET. We begin with analyzing the requirements of survivability of ad hoc network, and then classify the impacts that affect survivability into three categories: dynamic topology, faults and attacks. The impacts of these factors are analyzed individually. A simulation environment for the MANET towards survivability is designed and implemented as well. Experiments that under the requirements and the impacts we declared are done based on this environment.

[1]  Leonard Kleinrock,et al.  Mobile wireless network system simulation , 1995, MobiCom '95.

[2]  Suresh L. Konda,et al.  A Simulation Model for Managing Survivability of Networked Information Systems , 2000 .

[3]  Ahmad-Reza Sadeghi,et al.  Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.

[4]  Jan Camenisch,et al.  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..

[5]  George F. Riley,et al.  The Georgia Tech Network Simulator , 2003, MoMeTools '03.

[6]  Ahmad-Reza Sadeghi,et al.  Secure Data Management in Trusted Computing , 2005, CHES.

[7]  Klara Nahrstedt,et al.  Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..

[8]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[9]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[10]  Kishor S. Trivedi,et al.  Network survivability performance evaluation:: a quantitative approach with applications in wireless ad-hoc networks , 2002, MSWiM '02.

[11]  Somesh Jha,et al.  Survivability analysis of network specifications , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[12]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[13]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[14]  Romit Roy Choudhury,et al.  Survivability Analysis of Ad Hoc Wireless Network Architecture , 2000, Mobile and Wireless Communication Networks.

[15]  Jan Camenisch,et al.  Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.

[16]  Ahmad-Reza Sadeghi,et al.  A protocol for property-based attestation , 2006, STC '06.

[17]  Ronald R. Willis,et al.  Software quality engineering: a total technical and management approach , 1988 .