To search, Click below search items.

 

All Published Papers Search Service

Title

Measuring the Performance of Call Admission Control in Two Tier Wireless Cellular Communication Networks

Author

Sumit kumar srivastava, Dharmendra Kumar Gupta

Citation

Vol. 13  No. 1  pp. 124-132

Abstract

A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. With the increasing interest in MANETs, there has been a greater focus on the subject of securing such networks. Out of the many discussions and research groups discussing the different security issues in the field of mobile ad hoc networks, many papers have been written describing different proposed secure routing protocols that defend against malicious nodes¡¯ attacks that MANETs face. However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs¡¯ attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities. Recently, researchers started to study selfish nodes and their effects on mobile ad hoc networks. That resulted in creating a new thread of research in the MANET field. A number of research papers discussing different cooperation enforcement schemes for detecting and defending against selfish nodes and their disturbance to mobile ad hoc networks were published. Still none of these proposed cooperation enforcement schemes were based on any existing MANET secure routing protocols. All of these proposed schemes were based on routing protocols with no security measures at all. My research strategy is to choose one of the secure routing protocols according to its security-effectiveness, study it and analyze its functionality and performance. The authenticated routing for ad hoc networks (ARAN) secure routing protocol was chosen for analysis. Then, the different existing cooperation enforcement schemes were surveyed so that to come up with a reputation-based scheme to integrate with the ARAN protocol. The result of that integration is called: Reputed-ARAN. Consequently, Reputed-ARAN is capable of handling both selfish and malicious nodes¡¯ attacks. Also, the Glomosim simulation package was chosen to carry out the experimental part of this thesis work. The results of the experiments showed that in the presence of 30% selfish nodes and with node mobility of 10 m/s, the newly proposed Reputed-ARAN protocol improves network throughput to 63.1%, from 38.8% network throughput provided by normal ARAN. This improvement is obtained at the cost of a higher overhead percentage with minimal increase in the average number of hops. The main contribution in this thesis: Reputed-ARAN proves to be more efficient and more secure than normal ARAN secure routing protocol in defending against both malicious and authenticated selfish nodes.

Keywords

MANET, ARAN, TCP/IP, Two Tier Wireless Cellular Communication Networks

URL

http://paper.ijcsns.org/07_book/201301/20130120.pdf