Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised aodes or intruders. In this paper, we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.
Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area.
The performance of multi-antenna multi-relay cooperative system is investigated in this paper. Two relaying strategies, i.e., reactive and proactive strategies are analyzed with the Amplifyand-Forward (AF) and Decode-and-Forward (DF) protocols. We derive the Cumulative Distribution Function (CDF) of the received Signal-to-Noise Ratio (SNR) at the destination, which is used to calculate the exact outage probability, for both AF and DF protocols. According to these results, we conclude that a cooperative network which composes K relays each equipped with nr antennas can achieve maximal order-(2nrK+1) diversity gain, by proper processing at relays and destination. Furthermore, the performance comparison is given, in terms of outage probability. These two strategies outperform each other in different scenarios in AF protocol, whilst proactive strategy is always better than its counterpart in DF protocol. According to these results, the optimal power allocation schemes among relay nodes are also presented, with reasonable power constraint.
Due to their characteristics of dynamic topology, wireless channels and limited resources, mobile ad hoc networks are particularly vulnerable to a denial of service (DoS) attacks launched by intruders. The effects of flooding attacks in network simulation 2 (NS2) and measured performance parameters are investigated, including packet loss ratio, average delay, throughput and average number of hops under different numbers of attack nodes, flooding frequency, network bandwidth and network size. Simulation results show that with the increase of the flooding frequency and the number of attack nodes, network performance sharply drops. But when the frequency of flooding attacks or the number of attack nodes is greater than a certain value, performance degradation tends to a stable value.