Modelo de arquitetura para simulação de redes móveis sem fio ad hoc no Simmcast

PIPCA-Programa de Pós-Graduação em Computação Aplicada Centro de Ciências Exatas e Tecnológicas Unisinos -Universidade do Vale do Rio dos Sinos Av. Unisinos

ABSTRACT Research in ad hoc mobile wireless networking presents a series of challenges, caused by factors such as mobility, restrictions imposed by portabi-lity, vulnerability and wireless instability and security. Simulation is an impor-tant tool in this area. This paper describes the main mobile wireless network simulators and their uses, and based on them, proposes an architectural model for simulation of ad hoc networks for the Simmcast simulation framework. Resumo. A pesquisa na área de redes móveis ad hoc sem fio apresenta uma série de desafios, causada por fatores como mobilidade, restrições impostas pela portabilidade, a vulnerabilidade e instabilidade do meio e segurança. Si-mulação é uma importante ferramenta nesta área. O presente artigo traça um panorama dos principais simuladores de redes móveis sem fio e seus usos, e a partir destes, propõe um modelo de arquitetura de simulação de redes ad hoc para o framework de simulação Simmcast.

  • [Show abstract] [Hide abstract]
    ABSTRACT: Securing the operation of ad hoc networking protocols is a multifaceted and complex problem that poses new and unique challenges. All network nodes constitute a self-organizing infrastructure, while operating in an inherently unreliable and insecure environment. The boundaries of an ad hoc network are blurred, if not inexistent, and its membership may frequently change. Without security measures, attackers have ample opportunity to control, disrupt, and degrade the services or even disable communications of other users. As a result, applications based on the ad hoc networking technology cannot proliferate, unless such vulnerabilities are eradicated. For example, search-and-rescue, law enforcement, or battlefield networks must guarantee secure and reliable communication, even if a significant fraction of the network nodes are disabled or controlled by an adversary. Similarly, users will not enable their portable devices to join and form ad hoc networks, unless access to the sought services is protected from compromise. This talk discusses threats and security measures, focusing on a comprehensive solution for secure and fault-tolerant communication in ad hoc networks. We discuss our design of a protocol suite that addresses the security of the route discovery and the security of the data transmission in ad hoc networks. The presented material reflects on-going research, as well as research conducted over the past four years at Cornell University under the supervision of Prof. Z. J.Haas.
    03/2005: pages 46-47;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Most recent ad hoc network research has focused on providing routing services without considering security. We detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, authenticated routing for ad hoc networks (ARAN), is based on certificates and successfully defeats all identified attacks.
    Network Protocols, 2002. Proceedings. 10th IEEE International Conference on; 12/2002
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The technical challenges that mobile computing must surmount to achieve its potential are hardly trivial. Some of the challenges in designing software for mobile computing systems are quite different from those involved in the design of software for today's stationary networked systems. The authors focus on the issues pertinent to software designers without delving into the lower level details of the hardware realization of mobile computers. They look at some promising approaches under investigation and also consider their limitations. The many issues to be dealt with stem from three essential properties of mobile computing: communication, mobility, and portability. Of course, special-purpose systems may avoid some design pressures by doing without certain desirable properties. For instance portability would be less of a concern for mobile computers installed in the dashboards of cars than with hand-held mobile computers. However, the authors concentrate on the goal of large-scale, hand-held mobile computing as a way to reveal a wide assortment of issues
    Computer 05/1994; 27(4):38-47. · 1.44 Impact Factor

Full-text (2 Sources)

Available from
May 28, 2014