Timeout Misbehavior Detection Algorithm

3 downloads 0 Views 5MB Size Report
for Efficient 3D NoC Multicore Crypto Processor by A. Vino Vilmet Rose, R. Seshasayanan Ramachandran. 1082. Timeout Misbehavior Detection Algorithm:.
ISSN 1828-6003 Vol. 8 N. 5 May 2013

International Review on

Computers and Software Contents:

IN

Segmentation of Cerebrospinal Fluid and Internal Brain Nuclei in Brain Magnetic Resonance Images by D. Selvaraj, R. Dhanasekaran

T

(IRECOS) 1063

1072

Clustering Network Traffic Utilization by Nazli Mohd. Khairudin, Zaiton Muda, Aida Mustapha, Yogeswaran Nagarathinam, Mohd. Sidek Salleh

1076

Genetic Algorithm Based Optimization of Vertical Links for Efficient 3D NoC Multicore Crypto Processor by A. Vino Vilmet Rose, R. Seshasayanan Ramachandran

1082

Timeout Misbehavior Detection Algorithm: a Novel Method for the Detection of MANET Misbehavior by R. Kalaiarasi, D. Sridharan

1091

An Efficient Iterative Modulo Scheduling Approach for Improved Resource Allocation for Effective Multimedia Communication on Grid Computing Environment by G. Saravanan, V. Gopalakrishnan

1097

Comparison of TCP Variants in Wired-Cum-Wireless Environment by Nitin Jain, Neelam Srivastava

1108

R

EP

R

Intrusion Detection System Using Artificial Immune System and New Multi Core Technology by Anas Bakla, Rand El-Koutly

Queuing Mechanism in Migrating Workflow System Based on Cloud Computing Paradigm (MWfSCC) by Wu Xiuguo

1111

Experimental Evaluation of T-Learning Applications Usability by Vladimír Bureš, Jaroslava Mikulecká, Daniela Ponce, Tereza Otčenášková

1120

Intelligent Agent for Extracting Interesting Information Using Mining Algorithm by M. Vinoth Kumar, G. Tholkappia Arasu

1126

Main Types of Peer-to-Peer Live Video Streaming Topologies and their Data Delivery Mechanism by Ammar Waysi AlTuhafi, Raja Kumar Murugesan, Sureswaran Ramadas

1135

(continued on inside back cover)

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

International Review on Computers and Software (IRECOS) Managing Editor: Santolo Meo Department of Electrical Engineering FEDERICO II University 21 Claudio - I80125 Naples, Italy [email protected]

Editorial Board: (U.K.)

Pascal Lorenz

(France)

Mikio Aoyama

(Japan)

Marlin H. Mickle

(U.S.A.)

Francoise Balmas

(France)

Ali Movaghar

(Iran)

Vijay Bhatkar

(India)

Dimitris Nikolos

(Greece)

Arndt Bode

(Germany)

Mohamed Ould-Khaoua

(U.K.)

Rajkumar Buyya

(Australia)

Witold Pedrycz

(Canada)

Wojciech Cellary

(Poland)

Dana Petcu

Bernard Courtois

(France)

Erich Schikuta

(Austria)

Andre Ponce de Carvalho

(Brazil)

Arun K. Somani

(U.S.A.)

David Dagan Feng

(Australia)

Miroslav Švéda

(Czech)

Peng Gong

(U.S.A.)

Daniel Thalmann

(Switzerland)

Defa Hu

(China)

Luis Javier García Villalba

(Spain)

Michael N. Huhns

(U.S.A.)

Ismail Khalil

(Austria)

Catalina M. Lladó

(Spain)

R

IN

T

Marios Angelides

(Romania)

(Australia)

Lipo Wang

(Singapore)

EP

Brijesh Verma

The International Review on Computers and Software (IRECOS) is a publication of the Praise Worthy Prize S.r.l.. The Review is published monthly, appearing on the last day of every month. Published and Printed in Italy by Praise Worthy Prize S.r.l., Naples, May 31, 2013. Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved.

R

This journal and the individual contributions contained in it are protected under copyright by Praise Worthy Prize S.r.l. and the following terms and conditions apply to their use: Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the Publisher and payment of a fee is required for all other photocopying, including multiple or systematic copying, copying for advertising or promotional purposes, resale and all forms of document delivery. Permission may be sought directly from Praise Worthy Prize S.r.l. at the e-mail address: [email protected] Permission of the Publisher is required to store or use electronically any material contained in this journal, including any article or part of an article. Except as outlined above, no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission of the Publisher. E-mail address permission request: [email protected] Responsibility for the contents rests upon the authors and not upon the Praise Worthy Prize S.r.l.. Statement and opinions expressed in the articles and communications are those of the individual contributors and not the statements and opinions of Praise Worthy Prize S.r.l.. Praise Worthy Prize S.r.l. assumes no responsibility or liability for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained herein. Praise Worthy Prize S.r.l. expressly disclaims any implied warranties of merchantability or fitness for a particular purpose. If expert assistance is required, the service of a competent professional person should be sought.

International Review on Computers and Software (I.RE.CO.S.), Vol. 8, N. 5 ISSN 1828-6003 May 2013

Timeout Misbehavior Detection Algorithm: a Novel Method for the Detection of MANET Misbehavior R. Kalaiarasi, D. Sridharan Abstract – The performance of the mobile ad hoc network is subject to degradation in the

T

presence of misbehaving nodes, due to the timeout misbehavior of the MAC layer. In order to rectify this drawback, the Timeout Misbehavior Detection Algorithm (TMDA) is proposed. The RTS frame adds an additional field called TimeOut Bit (TOB), which gives the information about whether the particular node is misbehaving or not. According to that, the detection and correction procedure has been carried out. The proposed method minimizes the throughput degradation, jitter, frame delay and increases the frame delivery ratio. Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved.

Keywords: MANET, Timeout Misbehavior, TMDA Algorithm, Misbehavior Detection,

I.

Introduction

The following section describes the IEEE 802.11 MAC protocol. Section 3 describes the related work, section 4 describes the details of our proposed model section 5 describes the simulation environment, result and discussion, finally conclusion is given in section 6.

R

EP

R

A mobile ad hoc network (MANET) is an infrastructure less network, which can communicate via intermediate nodes within their transmission range [1]. In MANET, network is established instantly at any place, at any time without any fixed infrastructure. MANETs are being used in emergency operations like earthquake, military mobile networks, disaster relief and mine site operations [2]. In recent years, wireless technologies have opened up new challenges in MANET due to limited wireless links and bandwidth, mobility, and battery power. Each node acts as a router and forwards frames to its neighbor in a multihop manner. The node may forward the frames to far away nodes with the cooperation of the intermediate nodes. In these networks, Medium Access Control (MAC) protocols are responsible for the coordination of the nodes to achieve successful frame delivery ratio. The mobile nodes are free to move anywhere, and new nodes can enter into the network without prior notice [3]. Misbehavior can be classified into selfish misbehavior and greedy misbehavior. The primary goal of a selfish user is to improve its own performance, but its greedy misbehavior usually results in performance degradation of honest hosts [4]. Selfish nodes may choose small backoff interval, does not double the Contention Window (CW) after collision and refuse to forward frames on behalf of other hosts in order to conserve energy. The greedy nodes may be modified by using the parameters such as Denials of Service (DOS) attack, timeout mechanism, Network Allocation Vector (NAV) and Short Distributed Inter Frame Space (S-DIFS). This paper presents methods to detect and penalize the malicious misbehaving nodes using the TMDA. The rest of the paper is organized as follows.

IN

Throughput Improvement

Manuscript received and revised April 2013, accepted May 2013

II.

IEEE 802.11 MAC

The IEEE 802.11 MAC uses two types of coordination function to access the wireless networks, namely Distributed Coordination Function (DCF) and optional Point Coordination Function (PCF). DCF uses the Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA) [5] to access the nodes as shown in Fig. 1. Any node before accessing the channel should wait for DIFS time. If the channel senses idle for DIFS time, then it enters into the contention mode. The node waits for an additional time called contention period. Contention period can be calculated using the Eq. (1): BT=B·aSlotTime

(1)

where, BT represents backoff time, B is the backoff timer which is a randomly chosen integer from a uniform distribution over the interval between zero and the current contention window size CW, and aSlotTime is the length of a unit time slot [6]. During this period, backoff time is chosen uniformly in the interval of [0 to CW-1] [7]. The CW is doubled after every unsuccessful transmission up to the maximum contention window (CWMAX). If the data transmission is successful, CW is reset to CWMIN. RTS/CTS control frames are used here to reserve the channel and minimize the collisions. After the

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

1091

R. Kalaiarasi, D. Sridharan

successful transmission of RTS/CTS frames the sender sends the data frame. At the completion of the data transmission the receiver sends the ACK frame. Other stations that overhear the RTS/CTS control frames, adjust their Network Allocation Vector (NAV) based on the duration field value.

The receiver sends the CTS frame at the duration specified by the IEEE 802.11 standard (TOCTS). As the sender does not receive the CTS frame within the TOCTS’ time, it drops the CTS frame and retries sending RTS frame again [9]. TOCTS can be calculated using the following equation: TOCTS=TRTS+2  +SIFS+TCTS

(2)

Fig. 1. IEEE 802.11 RTS/CTS mechanism

IN

T

where, TRTS and TCTS are the transmission time of RTS and CTS control frames and is the maximum propagation delay. Here S is the sender node and R (M) is defined as the misbehaving receiver. Sender will not know about the receiver misbehavior. Malicious receiver chooses a larger SIFS value (SIFS*) so that sender receives only CTS after the timeout period. Due to the expiration time of CTS, sender drops the frame as shown in Fig. 3. Sender will not know about the receiver misbehavior. Sender assumes that a collision has occurred and repeats sending the RTS control frame instead of the DATA frame [9]. TO CTS*

TO CTS

EP

R TO CTS ’

S (M)

CTS (1)

RTS (3)

RTS (2)

RTS (1)

R SIFS’ SIFS

Fig. 2. Sender side misbehavior

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

CTS (1)

RTS (3)

TO CTS

RTS (2)

R

S

RTS (1)

In MANET, node misbehavior can occur either at the sender side or receiver side. Misbehaving nodes could interrupt either contention based or reservation based MAC protocols. Misbehaving sender or receiver could intentionally not follow protocol specification defined in IEEE 802.11 MAC protocol. If the MAC protocol is implemented as software instead of hardware, it is easy to alter the protocol by the selfish or malicious nodes [8]. A misbehaved receiver could transmit the CTS after DIFS instead of Short Inter Frame Space (SIFS) without any change of the standard parameters. This type of attack is defined as TimeOut (TO) attack. The malicious sender sets its SIFS value to a smaller value than the standard IEEE 802.11 SIFS value. Due to this, the expected time for a CTS frame to arrive from the receiver to the sender becomes less. This value is set as TOCTS’ as shown from the Fig. 2. Here S (M) is defined as misbehaving sender and R is the receiver node.

R (M) SIFS SIFS*

Fig. 3. Receiver side misbehavior

III. Related Work V. N. Lolla, L. K. Law, S. V. Krishnamoorthy, C. Ravishankar and D. Manjunath [10] have modified the IEEE 802.11 MAC protocol and proposed a method to detect the MAC layer back off timer violations in MANET. This protocol exchanges the state of random number generator of each of the neighbors and then uses the Wilcoxon rank sum test to compare the difference between analytically computed samples and the observed sample to detect the misbehavior. The main disadvantage of this approach is the usage of fixed sample size to detect the misbehaving node and also it does not handle collusion between the nodes. Minimax Robust Misbehavior detection [11] constitutes the theoretical worst case attack framework to detect the misbehaving nodes. It is a robust misbehavior detection technique. Here all the transmissions are observable during communication. However, in the case of collision, it is not possible to obtain the details of nodes involved in the communication. There is no operational method International Review on Computers and Software, Vol. 8, N. 5

1092

R. Kalaiarasi, D. Sridharan

proposed to detect the misbehaving node. Toledo and Wang [12] utilizes the Kolmogorov-Smirnov (K-S) test to address the detection problem. The misbehavior detection can be made by comparing the distribution of sampled traffic data with the normal behavior distribution estimated on line. This method needs fixed size data samples to perform the operation which are not suitable for real time detection. The modified sequential truncated K-S test has been used to predefine the number of samples before the test starts in order to get a proper significant level for each test step [13]. Utpal Paul, Anand Kashyap, Ritesh Maheshwari and Samir R. Das [14] used the tool to estimate the interference between nodes and links in a wireless traffic and to demonstrate the detection of selfish carrier sense behavior in an IEEE 802.11 network. It can be accommodated with high computational cost where as it needs to provide sniffer associated with the sender to monitor the frames.

T

Proposed Model

R

EP

R

A new algorithm is developed to detect both sender

IN

IV.

misbehavior and receiver misbehavior is shown in Fig. 4. Initially the expected TOCTS value (TOCTS) is calculated as given in Eq. (2). Then during frame transmission, the algorithm computes the TOCTS actual value and at each iteration, this value is compared with TOCTS value. If they are equal then there is no misbehavior and algorithm will stop. If it is not the same, then misbehavior is detected and the algorithm monitors the communication of the particular node for a particular duration which is set based on a threshold value. The threshold value is determined by the number of times a node’s misbehavior can be pardoned. If the number of misbehaviors equals to the threshold value, then the node is deviated from the network. The RTS frame format is modified from the standard IEEE 802.11 RTS format. It is shown in Fig. 5. An additional field TimeOut Bit (TOB) is added to it. The TOB represents the presence or absence of misbehavior node.

Fig. 4. Flowchart depicts TimeOut misbehavior detection algorithm

Fig. 5. T-RTS frame format

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

International Review on Computers and Software, Vol. 8, N. 5

1093

R. Kalaiarasi, D. Sridharan

IV.1. Sender Misbehavior Detection

given time period [17]. The effect of network performance in terms of number of nodes and the throughput are shown in Fig. 6. It has been observed from the figure that the IEEE 802.11 MAC throughput degrades when the number of nodes exceed above 70. It has been reported that similar degradation behavior was observed by Antonis Athanasopoulos, Evangelos Topalis, Christos Antonopoulos, Stavros Koubias [18], due to RTS/CTS exchange signaling, which in turn added to the extra overhead in the network.

If the TOCTS actual is equal to TOCTS then, set the bit as 0 and it represents that there is no misbehavior by the sender. If it is not equal, TOB is set to 1 and it assures sender misbehavior: If TOCTS > TOCTS’ – sender misbehavior The TMDA algorithm is run to detect the sender misbehavior. This algorithm computes the TOCTS actual value of the sender and compares it with expected TOCTS value. If it is less, then the TOB bit is set. After detecting the sender misbehavior, call the adjustment procedure for the correction of misbehaving node: Adjust SIFS’= SIFS

If the TOCTS’ time is greater than the TOCTS time then the receiver is a misbehaving node because malicious receiver purposely chooses larger SIFS. The sender waits for a CTS frame till TOCTS time and on not receiving it, tries to retransmit the RTS frame:

After detecting, the receiver to be misbehaving the algorithm adjusts the SIFS value:

EP

Adjust SIFS* = SIFS

Then check the number of misbehaviors to a threshold value and deactivate the receiver node if the number of misbehavior is greater than the threshold.

V.

Proposed Model

R

We have simulated this algorithm using Network Simulator-2 (ns-2) [15]. Hundred nodes are deployed in a field of area 2000×2000 m2 randomly. Simulation has been run for 200 seconds. The propagation channel of two ray ground reflection model is assumed with the data rate of 2Mbps. Source transmits constant Bit Rate (CBR) with UDP traffic at two frames per second and data payload of each frame is 210 bytes long. Source destination pairs are randomly selected. Mobile nodes are moved randomly according to the random waypoint mobility model with the node speed of 2 m/s. AODV routing protocol is used to find the path for a given source-destination pair [16]. V.1.

Fig. 6. Effect of throughput with the number of nodes using TMDA algorithm

This also occurs due to large network size which results in a higher collision probability and significant performance degradation [19]. However, by using the TMDA algorithm, the throughput value is increased to 1.98 Mbps. This indicates the significant performance enhancement in the throughput compared to IEEE 802.11 MAC protocol. In addition, the degradation behavior is eliminated after 70 nodes, thereby proving it to be a better method. Frame delivery ratio is defined as the ratio of the number of data frames successfully delivered to the destination over the number of data frames sent by the source. Fig. 7 shows the effect of frame delivery ratio with the number of nodes. As per the IEEE 802.11, the FDR was decreased when the number of nodes exceeds 70 is shown in Fig. 7. It is observed that on applying the TMDA algorithm, the FDR value is increased linearly with the increasing number of nodes. For instance, the IEEE 802.11 showed the FDR value of 97.9 whereas, the TMDA showed nearly 98.8. Hence, FDR value was increased significantly using TMDA.

R

If TOCTS < TOCTS’ - receiver misbehavior

IN

IV.2. Receiver Misbehavior Detection

T

Then check the number of misbehaviors to a threshold value and deactivate the sender node if the number of misbehavior is greater than the threshold.

Results and Discussion

Throughput is defined as the amount of data stimulated successfully from source to destination in a

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

Fig. 7. Effect of FDR with the number of nodes using TMDA

International Review on Computers and Software, Vol. 8, N. 5

1094

R. Kalaiarasi, D. Sridharan

In general, the variation in frame delay is expressed as jitter. Fig. 8 shows that the TMDA algorithm decreases the jitter value significantly as the number of nodes increases. The delay is the time difference between when a frame is generated and until it is delivered to the receiving application at the destination node [20].

Fig. 10. Effect of misdetection and correct detection ratio

VI.

T

This paper discussed about the misbehaving mobile nodes and their impact on the degradation of MANET performance. An algorithm (TMDA) is proposed here to reduce the misbehaving occurring due to timeout attack. TMDA algorithm detects and corrects the misbehaving nodes if possible or it deactivates the nodes from the network. Simulation study shows that the performance of the network has increased considerably after the implementation of TMDA.

IN

Fig. 8. Effect of jitter with the number of nodes using TMDA algorithm

Acknowledgements

This work was supported by the Department of Science and Technology, New Delhi, India, under Grant SR/WOS-A/ET-31/2009.

R

It is seen from the graph (Fig. 9) that there is not much effect of delay with the number of nodes on using TMDA algorithm as compared to IEEE 802.11. In IEEE 802.11 algorithm delay occurs due to the misbehaving behavior of the nodes. In TMDA delay occurs due to implementation of detection and correction algorithm. It is observed that this delay in TMDA is balanced due to the reduction of misbehaving nodes, which in turn increases the overall network performance.

Conclusion

EP

[1]

[2]

Fig. 9. Effect of Delay with the number of nodes using TMDA algorithm

R

[3]

Correct detection is the ratio of the number of misbehaved nodes that are correctly marked by the detection systems suspects to the total number of active misbehaved nodes in the network. Misdetection is the ratio of the number of wellbehaved nodes that is incorrectly diagnosed as suspects to the total number of well-behaved nodes in the network [21]. Fig. 10 shows the correct detection ratio is nearly 80%. On the other hand, misdetection ratio is nearly 20%. This is due to the fact that well behaved nodes can be misdiagnosed due to collision. Misdetection and correct detection ratio is significantly increased when the number of nodes increases.

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

[4]

[5]

[6]

[7]

[8]

References

Kok Seng Ting, Gee Keng Ee, Chee Kyun Ng, Nor Kamariah Noordin and Borhanuddin Mohd. Ali, The Performance Evaluation of IEEE 802.11 against IEEE 802.15.4 with Low Transmission Power, 17th Asia-Pacific Conference on Communications, APCC (Page: 850- 855, Malaysia, October 2011, Avaliable:http://dx.doi.10.1109/APCC.2011.6152927). R. Kalaiarasi, Getsy S. Sara S. Neelavathy Pari and D. Sridharan, Performance Analysis of Contention Window Cheating Misbehaviors in Mobile Ad hoc Networks, International journal of computer science & information Technology (IJCSIT) Vol.2, no.5, pp. 31-42, 2010. S. Priyadarsini and Umashankar S, TSRD-RL Algorithm Based Secured Route Discovery for MANET with Improved Route Lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504. Ghazale Hosseinabadi and Nitin Vaidya, Selfish Misbehavior in Scheduling Algorithms of Wireless Networks, IEEE 29th International Conference on Performance Computing and Communications Conference , IPCCC, (Page 214 - 221, 2010, Avaliable:http://dx.doi.10.1109/PCCC.2010.5682306). Nidal A. Al-Dmour, Studying the Impact of DIFS on the QoS Parameters for Wireless Networks, (2011) International Review on Computers and Software (IRECOS), 6 (3), pp. 384-388. Somkiat Pornchaiwiwat and Watit Benjapolakul, Coordinate Assigning Contention Window in Ad Hoc Network, 2006 IEEE Region 10 Conference, (Page 1-4, Nov.2006, ,Avaliable:http://dx.doi.10.1109/TENCON.2006.343780). Ting-Yu Lin, Ching-Yi Tsai, and Kun-Ru Wu, EARC: Enhanced Adaptation of Link Rate and Contention Window for IEEE 802.11 Multi-Rate Wireless Networks, IEEE Transactions on Communications, Vol. 60, no. 9, pp. 2623-2634, 2012. M. Raya, J.P. Hubaux, I. Aad, DOMINO: a system to detect greedy behavior in ieee 802.11 hotspots, in: Proc. of ACM

International Review on Computers and Software, Vol. 8, N. 5

1095

R. Kalaiarasi, D. Sridharan

[13]

[14]

[15] [16]

[17]

[18]

[19]

[20]

Dr. D. Sridharan was born in Tirupattur, Vellore district, India on May 3rd, 1968. He received his B.Tech. degree and M.E.degree in Electronics Engineering from Madras Institute of Technology, Anna University, India in the year 1991 and 1993 respectively. He got his Ph.D degree in the Faculty of Information and Communication Engineering, Anna University in 2005. He is currently working as Associate Professor in the Department of Electronics and Communication Engineering, CEG Campus, Anna University, Chennai, India. He was awarded the Young Scientist Research Fellowship by SERC of Department of Science and Technology, Government of India. His present research interests include Internet Technology, Network Security, Distributed Computing and Wireless Sensor Networks.

R

[21]

R. Kalaiarasi was born in Namakkal, India on July 7th, 1976. She received her B.Sc degree in Computer Science from Bharathiar University, India in the year 1996 and Master of Computer Applications from University of Madras in the year 2004. Currently she is pursuing her Ph.D degree in the Faculty of Science & Humanities, Anna University, Chennai, India. Her research field includes wireless ad hoc networks, MAC Layer, Quality of Service and communication networks. She has published 4 papers in peer reviewed journals and 3 international conference proceedings.

T

[12]

Department of Electronics and Communication Engineering, CEG campus, Anna University, Chennai, India.

IN

[11]

Authors’ information

R

[10]

MobiSys, June, 2004. Lei Guang, ChadiAssi,Yinghua Ye, DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks, Computer Communications, Vol. 30, no.8, pp. 1841– 1853, 2007. V. N. Lolla,L. K. Law, S. V. Krishnamoorthy, C. Ravishankar, and D. Manjunath, Detecting MAC layer back-off time violations in mobile ad hoc networks, 26th IEEE International Conference on Distributed Computing Systems, ICDCS, (Page: 63, 2006, Avaliable:http://dx.doi>10.1109/ICDCS.2006.28). S. Radosavac, J. Baras and I. Koutsopoulos, A frame work for MAC protocol misbehavior detection in wireless networks, Proceedings of ACM workshop on wireless security, (Page: 3342, 2005, Avaliable:http://dx.doi>10.1145/1080793.1080801). Alberto Lopez Toledo and Xiaodong Wang, A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF, IEEE International Conference on Communications ICC, (Page: 1564-1569, 2007). Toledo and X. Wang, Robust Detection of Selfish Misbehavior in Wireless Networks, IEEE Journal on Selected Areas in Communication, Vol. 25, no. 6, pp. 1124-1134, 2007. Utpal Paul, Anand Kashyap, Ritesh Maheshwari and Samir R. Das, Passive Measurment of Interference in WiFi Networks with Application in Misbehavior Detection, IEEE Transactions on Mobile Computing, no. 99, pp. 1. The Network Simulator ns-2, http://www.isi.edu/nsnam/ns/,2006. Charles E. Perkins and Elizabeth M. Royer, Ad hoc On-Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, (Page 90-100, February 1999). Ahmed Riza, Ling Teck Chaw, Phang Keat Keong and Hoh Kian Pee, Improving QOS In WLAN Using Dynamic Weighted Fair Scheduling, Malaysian Journal of Computer Science, Vol. 23, no.2, pp 85-101, 2010. Antonis Athanasopoulos, EvangelosTopalis, Christos Antonopoulos, Stavros Koubias, Evaluation Analysis of the Performance of IEEE 802.11b and IEEE 802.11g Standards, Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICNICONSMCL, (Page: 141, April 2006, Avaliable:http://dx.doi>10.1109/ICNICONSMCL.2006.92). P. Raptis , V. Vitsas and K. Paparrizos, Packet Delay Metrics for IEEE 802.11 DistributedCoordination Function, Mobile Networks and Applications, Vol. 14, no. 6, pp.772-781, 2009. Noor M. Asraf, Raja N. Ainon and Phang Keat Keong, QoS Parameter Optimization using Multi-Objective Genetic Algorithm in MANETs, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, (Page: 138143, 2010, Available: http://dx.doi. 10.1109/AMS.2010.40). Lei Guang and Chadi Assi, A Self-Adaptive Detection System for MAC Misbehavior in Ad Hoc Networks, IEEE International Conference on Communications, ICC, (Page: 3682- 3687, vol. 8, 2006, Avaliable:http://dx.doi.10.1109/ICC.2006.255644).

EP

[9]

Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

International Review on Computers and Software, Vol. 8, N. 5

1096

International Review on Computers and Software (IRECOS) (continued from outside front cover) 1141

Priority Based Fault Tolerant Technique for Wireless Body Area Networks (WBANs) by K. T. Meena Abarna, K. Venkatachalapathy

1149

Probabilistic Key Chain Based Key Distribution Schemes for WSN by T. Kavitha, D. Sridharan

1156

Evaluation of WSN Hierarchical Routing Protocols According to Energy Efficiency Heterogeneity Levels by Ahmad Al-Hilal, Salah Dowaji

1170

T

Dynamic Traffic Energy Efficient Topology based Routing Protocol for Wireless Ad Hoc Sensor Networks by N. Thangadurai, R. Dhanasekaran, R. D. Karthika

1180

Optimal Software Architecture Design Based on Responsibilities Using Adaptive Genetic Algorithm by M. Sunil Kumar, A. Rama Mohan Reddy

1186

IN

Low Complexity, High Throughput Layered FFT Structure for BI Based COFDM Systems by T. Deepa, R. Kumar

R

Network Intrusion Detection System Based on Negative Selection Algorithm Reinforced by Danger Theory by Y. Chihab, A. A. Ouahman, O. Bencharef

1195

1199

Multivariate Gaussian Mean Distributed Network Topology for Energy Efficient Communication in Wireless Sensor Networks by T. Shankar, S. Shanmugavel, A. Karthikeyan, Arshad Nadeem

1203

Study of Personalization in E-Learning by V. Senthil Kumaran, A. Sankar

1209

An Efficient Machine Learning Approach for Screening of COPD Lung Disease by K. Meenakshi Sundaram, C. S. Ravichandran

1218

Errata corrige

1227

R

EP

The Coverage Analysis of Hierarchical Networks with Specified Reliability Indices by Fares A. H. AL-hadsha, Sergey V. Gaevoy, Viktor S. Luk’yanov

Abstracting and Indexing Information: Cambridge Scientific Abstracts (CSA/CIG) Academic Search Complete (EBSCO Information Services) Elsevier Bibliographic Database - SCOPUS Index Copernicus (Journal Master List): Impact Factor 6.14 Autorizzazione del Tribunale di Napoli n. 59 del 30/06/2006

T IN R EP R 1828-6003(201305)8:5;1-J Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved

Suggest Documents