首页> 外文学位 >Exploiting neighborhood information in wireless networks: Channel assignment and replica detection.
【24h】

Exploiting neighborhood information in wireless networks: Channel assignment and replica detection.

机译:在无线网络中利用邻居信息:信道分配和副本检测。

获取原文
获取原文并翻译 | 示例

摘要

Distributed networking paradigms, e.g., mesh/ad hoc/sensor networking, are envisioned as a fundamental building block of the "any time, any where" next generation wireless networks. In these paradigms, it is often the case that neighboring nodes need to cooperate together to perform a task, e.g., resource allocation, misbehavior detection, routing, sensing, etc. The first step in performing any of these applications is for these nodes to exploit their neighborhood information in order to facilitate cooperation. In other words, nodes need to know "how to make use of their neighborhood information to facilitate their task execution?". This neighborhood exploitation issue directly determines the performance, efficiency, and security of the network.;In this research, we study the exploitation of neighborhood information and focus on two major problems: channel assignment in multi-channel wireless mesh networks, and replica detection in static wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs). In multi-channel wireless mesh networks, as decentralized channel assignment decisions are made over nodes spread over the network, such decisions have to be granted with low interference, low delay and high throughput while keeping the network connected and the channel assignments fair. In our approach, we first pre-assign each node with a unique channel codeword based on s-disjunct codes. By exploiting neighbors' channel codewords and their s-disjunct property, we then develop two localized channel assignment algorithms, one for unicast and one for local broadcast (as defined in [1]). We also identify the conditions that interference-free communication can be achieved for both unicast and local broadcast, and the scenarios when the channel assignment algorithm for unicast can reach 100% throughput. The probability analysis on the above conditions, as well as channel diversity and transmission delay are researched as well.;In static sensor networks and mobile ad hoc networks, we focus on the node replication detection problem. Specifically, we proposed two replica detection schemes, one hybrid detection scheme for sensor networks detects replicas either locally or at the base station based on social fingerprint, and one localized approach for MANETs detects node replication attacks from space domain. In the former scheme, each node computes a social fingerprint characterizing the local neighborhood (neighbors). Since each node's neighborhood is unique in the network, the replica can be detected by discovering fingerprint mismatch. In the latter scheme, each node maintains a cryptographic one-way hash chain. When two nodes meet, they first exchange their time-stamped location claims associated with their one-way hash values, then check the information they kept for other nodes. Once they find paradox information, the replica attack can be detected. Our analysis indicates that both schemes provide a high detection accuracy disregarding node collusion and the number/distribution of replicas/compromised nodes. Moreover, these schemes are naturally extensible to other classes of static/mobile networks in which nodes can be physically captured and replicated by adversaries.;The major contributions of this dissertation are multi-fold. Firstly, the channel assignment approach for local broadcast is the first to stand for effectively supporting local broadcast in multi-channel networks. Secondly, the channel assignment approach for unicast can reach 100% throughput under the primary interference model and achieve interference free communication under certain conditions. Thirdly, the social fingerprint based replica detection scheme is the first to provide realtime detection of node replication attacks in an effective and efficient way in static sensor networks. And lastly, to our best knowledge, the replica detection scheme for MANETs is the only approach that supports mobile networks while placing no restrictions on the number and distribution of the cloned frauds and on whether the replicas collude or not.
机译:分布式网状网络范例,例如网状/自组织/传感器网络,被设想为下一代无线网络“随时随地”的基本构建块。在这些范例中,通常情况下,相邻节点需要一起合作以执行任务,例如资源分配,行为不当检测,路由,传感等。执行任何这些应用程序的第一步是让这些节点利用他们的邻居信息,以促进合作。换句话说,节点需要知道“如何利用其邻域信息来促进其任务执行?”。这个邻域利用问题直接决定了网络的性能,效率和安全性。在本研究中,我们研究邻域信息的利用,并着眼于两个主要问题:多信道无线网状网络中的信道分配和网络中的副本检测。静态无线传感器网络(WSN)和移动自组织网络(MANET)。在多信道无线网状网络中,由于分散的信道分配决策是在分布在网络上的节点上做出的,因此在保持网络连接和信道分配公平的同时,必须以低干扰,低延迟和高吞吐量的方式授予此类决策。在我们的方法中,我们首先基于s分离码为每个节点预先分配一个唯一的信道码字。通过利用邻居的信道码字及其s-disjunct属性,我们然后开发了两种本地化的信道分配算法,一种用于单播,一种用于本地广播(如[1]中所定义)。我们还确定了单播和本地广播都可以实现无干扰通信的条件,以及单播的信道分配算法可以达到100%吞吐量的情况。研究了上述条件下的概率分析,以及信道分集和传输时延。在静态传感器网络和移动自组织网络中,我们重点研究节点复制检测问题。具体来说,我们提出了两种副本检测方案,一种用于传感器网络的混合检测方案,它基于社交指纹在本地或基站处检测副本,一种用于MANET的本地化方法,用于检测来自空间域的节点复制攻击。在前一种方案中,每个节点都计算一个表征本地邻居(邻居)的社交指纹。由于每个节点的邻居在网络中都是唯一的,因此可以通过发现指纹不匹配来检测副本。在后一种方案中,每个节点都维护一个加密的单向哈希链。当两个节点相遇时,它们首先交换与它们的单向哈希值关联的时间戳位置声明,然后检查为其他节点保留的信息。一旦发现矛盾信息,就可以检测到副本攻击。我们的分析表明,这两种方案都可以提供高检测精度,而无需考虑节点共谋和副本/受损节点的数量/分布。此外,这些方案自然可以扩展到其他类别的静态/移动网络,在这些网络中,节点可以被对手物理捕获和复制。;本论文的主要贡献是多方面的。首先,用于本地广播的信道分配方法是首先代表有效支持多信道网络中的本地广播的方法。其次,单播信道分配方法在主要干扰模型下可以达到100%的吞吐量,并在某些条件下实现无干扰通信。第三,基于社会指纹的副本检测方案是第一个以有效和高效的方式在静态传感器网络中提供对节点复制攻击的实时检测的方法。最后,据我们所知,MANET的副本检测方案是支持移动网络的唯一方法,同时对克隆的欺诈行为的数量和分布以及副本是否合谋没有任何限制。

著录项

  • 作者

    Xing, Kai.;

  • 作者单位

    The George Washington University.;

  • 授予单位 The George Washington University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 124 p.
  • 总页数 124
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号