CFP last date
20 December 2024
Reseach Article

Investigation of Performance-Security Tradeoff in Robotic Mobile Wireless Ad hoc Networks (RANETs) using Stochastic Petri Nets

by Muhammad Jawad Ikram, Kashif Ahmad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 18
Year of Publication: 2013
Authors: Muhammad Jawad Ikram, Kashif Ahmad
10.5120/10183-5034

Muhammad Jawad Ikram, Kashif Ahmad . Investigation of Performance-Security Tradeoff in Robotic Mobile Wireless Ad hoc Networks (RANETs) using Stochastic Petri Nets. International Journal of Computer Applications. 62, 18 ( January 2013), 34-41. DOI=10.5120/10183-5034

@article{ 10.5120/10183-5034,
author = { Muhammad Jawad Ikram, Kashif Ahmad },
title = { Investigation of Performance-Security Tradeoff in Robotic Mobile Wireless Ad hoc Networks (RANETs) using Stochastic Petri Nets },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 18 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number18/10183-5034/ },
doi = { 10.5120/10183-5034 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:12:11.705295+05:30
%A Muhammad Jawad Ikram
%A Kashif Ahmad
%T Investigation of Performance-Security Tradeoff in Robotic Mobile Wireless Ad hoc Networks (RANETs) using Stochastic Petri Nets
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 18
%P 34-41
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a comprehensive review of performance-security trade-off based on RANETs. It is suggested that stochastic Petri nets (SPNs) are the best choice to investigate performance-security trade-off in RANETs. In the context of RANETs, a mathematical model that is based on SPNs is analysed to investigate performance-security trade-off. Security is assessed in terms of mean time to security failure (MTTSF) and performance is assessed in terms of service response time (R). The main objective is to find optimal settings that includes the best intrusion detection interval and best batch rekey interval under which mean time to security failure is maximized while satisfying performance requirement in terms of system response time.

References
  1. Wolter, K. , Reinecke, P. (2010) Performance and security trade-off. In Aldini, A. (Ed. ), Proceedings of SFM 2010, LNCS 6154, 135-167. .
  2. S. K. Sarkar, T. G. Basavararaju and C. Puttamadappa "Ad hoc Mobile Wireless Networks Principles, Protocols and Applications". Auerbach Publications 2008.
  3. Kouvatsos, D. D. and Miskeen, G. M. , "Performance Related Security Modelling and Evaluation of RANETs", springer, 2012
  4. Asokan, A. , Natarajan, A. M. , "Quality of Service (QoS) Routing in Mobile Ad Hoc Networks. " IGI global, 2010.
  5. Das, S. M. , Hu, Y. C. , George, C. S. , & Lu, L. Y. (2007). Mobility-aware ad hoc routing protocols for networking mobile robot teams. Journal of Communications and Networks, 9(3), 296-311.
  6. Robinson, K. P. (2008). Cooperation using a robotic ad hoc network made from Bluetooth, J XTA, OSGi and other commercial off the shelf (COTS) products. Masters by Research Thesis, Queensland University of Technology, Australia.
  7. Ardawi, A. M. H, "Performance Modeling and Evaluation of Robotic Mobile Wireless Ad Hoc Networks. ", MSc Thesis, NetPen – Networks and Performance Engineering Research Unit, IRI - Informatics Research Institute, University of Bradford, Bradford, UK (Sept. 2010).
  8. Cho,J. -H. , Chen, I. -R. and Feng, P. -G. "Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobilead hoc networks. " AINAW '08: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications { Workshops, pp. 644{649, Washington, DC, USA, 2008.
  9. Kouvatsos, D. D. (2010). Performance modeling and evaluation of RANETs. PP Presentation at the 1st ETSI Workshop on "Networked Mobile Wireless Robotics", Munich, Germany. http://workshop. etsi. org/2010/201010_NetworkedMobileWirelessRobotics/06%20Kou vatsos%202010-10 08%20Networked%20Robots. pdf
  10. Kouvatsos, D. D. , Miskeen, G. M. A. (2011). Networked mobile wireless robotics. Technical Report DDK-NetPEn 15-02-11, Networks and Performance Engineering (NetPEn) Research Group, Informatics Research Institute (IRI), University of Bradford, UK, pp. 1-3.
  11. Brutch, P. , and Ko , C. , "Challenges in Intrusion Detection for Wireless Ad-hoc Networks," Proc. Symposium on Applications and the Internet Workshops, 27-31 Jan. 2003, pp. 178 – 373.
  12. Cho, J. H. , Chen, I. R. , and Eltoweissy, M. , "On Optimal Batch Rekeying for Secure Group Communications in Wireless Networks," ACM/Springer Wireless Networks, 2007#
  13. Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau, "Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups," IEEE/ACM Transactions on Networking, vol. 14, no. 2, April 2006, pp. 263-276.
  14. Li, X. , Yang, Y. R. , Gouda, M. G. and Lam, S. S. "Batch Rekeying for Secure Group Communications," Proc. of the Tenth Int'l Conf. on World Wide Web, Hong Kong, July 2001, pp. 525-534.
  15. Huang, Y. and Lee, W. , "A Cooperative Intrusion Detection System for Ad Hoc Networks," Proc. 1st ACM Workshop on Security of Ad-hoc and Sensor Networks, Fairfax, Virginia,2003, pp. 135-147.
  16. Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau, "Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups," IEEE/ACM Transactions on Networking, vol. 14, no. 2, April 2006, pp. 263-276.
  17. Bianchi, G. , "Performance Analysis of the IEEE 802. 11Distributed Coordination Function," IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, Mar. 2000, pp. 535-547.
  18. Gärtner, F. C. , "Byzantine Failures and Security: Arbitrary is not (always) Random," Technical Report IC/2003/20, EPFL, April, 2003.
  19. Jeffrey W. HerrmannEdward Lin, Petri Nets: Tutorial and Applications, CIM Lab, Institute for Systems Research, University of Maryland, College Park, Maryland INSTITUTE FOR SYSTEMS RESEARCH. A National Science Foundation Engineering Research Center, supportedby NSF, the University of Maryland, Harvard University, and Industry. The 32th Annual Symposium of the Washington Operations Research -Management Science Council,Washington, D. C.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc networks (MANETs) robotic mobile wireless ad hoc networks (RANETs) queueing network models (QNMs) Petri nets Stochastic Petri nets (SPN) intrusion detection system (IDS) rekeying