Professional Documents
Culture Documents
Mobile Ad Hoc Networks
Mobile Ad Hoc Networks
Organization
Introduction and Architecture Applications and Challenges Media Access Control Routing in Ad Hoc Networks Transport Layer Issues Overarching Issues
7/30/2012
Prasant Mohapatra
MANETs: Introduction
MANETs are mobile nodes that form a network in an ad hoc manner The nodes intercommunicate using single or multi-hop wireless links Each node in MANETs can operate as a host as well as a router The topology, locations, connectivity, transmission quality are variable
7/30/2012
Prasant Mohapatra
MANETs: Operations
D
Y X D Z S
X
S
7/30/2012
Prasant Mohapatra
MANET: Applications
Civil
Wireless LANs/WANs mobile and stationary Remote data collection and analysis Taxi/Cabs, Buses scheduling Disaster recovery Communications over water using floats Vehicular Ad Hoc Network
Defense
Battlefield communications and data transfer Monitoring and Planning
7/30/2012
Prasant Mohapatra
Prasant Mohapatra
No centralized coordinators, should function in full distributed manner No clock synchronization, asynchronous operations
7/30/2012
Prasant Mohapatra
Carrier-Sensing in MANET
Problems
Hidden terminal problem Exposed terminal problem
7/30/2012
Prasant Mohapatra
MACAW [Bharghavan94]
Increase reliability by RTS/CTS/DATA/ACK dialog
Prasant Mohapatra
7/30/2012
Prasant Mohapatra
10
Collision avoidance
Nodes stay silent when carrier sensed busy (physical/virtual) Backoff intervals used to reduce collision probability
7/30/2012
Prasant Mohapatra
11
Prasant Mohapatra
12
7/30/2012
Prasant Mohapatra
13
7/30/2012
Prasant Mohapatra
14
After collision, packet with smaller CW is more likely to occupy medium earlier
7/30/2012
Prasant Mohapatra
15
7/30/2012
Prasant Mohapatra
16
Black Burst
A
Media Busy
A
B
C
7/30/2012
Carrier Sense
Prasant Mohapatra
17
Black Burst
A
DIFS
Media Busy A
B
C
7/30/2012
18
Black Burst
C
DIFS
Media Busy A
B
C
7/30/2012
Prasant Mohapatra
19
Black Burst
C
DIFS
Media Busy A
B
C
7/30/2012
Prasant Mohapatra
20
Black Burst
C
Media Busy A
B
C
7/30/2012
Prasant Mohapatra
21
Black Burst
C
DIFS
Media A
Busy
RT A
RT A
B
C
7/30/2012
Prasant Mohapatra
22
Black Bursts
All nodes begin the priority contention phase together Higher priority node transmit a longer burst than low priority node After transmitting its burst, a node listens to the channel If channel still busy, the node has lost contention to a higher priority node
7/30/2012
Prasant Mohapatra
23
7/30/2012
Prasant Mohapatra
24
Power Saving
Power Consumptions
From Spec. of Orinoco 11b WLAN PC Card [Proxim Co. 2003] Battery Voltage: 5V Dose mode: 9 mA (= 45 mW) Receiver mode: 185 mA (= 925 mW) Transmit mode: 285 mA (= 1425 mW)
7/30/2012
Prasant Mohapatra
25
Prasant Mohapatra
26
PS Mode in WLANs
ATIM (Ad hoc Traffic Indication Map) window : short interval during which the PS hosts wake up periodically. Assume that hosts are fully connected and synchronized. In the beginning of each ATIM window, each mobile host will contend to send a beacon frame. Successful beacon serve for synchronizing mobile hosts clock. This beacon also inhibits other hosts from sending their beacon To avoid collisions among beacons, use random back-off [0-2*CWmin 1]
7/30/2012
Prasant Mohapatra
27
PS Mode in WLANs
- After the beacon, host can send a
- After transmitted an ATIM frame, keep remaining awake - On reception of the ATIM frame, reply with an ACK and remain active for the remaining period
7/30/2012
Prasant Mohapatra
28
Problems
PS mode of 802.11 is designed for single hop (fully connected) ad hoc network. If applied for multi-hop
Clock synchronization Communication delay and mobility are all unpredictable network merging Neighbor discovery When a host in PS mode, both its chance to transmit and to hear others signal is reduced ==> inaccurate neighbor information Network partitioning Inaccurate neighbor information may lead to long packet delay or even network (logically) partitioning problem.
7/30/2012
Prasant Mohapatra
29
PAMAS [Singh98]
A node avoids overhearing packets not addressed to it
so, reduce power consumption of processing unnecessary packets
7/30/2012
Prasant Mohapatra
30
PAMAS
When to turn off?
when a node has no packets to send, it should power itself off if a neighbor starts transmitting if at least one neighbor is transmitting and another is receiving, the node should power itself off
7/30/2012
Prasant Mohapatra
31
STEM [Schurgers02]
Sparse Topology and Energy Management Basic idea: to wake up nodes only when they need to forward data
using asynchronous beacon packets in a separate control channel to wake up nodes latency is traded off for energy savings
7/30/2012
Prasant Mohapatra
32
Wakeup mechanisms
On-demand wake-up
STEM, Remote Activated Switch(RAS)
Scheduled rendezvous
802.11, Bluetooth, etc
Asynchronous wakeup
Power saving protocols [Tseng02] Asynchronous wake-up [Zheng03]
7/30/2012
Prasant Mohapatra
33
7/30/2012
Prasant Mohapatra
34
Tsengs Protocol
Beacon interval
For each PS host, it divides its time axis into a number of fixed length interval
Active window
On state
Beacon window
PS hosts send its beacon
MTIM window
Other hosts send their MTIM frames to the PS host.
Excluding these three windows, PS host with no packet to send or receive may go to the sleep mode.
7/30/2012
Prasant Mohapatra
35
Dominating-Awake-Interval
Dominating awake property
AW >= BI/2 + BW This guarantees any PS hosts beacon window to overlap with any neighboring PS hosts active window. In every two beacon interval, PS host can receive all its neighbors beacon short response timesuitable for highly mobile
The sequence of beacon intervals are alternatively labeled as odd and even interval
7/30/2012
Prasant Mohapatra
36
Periodicallyfully-awake-interval
Two types of beacon interval
Low power intervals
AW is reduced to the minimum PS host send out its beacon to inform others its existence
7/30/2012
Prasant Mohapatra
37
Quorum-based
PS host only picks 2n-1 intervals (one column and one row) out of the n x n quorum Quorum interval
Beacon + MTIM, AW = BI
7/30/2012
Prasant Mohapatra
38
7/30/2012
Prasant Mohapatra
39
Slot Assignments
124 235 346 457 561 672 713
SLOTS
Slot assignment for (7,3,1) design: The schedule repeats after 7 slots, has three ON slots, and any two schedules overlap at least 1 slot.
7/30/2012
Prasant Mohapatra
40
Increase range, keeping transmit power constant Reduce transmit power, keeping range comparable with omni mode
Reduces interference, potentially increasing spatial reuse
7/30/2012
Prasant Mohapatra
41
A A B C C D
7/30/2012
Prasant Mohapatra
42
Antenna Model
2 Operation Modes: Omni and Directional
Prasant Mohapatra
43
Antenna Model
In Omni Mode: Nodes receive signals with gain Go While idle a node stays in omni mode
In Directional Mode: Capable of beamforming in specified direction Directional Gain Gd (Gd > Go) Symmetry: Transmit gain = Receive gain
7/30/2012
Prasant Mohapatra
44
D-O transmission
A
Bs directional receive beam
7/30/2012
D-D transmission
Prasant Mohapatra
45
Current proposals:
ORTS/OCTS [Nasipuri00] DRTS/OCTS [Ko00] DRTS/DCTS [Choudhury02]
7/30/2012
Prasant Mohapatra
46
ORTS/OCTS
Sender sends omni-directional RTS Receiver sends omni-directional CTS
Receiver also records direction of sender by determining the antenna on which the RTS signal was received with highest power level Similarly, the sender, on receiving CTS, records the direction of the receiver
All nodes overhearing RTS/CTS defer transmissions Sender then sends DATA directionally to the receiver Receiver sends directional ACK
7/30/2012
Prasant Mohapatra
47
ORTS/OCTS cont.
Protocol takes advantage of reduction in interference due to directional transmission/reception of DATA All neighbors of sender/receiver defer transmission on receiving omni-directional RTS/CTS spatial reuse benefit not realized
7/30/2012
Prasant Mohapatra
48
D-MAC
Uses directional antenna for sending RTS, DATA and ACK in a particular direction, whereas CTS sent omni-directionally Directional RTS (DRTS) and Omni-directional CTS (OCTS)
7/30/2012
Prasant Mohapatra
49
DMAC: DRTS/OCTS
A B C
D
7/30/2012
Prasant Mohapatra
50
7/30/2012
Prasant Mohapatra
51
Directional NAV
Physical carrier sensing still omnidirectional Virtual carrier sensing be directional directional NAV
When RTS/CTS received from a particular direction, record the direction of arrival and duration of proposed transfer Channel assumed to be busy in the direction from which RTS/CTS received
7/30/2012
Prasant Mohapatra
52
7/30/2012
Prasant Mohapatra
53
7/30/2012
Prasant Mohapatra
54
RTS
7/30/2012
Prasant Mohapatra
55
Multicast
Source node to multiple destination nodes Varied number of hops Members could join and leave
7/30/2012
Prasant Mohapatra
56
7/30/2012
Prasant Mohapatra
57
7/30/2012
Prasant Mohapatra
58
Flooding-Based Routing
D
7/30/2012
Prasant Mohapatra
59
Proactive Routing
Nodes maintain global state information Consistent routing information are stored in tabular form at all the nodes Changes in network topology are propagated to all the nodes and the corresponding state information are updated Routing state maintenance could be flat or hierarchical
7/30/2012
Prasant Mohapatra
60
7/30/2012
Prasant Mohapatra
61
Prasant Mohapatra
62
7/30/2012
Prasant Mohapatra
63
WRP - Continued
The mobile nodes inform each other of link changes through the use of update messages Update messages are sent only between neighboring nodes, which modify their tables and send updates to their neighbors The existence and status of the neighboring nodes is determined through ACKs of messages or periodic hello messages
7/30/2012
Prasant Mohapatra
64
7/30/2012
Prasant Mohapatra
65
CGSR [Chiang97]
7/30/2012
Prasant Mohapatra
66
7/30/2012
Prasant Mohapatra
67
Prasant Mohapatra
68
Prasant Mohapatra
69
AODV
F?
S A C E
D
B F
I am F
7/30/2012
Prasant Mohapatra
70
AODV
To F, Next-hop is B
A S
C E
D
B F
Prasant Mohapatra
71
On-demand source-based routing approach Packet routing is loop-free Avoids the need for up-to-date route information in intermediate nodes Nodes that are forwarding or overhearing, cache routing information for future use Two phases: Route Discovery and Route Maintenance
7/30/2012
Prasant Mohapatra
72
Prasant Mohapatra
73
7/30/2012
Prasant Mohapatra
74
DSR
F? SA
F?
S
C E
D
B To F, route is SBDF F Choose Route2
RREP Unicast
7/30/2012
Prasant Mohapatra
75
Prasant Mohapatra
76
ZRP-Example
F E
G H A D G M F E D A B I J K L
B
I J
L
K
Border nodes Routing Zone of A (Zone radius = 2) IARP: Intra-zone routing protocol IARP runs at the center of each zone IARP uses proactive routing method Each node has its own zone
BoarderCast: efficiently deliver route request to all boarder nodes.
7/30/2012
Prasant Mohapatra
77
ZRP-Example
F E
G H A D N M Q V R S W
B
I J
L
K O
U
T
Source/Destination node
Center of zone
7/30/2012
Prasant Mohapatra
78
ZRP-Example
F E
G H A D N M Q V R S W
B
I J
L
K O
U
T
Source/Destination node
Center of zone
7/30/2012
Prasant Mohapatra
79
ZRP-Example
F E
G H A D N M Q V R S W
B
I J
L
K O
U
T
Source/Destination node
Center of zone
7/30/2012
Prasant Mohapatra
80
7/30/2012
Prasant Mohapatra
81
Lake
Expected zone
B
Network area
Request zone
7/30/2012
Prasant Mohapatra
82
A B S C D
7/30/2012
Prasant Mohapatra
83
B
S C D
7/30/2012
Prasant Mohapatra
84
7/30/2012
Prasant Mohapatra
85
7/30/2012
Prasant Mohapatra
86
Multicasting in MANETs
Ad hoc multicasting should
Guarantee message delivery to all interested members Minimize control messages in order not to interfere with data transmission Maintain membership information as nodes join and leave at will Repair broken links because of topology change
7/30/2012
Prasant Mohapatra
87
13
17
Prasant Mohapatra
88
Tree structured
Mesh structured
Group shared
Source based
Group shared
Source based
MAODV AMRoute
ADMR
CAMP MCEDAR
ODMR ODMR-MP
7/30/2012
Prasant Mohapatra
89
Hierarchical Multicasting
S
Clusterhead
G1 G2
G3
7/30/2012
Prasant Mohapatra
90
7/30/2012
Prasant Mohapatra
91
Multicast group member Multicast tree member Non-Tree nodes Multicast Tree Link
Prasant Mohapatra
92
f
e
a
7/30/2012
Prasant Mohapatra
93
e c
d a
7/30/2012
Prasant Mohapatra
94
e c
d a
7/30/2012
Prasant Mohapatra
95
7/30/2012
Prasant Mohapatra
96
MAODV--Repairing
Link break detection
Periodical hello messages between neighbors Hello message time_out:
hello_interval(1+allowed_hello_loss)
7/30/2012
Prasant Mohapatra
97
MAODV--Repairing
Down-stream node of the broken link is responsible of repairing Route Request is first given small TTL to hope the local operation
7/30/2012
Prasant Mohapatra
98
7/30/2012
Prasant Mohapatra
99
ODMRMesh setup
Step 1: Source periodically flood JOIN DATA packet
2 1 7 5 8 10 3 6
7/30/2012
Prasant Mohapatra
100
1 1
3 2 1
1
Finally, forwarding group is set to be {2,3,5,8}
7/30/2012
Prasant Mohapatra
101
7/30/2012
Prasant Mohapatra
102
7/30/2012
Prasant Mohapatra
103
A S S B B
7/30/2012
Prasant Mohapatra
104
7/30/2012
Prasant Mohapatra
105
7/30/2012
Prasant Mohapatra
106
D
7/30/2012
Prasant Mohapatra
107
Consequences
TCP sender misinterprets losses as congestion
Retransmits unACKed segments Invokes congestion control Enters slow start recovery
Prasant Mohapatra
108
7/30/2012
Prasant Mohapatra
109
Where to Do Modifications?
At the sender only
ATCP [Liu01]
7/30/2012
Prasant Mohapatra
110
ATCP Approach
ATCP utilizes network layer feedback (from the intermediate nodes) to take appropriate actions Network feedback is:
ICMP: The Destination Unreachable ICMP message indicates route disruption ECN: Indicates network congestion
With ECN enabled, time out and 3 dup ACKs are assumed to no longer be due to congestion
7/30/2012
Prasant Mohapatra
111
A-TCP
IP IP Link layer Link layer
Note: from now on, the terms ATCP and TCP are referred to as ATCP sender and TCP sender, respectively
7/30/2012
Prasant Mohapatra
112
Multi-path routing:
On receipt of duplicate ACKs, TCP sender should not invoke congestion control, because multi-path routing shuffles the order in which segments are received.
7/30/2012
Prasant Mohapatra
113
TCP/ATCP Behavior
RTO or 3rd dup ACK:
Retransmits unACKed segments
ATCP monitors TCP state and spoofs TCP in such a way to achieve the above behaviors
7/30/2012
Prasant Mohapatra
114
ATCP states
Normal (when a connection is opened) Congested Disconnected Loss
During operation, ATCP transits from one state to another and put TCP in Persist mode when appropriate
7/30/2012
Prasant Mohapatra
115
7/30/2012
Prasant Mohapatra
116
Advantages of ATCP
ATCP improves TCP performance
Maintains high throughput since TCPs unnecessary congestion control is avoided Saves network resources by reducing number of unnecessary re-transmissions
7/30/2012
Prasant Mohapatra
117
Overarching Issues
Power Aware Communication Quality of Service (QoS) Security
7/30/2012
Prasant Mohapatra
118
Prasant Mohapatra
119
Prasant Mohapatra
120
7/30/2012
Prasant Mohapatra
121
Compromising Principles
Soft QoS
After the connection set-up, there may exist transient periods of time when QoS specification is not honored The level QoS satisfaction is quantified by the fraction of total disruption
QoS Adaptation
As available resources change, the network can readjust allocations within the reservation range (dynamic QoS) Applications can also adapt to the re-allocations
7/30/2012
Prasant Mohapatra
122
7/30/2012
Prasant Mohapatra
123
Prasant Mohapatra
124
Prasant Mohapatra
125
MACA/PR [Lin97]
Multihop Access Collision Avoidance with Piggyback Reservation provides guaranteed bandwidth support for real-time traffic The first packet in a real-time stream uses RTS/CTS dialogs to make reservations in the path The sender schedules the next transmission after the current data transmission and piggybacks the reservation in the current data packet Upon receiving the data packet correctly, the receiver updates its reservation table and sends an ACK ACK serves for the renewal of reservation, not for recovering from packet losses
7/30/2012
Prasant Mohapatra
126
These algorithms are based on the discovery of shortest paths QoS-aware routing protocol should find a path that satisfies the QoS requirements in the path from source to the destination
7/30/2012
Prasant Mohapatra
127
CEDAR [Singha99]
Core Extraction Distributed Ad hoc Routing scheme dynamically establishes the core of the network, and then incrementally propagates the link states of stable high-bandwidth links to the core nodes The route computation is on demand basis Components of CEDAR
Core extraction Link-state propagation Route computation
7/30/2012
Prasant Mohapatra
128
7/30/2012
Prasant Mohapatra
129
7/30/2012
Prasant Mohapatra
130
Prasant Mohapatra
131
Prasant Mohapatra
132
Explicit feedback mechanisms to distinguish between losses due to errors and congestion is necessary for QoS provisioning in MANETs Efficient techniques for resource management is necessary for QoS provisioning
7/30/2012
Prasant Mohapatra
133
Prasant Mohapatra
134
Prasant Mohapatra
135
Security Issues
Environments and Philosophies:
Closed vs. open world assumption Prevention vs. Detection Malicious vs. Selfish behavior
7/30/2012
Prasant Mohapatra
136
Vulnerabilities
Wireless links vulnerable to jamming Inherent broadcast nature facilitates eavesdropping Tradeoffs between resource constraints and security Mobility/dynamics make it difficult to detect anomalies such as bogus routes Self organization is inherent, cannot have central authorities/infrastructures, such as for key management
7/30/2012
Prasant Mohapatra
137
Attacks
Motivation:
Better service Monetary benefits Gaining confidential information Power saving Preventing someone else from getting proper service
7/30/2012
Prasant Mohapatra
138
Attacks: Indications
Create routing loops Black holes Misrouting along sub-optimal paths Incorrect forwarding: acknowledge ROUTE REQUEST, and do not forward it at all Bogus routing information: advertise a non-existent route Choose a very short reply time, so the route will be prioritized and stays in cache longer Do not send error messages in order to prevent other nodes from looking for alternative routes Use promiscuous mode to listen in on traffic and gather information Cause DoS attack caused by overload, by sending route updates at short intervals
7/30/2012
Prasant Mohapatra
139
Solutions
Authentication by imprinting (closed world) Incentives to cooperate per hop payment in every packet/counters embedded in nodes Localized certification based on Public Key Infrastructure ARIADNE: Secure on-demand routing protocol which prevents attackers from tampering SEAD: One way hash functions used to add security to DSDV (adds latency)
7/30/2012
Prasant Mohapatra
140
Detection
Intrusion detection techniques
Distributed and cooperative Using statistical anomaly detection approaches Cooperate with other network layers Majority voting to classify behavior
7/30/2012
Prasant Mohapatra
141
7/30/2012
Prasant Mohapatra
142
7/30/2012
Prasant Mohapatra
143
7/30/2012
Prasant Mohapatra
144
Components
The Monitor
Neighborhood watch Look out for deviations no forwarding, route salvaging, unusually frequent route updates
7/30/2012
Prasant Mohapatra
145
Components
Reputation System
Own experience: greatest weight Observations: smaller weight Reported experience: weight function according to trust level
Path Manager
Remove malicious nodes from routes between well behaved nodes Educate nodes to not provide paths between malicious nodes
7/30/2012
Prasant Mohapatra
146
ARIADNE [Hu02]
Aims to create a secure on-demand routing protocol Uses TESLA, an authentication scheme that requires loose time synchronization Incorporate security features into DSR Focuses on active attackers
7/30/2012
Prasant Mohapatra
147
Attacker Model
Passive versus Active
Passive : only eavesdrops
Threats against privacy/anonymity
Attacker have all keys of compromised nodes and distributes it among all its nodes Active-VC attacker
Owns all nodes on a vertex cut
7/30/2012
Prasant Mohapatra
148
Overview of TESLA
Broadcast authentication protocol
Authenticate routing messages Only one MAC(Message Authentication Code)
Secure authentication in point-to-point communication Asymmetric primitive by clock synchronization and delayed key disclosure
Prasant Mohapatra
149
Overview of TESLA
Receiver can determine which key is disclosed
Based on loose time synchronization() Sender picks Ki which will not be disclosed until + 2 time passes and add MAC using Ki Discard the packet if security condition fails
Prasant Mohapatra
150
Data Authentications
Initiator authenticates nodes in Route Reply Target authenticates nodes in Route Request and return only legitimate paths TESLA, digital signatures, standard MACs
Per-hop hashing
One-way hash functions to verify that no hop was omitted
7/30/2012
Prasant Mohapatra
151
References
[Bharghavan94] V. Bharghavan, A. Demers, S. Shenker and L. Zhang, MACAW: a media access protocol for wireless LANs, SIGCOMM94. [Braginsky02] David Braginsky and Deborah Estrin. Rumor Routing Algorithm For Sensor Networks. In Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), September 28 2002, Atlanta, GA. [Buchegger02] S. Buchegger and J. L. Boudec, Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc networks, Euromicro Workshop on Parallel, Distributed, and Network-Based Processing, 2002. [Bulusu01] N. Bulusu, John Heidemann and Deborah Estrin. Adaptive Beacon Placement. In Proceedings of the Twenty First International Conference on Distributed Computing Systems (ICDCS-21), April, 2001. [Bulusu02] N. Bulusu. Self-Configuring Localization Systems, Ph.D Thesis, University of California at Los Angeles, October 2002. [Bulusu00] N. Bulusu, John Heidemann and Deborah Estrin. GPS-less Low Cost Outdoor Localization for Very Small Devices. IEEE Personal Communications Magazine, Vol. 7, No. 5, pp. 28-34. October, 2000. [Bulusu03] N. Bulusu, J. Heidemann, D. Estrin, and T. Tran. Self-configuring Localization Systems: Design and Experimental Evaluation. ACM Transactions on Embedded Computing Systems(TECS), Special Issue on Networked Embedded Computing, May 2003. [Campbell01] A. Veres, A.T. Campbell, M. Barry, and L.H. Sun, Supporting service differentiation in wireless packet networks using distributed control, IEEE J. SAC, Oct, 2001. [Chen99] S. Chen and K. Nahrstedt, "Distributed Quality-of-Service Routing in Ad-Hoc Networks," IEEE Journal of Selected Areas on Communications, vol. 17, No. 8, August 1999.
7/30/2012
Prasant Mohapatra
152
[Chiang97] C.-C. Chiang, Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel, IEEE SICON (Singapore International Conference on Networks) , Apr, 1997 [Choudhury02] R. R. Choudhury, X. Yang, N. Vaidya, R. Ramanathan, Using directional antennas for medium access control in ad hoc networks, Mobicom, 2002. [Dawkins76] R. Dawkins, The Selfish Gene, Oxford University Press, 1989 Edition, 1976. [Getting93] I. A. Getting, "The Global Positioning Systems," IEEE Spectrum, pp. 36--47, December 1993. [Haas97]Z.J. Haas, "A New Routing Protocol for the Reconfigurable Wireless Networks", IEEE Intl. Conf. on Universal Personal Comm. (ICUPC'97), San Diego, Oct. 1997. [He03] T. He, C. Huang, B. M. Blum, J. A. Stankovic,and T. F. Abdelzaher. Range-Free Localization Schemes in Large Scale Sensor Networks, the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom 2003), San Diego, CA, September 2003. [Heinzelman99] W. Heinzelman, J. Kulik, and H. Balakrishnan, ``Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,'' Proc. 5th ACM/IEEE Mobicom Conference (MobiCom '99), Seattle, WA, August, 1999. [Heinzelman00] Wendi Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, EnergyEfficient Communication Protocols for Wireless Microsensor Networks, Proc. Hawaaian Int'l Conf. on Systems Science, January 2000. [Intanagonwiwat00] C. Intanagonwiwat, R. Govindan and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of MobiCOM 2000, August 2000, Boston, Massachusetts. [Johnson96] D.B. Johnson, and D.A. Maltz, Dynamic Source Routing in Ad-Hoc Wireless Networks, Mobile Computing, T. Imielinkski and H. Korth, Eds., Kluwer, 1996, pp 153-181.
7/30/2012
Prasant Mohapatra
153
[Karn90] P. Karn, MACA a new channel access method for packet radio, Amateur Radio 9th Computer Networking Conference, 1990. [Kleinrock75] L.Kleinrock and F.A.Tagobi, Packet switching in radio channels: Part-II The hidden terminal problem in carrier sense multiple-access modes and the busy tone solution, IEEE Trans. Comm. Vol 23, no 12, 1975 [Ko00] Y.-B. Ko, V. Shankarkumar, N. Vaidya, Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks, Infocom 2000 [Ko98] Y. B. Ko and N. H. Vaidya, Location-Aided Routing (LAR) in Mobile Ad Hoc Networks, Mobicom, 1998. [Lai02] B.C. Lai, S. Kim, I. Verbauwhede. Scalable session key construction protocol for wireless sensor networks. IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES). December 2002 [Lee99]S.J. Lee, M. Gerla, and C.C. Chiang, On-Demand Multicast Routing Protocol, IEEE WCNC, 1999. [Lee98] S. Lee and A. T. Campbell "INSIGNIA: In-band signaling support for QOS in mobile ad hoc networks", Proc of 5thInternational Workshop on Mobile Multimedia Communications (MoMuC,98) , Berlin,Germany, October 1998. [Li03] J. Li and P. Mohapatra, LAKER: Location Aided Knowledge Extraction Routing for Mobile Ad Hoc Netwoks, WCNC 2003. [Li03] Jian Li, and Prasant Mohapatra. "A Novel Mechanism for Flooding Based Route Discovery in Ad Hoc Networks," IEEE GlobeCom 2003 . [Liao01] Wen-Hwa Liao, Yu-Chee Tseng, Shu-Ling Wang, Jang-Ping Sheu: A Multi-path QoS Routing Protocol in a Wireless Mobile ad Hoc Network. ICN (2) 2001: 158-167.
7/30/2012
Prasant Mohapatra
154
[Lin97] C.R. Lin, and M. Gerla, MACA/PR: An Asynchronous Multimedia Multihop Wireless Network, IEEE INFOCOM, 1997 [Lin99] C. R. Lin and J. S. Liu, QoS routing in Ad hoc Wireless Networks", IEEE Journal on Selected Areas in Communications, August 1999. [Liu01]J. Liu, and S. Singh, ATCP: TCP for mobile ad hoc networks, IEEE J-SAC, July, 2001 [Liu99]M. Liu, R.R. Talpade, A. McAuley, and E. Bommaiah, AMRoute: Adhoc Multicast Routing Protocol, Computer Science Dept. U. Maryland, TR-99-8 [Mohapatra03] P. Mohapatra, J. Li, and C. Gui, QoS in Mobile Ad Hoc Networks, IEEE Wireless Communications, June 2003. [Murthy96] S. Murthy and J.J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM MONET, Oct, 1996, pp 183-197 [Nasipuri00] A. S. Nasipuri, S. Ye, and R. E. Hiromoto, "A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas", WCNC 2000 [Niculescu01] D. Niculescu and B. Nath, "Ad hoc Positioning System (APS)", GLOBECOM 2001, San Antonio, Nov 2001. [Niculescu03] D. Niculescu and B. Nath, "Ad hoc Positioning System (APS) using AoA", INFOCOM 2003.
7/30/2012
Prasant Mohapatra
155
[Perkins94]C. Perkins, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, ACM SIGCOMM, 1994 [Perkins99] C.E. Perkins, and E.M. Royer, Ad-hoc On-Demand Distance Vector Routing, IEEE Workshop on Mobile Computing Systems and Applications, Feb, 1999 [Perrig01] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security Protocols for Sensor Networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom) 2001. [Royer99]E. Royer, and C.E. Perkins, Multicast operations of the ad-hoc on-demand distance vector routing protocol, ACM MOBICOM, 1999 [Sawide01] A. Savvides, C.C. Han and M. B. Srivastava, Dynamic Fine Grained Localization in Ad-Hoc Sensor Networks, Proceedings of the Fifth International Conference on Mobile Computing and Networking, Mobicom 2001, pp. 166-179, Rome, Italy, July 2001 [Schurgers02]C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava, Optimizing Sensor Networks in the Energy-Latency-Density Design Space, IEEE Tran. Mobile Comp. Vol. 1, No. 1, Jan-Mar, 2002 [Shah01] Samarth H. Shah, Kai Chen, Klara Nahrstedt, Cross Layer Design for Data Accessibility in Mobile Ad Hoc Networks, in Proc. of 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Florida, July, 2001. [Shih01] Eugene Shih, Seong-Hwan Cho, Nathan Ickes, Rex Min, Amit Sinha, Alice Wang, and Anantha Chandrakasan. Physical Layer Driven Algorithm and Protocol Design for Energy-E#cient Wireless Sensor Networks. In Proceedings of MOBICOM 2001
7/30/2012
Prasant Mohapatra
156
[Singh98] S. Singh and C.S. Raghavendra, PAMAS power aware multi-access protocol with signaling for ad hoc networks, ACM SIGCOMM, 1998 [Sinha99a] P. Sinha, R. Sivakumar, and V. Bharghavan, CEDAR: A core extraction distributed ad hoc routing algorithm. In Proc. of IEEE Infocom, 1999. [Sinha99b]P. Sinha, R. Sivakumar and V. Bharghavan, ``MCEDAR: Multicast extensions to CoreExtraction Distributed Ad hoc Routing algorithm'', IEEE WCNC, 1999 [SmartDust] http://robotics.eecs.berkeley.edu/~pister/SmartDust/ [Sobrinho99] J.L. Sobrinho, and A.S. Hrishnakumar, Quality-of-Service in Ad Hoc carrier sense multiple access wireless networks, IEEE J. SAC, Aug, 1999 [Sohrabi00] K. Sohrabi, J. Gao, V. Ailawadhi, and G.J. Pottie. Protocols for self-organization of a wireless sensornetwork. IEEE Personal Communications, 7(5):1627, October 2000. [Tseng02]Y.-C. Tseng, C.-S. Hsu, and T.-Y. Hsieh, Power-Saving Protocols for IEEE 802.11Based Multi-Hop Ad Hoc Networks, IEEE INFOCOM, 2002 [Woo01] A. Woo, D. Culler, A Transmission Control Scheme for Media Access in Sensor Networks, Mobicom 2001. [Ye02] W. Ye, J. Heidemann and D. Estrin. "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," In Proceedings of the 21st International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), New York, June 2002. [Zheng03]R. Zheng, J. Hou, and L. Sha, Asynchronous Wakeup for Power Management in Ad Hoc Networks, ACM MOBIHOC, 2003
7/30/2012
Prasant Mohapatra
157