Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188794
Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida
Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.
{"title":"A new approach for multi-sink environments in WSNs","authors":"Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida","doi":"10.1109/INM.2009.5188794","DOIUrl":"https://doi.org/10.1109/INM.2009.5188794","url":null,"abstract":"Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188804
Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li
The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.
{"title":"Probabilistic fault diagnosis for IT services in noisy and dynamic environments","authors":"Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li","doi":"10.1109/INM.2009.5188804","DOIUrl":"https://doi.org/10.1109/INM.2009.5188804","url":null,"abstract":"The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188838
Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward
Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.
{"title":"Heteroscedastic models to track relationships between management metrics","authors":"Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward","doi":"10.1109/INM.2009.5188838","DOIUrl":"https://doi.org/10.1109/INM.2009.5188838","url":null,"abstract":"Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188791
Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai
In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.
{"title":"A systematic and practical approach to generating policies from service level objectives","authors":"Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai","doi":"10.1109/INM.2009.5188791","DOIUrl":"https://doi.org/10.1109/INM.2009.5188791","url":null,"abstract":"In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188841
Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu
Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide views leading to the blindness of network management. With these problems, this paper decomposes the necessary network management information into three parts: the basic information, the cross-layer association, and global information. And a new controlled object description model is presented in the trustworthy and controllable network control architecture which separates the functionality of control and management of network form the data plane of IP network, and constructs the formal control and management plane of IP network. The new model identifies and abstracts the controlled objects with object-oriented approach. Based on this model, a cross-layer database is built to store the different layer control objects and to present cross-layer association view, a processing mechanism to process the original information is presented for global network state view, and a control plane is constructed to realize network control. The control information description model restricts the complexity of the controlled objects to their own implementation by abstraction, and alleviates the difficulty of network management. The cross-layer association view and the global network state view composes the network-wide views. The network-wide views realize the visibility and improve the manageability of network. Finally, we present 3 examples to indicate that the model alleviates the complexity of configuration management.
{"title":"Control information description model and processing mechanism in the trustworthy and controllable network","authors":"Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu","doi":"10.1109/INM.2009.5188841","DOIUrl":"https://doi.org/10.1109/INM.2009.5188841","url":null,"abstract":"Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide views leading to the blindness of network management. With these problems, this paper decomposes the necessary network management information into three parts: the basic information, the cross-layer association, and global information. And a new controlled object description model is presented in the trustworthy and controllable network control architecture which separates the functionality of control and management of network form the data plane of IP network, and constructs the formal control and management plane of IP network. The new model identifies and abstracts the controlled objects with object-oriented approach. Based on this model, a cross-layer database is built to store the different layer control objects and to present cross-layer association view, a processing mechanism to process the original information is presented for global network state view, and a control plane is constructed to realize network control. The control information description model restricts the complexity of the controlled objects to their own implementation by abstraction, and alleviates the difficulty of network management. The cross-layer association view and the global network state view composes the network-wide views. The network-wide views realize the visibility and improve the manageability of network. Finally, we present 3 examples to indicate that the model alleviates the complexity of configuration management.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188882
S. Davy, C. Fahy, Zohra Boudjemil, L. Griffin, J. Strassner
Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding of available resources that exist in a communications network to build services . This process contributes to the realisation of the AutoI autonomic management architecture for the Internet, which aims to develop a self-managing virtual resource overlay that can span across heterogeneous networks and supports service mobility, security, quality of service and reliability. The core of the process is to take advantage of the substantial DEN-ng information model that decouples the definition and design of services from the resources available in the network. In this way, the creation and modification of services within a network can be planned, deployed, and even dynamically composed to meet context-aware demands. Providing such a service-aware process is central to the architecture being defined in the AutoI project and information modelling is seen as a major facilitator to this task.
{"title":"A model based approach to autonomic management of virtual networks","authors":"S. Davy, C. Fahy, Zohra Boudjemil, L. Griffin, J. Strassner","doi":"10.1109/INM.2009.5188882","DOIUrl":"https://doi.org/10.1109/INM.2009.5188882","url":null,"abstract":"Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding of available resources that exist in a communications network to build services . This process contributes to the realisation of the AutoI autonomic management architecture for the Internet, which aims to develop a self-managing virtual resource overlay that can span across heterogeneous networks and supports service mobility, security, quality of service and reliability. The core of the process is to take advantage of the substantial DEN-ng information model that decouples the definition and design of services from the resources available in the network. In this way, the creation and modification of services within a network can be planned, deployed, and even dynamically composed to meet context-aware demands. Providing such a service-aware process is central to the architecture being defined in the AutoI project and information modelling is seen as a major facilitator to this task.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188833
Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba
In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.
{"title":"iMark: An identity management framework for network virtualization environment","authors":"Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba","doi":"10.1109/INM.2009.5188833","DOIUrl":"https://doi.org/10.1109/INM.2009.5188833","url":null,"abstract":"In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188821
V. Gondi, N. Agoulmine
The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.
{"title":"Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188821","DOIUrl":"https://doi.org/10.1109/INM.2009.5188821","url":null,"abstract":"The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188795
M. Brenner, T. Schaaf, Alexander Scherer
As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.
{"title":"Towards an information model for ITIL and ISO/IEC 20000 processes","authors":"M. Brenner, T. Schaaf, Alexander Scherer","doi":"10.1109/INM.2009.5188795","DOIUrl":"https://doi.org/10.1109/INM.2009.5188795","url":null,"abstract":"As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188816
O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth
Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.
{"title":"Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies","authors":"O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth","doi":"10.1109/INM.2009.5188816","DOIUrl":"https://doi.org/10.1109/INM.2009.5188816","url":null,"abstract":"Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126175474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}