scholarly journals Cross-layer model design in wireless ad hoc networks for the Internet of Things

PLoS ONE ◽  
2018 ◽  
Vol 13 (5) ◽  
pp. e0196818 ◽  
Author(s):  
Xin Yang ◽  
Ling Wang ◽  
Jian Xie ◽  
Zhaolin Zhang
2020 ◽  
Vol 2020 ◽  
pp. 1-21
Author(s):  
Muhammad Haleem Junejo ◽  
Ab Al-Hadi Ab Rahman ◽  
Riaz Ahmed Shaikh ◽  
Kamaludin Mohamad Yusof ◽  
Imran Memon ◽  
...  

The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety and diminished road congestion. However, security threats are increasing due to dependency on infrastructure, computing, dynamic nature, and control technologies of VANET. The security threats of VANETs could be addressed comprehensively by increasing trustworthiness on the message received and transmitting node. Conversely, the presence of dishonest vehicles, for instance, Man in the Middle (MiTM) attackers, in the network sharing malicious content could be posed as a severe threat to VANET. Thus, increasing trustworthiness among nodes can lead to increased authenticity, privacy, accuracy, security, and trusted information sharing in the VANET. In this paper, a lightweight trust model is proposed, presented model identifying dishonest nodes and revoking its credential in the MiTM attack scenario. Furthermore, addressing the privacy and security requirement, the pseudonym scheme is used. All nodes in the VANET established trust provided by initially RSU, which is a trusted source in the network. Extensive experiments are conducted based on a variety of network scenarios to evaluate the accuracy and performance of the presented lightweight trust model. In terms of recall, precision, and F-score, our presented model significantly outperformed compared to MARINE. The simulation results have validated that the proposed lightweight model realized a high trust level with 40% of MiTM attackers and in terms of F-score 95%, whereas the MARINE model has 90%, which leads to the model to attain high detection accuracy.


2013 ◽  
Vol 9 (3) ◽  
pp. 170 ◽  
Author(s):  
Nyoman Gunantara ◽  
Gamantyo Hendrantoro

This paper focuses in the selection of an optimal path pair for cooperative diversity based on cross-layer optimization in multihop wireless ad hoc networks. Cross-layer performance indicators, including power consumption, signal-to-noise ratio, and load variance are optimized using multi-objective optimization (MOO) with Pareto method. Consequently, optimization can be performed simultaneously to obtain a compromise among three resources over all possible path pairs. The Pareto method is further compared to the scalarization method in achieving fairness to each resource. We examine the statistics of power consumption, SNR, and load variance for both methods through simulations. In addition, the complexity of the optimization of both methods is evaluated based on the required computing time.


Author(s):  
Shahin Vakilinia ◽  
Mohammadhossein Alvandi ◽  
Mohammadreza Khalili Shoja ◽  
Iman Vakilinia

In this paper, Cross-layer design has been used to provide quality of service (QoS) and security at the same time for VOIP over the wireless ad-hoc network. In this paper the authors extend their previous work (i.e. Multi-path Multi-Channel Protocol Design for Secure QoS-Aware VOIP in Wireless Ad-Hoc Networks) by adding transport and application layers considerations. The goal of this paper is to support QoS and security of VOIP simultaneously. Simulation results shows that the proposed cross-layered protocol stack design significantly improve QoS parameters of the VOIP calls under the jamming or Denial-of-service attacks.


Sign in / Sign up

Export Citation Format

Share Document