[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Survivability modeling and analysis on 3D mobile ad-hoc networks

  • Published:
Journal of Central South University of Technology Aims and scope Submit manuscript

Abstract

Most existing work on survivability in mobile ad-hoc networks (MANETs) focuses on two dimensional (2D) networks. However, many real applications run in three dimensional (3D) networks, e.g., climate and ocean monitoring, and air defense systems. The impact on network survivability due to node behaviors was presented, and a quantitative analysis method on survivability was developed in 3D MANETs by modeling node behaviors and analyzing 3D network connectivity. Node behaviors were modeled by using a semi-Markov process. The node minimum degree of 3D MANETs was discussed. An effective approach to derive the survivability of k-connected networks was proposed through analyzing the connectivity of 3D MANETs caused by node misbehaviors, based on the model of node isolation. The quantitative analysis of node misbehaviors on the survivability in 3D MANETs is obtained through mathematical description, and the effectiveness and rationality of the proposed approach are verified through numerical analysis. The analytical results show that the effect from black and gray attack on network survivability is much severer than other misbehaviors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. PENG San-cheng, JIA Wei-jia, WANG Guo-jun, WU Jie, GUO Min-yi. Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks [J]. IEICE Transactions on Information and Systems, 2010, E93-D(3): 510–517.

    Article  Google Scholar 

  2. HEIDEMANN J, YE Wei, WILLS J, SYED A, LI Yuan. Research challenges and applications for underwater sensor networking [C]// Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006). Las Vegas, Nevada, USA, IEEE Computer Society, 2006: 228–235.

    Chapter  Google Scholar 

  3. ALAM S M N, HAAS Z J. Coverage and connectivity in three-dimensional networks [C]// Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2006). Los Angeles, California, USA, IEEE Computer Society, 2006: 346–357.

    Chapter  Google Scholar 

  4. BAI Xiao-le, ZHANG Chuan-lin, XUAN Dong, JIA Wei-jia. Full-coverage and k-connectivity (k=14, 6) three dimensional networks [C]// Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM 2009). Rio de Janeiro, Brazil, IEEE Computer Society, 2009: 388–396.

    Chapter  Google Scholar 

  5. LIU Cong, WU Jie. Efficient geometric routing in three dimensional ad hoc networks [C]// Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM 2009). Rio de Janeiro, Brazil, IEEE Computer Society, 2009: 2751–2755.

    Chapter  Google Scholar 

  6. LIMA M N, SANTOS A, PUJOLLE G. A survey of survivability in mobile ad hoc networks [J]. IEEE Communications Surveys & Tutorials, 2009, 11(1): 66–77.

    Article  Google Scholar 

  7. KAWAHIGASHI H, TERASHIMA Y, MIYAUCHI N, NAKAKAWAJI T. Designing fault tolerant ad hoc networks [C]// Proceedings of IEEE/AFCEA Military Communications Conference (MILCOM 2005). Atlantic City, New Jersey, IEEE Computer Society, 2005: 1360–1367.

    Google Scholar 

  8. BETTSTETTER C. On the minimum node degree and connectivity of a wireless multihop Network [C]// Proceedings of the 3rd ACM International Symposium On Mobile Ad Hoc Networking and Computing (MobiHoc 2002). Lausanne, Switzerland: ACM, 2002: 80–91.

    Chapter  Google Scholar 

  9. SANTI P. The critical transmitting range for connectivity in mobile Ad Hoc networks [J]. IEEE Transaction on Mobile Computing, 2005, 4(3): 310–317.

    Article  Google Scholar 

  10. HOLLICK M, SCHMITT J, SEIPL C, STEINMETZ R. On the effect of node misbehavior in ad hoc networks [C]// Proceedings of the IEEE International Conference on Communications (ICC 2004). Paris: IEEE Computer Society, 2004: 3759–3763.

    Google Scholar 

  11. XING Fei, WANG Wen-ye. Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes [C]// Proceedings of the IEEE International Conference on Communications (ICC 2006). Istanbul, Turkey: IEEE Computer Society, 2006: 1879–1884.

    Chapter  Google Scholar 

  12. KOMATHY K, NARAYANASAMY P. A probabilistic behavioral model for selfish neighbors in a wireless ad hoc network [J]. International Journal of Computer Science and Network Security, 2007, 7(7): 77–83.

    Google Scholar 

  13. CHEN Dong-yan, GARG S, TRIVEDI K S. Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks [C]// Proceedings of the 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems. New York, USA: IEEE Computer Society, 2002: 61–68.

    Google Scholar 

  14. KOROMA J, LI Wei. A generalized model for network survivability [C]// Proceedings of the 2003 Conference on Diversity in Computing (TAPIA 2003). Atlanta, Georgia, USA, 2003: 47–51.

  15. PENG San-cheng, JIA Wei-jia, WANG Guo-jun. Survivability evaluation in large-scale mobile ad-hoc networks [J]. Journal of Computer Science and Technology, China, 2009, 24(4): 761–774.

    Article  Google Scholar 

  16. HUANG X. Semi-Markov model of network traffic [D]. Graduate School of Chinese Academy of Sciences, China, 2006. (in Chinese)

    Google Scholar 

  17. XING Fei, WANG Wen-ye. On the survivability of wireless ad hoc networks with node misbehaviors and failures [J]. IEEE Transactions on Dependable and Secure Computing, 2008, 7(3): 284–299.

    Article  MathSciNet  Google Scholar 

  18. BOLLOBAS B. Modern graph theory [M]. New York: Springer, 1998: 216–240.

    Google Scholar 

  19. PENROSE M D. On k-connectivity for a geometric random graph [J]. Random Structure Algorithms, 1999, 15(2): 145–164.

    Article  MATH  MathSciNet  Google Scholar 

  20. FARAGO A. Scalable analysis and design of ad hoc networks via random graph theory [C]// Proceedings of the ACM Dial-M. Atlantic, Georgia, USA: ACM, 2002: 43–50.

    Google Scholar 

  21. HU Y C, PERRIG A, JOHNSON D B. Ariadne: A secure on-demand routing protocol for ad hoc networks [J]. Wireless Networks, 2005, 11(2): 21–38.

    Article  Google Scholar 

  22. GONG Guang-lu, QIAN Min-ping. Tutorial on the application of random process & the stochastic model of algorithm and intelligent computing [M]. Beijing, China: Tsinghua University Press, 2004: 26–27. (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guo-jun Wang  (王国军).

Additional information

Foundation item: Project(07JJ1010) supported by the Hunan Provincial Natural Science Foundation of China for Distinguished Young Scholars; Projects (61073037, 60773013) supported by the National Natural Science Foundation of China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Peng, Sc., Wang, Gj., Hu, Zw. et al. Survivability modeling and analysis on 3D mobile ad-hoc networks. J. Cent. South Univ. Technol. 18, 1144–1152 (2011). https://doi.org/10.1007/s11771-011-0816-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-011-0816-1

Key words

Navigation