Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/570681.570685acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Survivable mobile wireless networks: issues, challenges, and research directions

Published: 28 September 2002 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements*. Research focus on three key aspects can significantly enhance network survivability: (i) establishing and maintaining survivable topologies that strive to keep the network connected even under attack, (ii) design for end-to-end communication in challenging environments in which the path from source to destination is not wholly available at any given instant of time, (iii) the use of technology to enhance survivability such as adaptive networks and satellites.

    References

    [1]
    Afek Y., and E. Gafni, "End-to-End Communication in Unreliable Networks," Proc. Seventh Annual ACM Symp. on the Principles of Distributed Computing, Toronto, Ontario, Canada, 1988, pp. 131--148.]]
    [2]
    Afek, Y., B. Awerbuch, E. Gafni, E. Rosen, and N. Shavit, "Slide - the Key to Polynomial End-to-End Communication," J. Algorithms, vol. 22, 1997, pp. 158--186.]]
    [3]
    Akyildiz, I.F., G. Morabito, and S. Palazzo, "Research Issues for Transport Protocols in Satellite IP Networks," IEEE Personal Communications, vol. 8, no. 3, Jun 2001, pp. 44--48.]]
    [4]
    Allman, M., D. Glover, and L. Sanchez, "Enhancing TCP over Satellite Channels Using Standard Mechanisms," RFC 2488, Jan 1999.]]
    [5]
    Allman, M., ed., "Ongoing TCP Research Related to Satellites," RFC 2766, Feb 2000.]]
    [6]
    Arquilla, J., and D. Ronfeldt, (eds.), "In Athena's Camp: Preparing for Conflict in the Information Age," Rand Technical Report MR-880-OSD/RC, ISBN: 0-8330-2514-7, 1997.]]
    [7]
    Awerbuch, B., O. Goldreich, and A. Herzberg, "A quantitative approach to dynamic networks," Proc. Ninth Annual ACM Symp. on Principles of Distributed Computing, Quebec city, Quebec, Canada, 1990, pp. 189--204.]]
    [8]
    Balakrishnan, H., V. Padmanabhan, S. Seshan, and R.H. Katz., "A Comparison of Mechanisms for Improving TCP Performance over Wireless Links," IEEE/ACM Trans. Networking, vol. 5, no. 6, Dec 1997, pp.756--769.]]
    [9]
    Bose, V.G., "The Impact of Software Radio on Wireless Networking," Mobile Computing and Communications Review, vol. 3, no. 1, Jan 1999, pp. 30--37.]]
    [10]
    Bowen, T.F., G. Gopal, G.E. Herman, T.M. Hickey, K.C. Lee, W.H. Mansfield, J. Raitz, and A. Weinrib, "The Datacycle Architecture," Communications of the ACM, vol. 35 no. 12, Dec. 1992, pp. 71--79.]]
    [11]
    Calvert, K, S. Bhatacharjee, E.W. Zegura, and J.P.G. Sterbenz, "Directions in Active Networks," IEEE Communications, vol. 36 no. 10, Oct. 1998, pp. 72--78.]]
    [12]
    Chotikapong, Y., H. Cruickshank, and Z. Sun, "Evaluation of TCP and Internet Traffic via low Earth Orbit Satellites," IEEE Personal Communications, vol. 8, no. 3, Jun 2001, pp. 28--34.]]
    [13]
    Cidon, I., and R. Rom, "Failsafe end-to-end protocols in computer networks with changing topology," IEEE Trans. Communications, vol. 35, 1987, pp. 410--413.]]
    [14]
    Dahlberg, T., S. Ramaswamy, and D. Tipper, "Issues in the Survivability of Wireless Networks," Proc. IEEE Mobile and Wireless Communication Networks Workshop, May 1997.]]
    [15]
    Ellison, R.J., D.A. Fisher, R.C. Linger, H.F. Lipson, T. Longstaff, and N.R. Mead, "Survivable Network Systems: An Emerging Discipline," Technical Report CMU/SEI-97-TR-013 and ESC-TR-97-013, Carnegie Mellon University, Software Engineering Institute, Nov 1997, Rev. May 1999.]]
    [16]
    Finn, S.G., "Resynch procedures and failsafe network protocol," IEEE Trans. Communications, vol. 27, 1979, pp. 840--846.]]
    [17]
    Finn, G.G., "Routing and addressing problems in large metropolitan-scale internetworks," ISI/RR-87-180, ISI, Mar 1987.]]
    [18]
    Hughes, L., O. Banyasad, and E. Hughes, "Cartesian routing," Computer Networks, vol. 34, no. 3, Sep 2000, pp. 455--466.]]
    [19]
    Herzberg, A., and S. Kutten, "Early Detection of Message Forwarding Faults," SIAM J. Computing, vol. 30, no. 4, 2000, pp. 1169--1196.]]
    [20]
    Intanagonwiwat, C., R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks," Proc. Sixth Annual Intl. Conf. Mobile Computing and Networking, Aug 2000, Boston, MA, pp. 56--67.]]
    [21]
    Karp, B., and H.T. Kung, "Greedy Perimeter Stateless Routing for Wireless Networks," Proc. Sixth Annual Intl. Conf. Mobile Computing and Networking, Boston, MA, Aug, 2000, pp. 243--254.]]
    [22]
    Lee, S.-J., and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks," Proc. ICC 2001, Helsinki, Finland, Jun 2001, pp.3201--3205.]]
    [23]
    Linger, R.C., N.R. Mead, and H.F. Lipson, "Requirements Definition for Survivable Network Systems," Proc. 1998 Intl. Conf. Requirements Engineering (ICRE'98), Colorado Springs, CO, 6-10 Apr 1998.]]
    [24]
    Mauve, M., J. Widmer, and H. Hartenstein, "A Survey of Position-based Routing in Mobile Ad-Hoc Networks," IEEE Network, vol. 15, no. 6, Nov/Dec 2001, pp. 30--39.]]
    [25]
    Mitola, J. "The Software Radio Architecture," IEEE Communications Magazine, May 1995, pp. 26--38.]]
    [26]
    Nagpal, R., and D. Coore, "An Algorithm for Group Formation and Maximal Independent Set in an Amorphous Computer," AI Memo 1626, MIT, 1997.]]
    [27]
    Partridge, C., and T.J. Shepard, "TCP/IP Performance over Satellite Links," IEEE Network, vol. 11, no. 5, Sep/Oct 1997, pp. 44--49.]]
    [28]
    Perlman, R., "Network Layer Protocols with Byzantine Robustness," PhD Thesis, MIT Laboratory for Computer Science, Cambridge, MA, 1988.]]
    [29]
    Plattner, B. and J.P.G. Sterbenz, "Mobile Wireless Active Networking: Issues and Research Agenda," IEICE Workshop on Active Network Technology and Applications (ANTA) 2002, Tokyo, Mar. 2002, pp. 71--74.]]
    [30]
    Raju, J., and J.J. Garcia-Luna-Aceves, "A New Approach to On-demand Loop-Free Multipath Routing," Proc. 8th Annual IEEE Intl. Conf. Computer Communications and Networks (ICCCN), Boston, MA, Oct 1999, pp. 522--527.]]
    [31]
    Ramanathan, R., and M. Steenstrup, "Hierarchically-Organized, Multihop Mobile Wireless Networks for Quality-of-Service Support," Mobile Networks and Applications, vol. 3, no. 2, Aug 1998, pp. 101--119.]]
    [32]
    Ramanathan, S., and R. Rosales-Hain, "Topology Control of Multihop Radio Networks using Transmit Power Adjustment," Proc. IEEE INFOCOM, Tel-Aviv, Israel, 2000, pp. 404--413.]]
    [33]
    R. Ramanathan, "On the Performance of Ad Hoc Networks Using Beamforming Antennas," Proc. ACM Mobihoc 2001, Long Beach, CA, USA, Oct 2001, pp. 95--105.]]
    [34]
    Royer, E.M., and C.-K. Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, Apr 1999, pp. 46--55.]]
    [35]
    Software Engineering Institute, Carnegie Mellon University, "Survivable Network Analysis," http://www.sei.cmu.edu/programs/nss/analysis-method.html]]
    [36]
    Shen, C.-C., D.-P. Hsing, T.-H. Wu, and Y. Tsai, "A Network Management Architecture for Battlefield Networks," Proc. MILCOM'97, Monterey, California, Nov 2-5, 1997, pp. 1226--1231.]]
    [37]
    Snoeren, A., and H. Balakrishnan, "An End-to-End Approach to Host Mobility," Proc. Sixth ACM/IEEE Intl. Conf. Mobile Computing and Networking, Boston, MA, USA, Aug 2000, pp.155--164.]]
    [38]
    Snow, A.P., U. Varshney, and A.D. Malloy, "Reliability and survivability of wireless and mobile networks," Computer, vol. 33, Issue 7, Jul 2000, pp. 49--55.]]
    [39]
    Snow, A.P., "Network reliability: the concurrent challenges of innovation, competition, and complexity," IEEE Trans. Reliability, vol. 50, Issue 1, Mar 2001, pp. 38--40.]]
    [40]
    Sterbenz, J.P.G., and R. Krishnan, "Multimodal Routing and Switch Architecture," DARPA/ DOE/ NASA/ NIST/ NLM/ NSF Workshop on New Visions for Large-Scale Networks: Research and Applications, Mar 2001.]]
    [41]
    Committee T1, "T1A1.2 Working Group," http://www.t1.org/t1a1/_a12-hom.htm]]
    [42]
    Tchakountio, F., and R. Ramanathan, "Tracking Highly Mobile Endpoints," Proc. ACM Workshop on Wireless Mobile Multimedia (WoWMoM), Jul 2001, Rome, Italy.]]
    [43]
    Tennenhouse, D., and D.J. Wetherall, "Toward and Active Network Architecture," ACM Computer Communication Review, vol. 26 no. 2, April 1996, pp. 5--18.]]
    [44]
    Thuraya Satellite Communication Company of United Arab Emirates, http://www.thuraya.com/]]
    [45]
    Toh, C.-K., "Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks," IEEE Communications, vol. 39, no. 6, Jun 2001, pp. 138--147.]]
    [46]
    Troxel, G.D., Personal Communication.]]
    [47]
    UDAAN Transceiver API, BBN Technologies, http://www.ir.bbn.com/projects/udaan/udaan-index.html]]
    [48]
    Vishkin, U., "An Efficient Distributed Orientation Algorithm," IEEE Trans. Information Theory, vol. 29, no. 4, Jul 1983, pp. 624--629.]]
    [49]
    Wood, L., G. Pavlou, and B. Evans, "Effects on TCP of Routing Strategies in Satellite Constellations," IEEE Communications, vol. 39, no. 3, Mar 2001, pp.172--181.]]
    [50]
    Zaumen, W.T., and J.J. Garcia-Luna-Aceves, "Loop-Free Multipath Routing Using Generalized Diffusing Computations," Proc. IEEE INFOCOM '98, Mar 1998, pp.1408--1417.]]
    [51]
    IETF ZEROCONF Working Group, http://www.ietf.org/html.charters/zeroconf-charter.html]]

    Cited By

    View all
    • (2023)Are safety-critical systems really survivable to attacks?2023 IEEE International Systems Conference (SysCon)10.1109/SysCon53073.2023.10131114(1-8)Online publication date: 17-Apr-2023
    • (2022)Threat analysis for space information network based on network security attributes: a reviewComplex & Intelligent Systems10.1007/s40747-022-00899-z9:3(3429-3468)Online publication date: 28-Nov-2022
    • (2021)Routing in Vehicular Delay Tolerant NetworksCloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks10.4018/978-1-7998-2764-1.ch009(191-203)Online publication date: 2021
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
    September 2002
    100 pages
    ISBN:1581135858
    DOI:10.1145/570681
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 September 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc routing
    2. asymmetric channel
    3. disconnected
    4. eventual connectivity
    5. eventual stability
    6. fault tolerance
    7. low probability of detection (LPD)
    8. mobile wireless network
    9. satellite
    10. security
    11. store and haul forwarding
    12. survivability
    13. topology
    14. weak and episodic connectivity

    Qualifiers

    • Article

    Conference

    WiSe02
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 10 of 41 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Are safety-critical systems really survivable to attacks?2023 IEEE International Systems Conference (SysCon)10.1109/SysCon53073.2023.10131114(1-8)Online publication date: 17-Apr-2023
    • (2022)Threat analysis for space information network based on network security attributes: a reviewComplex & Intelligent Systems10.1007/s40747-022-00899-z9:3(3429-3468)Online publication date: 28-Nov-2022
    • (2021)Routing in Vehicular Delay Tolerant NetworksCloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks10.4018/978-1-7998-2764-1.ch009(191-203)Online publication date: 2021
    • (2021)Reliability and Survivability Analysis of Long-Term Evolution Vehicular Ad-Hoc Networks: An Analytical ApproachJournal of Network and Systems Management10.1007/s10922-020-09582-529:2Online publication date: 20-Jan-2021
    • (2021)Risk Analysis Methods in Resilience Modeling: An Overview of Critical Infrastructure ApplicationsApplied Risk Analysis for Guiding Homeland Security Policy10.1002/9781119287490.ch14(357-379)Online publication date: 28-Jan-2021
    • (2020)Enhanced Distributed Connectivity Control in Low Probability of Detection Operations2020 Military Communications and Information Systems Conference (MilCIS)10.1109/MilCIS49828.2020.9282374(1-6)Online publication date: 10-Nov-2020
    • (2019)Self-Organization and Resilience for Networked Systems: Design Principles and Open Research IssuesProceedings of the IEEE10.1109/JPROC.2019.2894512107:4(819-834)Online publication date: Apr-2019
    • (2018)A Review of Adversarial Behaviour in Distributed Multi-Agent Optimisation2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion)10.1109/UCC-Companion.2018.00034(53-58)Online publication date: Dec-2018
    • (2018)Through-life cyber resilience in future smart manufacturing environments. A research programme.Procedia Manufacturing10.1016/j.promfg.2018.10.15716(193-207)Online publication date: 2018
    • (2018)Architecture and design for resilient networked systemsComputer Communications10.1016/j.comcom.2018.07.028131(13-21)Online publication date: Oct-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media