We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
San-Cheng Peng, Wei-Jia Jia, Guo-Jun Wang. Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks[J]. Journal of Computer Science and Technology, 2009, 24(4): 761-774.
Citation: San-Cheng Peng, Wei-Jia Jia, Guo-Jun Wang. Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks[J]. Journal of Computer Science and Technology, 2009, 24(4): 761-774.

Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks

Funds: This work is supported by the National Basic Research 973 Program of China under Grant No. 2003CB317003, the Research Grants Council of the Hong Kong Special Administrative Region, China under Grant No. 9041350 (CityU 114908), CityU Applied R&D Funding (ARD-(Ctr-)) under Grant Nos. 9681001 and 9678002, the Hunan Provincial Natural Science Foundation of China for Distinguished Young Scholars under Grant No. 07JJ1010, the National Natural Science Foundation of China for Major Research Plan under Grant No. 90718034, and the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT0661.
More Information
  • Author Bio:

    San-Cheng Peng received his M.S. degree in computer science from Yanshan University in 2004. He is a student member of China Computer Federation (CCF). He is currently a Ph.D. candidate of the Central South University. He is also a research associate at City University of Hong Kong during 2008—2009. His current research interests include computer networks, survivability and trusted computing.

    Wei-Jia Jia is currently a full professor in the Department of Computer Science and the Director of Future Networking Center, Shenzhen Research Institute of City University of Hong Kong (CityU). He received the B.Sc. and M.Sc. degrees from Central South University, China in 1982 and 1984, and Master of Applied Sci. and Ph.D. degrees from Polytechnic Faculty of Mons, Belgium in 1992 and 1993 respectively, both in computer science. He joined German National Research Center for Information Science (GMD) in Bonn (St. Augustine) from 1993 to 1995 as a research fellow. In 1995, he joined Department of Computer Science, CityU as an assistant professor.His research interests include next generation wireless communication, protocols and heterogeneous networks, distributed systems, multicast and anycast QoS routing protocols. In these fields, he has over 300 publications in the prestige international journals (IEEE Transactions, e.g., TPDS, TC, TMC), books/chapters and refereed international conference proceedings (e.g., ACM MobiHoc, SenSys, IEEE ICDCS, INFOCOM).He (with W. Zhou) published a book "Distributed Network Systems" by Springer where the book contains extensive research materials and implementation examples. He has received the best paper award in a prestige (IEEE) conference and (with J. Chen et al.) proposed an improved algorithm for well-known Vertex Cover and Set-packing NP-hard problems with time bounds of O(kn+1.2852 k) and O((5.7k)kn) respectively. He is chair professor of Central South University, Changsha, China, guest professor of University of Science and Technology of China, Beijing Jiaotong University, and Jinan University, Guangzhou, China. He has served as the editor and guest editor for international journals, PC chairs and members/keynote speakers for various prestige international conferences. He has been listed in Marquis Who's Who (VIP) in the World (2000-2008). He is a senior member of IEEE and member of ACM.

    Guo-Jun Wang received the B.Sc. degree in geophysics, M.Sc. degree in computer science, and Ph.D. degree in computer science, from Central South University, in 1992, 1996, and 2002, respectively. He is currently a professor at Central South University, China. He is the director of the Trusted Computing Institute, formerly the Mobile Computing Institute, in the University. He is also a vice dean of the Department of Computer Science and Technology in the University. He is currently a visiting scholar at Florida Atlantic University in USA. He was a research fellow at the Hong Kong Polytechnic University, during 2003~2005, and a visiting researcher in the University of Aizu, Japan, during 2006~2007. His research interests include trusted computing, pervasive computing, mobile computing, and software engineering. He has published more than 140 technical papers and books/chapters in the above areas. He is an associate editor or on the editorial board of some international journals including Security and Communication Networks, Journal of Computer Systems, Networking, and Communications, and International Journal of Multimedia and Ubiquitous Engineering. He has also served as guest editor-in-chief or guest editor for some international journals including IEICE Transactions on Information and Systems, Journal of Supercomputing (Springer), Security and Communication Networks (Wiley), and Journal of Computers (Academy Publisher). He is a senior member of the China Computer Federation.

  • Received Date: November 24, 2008
  • Revised Date: May 10, 2009
  • Published Date: July 04, 2009
  • Survivability refers to the ability of a network system to fulfill critical services in a timely manner to end users in the presence of failures and/or attacks. In order to establish a highly survivable system, it is necessary to measure its survivability to evaluate the performance of the system's services under adverse conditions. According to survivability requirements of large-scale mobile ad-hoc networks (MANETs), we propose a novel model for quantitative evaluation on survivability. The proposed model considers various types of faults and connection states of mobile hosts, and uses the continuous time Markov chain (CTMC) to describe the survivability of MANETs in a precise manner. We introduce the reliability theory to perform quantitative analysis and survivability evaluation of segment-by-segment routing (SSR), multipath-based segment-by-segment routing (MP-SSR), and segment-by-segment-based multipath routing (SS-MPR) in large-scale MANETs. The proposed model can be used to analyze the network performance much more easily than a simulation-based approach. Numerical validation shows that the proposed model can be used to obtain a better evaluation result on the survivability of large-scale MANETs.
  • [1]
    Macker J P, Corson M S. Mobile ad hoc networking and the IETF. Mobile Computing and Communication, 1999, 17(8): 1426–1438.
    [2]
    Corson S, Macker J. Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. RFC 2501 Internet Engineering Task Force (IETF), 1999.
    [3]
    Wang G, Mo Q, Guo M, Jia W. Designing piecewise QoS routing protocol in large-scale MANETs. In Proc. the JapanChina Joint Workshop on Frontier of Computer Science and Technology (FCST 2007), Wuhan, China, Nov. 1–3, 2007, pp.1–6.
    [4]
    Peng S, Jia W, Wang G. Quantitative evaluation model for survivability in MANETs. Geomatics and Information Science of Wuhan University, 2008, 33(10): 1095–1098.
    [5]
    Wang G, Zhang L, Cao J. Logical location-based routing with Hole-shadowing in large-scale MANETs. In Proc. the IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, June 11–15, 2006, pp.3560–3565.
    [6]
    Wang G, Wang Q, Cao J, and Guo M. An e?ective trust establishment scheme for authentication in mobile ad-hoc networks. In Proc. the Seventh IEEE International Conference on Computer and Information Technology (CIT 2007), Japan, Oct. 16–19, 2007, pp.749–754.
    [7]
    Lu Q. Vulnerability of Wireless Routing Protocols. Technical Report, Dec. 15, 2002.
    [8]
    Li X P, Yang D F. A quantitative survivability evaluation model for wireless sensor networks. In Proc. the IEEE International Conference on Networking, Sensing and Control (ICNSC 2006), Ft. Lauderdale, Florida, USA, April 23–25, 2006, pp.727–732.
    [9]
    Ellison R, Linger R. Survivable network system analysis: A case study. Software, 1999, 16(4): 70–77.
    [10]
    Liew S C, Lu K W. A framework for network survivability characterization. In Proc. the IEEE International Conference on Communications (ICC 1992), Chicago, USA, June 14–18, 1992, Vol. 1, pp.405–410.
    [11]
    Zolfaghario A, Kaudel F J. Framework for network survivability performance. IEEE Journal on Selected Areas in Communications, 1994, 12(1): 46–51.
    [12]
    Frank H. Survivability analysis of command and control communications networks — Part I, II. IEEE Transactions on Communications, 1974, 22(5): 589–605.
    [13]
    Jha S, Wing M. Survivability analysis of networked systems. In Proc. IEEE International Conference on Software Engineering (ICSE 2001), Toronto: IEEE Press, 2001, pp.307– 317.
    [14]
    Krings A W, Azadmanesh A. A graph based model for survivability applications. European Journal of Operational Research, 2005, 164(3): 680–689.
    [15]
    McDermott J. Attack-potential-based survivability modeling for high-consequence systems. In Proc. the Third IEEE International Workshop on Information Assurance (IWIA 2005), College Park, Maryland, USA, March 23–24, 2005, pp.119–130.
    [16]
    Chen D Y, Garg S, Trivedi K S. Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks. In Proc. the 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Atlanta, Georgia, USA, September 28–30, 2002, pp.61–68.
    [17]
    Koroma J, Li W. A generalized model for network survivability. In Proc. the 2003 Conference on Diversity in Computing (TAPIA 2003), Atlanta, Georgia, USA, 2003, pp.47–51.
    [18]
    Trajanov D, Filiposka S. Ad hoc networks connection availability modeling. In Proc. the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Venezia, Italy, October 4–7, 2004, pp.56–60.
    [19]
    Peng S, Jia W, Wang G. Quantitative evaluation model for survivability in large-scale MANETs based on reliability theory. In Proc. the 9th International Conference for Young Computer Scientists (ICYCS 2008), Zhangjiajie, Hunan, China, Nov. 18–21, 2008, pp.432–438.
    [20]
    Knight J, Sullivan K. On the de?nition of survivability. Department of Computer Science, University of Virginia, Technical Report CS-00-33, 2000.
    [21]
    Cao J, Zhang L,Wang G, Cheng H. SSR: Segment-by-segment routing in large-scale MANETs. In Proc. the Third IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2006), Vancouver, Canada, October 9–12, 2006, pp.216–225.
    [22]
    Shu Y,Wang G,Wang L et al. Provisioning QoS guarantee by multipath routing and reservation in ad hoc networks. Journal of Computer Science & Technology, March 2004, 19(2): 128–137.
    [23]
    Leung R, Liu J, Poon E et al. MP-DSR: A QoS-aware multipath dynamic source routing protocol for wireless ad-hoc networks. In Proc. the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), Tampa, Florida, USA, Nov. 14–16, 2001, pp.132–141.
    [24]
    An H, Zhong L, Lu X, Peng W. A cluster-based multipath dynamic source routing in MANET. In Proc. the IEEE International Conference on Wireless and Mobile Computing (WiMob 2005), Montreal, Canada, August 22–24, 2005, Vol. 3, pp.369–376.
    [25]
    Lu Y, Jia W, Wang G, Peng S. Multipath-based segment-bysegment routing protocol inMANETs. In Proc. the 9th International Conference for Young Computer Scientists (ICYCS 2008), Zhangjiajie, Hunan, China, Nov. 18–21, 2008, pp.527– 532.
    [26]
    Louca S, Pitsillides A, Samaras G. On network survivability algorithms based on trellis graph transformations. In Proc. the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), Sharm EI Sheik, Red Sea, Egypt, July 6–8, 1999, pp.235–243.
    [27]
    Liew S C, Lu K W. A framework for characterizing disasterbased network survivability. IEEE Journal on Selected Areas in Communications, 1994, 12(1): 52–58.
    [28]
    Westmark R. A de?nition for information system survivability. In Proc. the 37th Hawaii International Conference on System Sciences, New York, USA, Jan. 5–8, 2004, pp.2086– 2096.
    [29]
    Liu P Y, Zhang W M. Mathematical problems in research on reliability of communication networks. Journal of China Institute of Communications, 2000, 21(10): 50–57.
    [30]
    KeWJ,Wang S D. Reliability evaluation for distributed computing network with imperfect nodes. IEEE Transactions on Reliability, 1997, 46(3): 342–349.

Catalog

    Article views (23) PDF downloads (1772) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return