CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET

Size: px
Start display at page:

Download "CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET"

Transcription

1 CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Saravanan Kumarasamy 1, Hemalatha B 2 and Hashn P 3 1 Asst. Professor/CSE Erode Sengunthar Engneerng College, Erode, Inda 2, 3 B.E. C.S.E. Student, Erode Sengunthar Engneerng College, Erode, Inda Emal:saravanankumarasamy@gmal.com ABSTRACT Moble ad-hoc networks are temporary wreless networks. Network resources are abnormally consumed by ntruders. Anomaly and sgnature based technques are used for ntruson detecton. Classfcaton technques are used n anomaly based technques. Intruson detecton technques are used for the network attack detecton process. Two types of ntruson detecton systems are avalable. They are anomaly detecton and sgnature based detecton model. The anomaly detecton model uses the hstorcal transactons wth attack labels. The sgnature database s used n the sgnature based IDS schemes. The moble ad-hoc networks are nfrastructure less envronment. The ntruson detecton applcatons are placed n a set of nodes under the moble ad-hoc network envronment. The nodes are grouped nto clusters. The leader nodes are assgned for the clusters. The leader node s assgned for the ntruson detecton process. Leader nodes are used to ntate the ntruson detecton process. Resource sharng and lfetme management factors are consdered n the leader electon process. The system optmzes the leader electon and ntruson detecton process. The system s desgned to handle leader electon and ntruson detecton process. The clusterng scheme s optmzed wth coverage and traffc level. Cost and resource utlzaton s controlled under the clusters. Node moblty s managed by the system. 1. INTRODUCTION Unlke tradtonal networks, the Moble Ad hoc Networks (MANETs) have no fxed chokeponts/bottlenecks where Intruson Detecton Systems (IDSs) can be deployed [3]. Hence, a node may need to run ts own IDS [1] and cooperate wth others to ensure securty. Ths s very neffcent n terms of resource consumpton snce moble nodes are energylmted. To overcome ths problem, a common approach s to dvde the MANET nto a set of 1- hop clusters where each node belongs to at least one cluster. The nodes n each cluster elect a leader node (cluster head) to serve as the IDS for the entre cluster. The leader-ids electon process can be ether random or based on the connectvty. Both approaches am to reduce the overall resource consumpton of IDSs n the network. However, we notce that nodes usually have dfferent remanng resources at any gven tme, whch should be taken nto account by an electon scheme. Unfortunately, wth the random model, each node s equally lkely to be elected regardless of ts remanng resources [11]. The connectvty ndex-based approach elects a node wth a hgh degree of connectvty even though the node may have lttle resources left. Wth both electon schemes, some nodes wll de faster than others, leadng to a loss n connectvty and potentally the partton of network. Although t s clearly desrable to balance the resource consumpton of IDSs among nodes, ths objectve s dffcult to acheve snce the resource level s the prvate nformaton of a node. Unless suffcent ncentves are provded, nodes mght msbehave by actng selfshly and lyng about ther resources level to not consume ther resources for servng others whle recevng others servces. Moreover, even when all nodes can truthfully reveal ther resource levels, t remans a challengng ssue to elect an optmal collecton of leaders to balance the overall resource consumpton wthout floodng the network. Next, we motvate further dscussons through a concrete example. The problem of selfshness and energy balancng exsts n many other applcatons to whch our soluton s also applcable. Lke n IDS scheme, leader electon s needed for routng and key dstrbuton [6] n MANET. In key management, a central key dstrbutor s needed to update the keys of nodes. In routng, the nodes are 1

2 grouped nto small clusters and each cluster elects a cluster head (leader) to forward the packets of other nodes. Thus, one node can stay alve, whle others can be n the energy-savng mode. The electon of a leader node s done randomly, based on connectvty (nodes degree) or based on a node s weght. We have already ponted out the problems of random model and connectvty model. We beleve that a weghtbased leader electon should be the proper method for electon. Unfortunately, the nformaton regardng the remanng energy s prvate to a node, and thus, not verfable. Snce nodes mght behave selfshly, they mght le about ther resource level to avod beng the leader f there s no mechansm to motvate them. Our method can effectvely address ths ssue. 2. RELATED WORK Ths secton revews related work on ntruson detecton n MANET, the applcaton of mechansm desgn to networks, and the applcaton of leader electon scheme to routng and key dstrbuton INTRUSION DETECTION SYSTEMS IN MANET The dfference between wred nfrastructure networks and moble ad hoc networks rases the need for new IDS models that can handle new securty challenges. Due to the securty needs n MANET, a cooperatve ntruson detecton model has been proposed, where every node partcpates n runnng ts IDS n order to collect and dentfy possble ntrusons. If an anomaly s detected wth weak evdence, then a global detecton process s ntated for further nvestgaton about the ntruson through a secure channel. An extenson of ths model was proposed, where a set of ntrusons can be dentfed wth ther correspondng sources. Moreover, the authors address the problem of runtme resource constrants through modelng a repeatable and random leader electon framework. An elected leader s responsble for detectng ntrusons for a predefned perod of tme. Unlke our work, the random electon scheme does not consder the remanng resources of nodes or the presence of selfsh nodes. A modular IDS system based on moble agents s proposed and the authors pont out the mpact of lmted computatonal and battery power on the network montorng tasks. Agan, the soluton gnores both the dfference n remanng resources and the selfshness ssue. To motvate the selfsh nodes n routng, CONFIDANT proposes a reputaton system where each node keeps track of the msbehavng nodes. The reputaton system s bult on the negatve evaluatons rather than postve mpresson. Whenever a specfc threshold s exceeded, an approprate acton s taken aganst the node. Therefore, nodes are motvated to partcpate by punshng the msbehavng ones through gvng a negatve reputaton. As a consequence of such a desgn, a malcous node can broadcast a negatve mpresson about a node n order to be punshed. On the other hand, CORE [2] s proposed as a cooperatve enforcement mechansm based on montorng and reputaton systems. The goal of ths model s to detect selfsh nodes and enforce them to cooperate. Each node keeps track of other nodes cooperaton usng reputaton as a metrc. CORE ensures that msbehavng nodes are punshed by gradually excludng them from communcaton servces. In ths model, the reputaton s calculated based on data montored by local nodes and nformaton provded by other nodes nvolved n each operaton. In contrast to such passve approaches, our soluton proactvely encourages nodes to behave honestly through computng reputatons based on mechansm desgn. Moreover, t s able to punsh msbehavng leaders through a cooperatve punshment system based on cooperatve game theory. In addton to ths, a noncooperatve game s desgned to help the leader IDS to ncrease the probablty of detecton by dstrbutng the node s samplng over the most crtcal lnks APPLICATION OF MECHANISM DESIGN As a subfeld of mcroeconomcs and game theory, mechansm desgn has receved extensve studes n mcroeconomcs for modelng economcal actvtes. Nsan and Ronen apply mechansm desgn for solvng the least-cost path and task schedulng problem. Dstrbuted mechansm desgn based on VCG s frst ntroduced n a drect extenson of Border Gateway Protocol (BGP) for computng the lowest cost routes. Moreover, the authors outlned the 2

3 bascs of dstrbuted mechansm desgn and revewed the results done on multcast cost sharng and nterdoman routng. Mechansm desgn has been used for routng purposes n MANETs, such as a truthful ad-hoc-vcg mechansm for fndng the most cost-effcent route n the presence of selfsh nodes. In [9], the authors provde an ncentve compatble aucton scheme to enable packet forwardng servces n MANETs usng VCG; a contnuous aucton process s used to determne the dstrbuton of bandwdth, and ncentves are gven as monetary rewards. To our best knowledge, ths work s among the frst efforts n applyng mechansm desgn theory to address the securty ssues n MANETs, n partcular, the leader electon for ntruson detecton. Ths paper s the extenson of [4], where we presented the leader electon mechansm n a statc envronment wthout addressng dfferent performance overhead LEADER ELECTION APPLICATIONS Dstrbuted algorthms for clusterng and leader electon have been addressed n dfferent research work [5]. These algorthms can be classfed nto two categores: Cluster-frst or leader-frst. In the cluster frst approach, a cluster s formed, and then, the nodes belongng to that cluster elect a leader node. In the leader frst approach, a set of leader nodes s elected frst, then the other nodes are assgned to dfferent leader nodes. Some of the methods assume that there exst a weght assocated wth each node or there exst a trusted authorty to certfy each node s metrc (weght) whch s used to elect a leader. We consder these assumptons as qute strong for MANET. Our model s able to run n a clustered and nonclustered network where we are able to perform better results wth respect to dfferent performance metrcs. 3. PROBLEM STATEMENT We consder an MANET where each node has an IDS and a unque dentty. To acheve the goal of electng the most cost-effcent nodes as leaders n the presence of selfsh and malcous nodes, the followng challenges arse: Frst, the resource level that reflects the cost of analyss s consdered as prvate nformaton. As a result, the nodes can reveal fake nformaton about ther resources f that could ncrease ther own benefts. Second, the nodes mght behave normally durng the electon but then devate from normal behavor by not offerng the IDS servce to ther voted nodes. In our model, we consder MANET as an undrected graph G = (N,L), where N s the set of nodes and L s the set of bdrectonal lnks. We denote the cost of analyss vector as C = {c 1, c 2, c n } where n s the number of nodes n N. We denote the electon process as a functon vt k (C, ), where vt k (C, ) = 1 f a node votes for a node k; vt k (C, ) = 0, otherwse. We assume that each elected leader allocates the same budget B for each node that has voted for t. Knowng that the total budget wll be dstrbuted among all the votng nodes accordng to ther reputaton. Ths wll motvate the nodes to cooperate n every electon round that wll be held on every tme T ELECT. Thus, the model wll be repeatable. For example, f B = 25 packet/sec and the leader gets three votes, then the leader s samplng budget s 75 packet/sec. Ths value s dvded among the three nodes based on ther reputaton value. The objectve of mnmzng the global cost of analyss whle servng all the nodes can be expressed by the followng Socal Choce Functon (SCF): SCF = S(C) = mn c. k vtk ( C, ). B. k N N Clearly, n order to mnmze ths SCF, the followng must be acheved. Frst, we need to desgn ncentves for encouragng each node n revealng ts true cost of analyss value c. Second, we need to desgn an electon algorthm that can provably mnmze the above SCF whle not ncurrng too much of the performance overhead. 4. LEADER ELECTION MECHANISM 4.1 MECHANISM DESIGN BACKGROUND Mechansm desgn s a subfeld of mcroeconomcs and game theory. Mechansm desgn uses game theory tools to acheve the desred goals. The man dfference between game theory and mechansm desgn s that the former can be used to study what could happen when ndependent players act selfshly. On the other hand, mechansm desgn allows a game desgner to defne rules n terms of the SCF such that players wll play accordng to these rules. The balance of IDS resource consumpton problem can 3

4 be modeled usng mechansm desgn theory wth an objectve functon that depends on the prvate nformaton of the players. In our case, the prvate nformaton of the player s the cost of analyss whch depends on the player s energy level. Here, the ratonal players select to delver the untruthful or ncomplete nformaton about ther preferences f that leads to ndvdually better outcomes [10]. The man goal of usng mechansm desgn [7] s to address ths problem by: 1) desgnng ncentves for players (nodes) to provde truthful nformaton about ther preferences over dfferent Outcomes and 2) computng the optmal system-wde soluton, whch s defned accordng to (1). A mechansm desgn model conssts of n agents where each agent {1,, n } has a prvate nformaton, φ θ, known as the agent s type. Moreover, t defnes a set of strateges A for each agent. The agent can choose any strategy a A to nput n the mechansm. Accordng to the nputs (a,..., a n ) of all the agents, the mechansm calculates an output o = o(a 1,..., a n ) and payment vector p = (p 1,..., p n ), where p = p (a 1,..., a n ). The preference of each agent from the output s calculated by a valuaton functon v ( θ, o). Ths s a quantfcaton n terms of a real number to evaluate the output for an agent. Thus, the utlty of a node s calculated as u = p - v ( θ, o). Ths means that the utlty s the combnaton of output measured by valuaton functon and the payment t receves from the mechansm. In drect revelaton mechansm, every agent has a type θ. Each agent gves an nput a ( θ ) to the mechansm. The agent chooses the strategy accordng to ts type, where a ( θ ) = _, whch s chosen from the strategy set θ = {Selfsh; Normal}. We assume that normal agents follow the protocol, whereas selfsh agents devate from the defned protocol f the devaton leads to a hgher utlty. Although the prme objectve of these agents s not to actvely harm others but ther presence can passvely harm others. Last but not least, the mechansm provdes a global output from the nput vector and also computes a specfc payment for each agent. The goal s to desgn a strategy proof mechansm where each agent gves an nput based on ts real type θ such that t maxmzes ts utlty regardless of the strateges of others. A strategy s domnated by another strategy f the second strategy s at least as good as the other one regardless of the other players strategy. Ths s expressed as follows: p - v ( θ, o) = where * * u u = p - v ( θ, o), * θ denotes nonselfshness and denotes selfshness. Note that u s maxmzed only when p s gven by the mechansm. The queston s: How to desgn the payments n a way that makes truth-tellng the domnant strategy? In other words, how to motvate nodes to reveal truthfully ther valuaton functon v ( θ, o)? The VCG mechansm answers ths queston by gvng the nodes a fxed payment ndependent of the nodes valuaton, whch s equal to the second best valuaton. The desgn of the payment, accordng to our scenaros, s gven n the followng sectons. A general overvew of mechansm desgn can be found n [8] THE MECHANISM MODEL We treat the IDS resource consumpton problem as a game where the N moble nodes are the agents/players. Each node plays by revealng ts own prvate nformaton whch s based on the node s type θ. The type * θ θ s drawn from each player s avalable type set θ = {Normal, Selfsh}. Each player selects hs own strategy/type accordng to how much the node values the outcome. If the player s strategy s normal, then the node reveals the true cost of analyss. We assume that each player has a utlty functon: u ( θ ) = p - v ( θ, o( θ, θ )), - (2) where. θ s the type of all the other nodes except. v s the valuaton of player of the output o O, knowng that O s the set of possble outcomes. In our case, f the node s elected, then v s the cost of analyss c. Otherwse, v s 0 snce the node wll not be the leader, and hence, there wll be no cost to run the IDS. p R s the payment gven by the mechansm to the elected node. Payment s 4

5 gven n the form of reputaton. Nodes that are not elected receve no payment. Note that u ( θ ) s what the player usually seeks to maxmze. It reflects the amount of benefts ganed by player f he follows a specfc type θ. Players mght devate from revealng the truthful valuaton for the cost of analyss f that could lead to a better payoff. Therefore, our mechansm must be strategy-proof where truthtellng s the domnant strategy. To play the game, every node declares ts correspondng cost of analyss where the cost vector C s the nput of our mechansm. For each nput vector, the mechansm calculates ts correspondng output o = o( θ,..., θ n ) and a payment vector p = (p 1,...,p n ). Payments are used to motvate players to behave n accordance wth the mechansm goals. In the followng sectons, we wll formulate the followng components: 1. Cost of analyss functon: It s needed by the nodes to compute the valuaton functon. 2. Reputaton system: It s needed to show how: a. Incentves are used once they are granted. b. Msbehavng nodes are catched and punshed. 3.Payment desgn: It s needed to desgn the amount of ncentves that wll be gven to the nodes based on VCG. 4.3 COST OF ANALYSIS FUNCTION Durng the desgn of the cost of analyss functon, the followng two problems arse: Frst, the energy level s consdered as prvate and senstve nformaton and should not be dsclosed publcly. Such a dsclosure of nformaton can be used malcously for attackng the node wth the least resources level. Second, f the cost of analyss functon s desgned only n terms of nodes energy level, then the nodes wth the low energy level wll not be able to contrbute and ncrease ther reputaton values. To solve the above problems, we desgn the cost of analyss functon wth the followng two propertes: Farness and Prvacy. The former s to allow nodes wth ntally less resources to contrbute and serve as leaders n order to ncrease ther reputaton. On the other hand, the latter s needed to avod the malcous use of the resources level, whch s consdered as the most senstve nformaton. To avod such attacks and provde farness, the cost of analyss s desgned based on the reputaton value, the expected number of tme slots that a node wants to stay alve n a cluster, and energy level. Note that the expected number of slots and energy level are consdered as the nodes prvate nformaton. Fg Reputaton system model REPUTATION SYSTEM MODEL Before we desgn the payment, we need to show how the payment n the form of reputaton can be used to: 1) motvate nodes to behave normally and 2) punsh the msbehavng nodes. Moreover, t can be used to determne whom to trust. To motvate the nodes n behavng normally n every electon round, we relate the cluster s servces to nodes reputaton. Ths wll create a competton envronment that motvates the nodes to behave normally by sayng the truth. To enforce our mechansm, a punshment system s needed to prevent nodes from behavng selfshly after the electon. Msbehavng nodes are punshed by decreasng ther reputaton, and consequently, are excluded from the cluster servces f the reputaton s less than a predefned threshold. As an extenson to our model, we can extend our reputaton system to nclude dfferent sources of nformaton such as routng and key dstrbuton wth dfferent assgned weghts CILE PAYMENT DESIGN In CILE, each node must be montored by a leader node that wll analyze the packets for other ordnary nodes. Based on the cost of analyss vector C, nodes wll cooperate to elect a set of leader nodes that wll be able to analyze the traffc across the whole network and handle the montorng process. Ths ncreases the effcency and balances the resource consumpton of an IDS n the network. Our mechansm provdes 5

6 payments to the elected leaders for servng others. The payment s based on a per-packet prce that depends on the number of votes the elected nodes get. The nodes that do not get any vote from others wll not receve any payment. The payment s n the form of reputatons, whch are then used to allocate the leader s samplng budget for each node. Hence, any node wll strve to ncrease ts reputaton n order to receve more IDS servces from ts correspondng leader. Fg An example of leader electon CDLE PAYMENT DESIGN In CDLE, the whole network s dvded nto a set of clusters where a set of 1-hop neghbor nodes forms a cluster. Here, we use the scheme to cluster the nodes nto 1-hop clusters. Each cluster then ndependently elects a leader among all the nodes to handle the montorng process based on nodes analyss cost. Our objectve s to fnd the most cost-effcent set of leaders that handle the detecton process for the whole network. Hence, our socal choce functon s stll as n (1). To acheve the desred goal, payments are computed usng the VCG mechansm where truth-tellng s proved to be domnant. Lke CILE, CDLE provdes payment to the elected node and the payment s based on a per-packet prce that depends on the number of votes the elected node gets. 5. LEADER ELECTION ALGORITHM To run the electon mechansm, we propose a leader electon algorthm that helps to elect the most cost-effcent leaders wth less performance overhead compared to the network floodng model. We devse all the needed messages to establsh the electon mechansm takng nto consderaton cheatng and presence of malcous nodes. Moreover, we consder the addton and removal of nodes to/from the network due to moblty reasons. Fnally, the performance overhead s consdered durng the desgn of the gven algorthm where computaton, communcaton, and storage overhead are derved OBJECTIVES AND ASSUMPTIONS To desgn the leader electon algorthm, the followng requrements are needed: 1) To protect all the nodes n a network, every node should be montored by a leader and 2) to balance the resource consumpton of IDS servce, the overall cost of analyss for protectng the whole network s mnmzed. In other words, every node has to be afflated wth the most cost-effcent leader among ts neghbors. Our algorthm s executed n each node takng nto consderaton the followng assumptons about the nodes and the network archtecture: Every node knows ts (2-hop) neghbors, whch s reasonable snce nodes usually mantan a table about ther neghbors for routng purposes. Loosely synchronzed clocks are avalable between nodes. Each node has a key par for establshng a secure communcaton between nodes. Each node s aware of the presence of a new node or removal of a node. For secure communcaton, we can use a combnaton of TESLA and publc key nfrastructure. Wth the help of TESLA, loosely synchronzed clocks can be avalable. Nodes can use publc key nfrastructure durng electon and TESLA n other cases. Recent nvestgatons showed that computatonally lmted moble nodes can also perform publc key operatons LEADER ELECTION To start a new electon, the electon algorthm uses four types of messages. Hello, used by every node to ntate the electon process; Begn-Electon, used to announce the cost of a node; Vote, sent by every node to elect a leader; and Acknowledge, sent by the leader to broadcast ts payment, and also as a confrmaton of ts leadershp. For descrbng the algorthm, we use the followng notaton: servce-table(k): The lst of all ordnary nodes, those voted for the leader node k. 6

7 reputaton-table(k): The reputaton table of node k. Each node keeps the record of reputaton of all other nodes. neghbors(k): The set of node k s neghbors. leadernode(k): The ID of node k s leader. If node k s runnng ts own IDS, then the varable contans k. leader(k): A boolean varable that sets to TRUE f node k s a leader and FALSE otherwse. Intally, each node k starts the electon procedure by broadcastng a Hello message to all the nodes that are 1 hop from node k and starts a tmer T 1. Ths message contans the hash value of the node s cost of analyss and ts unque dentfer (ID). Ths message s needed to avod cheatng where further analyss s conducted. Algorthm 1 (Executed by every node) /* On recevng Hello, all nodes reply wth ther cost */ 1. f (receved Hello from all neghbors) then 2. Send Begn-Electon (ID k ; cost k ); 3. else f(neghbors(k) = φ ) then 4. Launch IDS. 5. end f On expraton of T 1, each node k checks whether t has receved all the hash values from ts neghbors. Nodes from whom the Hello message have not receved are excluded from the electon. On recevng the Hello from all neghbors, each node sends Begn-Electon as n Algorthm 1, whch contans the cost of analyss of the node, and then, starts tmer T 2. If node k s the only node n the network or t does not have any neghbors, then t launches ts own IDS. Algorthm 2 (Executed by every node) /* Each node votes for one node among the neghbors */ 1. f ( n ε neghbor(k), 9 ε n : c c n ) then 2. send Vote(ID k, ID, cost j ); 3. leadernode(k) := ; 5. end f On expraton of T 2, the node k compares the hash value of Hello to the value receved by the Begn-Electon to verfy the cost of analyss for all the nodes. Then, node k calculates the leastcost value among ts neghbors and sends Vote for node as n Algorthm 2. The Vote message contans the ID k of the source node, the ID of the proposed leader, and second least cost among the neghbors of the source node cost j. Then, node k sets node as ts leader n order to update later on ts reputaton. Note that the second least cost of analyss s needed by the leader node to calculate the payment. If node k has the least cost among all ts neghbors, then t votes for tself and starts tmer T 3. Algorthm 3 (Executed by Elected leader node) /* Send Acknowledge message to the neghbor nodes */ 1. Leader() := TRUE; 2. Compute Payment, P ; 3. update servce-table (); 4. update reputaton-table (); 5. Acknowledge = P + all the votes; 6. Send Acknowledge (); 7. Launch IDS. On expraton of T 3, the elected node calculates ts payment usng (5) and sends an Acknowledge message to all the servng nodes as n Algorthm 3. The Acknowledge message contans the payment and all the votes the leader receved. The leader then launches ts IDS. Each ordnary node verfes the payment and updates ts reputaton table accordng to the payment. All the messages are sgned by the respectve source nodes to avod any knd of cheatng. At the end of the electon, nodes are dvded nto two types: Leader and ordnary nodes. Leader nodes run the IDS for nspectng packets, durng an nterval T ELECT, based on the relatve reputatons of the ordnary nodes. We enforce reelecton every perod T ELECT snce t s unfar and unsafe for one node to be a leader forever. Even f the topology remans same after T ELECT tme, all the nodes go back to ntal stage and elect a new leader accordng to the above algorthms. 6. ENERGY EFFICIENT LEADER ELECTION MODEL The system s desgned to handle leader electon and ntruson detecton process. The clusterng scheme s optmzed wth coverage and traffc level. Cost and resource utlzaton s controlled under the clusters. Node moblty s managed by the system. The system s desgned to perform ntruson detecton on MANET 7

8 envronment wth energy management. Intruson detecton operatons are ntated by the leader nodes. The anomaly based model s used for the ntruson detecton process. The system s dvded nto fve major modules. They are Network analyss, Clusterng process, Leader Electon, Detector assgnment and Intruson Detecton. The network analyss module s desgned to fnd out the neghbor detals. Clusterng process module s desgned to group up the nodes. Cluster leader node s selected wth resource levels. Detector assgnment module s desgned to place ntruson detector applcaton. The ntruson detecton process s performed wth network transactons. The neghborhood nodes are grouped nto clusters. The clusters are formed wth coverage and traffc nformaton. The cluster detals are updated n ntervals. The cluster resources are shared by the nodes LEADER ELECTION The leader s elected for each cluster. The resource and energy detals are consdered n the leader selecton process. The leader nodes are assgned wth ncentves. Reputaton s provded wth reference to ncentves NETWORK ANALYSIS The network node status nformaton are collected n ths module. Neghbor nodes and ther resource levels are collected and updated. Computatonal and storage detals are also collected from the nodes. Network status detals are perodcally updated. MANE T Node Neghbo r Dscover MA NET Nod Servce Request / Response Cluster ng Process Resource Analyss Leader Electo n Intruso n Servce Fg Intruson Detecton System for MANET 6.2. CLUSTERING PROCESS Servce Request / Response Fg An MANET after addng a new node DETECTOR ASSIGNMENT The detector responds for the ntruson detecton process. The detector s placed wth reference to the resource levels. The leader node s assgned wth detector module. The detector collects all transactons for ntruson detecton process INTRUSION DETECTION The ntruson detecton process s ntated n ntervals. Dynamc nterval estmaton s used n the system. The Bayesan classfcaton technque s used for ntruson detecton process. The ntruson detecton results are passed to the requested node. 7. CONCLUSION The moble ad-hoc networks are nfrastructure less envronment. Leader nodes are used to ntate the ntruson detecton process. Resource sharng and lfetme management factors 8

9 are consdered n the leader electon process. The system optmzes the leader electon and ntruson detecton process. The system reduces the energy consumpton. Network traffc s reduced by the system. Dynamc nterval s assgned for ntruson detecton process. Electon Model for Intruson Detecton n MANET IEEE Transactons On Dependable And Secure Computng, Vol. 8, No. 1, January- February REFERENCES [1] T. Anantvalee and J. Wu, A Survey on Intruson Detecton n Moble Ad Hoc Networks, Wreless/Moble Network Securty, Sprnger, [2] P. Mchard and R. Molva, Analyss of Coalton Formaton and Cooperaton Strateges n Moble Adhoc Networks, J. Ad Hoc Networks, vol. 3, no. 2, pp , [3] F. Anjum and P. Mouchtars, Securty for Wreless Ad Hoc Networks. John Wley and Sons, Inc., [4] N. Mohammed, H. Otrok, L. Wang, M. Debbab, and P. Bhattacharya, A Mechansm Desgn-Based Mult-Leader Electon Scheme for Intruson Detecton n Manet, Proc. IEEE Wreless Comm. and Networkng Conf. (WCNC), [5] K. Sun, P. Peng, P. Nng, and C. Wang, Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks, Proc. IEEE Computer Securty Applcatons Conf. (ACSAC), [6] M. Bechler, H. Hof, D. Kraft, F. Pahlke, and L. Wolf, A Cluster-Based Securty Archtecture for Ad Hoc Networks, Proc. IEEE INFOCOM, [7] L. Hurwcz and S. Reter, Desgnng Economc Mechansms, frst ed. Cambrdge Unv. Press, [8] N. Nsan, T. Roughgarden, E. Tardos, and V.V. Vazran, Algorthmc Game Theory, frst ed. Cambrdge Unv. Press, [9] K. Chen and K. Nahrstedt, Pass: An Incentve Compatble Aucton Scheme to Enable Packet Forwardng Servce n MANET, Proc. Int l Conf. Dstrbuted Computng Systems, [10] J. Shnedman and D. Parkes, Specfcaton Fathfulness n Networks wth Ratonal Nodes, Proc. ACM Symp. Prncples of Dstrbuted Computng, [11] Noman Mohammed, Had Otrok, Lngyu Wang, Mourad Debbab and Prabr Bhattacharya, Mechansm Desgn-Based Secure Leader 9

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet International Journal of Wireless Networks and Communications. ISSN 0975-6507 Volume 4, Number 1 (2012), pp. 71-81 International Research Publication House http://www.irphouse.com Using VCG based Designing

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Categories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture

Categories and Subject Descriptors ABSTRACT. General Terms. Keywords 1. INTRODUCTION. C.2.1. [Computer-Communication Networks]: Network Architecture On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Secure Distributed Cluster Formation in Wireless Sensor Networks

Secure Distributed Cluster Formation in Wireless Sensor Networks Secure Dstrbuted Cluster Formaton n Wreless Sensor Networks Kun Sun Intellgent Automaton, Inc. ksun@-a-.com Pa Peng Opsware Inc. ppeng@opsware.com Clff Wang Army Research Offce clff.wang@us.army.ml Peng

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

On Selfishness, Local Information, and Network Optimality: A Topology Control Example

On Selfishness, Local Information, and Network Optimality: A Topology Control Example On Selfshness, Local Informaton, and Network Optmalty: A Topology Control Example Ramakant S. Komal, Allen B. MacKenze, and Petr Mähönen Department of Wreless Networks, RWTH Aachen Unversty, 52072 Aachen

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Energy Saving Techniques in Ad hoc Networks

Energy Saving Techniques in Ad hoc Networks Energy Savng Technques n Ad hoc Networks 1 Energy Savng Technques n Ad hoc Networks R. Durga Bhavan 1, S. Nagaman 2 and V. Asha 3 1 Asst. Professor, Dept. of CSE, R. K. College of Engneerng, Vjayawada,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks

Extending Network Life by Using Mobile Actors in Cluster-based Wireless Sensor and Actor Networks Extendng Networ Lfe by Usng Moble Actors n Cluster-based Wreless Sensor and Actor Networs Nauman Aslam, Wllam Phllps, Wllam Robertson and S. Svaumar Department of Engneerng Mathematcs & Internetworng Dalhouse

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Cognitive Radio Resource Management Using Multi-Agent Systems

Cognitive Radio Resource Management Using Multi-Agent Systems Cogntve Rado Resource Management Usng Mult- Systems Jang Xe, Ivan Howtt, and Anta Raja Department of Electrcal and Computer Engneerng Department of Software and Informaton Systems The Unversty of North

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Amobile ad hoc network is a group of mobile nodes that do

Amobile ad hoc network is a group of mobile nodes that do IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 5, MAY 007 459 Game Theoretc Analyss of Cooperaton Stmulaton and Securty n Autonomous Moble Ad Hoc Networks We Yu and K.J. Ray Lu, Fellow, IEEE Abstract

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

A Misbehavior Detection System for Vehicular Delay Tolerant Networks

A Misbehavior Detection System for Vehicular Delay Tolerant Networks A Msbehavor Detecton System for Vehcular Delay Tolerant Networks Ynghu Guo, Sebastan Schldt, Johannes Morgenroth, Lars Wolf IBR, Technsche Unverstät Braunschweg Mühlenpfordstraße 23, 38106, Braunschweg,

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

A Super Peer-based Reputation Scheme for Mobile Computing Environments

A Super Peer-based Reputation Scheme for Mobile Computing Environments A Super Peer-based Reputaton Scheme for Moble Computng Envronments Xu Wu Department of Computer Scence, X an Unversty of Posts and Telecommuncatons, X an 710121, Chna Emal: xrdz2006@163.com Abstract Trust

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Tightly Cooperative Caching Approach in Mobile Ad Hoc Network

Tightly Cooperative Caching Approach in Mobile Ad Hoc Network Tghtly Cooperatve Cachng Approach n Moble Ad Hoc Network NWE NWE HTAY WIN 1,3, BAO JIANMIN 2, CUI GANG 1, DALAIJARGAL PUREVSUREN 1 School of Computer Scence and Technology 1, College of Internet of Thngs

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

A Proactive Non-Cooperative Game-theoretic Framework for Data Replication in Data Grids

A Proactive Non-Cooperative Game-theoretic Framework for Data Replication in Data Grids Eghth IEEE Internatonal Symposum on Cluster Computng and the Grd A Proactve Non-Cooperatve Game-theoretc Framewor for Data Replcaton n Data Grds Al H. Elghran, Student Member, IEEE, Ry Subrata, Member,

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Irregular Cellular Learning Automata and Its Application to Clustering in Sensor Networks

Irregular Cellular Learning Automata and Its Application to Clustering in Sensor Networks Irregular Cellular Learnng Automata and Its Applcaton to Clusterng n Sensor Networks M. Esnaashar 1, M. R. Meybod 1,2 1 Soft Computng Laboratory, Computer Engneerng and Informaton Technology Department

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Mobile Ad Hoc Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Moble Ad Hoc Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, M. LUTFAR RAHMAN 1 Faculty of Scence and Informaton Technology, Daffodl Internatonal

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory U J.T. (: 33- (pr. 0 Optmzaton of Local Routng for Connected odes wth Sngle Output Ports - Part I: Theory Dobr tanassov Batovsk Faculty of Scence and Technology ssumpton Unversty Bangkok Thaland E-mal:

More information

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks

Technical Report. i-game: An Implicit GTS Allocation Mechanism in IEEE for Time- Sensitive Wireless Sensor Networks www.hurray.sep.pp.pt Techncal Report -GAME: An Implct GTS Allocaton Mechansm n IEEE 802.15.4 for Tme- Senstve Wreless Sensor etworks Ans Koubaa Máro Alves Eduardo Tovar TR-060706 Verson: 1.0 Date: Jul

More information

Control strategies for network efficiency and resilience with route choice

Control strategies for network efficiency and resilience with route choice Control strateges for networ effcency and reslence wth route choce Andy Chow Ru Sha Centre for Transport Studes Unversty College London, UK Centralsed strateges UK 1 Centralsed strateges Some effectve

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information