Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Performance Related Security Modelling and Evaluation of RANETs

  • 219 Accesses

  • 1 Citations


An exposition is undertaken on the performance related security modelling and evaluation of a robotic mobile wireless ad hoc networks (RANETs) and associated tradeoffs. It is based on the discrete event simulation analysis of a stable open gated queueing network model with infinite capacity, arbitrary configuration and multiple classes of packets under first-come-first-served and head-of-line rules. In this context, a quantitative case study on the trade-offs between performance and the wired equivalent privacy (WEP) security/selective security protocol is explored, based on generalised exponential transmission times and bursty arrival traffic flows characterised by an Interrupted Compound Poisson Process. Typical numerical experiments are carried out to evaluate the adverse effect of WEP security/selective security on performance and for illustration purposes, assess the adoption of a dual CPU towards performance enhancement of the RANET. A discussion on other vital related aspects such as broadcasting/multicasting and fault localisation in RANETs and their synergy with cognitive radio ad hoc networks (CRAHNs) is included.

This is a preview of subscription content, log in to check access.


  1. 1

    Aguero C. C., Journal M., Ortuno M., Matellan V. (2007) Design and implementation of an ad-hoc routing protocol for mobile robots. Turkish Journal of Electrical Engineering & Computer Sciences 15(2): 307–320

  2. 2

    Ardawi, A. M. H. (2010). Performance modeling and evaluation of ad hoc mobile wireless networks (RMWNs). MSc Thesis, Department of Computing, University of Bradford, UK.

  3. 3

    Asokan, R., & Natarajan, A. M. (2010). Quality of service (QoS) routing in mobile ad hoc networks. In S. Adibi et al. (Eds.), Quality of service architectures for wireless networks: Performance metrics and management (pp. 464–496). USA: Idea Group Inc (IGI).

  4. 4

    Asokan, R. (2010). A review of quality of service (QoS) routing protocols for mobile ad hoc networks. In IEEE Proceedings of ICWCSC 2010 on Wireless Communication and Sensor Computing, pp. 1–6. http://ieeexplore.ieee.org/xpl/freeabsallisp?amumjsp?arnumber=5415903.

  5. 5

    Barka E., Boulmalf M. (2007) On the impact of security on the performance of WLANS. Journal of Communications 2(4): 10–176

  6. 6

    Bhatia, H., Lening, R. B, Srivastava, S., & Sunitha, V. (2007). Application of QNA to analyze the ‘queueing network mobility model’ of MANET. Technical Report, Dhirubhai Ambani Insti tute of Information & Communication Technology, (DAIICT), Gandhinagar, INDIA (pp. 1–6). http://www.sci.utah.edu/~hbhatia/docs/HarshBhatia_BTP.pdf.

  7. 7

    Bhatia, H., Lenin, R. B., Munjal, A., Ramaswamy, S., & Srivastava, S. (2008). A Queueing theoretic framework for modeling and analysis of mobility. In WSNs, PerMIS ’08 proceedings of the 8th workshop on performance metrics for intelligent systems (pp. 248–253). Gaithersburg, Maryland, USA, Aug. 19–21.

  8. 8

    Chowdhury D. D. (2000) High speed LAN technology handbook. Springer, CA, USA

  9. 9

    Das S. M., Hu Y. C., George C. S., Lu L. Y. (2007) Mobility-aware ad hoc routing protocols for networking mobile robot teams. Journal of Communications and Networks 9(3): 296–311

  10. 10

    Fischer W., Meier-Hellstern K. (1993) The Markov-modulated poisson process cookbook. Performance Evaluation 18: 149–171

  11. 11

    Jain, V., & Jain, M. (2006). Queuing network model for link and path availability of ad hoc networks. In Proceedings of 2006 IEEE international conference on wireless and optical communications networks (pp. 1–5). http://www.ncc.org.in/download.php?f=NCC2007/1.3.2.pdf.

  12. 12

    Jain, V., Lenin, R.B., & Srivastava, S. (2007). Modeling MANETs using queueing networks. In Proceedings of NCC 2007, January 2007, pp. 1–5.

  13. 13

    Kim, S. L., Burgard, W., & Kim, D. E. (2009). Wireless communications in networked robotics. In IEEE Wireless Communications, Guest Editorial (pp. 4–5). http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04804362.

  14. 14

    Kouvatsos D. D. (1988) A Maximum entropy analysis of the G/G/1 queue at equilibrium. Journal of the Operational Research Society 9(2): 183–200

  15. 15

    Kouvatsos D. D. (1994) Entropy maximization and queueing network models. Annals of Operation Research 48: 63–126

  16. 16

    Kouvatsos D. D., Awan I. U. (2003) Entropy maximization and open queueing networks with priorities and blocking. Performance Evaluation 51: 191–227

  17. 17

    Kouvatsos, D. D. (2010). Performance modeling and evaluation of RANETs. PP Presentation at the 1st ETSI Workshop on “NetworkedMobile Wireless Robotics”, Munich, Germany. http://workshop.etsi.org/2010/201010_NetworkedMobileWirelessRobotics/06.

  18. 18

    Kouvatsos, D. D., & Miskeen, G. M. A. (2011). Networked mobile wireless robotics. Technical report DDK-NetPEn 15-02-11, networks and performance engineering (NetPEn) research group (pp. 1–3). Informatics Research Institute (IRI), University of Bradford, UK.

  19. 19

    Lehembre, G. (2005). Wi-Fi Security—WEP, WPA and WPA2 (pp. 2–15). www.hsc.fr/ressources/articles/hakin9_wifi/hakin9wifiEN.pdf.

  20. 20

    Miskeen, G. M. A. (2011). A Portfolio of simulation programs in java for the analysis of arbitrary open G-QNMs. TR-MGMA-5, NetPEn Research Group, Informatics Research Institute (IRI), University of Bradford, Bradford, UK.

  21. 21

    Mkwawa, I. M., & Kouvatsos, D. D. (2011). Broadcasting methods in MANETts: An overview. In D. D. Kouvatsos (Ed.), Network performance engineering—A handbook on onvergent multi-service networks and next generation internet. Lecture Notes in Computer Science (LNCS) (Vol. 5233, pp. 764–783). Berlin, Heidelberg: Springer.

  22. 22

    Molnar, S., Maricza, I., Maricza, I., Daniels, T., Färber, J., Frater, M., et al. (1999). Source characterization in broadband networks. High Speed Networks Laboratory, Technical Report, Department of Telecommunications and Telematics, Technical University of Budapest, Budapest, Hungary. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

  23. 23

    Munjal, A. (2007). Modeling MANETs using queueing networks. Master Thesis Abstract, Dhirubhai Ambani Institute of Information & Communication Technology, (DAIICT), Gandhinagar, India. http://magnet.daiict.ac.in/Theses/AartiMunjalMTech2005_ThesisAbstract.pdf.

  24. 24

    Okamura, H., Kamahara, Y., & Dohi, T. (2007). Estimating markov- modulated compound poisson processes. In Proceedings of ValueTools ’07—Second international conference on performance evaluation methodologies and tools, institute for computer sciences, social informatics and telecommunications engineering (ICST) (pp. 1–8). Brussels, Belgium.

  25. 25

    Ren, Y., Boukerche, A., & Mokdad, L. (2011). Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In Proceedings of IEEE WCNC 2011—The wireless communications and networking conference (WCNC), pp. 1038–1043.

  26. 26

    Robinson, K. P. (2008). Cooperation using a robotic ad hoc network made from bluetooth, J XTA, OSGi and other commercial off the shelf (COTS) products. Masters by Research Thesis, Queensland University of Technology, Australia.

  27. 27

    Salah, M., & Al khateeb, I. (2005). Performance of secure ad hoc sensor networks utilizing IEEE802.11b WEP. In IEEE Proceeding of Systems Communications (pp. 68–72). http://dl.acm.org/citation.cfm?id=1091935.

  28. 28

    Shah, S., & Lenin, R. B. (2007). Performance measures of mobile ad hoc networks using queueing models. Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India. First Stage Thesis Report. http://magnet.daiict.ac.in/magnet_members/MTech/2006/ShahSapan/FirstReport/Draft2.pdf.

  29. 29

    Shah, S., Lenin, R. B., Ramaswamy, S., & Srivastava, S. (2008). Modeling and analysis of mobility in manets for distributed applications. In Proceeding of ICDCIT ’08—Fifth nternational conference on distributed computing and internet technology (pp. 100–108). Berlin, Heidelberg: Springer.

  30. 30

    Sigman, K. (2007). Poisson processes and compound (batch) Poisson processes. Lecture Notes. Columbia University, USA. http://www.columbia.edu/~ks20/4703-Sigman/4703-07-Notes-PP-NSPP.pdf.

  31. 31

    Steindera M., Sethib A. S. (2004) Survey of fault localization techniques in computer networks. Science of Computer Programming 53: 165–194

  32. 32

    Suri P. K., Taneja K. (2010) Integrated Queuing based energy-aware computing in MANET. International Journal of Computer Science and Information Security 8(3): 7–10

  33. 33

    Tipper, D., Qian, Y., & Hou, X. (2004). Modelling the time varying behavior of mobile ad hoc networks. In Proceedings of MSWIM 04, Italy, pp. 1–9.

  34. 34

    Wang, Z., Zhou, M., & Ansari, N. (2003). Ad hoc robot wireless communication. In Proceedings of IEEE international conference on systems, man and cybernetics (Vol. 4, pp. 4045–4050).

  35. 35

    Wang Z., Liu L., Zhou M. (2005) Protocols and applications ad hoc robot wireless communication networks: An overview. International Journal of Intelligent Control and Systems 10(4): 296–302

  36. 36

    Wang Q. (2010) Traffic analysis and modeling in wireless sensor networks and their applications on network optimization and anomaly detection. Network Protocols and Algorithms 2(1): 74–92

  37. 37

    Wang, Q. (2010). Traffic analysis, modelling and their applications in energy-constrained wireless sensor networks on network optimization and anomaly detection. Doctoral Thesis, Department of Information Technology and Media, Sweden Mid University, Sundsvall, Sweden.

  38. 38

    Wolter, K., & Reinecke, P. (2010) Performance and security trade off. In A. Aldini (Ed.), Proceedings of SFM 2010, LNCS (Vol. 6154, pp. 135–167). Berlin, Heidelberg, New York: Springer.

  39. 39

    Yau, K. A., Komisarczuk, P., & Teal, P. D. (2009). Cognitive radio-based wireless sensor networks: Conceptual design and open issues. In Proceedings of second IEEE workshop on wireless and internet services (WISe 2009) (pp. 955–962). Zürich, Switzerland.

  40. 40

    Yau, S. S., Yin, Y., & An, H. G. (2009). An adaptive trade-off model for service performance and security in service-based systems. In Proceedings of 2009 IEEE international conference on web services (ICOWS), Los Angeles, CA (pp. 287–294).

  41. 41

    Zorkadis, V. (1994). Security versus performance requirements in data communication systems. In D. Gollmann (Ed.), Lecture Notes in Computer Science, Proceedings of Computer Security–ESORICS 94 (Vol. 875, pp. 19–30). Brighton, U.K.

Download references

Author information

Correspondence to Demetres D. Kouvatsos.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Kouvatsos, D.D., Miskeen, G.M.A. Performance Related Security Modelling and Evaluation of RANETs. Wireless Pers Commun 64, 523–546 (2012). https://doi.org/10.1007/s11277-012-0599-1

Download citation


  • Mobile ad hoc networks (MANETs)
  • Robotic mobile wirelessad hoc networks (RANETs)
  • Gated queueing network models (G-QNMs)
  • Interrupted compound Poisson process (ICPP)
  • Generalised exponential (GE)
  • First-come-first-served (FCFS) rule
  • Head-of-line (HOL) rule
  • Wired equivalent privacy (WEP)
  • Selective security
  • Cognitive radio ad hoc networks (CRAHNs)