An exposition is undertaken on the performance related security modelling and evaluation of a robotic mobile wireless ad hoc networks (RANETs) and associated tradeoffs. It is based on the discrete event simulation analysis of a stable open gated queueing network model with infinite capacity, arbitrary configuration and multiple classes of packets under first-come-first-served and head-of-line rules. In this context, a quantitative case study on the trade-offs between performance and the wired equivalent privacy (WEP) security/selective security protocol is explored, based on generalised exponential transmission times and bursty arrival traffic flows characterised by an Interrupted Compound Poisson Process. Typical numerical experiments are carried out to evaluate the adverse effect of WEP security/selective security on performance and for illustration purposes, assess the adoption of a dual CPU towards performance enhancement of the RANET. A discussion on other vital related aspects such as broadcasting/multicasting and fault localisation in RANETs and their synergy with cognitive radio ad hoc networks (CRAHNs) is included.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Aguero C. C., Journal M., Ortuno M., Matellan V. (2007) Design and implementation of an ad-hoc routing protocol for mobile robots. Turkish Journal of Electrical Engineering & Computer Sciences 15(2): 307–320
Ardawi, A. M. H. (2010). Performance modeling and evaluation of ad hoc mobile wireless networks (RMWNs). MSc Thesis, Department of Computing, University of Bradford, UK.
Asokan, R., & Natarajan, A. M. (2010). Quality of service (QoS) routing in mobile ad hoc networks. In S. Adibi et al. (Eds.), Quality of service architectures for wireless networks: Performance metrics and management (pp. 464–496). USA: Idea Group Inc (IGI).
Asokan, R. (2010). A review of quality of service (QoS) routing protocols for mobile ad hoc networks. In IEEE Proceedings of ICWCSC 2010 on Wireless Communication and Sensor Computing, pp. 1–6. http://ieeexplore.ieee.org/xpl/freeabsallisp?amumjsp?arnumber=5415903.
Barka E., Boulmalf M. (2007) On the impact of security on the performance of WLANS. Journal of Communications 2(4): 10–176
Bhatia, H., Lening, R. B, Srivastava, S., & Sunitha, V. (2007). Application of QNA to analyze the ‘queueing network mobility model’ of MANET. Technical Report, Dhirubhai Ambani Insti tute of Information & Communication Technology, (DAIICT), Gandhinagar, INDIA (pp. 1–6). http://www.sci.utah.edu/~hbhatia/docs/HarshBhatia_BTP.pdf.
Bhatia, H., Lenin, R. B., Munjal, A., Ramaswamy, S., & Srivastava, S. (2008). A Queueing theoretic framework for modeling and analysis of mobility. In WSNs, PerMIS ’08 proceedings of the 8th workshop on performance metrics for intelligent systems (pp. 248–253). Gaithersburg, Maryland, USA, Aug. 19–21.
Chowdhury D. D. (2000) High speed LAN technology handbook. Springer, CA, USA
Das S. M., Hu Y. C., George C. S., Lu L. Y. (2007) Mobility-aware ad hoc routing protocols for networking mobile robot teams. Journal of Communications and Networks 9(3): 296–311
Fischer W., Meier-Hellstern K. (1993) The Markov-modulated poisson process cookbook. Performance Evaluation 18: 149–171
Jain, V., & Jain, M. (2006). Queuing network model for link and path availability of ad hoc networks. In Proceedings of 2006 IEEE international conference on wireless and optical communications networks (pp. 1–5). http://www.ncc.org.in/download.php?f=NCC2007/1.3.2.pdf.
Jain, V., Lenin, R.B., & Srivastava, S. (2007). Modeling MANETs using queueing networks. In Proceedings of NCC 2007, January 2007, pp. 1–5.
Kim, S. L., Burgard, W., & Kim, D. E. (2009). Wireless communications in networked robotics. In IEEE Wireless Communications, Guest Editorial (pp. 4–5). http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04804362.
Kouvatsos D. D. (1988) A Maximum entropy analysis of the G/G/1 queue at equilibrium. Journal of the Operational Research Society 9(2): 183–200
Kouvatsos D. D. (1994) Entropy maximization and queueing network models. Annals of Operation Research 48: 63–126
Kouvatsos D. D., Awan I. U. (2003) Entropy maximization and open queueing networks with priorities and blocking. Performance Evaluation 51: 191–227
Kouvatsos, D. D. (2010). Performance modeling and evaluation of RANETs. PP Presentation at the 1st ETSI Workshop on “NetworkedMobile Wireless Robotics”, Munich, Germany. http://workshop.etsi.org/2010/201010_NetworkedMobileWirelessRobotics/06.
Kouvatsos, D. D., & Miskeen, G. M. A. (2011). Networked mobile wireless robotics. Technical report DDK-NetPEn 15-02-11, networks and performance engineering (NetPEn) research group (pp. 1–3). Informatics Research Institute (IRI), University of Bradford, UK.
Lehembre, G. (2005). Wi-Fi Security—WEP, WPA and WPA2 (pp. 2–15). www.hsc.fr/ressources/articles/hakin9_wifi/hakin9wifiEN.pdf.
Miskeen, G. M. A. (2011). A Portfolio of simulation programs in java for the analysis of arbitrary open G-QNMs. TR-MGMA-5, NetPEn Research Group, Informatics Research Institute (IRI), University of Bradford, Bradford, UK.
Mkwawa, I. M., & Kouvatsos, D. D. (2011). Broadcasting methods in MANETts: An overview. In D. D. Kouvatsos (Ed.), Network performance engineering—A handbook on onvergent multi-service networks and next generation internet. Lecture Notes in Computer Science (LNCS) (Vol. 5233, pp. 764–783). Berlin, Heidelberg: Springer.
Molnar, S., Maricza, I., Maricza, I., Daniels, T., Färber, J., Frater, M., et al. (1999). Source characterization in broadband networks. High Speed Networks Laboratory, Technical Report, Department of Telecommunications and Telematics, Technical University of Budapest, Budapest, Hungary. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.3030.
Munjal, A. (2007). Modeling MANETs using queueing networks. Master Thesis Abstract, Dhirubhai Ambani Institute of Information & Communication Technology, (DAIICT), Gandhinagar, India. http://magnet.daiict.ac.in/Theses/AartiMunjalMTech2005_ThesisAbstract.pdf.
Okamura, H., Kamahara, Y., & Dohi, T. (2007). Estimating markov- modulated compound poisson processes. In Proceedings of ValueTools ’07—Second international conference on performance evaluation methodologies and tools, institute for computer sciences, social informatics and telecommunications engineering (ICST) (pp. 1–8). Brussels, Belgium.
Ren, Y., Boukerche, A., & Mokdad, L. (2011). Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In Proceedings of IEEE WCNC 2011—The wireless communications and networking conference (WCNC), pp. 1038–1043.
Robinson, K. P. (2008). Cooperation using a robotic ad hoc network made from bluetooth, J XTA, OSGi and other commercial off the shelf (COTS) products. Masters by Research Thesis, Queensland University of Technology, Australia.
Salah, M., & Al khateeb, I. (2005). Performance of secure ad hoc sensor networks utilizing IEEE802.11b WEP. In IEEE Proceeding of Systems Communications (pp. 68–72). http://dl.acm.org/citation.cfm?id=1091935.
Shah, S., & Lenin, R. B. (2007). Performance measures of mobile ad hoc networks using queueing models. Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India. First Stage Thesis Report. http://magnet.daiict.ac.in/magnet_members/MTech/2006/ShahSapan/FirstReport/Draft2.pdf.
Shah, S., Lenin, R. B., Ramaswamy, S., & Srivastava, S. (2008). Modeling and analysis of mobility in manets for distributed applications. In Proceeding of ICDCIT ’08—Fifth nternational conference on distributed computing and internet technology (pp. 100–108). Berlin, Heidelberg: Springer.
Sigman, K. (2007). Poisson processes and compound (batch) Poisson processes. Lecture Notes. Columbia University, USA. http://www.columbia.edu/~ks20/4703-Sigman/4703-07-Notes-PP-NSPP.pdf.
Steindera M., Sethib A. S. (2004) Survey of fault localization techniques in computer networks. Science of Computer Programming 53: 165–194
Suri P. K., Taneja K. (2010) Integrated Queuing based energy-aware computing in MANET. International Journal of Computer Science and Information Security 8(3): 7–10
Tipper, D., Qian, Y., & Hou, X. (2004). Modelling the time varying behavior of mobile ad hoc networks. In Proceedings of MSWIM 04, Italy, pp. 1–9.
Wang, Z., Zhou, M., & Ansari, N. (2003). Ad hoc robot wireless communication. In Proceedings of IEEE international conference on systems, man and cybernetics (Vol. 4, pp. 4045–4050).
Wang Z., Liu L., Zhou M. (2005) Protocols and applications ad hoc robot wireless communication networks: An overview. International Journal of Intelligent Control and Systems 10(4): 296–302
Wang Q. (2010) Traffic analysis and modeling in wireless sensor networks and their applications on network optimization and anomaly detection. Network Protocols and Algorithms 2(1): 74–92
Wang, Q. (2010). Traffic analysis, modelling and their applications in energy-constrained wireless sensor networks on network optimization and anomaly detection. Doctoral Thesis, Department of Information Technology and Media, Sweden Mid University, Sundsvall, Sweden.
Wolter, K., & Reinecke, P. (2010) Performance and security trade off. In A. Aldini (Ed.), Proceedings of SFM 2010, LNCS (Vol. 6154, pp. 135–167). Berlin, Heidelberg, New York: Springer.
Yau, K. A., Komisarczuk, P., & Teal, P. D. (2009). Cognitive radio-based wireless sensor networks: Conceptual design and open issues. In Proceedings of second IEEE workshop on wireless and internet services (WISe 2009) (pp. 955–962). Zürich, Switzerland.
Yau, S. S., Yin, Y., & An, H. G. (2009). An adaptive trade-off model for service performance and security in service-based systems. In Proceedings of 2009 IEEE international conference on web services (ICOWS), Los Angeles, CA (pp. 287–294).
Zorkadis, V. (1994). Security versus performance requirements in data communication systems. In D. Gollmann (Ed.), Lecture Notes in Computer Science, Proceedings of Computer Security–ESORICS 94 (Vol. 875, pp. 19–30). Brighton, U.K.
About this article
Cite this article
Kouvatsos, D.D., Miskeen, G.M.A. Performance Related Security Modelling and Evaluation of RANETs. Wireless Pers Commun 64, 523–546 (2012). https://doi.org/10.1007/s11277-012-0599-1
- Mobile ad hoc networks (MANETs)
- Robotic mobile wirelessad hoc networks (RANETs)
- Gated queueing network models (G-QNMs)
- Interrupted compound Poisson process (ICPP)
- Generalised exponential (GE)
- First-come-first-served (FCFS) rule
- Head-of-line (HOL) rule
- Wired equivalent privacy (WEP)
- Selective security
- Cognitive radio ad hoc networks (CRAHNs)