• Autonomic trust reasoning enables misbehavior detection in OLSR

      Adnane, Asma; de Sousa Júnior, Rafael Timóteo; Bidan, Christophe; Mé, Ludovic; Supelec; University of Rennes (ACM, 2008)
    • Matching Services with Users in Opportunistic Network Environments

      Smith, Anthony; Berry, Stuart; Hill, Richard; University of Derby (2014-07)
      Opportunistic Networks are a specific type of wireless ad hoc network where there is an absence of a continuous end-to-end path. The proliferation of mobile devices with Wi-Fi capability creates opportunities to forward packets by utilizing nodes as they present themselves. Such a dynamic networking environment enables services to be advertised by propagating from device to device, in order that all users in an area receive them. However, excessive propagation of service advertisements consumes energy from mobile devices, whilst also degrading the users' experience if they receive adverts for services that are misaligned with their personal interests. In this article we propose an architecture for a protocol and an algorithm that facilitates the matching of relevant service adverts with interested recipients in an Opportunistic Networking environment, whilst serving to minimize energy consumption.
    • Measuring efficiency in opportunistic ad hoc networks

      Smith, Anthony; Hill, Richard; University of Derby; University of Derby, Distributed and Intelligent Systems Research Group (2011-11-30)
      Opportunistic Networks are examples of wireless, ad hoc networks where there is an absence of a continuous end-to-end path. The proliferation of mobile device usage creates opportunities for nodes to forward packets in a dynamic way, utilizing nodes as they present themselves. In more conventional, static network infrastructures, it is typical to measure efficiency of message passing between nodes. We review approaches to the measurement of efficiency in networks, and propose a qualitative and quantitative metrics framework and simulation model that would be suitable for the evaluation of performance in opportunistic networks.
    • Multipath optimized link state routing for mobile ad hoc networks

      Yi, Jiazi; Adnane, Asma; David, Sylvain; Parrein, Benoît; University of Nantes, France (Elsevier, 2011-01)
    • A systematic approach for cyber security in vehicular networks

      Ahmad, Farhan; Adnane, Asma; Franqueira, Virginia N. L.; University of Derby (Scientific Research Publishing, 2016-12-30)
      Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and with adjacent infrastructure by exchanging significant messages, such as road accident warnings, steep-curve ahead warnings or traffic jam warnings. However, this communication and other assets involved are subject to major threats and provide numerous opportunities for attackers to launch several attacks and compromise security and privacy of vehicular users. This paper reviews the cyber security in VANET and proposes an asset-based approach for VANET security. Firstly, it identifies relevant assets in VANET. Secondly, it provides a detailed taxonomy of vulnerabilities and threats on these assets, and, lastly, it classifies the possible attacks in VANET and critically evaluates them.
    • Towards a framework for the evaluation of efficient provisioning in opportunistic ad-hoc networks

      Smith, Anthony; Hill, Richard; University of Derby, Distributed and Intelligent Systems Research Group (IEEE Computer Society, 2011/20/26)
      In wireless ad-hoc networks where there is no continuous end-to-end path we move into the area of opportunistic networks. Forwarding messages via any encountered nodes, such as the mobile devices that many users already carry. Normally we are looking for the most efficient method of passing these messages across the network, but how do we evaluate the different methods. We propose to develop a framework that will allow us to evaluate how efficiently provisioning has been performed. This has been explored with the use of a case study and two benchmark protocols, Epidemic and PRoPHET. We present the results of this analysis and describe an approach to the validation of this through simulation.
    • Trail-using ant behavior based energy-efficient routing protocol in wireless sensor networks.

      Jung, Soon-gyo; Kang, Byungseok; Yeoum, Sanggil; Choo, Hyunseung; Sungkyunkwan University (SAGE Publications, 2016-04-06)
      Swarm Intelligence (SI) observes the collective behavior of social insects and other animal societies. Ant Colony Optimization (ACO) algorithm is one of the popular algorithms in SI. In the last decade, several routing protocols based on ACO algorithm have been developed for Wireless Sensor Networks (WSNs). Such routing protocols are very flexible in distributed system but generate a lot of additional traffic and thus increase communication overhead. This paper proposes a new routing protocol reducing the overhead to provide energy efficiency. The proposed protocol adopts not only the foraging behavior of ant colony but also the trail-using behavior which has never been adopted in routing. By employing the behaviors, the protocol establishes and manages the routing trails energy efficiently in the whole network. Simulation results show that the proposed protocol has low communication overhead and reduces up to 55% energy consumption compared to the existing ACO algorithm.
    • Trust-Based countermeasures for securing OLSR protocol

      Adnane, Asma; Bidan, Christophe; de Sousa Júnior, Rafael Timóteo; Supelec; University of Rennes (2009)
    • Trust-based security for the OLSR routing protocol

      Adnane, Asma; Bidan, Christophe; de Sousa Júnior, Rafael Timóteo (Elsevier, 2013-04-20)