Browsing by Author "Fu, H."
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
Item An Enhanced Multi-Channel MAC for the IEEE 1609.4 Based Vehicular Ad Hoc Networks(INFOCOM IEEE Conference on Computer Communications Workshops, 2010) Wang, Q.; Leng, S.; Fu, H.; Zang, Y.; Weerasinghe, K.G.H.D.This paper proposes a multi-channel MAC scheme for Vehicular Ad Hoc Networks (VANETs), which dynamically adjusts the intervals of Control Channel (CCH) and Service Channels (SCHs). Markov modeling is conducted to optimize the intervals based on the traffic condition. The scheme also introduces a multi-channel coordination mechanism to provide the contention-free access in SCHs. Theoretical analysis and simulation results show that the proposed scheme is able to help IEEE 1690.4 MAC improve the saturation throughput of SCHs significantly, while maintaining the prioritized transmission of critical safety information on the CCH.Item Analysis of key management in wireless sensor networks(IEEE EIT?07, 2007) Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasinghe, K.G.H.D.; Fu, H.A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors as the level of secrecy of the data being captured, the amount of computation done to the captured data, and the criticality of the data being available when needed. This paper aims to identify the various types of WSNs in existence today, review some of the key management schemes proposed by the community, and map each type of WSN to a set of these key management schemes that would be ideal to handle the security requirements for that network. Through our research, we aide in solving the question as to whether or not there exists any specific security concerns which are prevalent in a majority of WSNs in use today.Item Anonymous service access for Vehicular Ad hoc Networks(Information Assurance and Security (IAS), 2010 Sixth International Conference, 2011) Weerasinghe, K.G.H.D.; Fu, H.; Leng, S.Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel location privacy enhancement protocol for VANETs. Firstly, we propose an Anonymous Online Service Access (AOSA) protocol. Secondly, we analytically evaluate the anonymity and the unlinkability of the proposed protocol. Finally, a series of simulation studies are conducted to evaluate the performance of our protocol in the real VANET environments such as Manhattan and Urban scenarios. According to analytical evaluation and simulations, our protocol provides higher level of anonymity and location privacy for on-line service access applications. Simulation results further show that our protocol is feasible and produces better performance in real VANET environments by producing higher success ratio and smaller delay.Item Enhancement of IEEE 802.11 modules in ns-2 and performance evaluation with error rate(Proceedings of 43rd Annual Simulation Symposium (ANSS), 2010) Jin, K.; Weerasinghe, K.G.H.D.; Fu, H.Ns-2 is being widely utilized to evaluate the wired and wireless networks on many research activities. The ns-2.33 distribution version includes an extension of IEEE 802.11 module which improves the core functions of 802.11 MAC and PHY protocols. Although this extension version provides well-designed MAC and PHY functions, it has some significant shortcomings in handling packet errors. When a packet error rate, one of the most important performance parameters in wireless network simulations, applies to the extension, a simulation program is interrupted with some fatal errors. Besides, as the packet errors are handled on the PHY layer in this version, MAC layer loses its own right of treating the packet errors. In this paper, we modify the extension version to correct the mentioned problems and verify the behavior of our modified version by simulation work. And also, we perform the ns-2 simulation to investigate the impact of error rate on IEEE 802.11p-based vehicular ad-hoc networks.Item ESAP: Efficient and scalable authentication protocol with conditional privacy for secure vehicular communications(GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 2010) Weerasinghe, K.G.H.D.; Fu, H.Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. This paper proposes an Efficient and Scalable Authentication Protocol (ESAP) that provides anonymity and conditional privacy for vehicular ad hoc networks based on the self-generated certificates. The proposed ESAP provides all required security services such as authentication, message integrity, non-repudiation and revoking malicious vehicles in an efficient and scalable manner while supporting user anonymity, location privacy and conditional privacy. Moreover, accuracy of this protocol does not depend on the availability of Road Side Units.Item Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation(International Journal of Software Engineering and Its Applications, 2008) Weerasinghe, K.G.H.D.; Fu, H.A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. In [9], we proposed a solution to identifying and preventing the cooperative black hole attack. Our solution discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. In this paper, via simulation, we evaluate the proposed solution and compare it with other existing solutions in terms of throughput, packet loss percentage, average end-toend delay and route request overhead. The experiments show that (1) the AODV greatly suffers from cooperative black holes in terms of throughput and packet losses, and (2) our solution proposed in [9] presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution proposed in [9] can accurately prevent the cooperative black hole attacks.Item Verifying position and velocity for vehicular ad-hoc networks(Security and Communication Networks, 2011) Weerasinghe, K.G.H.D.; Tackett, R.; Fu, H.In the near future, vehicle-to-vehicle and vehicle-to-roadside infrastructure communications will enable numerous applications, such as collision avoidance, traffic management, location-based services, and infotainment for the automobile field. Position and velocity play important roles in these applications such as collision avoidance. Forged position or velocity information will make a severe impact on both performance and security of the vehicular ad-hoc network (VANET). The main challenges in developing secure position and velocity schemes for VANETs are the highly dynamic environment and cost constraints. In this paper, we propose a position and velocity verification scheme. Then via ns-2, we simulate the proposed scheme in various vehicular mobility environments including rural, urban and Manhattan. Finally, we evaluate the proposed scheme for both position and velocity verifications with automotive grade differential global positioning system (DGPS) and intentionally induced errors as well. The performance evaluation results show that (1) our scheme is very precise in both position and velocity verifications and (2) the proposed scheme is very robust in position verification for rural, urban and Manhattan scenarios even if the introduced errors are in the order of 10?m. Copyright ? 2010 John Wiley & Sons, Ltd.