Research on Survivability of Mobile Ad-hoc Network

DOI: 10.4236/jsea.2009.21008   PDF   HTML     6,255 Downloads   12,077 Views   Citations


In this paper, we analyze the survivability of Mobile Ad Hoc Network systemically and give a detailed description of the survivability issues related to the MANET. We begin our work with analyzing the requirements of survivability of ad hoc network, and then we classify the impacts that affect survivability into three categories: dynamic topology, faults and attacks. The impacts of these factors are analyzed individually. A simulation environment for the MANET towards survivability is designed and implemented as well. Experiments that under the requirements and the impacts we de-clared are done based on this environment.

Share and Cite:

Y. Zhou, C. Xia, H. Wang and J. Qi, "Research on Survivability of Mobile Ad-hoc Network," Journal of Software Engineering and Applications, Vol. 2 No. 1, 2009, pp. 50-54. doi: 10.4236/jsea.2009.21008.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] P. Papadimitratos and Z. Haas, “Handbook of ad hoc wireless networks,” chapter Securing mobile ad hoc networks, CRC Press, 2002.
[2] F. Adelstein, S. K. S. Gupta, and G. G. Richard III, “Funda-mentals of mobile and pervasive computing,” McGraw-Hill, 2005.
[3] D. Djenouri, L. Khelladi, and A. N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications surveys & tutorials, 7(4): pp. 2-28, 2005.
[4] M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, 6(3): pp. 106-107, 2002.
[5] Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless personal communications: an international journal, 29 (3-4): pp. 367-388, 2004.
[6] K. Paul, R. R. Choudhuri, and S. Bandyopadhyay, “Survivability analysis of ad hoc wireless network architecture,” Proceedings of the IFIP-TC6/European Commission International Workshop on Mobile and Wireless Communication Networks, pp. 31-46, May 16-17, 2000.
[7] J. Short, R. Bagrodia, and L. Kleinrock, “Mobile wireless network system simulation,” Wireless Network Journal, Vol. 1, No. 4, 1995.
[8] R. J. Ellison, D. A. Fisher, and R. C. Linger, “An approach to survivable systems,” In: NATO IST Symposium on Protecting Information Systems in the 21st Century, 1999.
[9] M. S. Deutsch and R. R.Willis, “Software quality engineering: A total technical and management approach,” IST Symposium on Protecting Information Systems in the 21st Century, 1999, Englewood Cliffs, NJ: Prentice- Hall, 1988.
[10] B. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, “Survivable network systems: An emerging discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997.
[11] D. Moitrasoumyo and L. K. Suresh, “A simulation model of managing survivability of network of emergent Systems,” [J], TechniealRePort CMU/SEI-2000-TR-020, 2000.
[12] K. J. Sanjay, M. W. Jeannette, and C. L. Richard, “Survivability Analysis of Network Spesifications,” In: Workshop on Depended ability Despite Malicious Fault, 2000 Intemational Conefreneeon Dependable Systemsand Networks (DSN2000); 2000, NewYork USA: IEEE ComPuterSoeiety: 2000, June 25-28, 2000.
[13] R. W. Makr, “The quantitative impact of survivable network architectural on service availbaility,” [J], IEEE Communications Magazine, 36(5): pp. 71-77, 1998.
[14] D. Y. Chen, S. Garg, and K. S. Trivedi, “Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks,” Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, Atlanta, Georgia, USA, pp. 28-28, September 2002.
[15] Dahlberg, T. S. Ramaswamy, and D. Tipper, “Issues in the survivability of wireless networks,” Proceedings IEEE Mobile and Wireless Communication Networks Workshop, May 1997.
[16] B.Wu, J. M. Chen, and J. Wu, “A survey of attack and countermeasures in mobile ad hoc networks,” Wireless Network Security, Springer US, pp. 103-135, 2007.
[17] G. F. Riley, “The georgia tech network simulator,” In Proceedings of the ACM SIGCOMM, New York, pp. 5-12, August 2003.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.