23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7-10 Industrial Communication Systems<br />

for transport layer where the TCP is modified to respond appropriately to unreliable wireless environment<br />

by avoiding retransmission and effective congestion control [KK98]. In addition, power-efficient<br />

strategies are also suggested for the application layer where the operating system (OS) is modified to<br />

handle the hardware and software more efficiently [LS98].<br />

7.4.3 topology and Connectivity<br />

In most of the ad hoc networks, P2P <strong>communication</strong> topology is required, which means each node in<br />

the network must be able to communicate with any other node in the same network. To attain this,<br />

connectivity between the entire networks must be provided all the times. But the limited resources,<br />

uncontrolled mobility of nodes, and the characteristics of wireless <strong>communication</strong> channels make it a<br />

challenging issue. Topology and connectivity control can have a significant impact on the performance<br />

of wireless networks. Such algorithms are used to enhance energy efficiency, minimize interference, and<br />

increase effective rate by adjusting transmission power.<br />

Topology control algorithms can be categorized into centralized and distributed [SBC03]. Centralized<br />

approach need to have the global knowledge of the network and works well in static networks. Distributed<br />

approach uses localized information only and works well in mobile networks. There are many issues<br />

with topology control algorithms. Optimal transmit power computation is one of the main challenges.<br />

If high transmit power is used, interference /contention range is increased. If lower power is used, it may<br />

result in a disconnected network. Furthermore, adjusting power level may introduce additional latency.<br />

In centralized approach, where all the information is sent to a central authority, reducing processing and<br />

<strong>communication</strong> overhead is a challenging task. Efficient topology control algorithms which take node<br />

mobility into account still require a great deal of attention.<br />

7.4.4 Security<br />

Security is required for secure <strong>communication</strong> and to maintain desired network performance in ad<br />

hoc network [YLYLZ04]. Security issues in ad hoc networks are more challenging than in conventional<br />

networks because of open access mechanism and P2P architecture, no infrastructure, highly<br />

dynamic network topology, publicly known protocols, stringent resource constraints, and unattended<br />

operation.<br />

Security for ad hoc networks entails key establishment and trust setup, secrecy and authentication,<br />

privacy, secure routing, intrusion, and secure data aggregation [PSW04]. Three main goals of security<br />

as discussed in [DPT03] are to maintain confidentiality (data protection), integrity (unauthorized data<br />

tampering), and availability (service availability anywhere and anytime). Common security threats outlined<br />

in [PSS00] and discussed in [DPT03] include “stealing confidential information, tampering information,<br />

resource stealing, and denial-of- service attacks.”<br />

Following is the summary of the open research opportunities and challenges in the security implementation<br />

for ad hoc networks, which are discussed in [ZFZ08,R96,RFLW96]. Because of the wireless<br />

environment and lack of firewall-like devices, the eavesdroppers can spoof the ongoing <strong>communication</strong><br />

that compromises confidentiality, privacy, and integrity of data. On the network layer, malicious<br />

nodes can introduce denial-of-service attacks, holes, and tamper information compromising basic<br />

security primitives, for example, availability and integrity of data. Therefore, designing secure routing<br />

protocols is one of the challenging areas in ad hoc networks. [T97] and [SMG97] are a few efforts<br />

in this direction. The major challenge is the authentication of the public keys, which can be solved by<br />

using identity-based cryptography. As the security operations are very frequent in ad hoc networks,<br />

it requires an efficient symmetric key algorithm for authentication and encryption. Key revocation<br />

should happen when a node is declared as malicious or when it is under compromise node attack.<br />

Although different key revocation schemes are working, still there is a demand for universal key<br />

revocation scheme [ZFZ08].<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!