SATNAC 2007 Conference Papers

Network Planning & General Topics

Title:                   Improving End-to-End Delay for Real-time Multimedia Services in Mobile Ad-hoc Networks

Authors:              Jacobus Boshoff (North-West University),
Albertus Helberg (North-West University) 

Abstract:             In a Mobile Ad-hoc Network (MANET), no fixed access points are present and thus there exists no physical or fixed routing infrastructure. This forces each node in a MANET to act not only as a host, but also as a router. Routing is a critical factor for the effective operation of a MANET. Many proposed MANET routing protocols are best effort protocols and do not consider the quality of service that can be provided by the routes that are used. Modern real-time multimedia applications often require strict bandwidth and delay guarantees. We extend the AODV routing protocol for MANETs to consider end-to-end delay requests from applications. Voice and video services are now able to request the maximum delay that the paths it will use should provide. Stationary and Mobile Ad-hoc Networks are simulated in OPNET and results prove that the end-to-end delay is greatly improved for these real-time services. The packet delivery fraction is also improved in most scenarios, thus, selected routes are more reliable than before.


Title:                   A biomimetic ranking system for energy constrained mobile wireless sensor networks

Authors:              Andrew Markham (University of Cape Town),
Andrew Wilkinson (University of Cape Town) 

Abstract:             Routing in highly mobile, energy constrained wireless networks remains an open research area. The majority of energy aware protocols are designed for stationary networks, and conversely, mobile ad hoc protocols rarely incorporate information about node energy. Obtaining global information about energy distribution across the network is wasteful of scarce resources, so we introduce a ranking system based on social dominance hierarchies found in nature. The Adaptive Social Hierarchy (ASH) is a simple means of assessing node rank, utilizing only local information. Both single-copy and multi-copy routing protocols using our ranking system are presented. As an application, we consider equipping a wide variety of wild animals with wireless collars. We also show how a simple cross-layer protocol can be constructed which further conserves energy of low level nodes.


Title:                   Lagrangian Relaxation as a solution approach to solving the Survivable Multi-Hour Network Design Problem

Authors:              Fanie Terblanche (North-West University),
Giel Hattingh (North-West University), R. Wessaly (Konrad-Zuse-Institute Berlin, Germany)

Abstract:             Survivable multi-hour network design aims at finding a cost efficient network design that is robust enough to operate under varying traffic requirements as well as in the case of single link failure. Based on a mixed-integer programming formulation, we present a simple heuristic which employs dual information from a Lagrangian relaxation. Computational results are compared to a Branch-and-Cut approach for experimental data.


Title:                   Framework for the Establishment of a Honeynet

Authors:              Namosha Veerasamy (University of Pretoria),
Jan Eloff (University of Pretoria) 

Abstract:             Honeypots are decoy machines that are placed on the network to attract attackers, whilst also distracting them from more important targets. Honeypots are thus an ideal medium for collecting data that can later be studied to analyse attackers’ actions and motives. As a decoy and data collection tool honeypots have become a useful security resource. A Honeynet consist of a number of honeypots and can thus be used to compare attack data, experiment with different setups and gather more information. However to successfully set up a Honeynet a number of design, architectural and implementation considerations need to be taken. The aim of this paper is to provide a framework to guide the establishment of a Honeynet.


Title:                   Implementing Honeypots as Part of a Simple Cost Effective Wireless Intrusion Detection System

Authors:              Harry Velupillai (CSIR),
Renier Van Heerden (CSIR), Johannes Vorster (CSIR)

Abstract:             Wireless networks face innovative intrusion methods that have never been focused on wired networks. This paper describes a simple inexpensive way to implement a wireless intrusion detection system. The system takes advantage of the unique features of wireless networks to implement the wired network design of a honeypot. The paper also provides a script that allows the Atheros chipset to be modified to implement multiple wireless access points on one wireless card.

< Back to Conference Paper Topics