This class will survey current research in
wireless communication networks. These types of networks have been growing
exponentially in the past several years and include a host of different network
types: ad hoc, cell phone, access point, sensor, etc. The class will build
understanding of all layers of wireless networking and the interactions between
them (including: physical, data link, medium access control, routing,
transport, and application). The topics of security, energy efficiency,
mobility, scalability, and their unique characteristics in wireless networks
will be discussed.
The class will be composed of two parts. In the first part, several different
lecturers (including guests from outside of JHU) will provide an introduction
to the field. The second part will be structured as a research seminar
consisting of class discussions of research papers. Prerequisites: 600.344/444
& 600.363/463.
[Algorithms, Systems or Analysis],
3 credits
Instructor: Dr. Baruch Awerbuch
Class Schedule: Mon, and Wed from
Room: Shaffer 300
Office Hours: Time TBA location in
To Join:
Send email to majordomo@cs.jhu.edu with "subscribe cs647" in the
message BODY.
To Post a Message:
Send email to cs647@cs.jhu.edu
Grading: based on attendance,
participation.
Recommended Prerequisites: Object
Oriented Systems, Distributed
Systems, and Networking
Every week we will discuss couple of research papers which are related to our class lecture. The papers will be posted here on the website. Please read these papers carefully and be prepared to discuss them during class.
Physical and MAC layer
MACAW: A Media Access Protocol for Wireless LANs, Bharghavan, Demers, Shenker, and Zhang
Does
the IEEE 802.11 MAC Protocol Work Well in Multihop
Wireless Ad hoc Networks?, Xu and Saadawi,
Contention-Aware
Admission Control for Ad hoc Networks. Yang and Kravets.
Trans. On
PAC: Perceptive Admission Control for Mobile Wireless Networks. Chakeres and Belding-Royer, Proceedings of QShine 2004.
Opportunistic routing and network coding
Network Layer and Routing
Mobile
IP,
IP
Micro-Mobility Protocols
Highly
Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile
Computers.
Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks. Draves, Padhye and Zill. Proceedings of Mobicom, September 2004
Routing Metrics
The Medium Time Metric: High Throughput Route Selection in Multirate Ad Hoc Wireless Networks
To appear in the Kluwer Mobile Networks and
Applications (MONET) Journal Special Issue on "Internet Wireless Access:
802.11 and Beyond".
Baruch Awerbuch, David Holmer,
and Herbert Rubens.
[Technical Report PDF].
Geographic routing
Geographic
Routing without Location Information
Geographic Routing Made
Practical Young-Jin
Jinyang Li, John Jannotti, Douglas S. J. De Couto, David R. Karger, Robert Morris, A Scalable Location Service for Geographic Ad Hoc Routing, ACM Mobicom 2000, Boston, MA, pages 120-130. Abstract, PostScript, PDF.
Effcient Geographic Routing in Multihop
Wireless Seungjoon
GPRS: Greedy Perimeter Stateteless routing for wireless networks B.Kap and H.T.Kung
L+: Scalable Landmark
Routing and Address Lookup for Multi-hop Wireless Networks
LANMAR: Landmark Routing for Large Scale Wireless Ad Hoc Networks with Group Mobility Guangyu Pei, Mario Gerla and Xiaoyan Hong
Wireless Hierarchical Routing Protocol with Group Mobility (WHIRL) Guangyu Pei, Mario Gerla , Xiaoyan Hong and Ching-Chuan Chiang
Routing and Scalability
Performance
Comparison of Two On-Demand Routing Protocols for Ad hoc Networks.
Location-Aided Routing in Mobile Ad hoc Networks. Ko and Vaidya, Proceedings of MobiCom, October 1998.
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation
Wireless On-demand Network Systems and
Services (WONS 2005), St. Moritz, Switzerland, January 2005
Baruch Awerbuch,
David Holmer,
and Herbert Rubens.
[PDF]
Also: see prseenttion Pulse
Protocol WONS 2005.ppt
The Pulse Protocol: Sensor Network Routing and Power Saving
Military Communications Conference (MILCOM
2004),
Baruch Awerbuch,
David Holmer,
Herbert Rubens, Kirk Chang, and
I.-J. Weng.
[PDF]
The Pulse Protocol: Energy Efficient Infrastructure Access
The 23rd Conference of the IEEE
Communications Society (IEEE Infocom 2004), Hong
Kong, China, March 2004
Baruch Awerbuch,
David Holmer,
and Herbert Rubens. [PDF]
Routing Algorithms
Baruch Awerbuch, Frank Thomson Leighton: A Simple Local-Control Approximation Algorithm for Multicommodity Flow FOCS 1993:
Algorithmic foundations for scalability
Energy issues
Baruch Awerbuch, David Holmer, and Herbert Rubens The Pulse Protocol: Energy Efficient Infrastructure Access The 23rd Conference of the IEEE Communications Society (IEEE Infocom 2004), Hong Kong, China, March 2004. [PDF]
Benjie Chen, Kyle Jamieson, Hari Balakrishnan, and Robert Morris, Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Proceedings of the 7th ACM International Conference on Mobile Computing and Networking (MobiCom '01), Rome, Italy, July 2001, pages 85-96. Abstract, PostScript, PDF.
Sensor Nets
Highly-Resilient,
Energy-Efficient Multipath Routing in Wireless Sensor
Networks
Next Century Challenges: Scalable Coordination in Sensor Networks. Estrin, Govindan, Heidemann, Kumar, Proceedings of Mobicom '99.
Wireless Sensor and Actor Networks: Research Challenges. Ian Akyildiz and Ismail Kasimoglu. Ad hoc Networks Journal, 2(4), 2004.
Negotiation-based Protocols for Disseminating Information in Wireless Sensor Networks. Kulik, Heinzelman, and Balakrishnan, Proceedings of Mobicom, August 1999
Routing Security
A Survey of Secure Wireless Ad Hoc
Routing (Survey)
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
SecureComm 2005 -
First International Conference on Security and Privacy for Emerging Areas in
Communication Networks, September 2005.
Baruch Awerbuch, Reza Curtmola,
David Holmer,
Cristina Nita-Rotaru, and Herbert
Rubens.
[PDF]
Provably Competitive Adaptive Routing
IEEE Infocom
2005 - The 24th Conference of the IEEE Communications Society, March 2005.
Baruch Awerbuch, David Holmer, Robert Kleinberg, and
Herbert Rubens.
[PDF].
Secure Multi-hop Infrastructure Access
NDSS 2005
Wireless and Mobile Security Workshop,
Baruch Awerbuch, Reza Curtmola,
David Holmer,
Cristina Nita-Rotaru, and Herbert
Rubens.
[PDF]
Adrian Perrig, Yih-Chun Hu and Dave Johnson. Wormhole Attacks in Wireless Networks (PDF). IEEE Journal on Selected Areas in Communications (JSAC).
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe 2003), pp. 30-40, ACM, San Diego, CA, September 2003. Slightly revised. (Proceedings Version)
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet
Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the Twenty-Second Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM 2003), vol. 3,
pp. 1976-1986,
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, ACM, Atlanta, GA, September 2002
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Efficient Security Mechanisms for Routing Protocols. Proceedings of the Tenth Annual Network and Distributed System Security Symposium (NDSS 2003), pp. 57-73, ISOC, San Diego, CA, February 2003. Slightly revised. (Proceedings version)
Trust and reputation systems
Baruch Awerbuch and Boaz Patt-Shamir
and David Peleg and Mark Tuttle, Collaboration of
Untrusting Peers Proc. of ACM conference on Electronic Commerce (EC), may,
2004. [PDF]
Baruch Awerbuch and Boaz Patt-Shamir
and David Peleg and Mark Tuttle, Adaptive
Collaboration in Peer-to-Peer Systems Proc. of ICDCS [PDF]
Baruch Awerbuch and Boaz Patt-Shamir
and David Peleg and Mark Tuttle, Improved
Recommendation Systems [PDF]
Sepandar D. Kamvar,
Sonja Buchegger and Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad-hoc Networks
Incentives, mechanisms, game theory
Sheng Zhong, Li (Erran) Li , Yanbin Grace Liu, Yang Richard Yan, On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks [PDF] [PPT]
Physical and link level issues
B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly, Opportunistic Media Access for Multirate Ad Hoc Networks MOBICOM’02, September 23-26, 2002, Atlanta, Georgia, USA. [PDF]
Mingming Lu,
More papers on security
Part 1: Overview and Basic concepts
Part
2: Secure Ad Hoc Networks Architecture and Intrusion detection
Part 3: Secure Routing
Part 4: Secure MAC protocol, node
misbehavior detection and handling
Part 5: Key Management and Authentication
Part 6: Others
___________________________________________________________________________
Lecture II - Overview - Part II
Lecture III - Wireless Transmission - Part I
Lecture IV & V - Wireless Transmission - Part II
Lecture VI - Introduction to Ad hoc Networks
Lecture VII - Medium
Access Control For Ad hoc
Networks – I
Lecture VIII - Medium
Access Control for Ad hoc Networks - II
Lecture IX - Medium
Access Control for Ad hoc Networks - III
Lecture X - Medium Access Control for Ad hoc Network - IV
Lecture XI - Unicast Ad hoc Routing I
Lecture XII - Unicast Ad hoc Routing II - AODV
Lecture XIII - Dynamic Source Routing
Lecture XIV - Transport Layer over Ad hoc Networks I