Prioritization-based QoS Support with
Attack Resilience in Wireless Ad Hoc Networks

Sponsor: DoD Infrastructure Support Program for HBCU/MI
Grant: 54477-CI-ISP (UNCLASSIFIED)
Period: September 15, 2008 - August 31, 2012
Amount: $587,872
PI: Turgay Korkmaz

Summary

Future military missions will extensively use networked devices along with wireless mobile ad hoc and sensor networks, e.g., troops exchanging strategic information, (un)manned vehicles/devices exchanging command-control messages, critical audio/video streaming between soldiers etc. Clearly, such military applications are in nature mission-critical and require various levels of quality-of-service (QoS) and security supports along with robustness and scalability. Providing such supports is essential to the success of future military missions.

Realizing the importance of providing such supports, the research community has been investigating various QoS and security issues while calling for simpler but yet the-state-of-the-art mechanisms for providing the desired levels of QoS and security. Moreover, most studies are done within idealized simulation environments; thus, it is not clear what will really work in practice. With these in mind, we are mainly targeting the general area of providing QoS support in wireless networks and planning to make our research as experimental as possible by implementing and testing our ideas or other promising ideas using the wireless laptops and sensors that� will be purchased through this� grant. Experimentations will deepen our understanding of the theoretical and practical limitations of wireless networks and allow us to develop practical QoS mechanisms. Taking the concerns due to dynamics of wireless networks into account, we propose a reservationless, prioritization-based QoS support scheme and plan to develop necessary mechanisms across the network and data link (MAC) layers.

Specifically, we plan to explore our recently proposed distributed prioritization scheduling mechanism at the MAC layer along with� new mechanisms at the network layer such as� determining and maintaining QoS-based paths without requiring global state-information. In addition, we plan to extend our proposed mechanisms to multi-radio, multi-channel wireless networks to further increase the capacity.

While providing the envisioned reservationless, prioritization-based QoS support, it is important to consider unauthorized nodes that may not respect the underlying QoS mechanisms and degrade the QoS capabilities through various attacks (e.g., DoS, unauthorized access to the network, delete messages, inject false packets, or impersonate a node). Accordingly, our second important task in this project is to develop necessary security mechanisms and integrate them into our QoS mechanisms so that various attacks/intrusions can be detected and avoided while maintaining the QoS-based operation of the network.

In addition to research, this project targets to quantitatively and qualitatively improve the participation of minority students in computer science while enriching the process of learning and discovery for all students. Although our university is a Hispanic-dominated minority-serving institution, the participation of these students in graduate level education is very low. I believe the experimentation component of our research and the fellowships that will be offered through this grant will attract many of these students and allow us to involve all interested students in our research through various educational activities such as independent studies, weekly seminars, outreach efforts, and mentoring.

Publications

  1. Husnu Narman, Turgay Korkmaz, Suleyman Tek, Utilizing Distance Distribution in Determining Topological Characteristics of Multi-hop Wireless Networks ICNC'13 - Workshops - CNC, January 2013.
  2. Andrew Wichmann, Justin Chester, Turgay Korkmaz, Smooth Path Construction for Data Mule Tours in Wireless Sensor Networks IEEE GLOBECOM 2012, Dec 2012
  3. Charles J. Zinsmeyer and Turgay Korkmaz, A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques, Journal of Internet Services and Information Security (JISIS), volume: 2, number: 1/2, pp. 59-72. link
  4. Navid Pustchi and Turgay Korkmaz, Improving packet reception rate for mobile sinks in wireless sensor networks, 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), Publication Year: 2012 , Page(s): 1 - 9 link
  5. Rehan Akbani, Turgay Korkmaz and G. V. S. Raju, Mobile Ad-Hoc Networks Security, Recent Advances in Computer Science and Information Engineering Lecture Notes in Electrical Engineering, 2012, Volume 127, 659-666, DOI: 10.1007/978-3-642-25769-8_92 link
  6. Rehan Akbani, Turgay Korkmaz, EMLTrust: An Enhanced Machine Learning Based Reputation System GVS Raju, Ad Hoc Networks, 10 (2012), 435–457 http://dx.doi.org/10.1016/j.adhoc.2011.08.003
  7. Rehan Akbani and Turgay Korkmaz, Enhancing Role Based Trust Management with a Reputation System for MANETs, EURASIP Journal on Wireless Communications and Networking, Volume 2011, Issue 1, pp 1-14. The article is available electronically on SpringerLink: http://dx.doi.org/10.1186/1687-1499-2011-90
  8. Turgay Korkmaz and Suleyman Tek, Analyzing Response Time of Batch Signing, Journal of Internet Services and Information Security (JISIS), May 2011, vol. 1, no. 1, pp. 70-85, http://www.jisis.org/vol1no1.php
  9. Griffin, M.; Korkmaz, T., Distributed verification of global multiple disjoint paths in mobile wireless networks, Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International, Digital Object Identifier: 10.1109/IWCMC.2011.5982626, Publication Year: 2011 , Page(s): 666 - 670, Full Text: PDF
  10. Korkmaz, T.; Sarac, K., Characterizing link and path reliability in large-scale wireless sensor networks, IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 Digital Object Identifier: 10.1109/WIMOB.2010.5644996, Publication Year: 2010 , Page(s): 217 - 224, Full Text: PDF
  11. Rehan Akbani and Turgay Korkmaz, Applications of Support Vector Machines in Bioinformatics and Network Security,Application of Machine Learning, Yagang Zhang (Ed.), InTech, pp. 1-20, 2010, ISBN: 978-953-307-035-3. link
  12. Turgay Korkmaz, Batch forwarding in wireless sensor networks, MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, Digital Object Identifier: 10.1109/MILCOM.2010.5680104, Publication Year: 2010 , Page(s): 116 - 124 Full Text: PDF
  13. Turgay Korkmaz, Analyzing Response Time of Batch Signing, Proceedings of 18th Internatonal Conference on Computer Communications and Networks 2009 (ICCCN 2009), Digital Object Identifier: 10.1109/ICCCN.2009.5235314 Publication Year: 2009 , Page(s): 1 - 6 Full Text: PDF
  14. Akbani, R.; Korkmaz, T.; Raju, G.V.S.; A Hybrid Trust Management System for automated fine-grained access control Military Communications Conference, 2009. MILCOM 2009. IEEE, Digital Object Identifier: 10.1109/MILCOM.2009.5379722 Publication Year: 2009 , Page(s): 1 - 7

Poster Presentations

  1. Drew Wichmann, Efficient Mobile Element Deployment in Tactical Wireless Sensor Networks, UTSA CoS Research Conference, Sept 2012. online
  2. Drew Wichmann, Justin Chester, Turgay Korkmaz, Tour Planning for UAV Data Mules in Border Wireless Multimedia Sensor Networks, UTSA CoS Research Conference, Sept 30, 2011. online
  3. Navid Pustchi and Turgay Korkmaz, Improving reliability in wireless sensor networks using multiple radio, UTSA CoS Research Conference, Sept 30, 2011. online
  4. Charles J. Zinsmeyer and Turgay Korkmaz, Wireless sensor localization techniques, UTSA CoS Research Conference 2010. online

Students Supported by This grant


This page certified up-to-date on Nov 12, 2012 by Turgay Korkmaz.