50
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

P-TCP: A Prediction-based Secure Transmission Control Protocol for Wireless Ad Hoc Networks

&
Pages 364-375 | Published online: 01 Sep 2014

References

  • G Holland, and N Vaidya, “Analysis of tcp performance over mobile ad hoc networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, MobiCom ’99, (New York, NY, USA), ACM, pp. 219–30, 1999.
  • Z Fu, X Meng, and S Lu, “How bad tcp can perform in mobile ad hoc networks,” in Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on, pp. 298–303, 2002.
  • V Jacobson, “Congestion avoidance and control,” SIGCOMM Comput. Commun. Rev., Vol. 18, pp. 314–29, Aug. 1988.
  • V Jacobson, “Berkeley tcp evolution from 4.3-tahoe to 4.3 reno,” in Proceedings of the 18th Internet Engineering Task Force, (University of British Colombia, Vancouver, BC), pp. 365–76, Sep. 1990.
  • J Heo, “Improving the start up behavior of a congestion control scheme for tcp,” in ACM SIGCOMM, New York, NY, USA, ACM; Vol. 26, No. 4, pp. 270–80, 1996.
  • S Xu, and T Saadawi, “Performance evaluation of tcp algorithms in multi-hop wireless packet networks,” Journal of Wireless Commun. and Mobile Computing, Vol. 2, pp. 85–100, Nov. 2002.
  • K Chandran, S Ragbunathan, S Venkatesan, and R Prakash, “A feed-back based scheme for improving tcp performance in ad-hoc wireless networks,” in Distributed Computing Systems, 1998. Proceedings. 18th International Conference on, pp. 472–9, May 1998.
  • H Singh, S Saxena, and S Singh, “Energy consumption of tcp in ad hoc networks,” Wirel. Netw., Vol. 10, pp. 531–42, Sep. 2004.
  • J Liu, and S Singh, “Atcp: Tcp for mobile ad hoc networks,” IEEE JSAC, Vol. 19, pp. 1300–15, Jul. 2001.
  • D Kim, C K Toh, and Y Choi, “TCP-Bus: Improving tcp performance in wireless ad hoc networks,” in IEEE International Conference on Communications (ICC), Vol. 3, pp. 1707–13, 2000.
  • F Wang, and Y Zhang, “Improving tcp performance over mobile ad hoc networks with out-of-order detection and response,” in ACM MOBIHOC, pp. 217–25, Jun. 2002.
  • T Dyer, and R Boppana, “A comparison of tcp performance over three routing protocols for mobile ad hoc networks,” in ACM MOBIHOC, pp. 56–66, 2001.
  • B Wu, J Chen, J Wu, and M Cardei, “A survey of attacks and countermeasures in mobile ad hoc networks,” in Wireless Network Security, Springer US, pp. 103–35, 2007.
  • P P Papadimitratos, and Z J Haas, “Secure Data Communication in Mobile Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, no. 2, pp. 343–56, 2006.
  • U Ghosh, and R Datta, “Identity based secure aodv and tcp for mobile ad hoc networks,” ACWR ’11, ACM, pp. 339–46, 2011.
  • Q Zheng, X Hong, J Liu, and L Tang, “A secure data transmission scheme for mobile ad hoc networks,” in Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE, pp. 1006–10, Nov. 2007.
  • “Ip security protocol (ipsec).” Available from: http://www.ietf.org/ html.charters/ipsp-charter.html. [Last accessed on Jan 2004].
  • K K Ramakrishnan, S Floyd, D Black, and G K Ramakrishnan, “The addition of explicit congestion notification (ecn) to ip,” RFC Editor, USA, PP.3186. 2001.
  • R de Oliveira, and T Braun, “Tcp in wireless mobile ad hoc networks,” Tech. Report IAM-02-003, University of Bern, Switzerland, July 2002
  • R P Kaufman, and M Speciner, “Network security private communi-cation in a public world,” in Handbook of Wireless Networks and Mobile Computing, Prentice Hall PTR, A division of Pearson Education, 2nd Ed 2002.
  • A Al Hanbali, E Altman, and P Nain, “A survey of tcp over ad hoc networks,” Communications Surveys Tutorials, IEEE, Vol. 7, no. 3, pp. 22–36, 2005.
  • D Johnson, D Maltz, Y C Hu, and J Jetcheva, “The dynamic source routing protocol for mobile ad hoc networks (dsr),” Internet Draft, draftietfmanetdsr07.txt, IETF MANET Working Group, RFC 2026, Feb. 2002.
  • K C Leung, and V Li, “Transmission control protocol (tcp) in wireless networks: Issues, approaches, and challenges,” Communications Surveys Tutorials, IEEE, Vol. 8, pp. 64–79, Fourth Quarter, 2006.
  • W Diffie, and M E Hellman, “New directions in cryptography,” in IEEE Transaction on Information Theory, Vol. IT-22, pp. 644–54, Nov. 2006.
  • U Ghosh, and R Datta, “A secure dynamic ip configuration scheme for mobile ad hoc networks,” Ad Hoc Networks, Vol. 9, no. 7, pp. 1327–42, 2011.
  • C E Perkins, and E M Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of 2nd IEEE Workshop on Mobile Computer Systems and Applications, pp. 90–100, Feb. 1999.
  • J C Cha, and J H Cheon, “An identity-based signature from gap diffie-hellman groups,” in Public Key Cryptography (PKC ’03), Springer-Verlag, LNCS 2139; Vol. 2567, pp. 18–30, 2003.
  • U Ghosh, and R Datta, “A novel signature scheme to secure distributed dynamic address configuration protocol in mobile ad hoc networks,” in IEEE WCNC, pp. 2700–5, Apr. 2012.
  • R Sakai, K Ohgishi, and M Kasahara, “Cryptosystems based on pairings,” in The 2000 Symposium on Cryptography and Information Security, pp. 26–8, 2000.
  • G Box, G Jenkins, and G Reinsel, “Time Series Analysis: Forecasting and Control,” Fourth Edition, Wiley Series in Probability and Statistics; 2008.
  • Y Yu, J Wang, M Song, and J Song, “Network traffic prediction and result analysis based on seasonal arima and correlation coefficient,” in Proceedings of the 2010 International Conference on Intelligent System Design and Engineering Application, (Washington, DC, USA), IEEE Computer Society, Vol. 01, ISDEA ’10, pp. 980–3, 2010.
  • H Akaike, “A new look at statistical model identification,” IEEE Trans. on Automatic Control, Vol. 19, pp. 716–23, 1974.
  • P Stoica, B Friedlander, and T Soderstrom, “Least-squares, yule-walker, and overdetermined yule-walker estimation of ar parameters: A monte carlo analysis is of finite-sample properties,” International Journal of Control, Vol. 43, pp. 13–27, 1986.
  • K Chen, Y Xue, and K Nahrstedt, “On setting tcps congestion window limit in mobile ad hoc networks,” in ICC 03, (Alaska), Vol. 2, pp. 1080–4, May. 2003.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.