CAMA: Cellular Aided Mobile Ad hoc Network [15]

4.5.1 Positioning Routing in CAMA

In CAMA, since the CAMA agent may work as a centralized positioning information server. An MT can find its precise geographical position through Global Positioning Satellite (GPS) or location based service of the cellular network itself. The position information is sent to the CAMA agent through the BS. As the result, an initial route from a source to a destination can be determined either by CAMA agents or by MTs

which will be broadcasted by BS to the other MTs. Then CAMA agent initiate centralized routing mechanism to appropriate MTs. The advantages of this mechanism are routing optimizations, security, radio resource allocation and power savings. It also does not need to broadcast the positioning information periodi- cally in downlink direction that bring to reducing of cellular radio bandwidth and MT power consumption.

One weak point of this mechanism is that an MT may have to wait for a long time to get the routing decision from the CAMA agent in the condition there are too many MTs send routing requests simultaneously. The delay can be caused by the uplink transmission collision, uplink request queue, and the downlink reply queue. If the delay is too long, it is possible that

a new route has to be determined by the updated position information because of mobility of the users. One idea to avoid lost of position information is by sending HELLO message between two adjacent MTs to make sure they are reachable to each other. This position information can be used by the CAMA agent to know exactly what link exists, and make more accurate routing decisions. However this scheme increases the overhead in both the cellular network and the ad hoc network.

Table 3. Routing Table (Example: for MT A) [15]

Neighboring MT

Position distance (d)

delta distance ( ∆ ∆ d)

Similar to Greedy Proxy Discovery and Routing mechanism of UCAN, with the help of GPS, Multi-Selection Greddy Positioning Routing (MSGPR) of CAMA has better performance. The CAMA agent keeps the position information of each MTs in a table shown by Table 3. The table consists of the IDs and position of neighboring MTs, the distance d, from the MT,

and ∆ ∆ d, the change of distance from the MT the last two position updates. When the condition of

d + Äd dô , where dô is the distance threshold value within which two MTs can still build a link with a required quality. This table is updated whenever there is a position update for any of the members in the table. Figure 11 shows the example of MSGPR with n = 2, i.e. only 2

Cellular Multihop Networks: State of the Art

[Teddy Sutanto Tarsono et al.]

Jurusan Teknik Elektro, Fakultas Teknologi Industri – Universitas Kristen Petra

closest neighbor nodes is chosen at each step to

be continued to the next step. And at the end, there are n = 2 routes are selected, in this case: S à B à H à G à T and S à C à E à I à T. Some most important criteria are considered to rank these n selected routes, i.e. total delay time and number of hops. At the end only one route is chosen to relay the data packets to the destination MTs.

Figure 11. Multi-Selection Greedy Positioning Routing (MSGPR) with n = 2 [15]

When an MT moves away from its previous position, position update is needed. The new positions of MTs are updated periodically, with a time threshold value for the update period, which brings to a probability of wrong routing decision caused by out-of-date position information. Another threshold value of the distance between the last position of MT and its previous position during last update should be defined. There is some mathematical approximation to define these two thresholds. Special updates should be treated when the radio environment quality of MTs changes significantly, e.g. when an MT experiences a deep fading in a corner or behind a building. These changes can be measured by sending HELLO messages to the other reachable MTs.

4.5.2 Security in CAMA

Security issues in wireless networks design must

be considered seriously. In CAMA the security issues is related to the ad hoc network, because cellular network already have own security concerns and solutions. In CAMA, the security of ad hoc network is much easier compared to the pure ad hoc network, because CAMA agent can also act as a central security control point for key distributions, intrusion detections, or broadcasting information through base station when a security violation is detected.

One aspect that should be considered in CAMA system is routing security against the intended falsa positioning information. There are two solutions for this problems i.e. proactive and reactive solution. In the proactive solution, MT will send IDs of their reachable neighboring MTs periodically. This information will be analyzed by CAMA agent to make a judgement whether this MT is sending its true position or not. CAMA agent in the reactive solution will use the reports from MTs which have info of their next hop which is actually does not exist. These MTs will be classified as malicious MTs by CAMA agent and they are excluded from the network. The report is encrypted to ensure the originality and the CAMA agent must have all public key of all the MTs. Some criteria can be used to classified which MTs are always send wrong report about their position and / or routing path, and which MTs act maliciously only occasionally. This criteria and mechanism will maintain the CAMA agent to have record of all good MTs.

Another security concern related to the forwarding routing information is to make sure that the routing information from CAMA agent is forwarded to the destination MT consistently. Firstly, the routing information is encrypted by CAMA agent by using secret key of destination MT before it is forwarded. Destination MT will decrypt it by using its public key. Secondly, Watch Dog scheme is used to avoid interruption by intermediate MTs. Thirdly, downlink and uplink data match with Hash code comparison is used to detect such a bad link in in the intermediate links.

The last security aspect is anti-jamming. In this case when outsider attacker send a strong noise to jam the ad hoc wireless channel, all nearby MTs will detect the channel is busy or detect a collision error, and consequently MTs can not send data at all. This problem can only be solved if there is more than one channel in ad hoc network available. After the CAMA agent receives a report of possible jamming problem, it will check whether the problem is come from a real jamming, or only caused by a very high traffic density. The CAMA through the base station can broadcast waring of the jamming to all related MTs to switch to another channel. MTs can communicate the messages with base station about when to switch and which channel to switch to with cellular channel. Combination

Jurnal Teknik Elektro Vol. 4, No. 2, September 2004: 110 - 125

of cellular and ad hoc channel jump used by MTs and user requirements. Trades off between the and base station could be difficult to be followed benefits and the network complexity and other by the attacker.

difficulties have to be considered in the real implementation this cellular multihop network

Introducing of CAMA agent in the cellular for comercial purposes. Further researches still multihop network gives some additional have to be conducted, and standardization of the improvement in the routing and relay path networks architecture and functional aspect must discovery and maintenance, AAA functions and

be organized to be implemented in the real higher security protection solutions.

worlds.

5. Conclusions

References

There are some proposals to implement the [1] G.Aggelou, R.Tafazolli: On the relaying Cellular Multihop Network. Each of proposals

capacity of next-generation GSM cellular has different intention of research for the same

networks, in IEEE Personal Communi- objectives. The HCMN system gives an

cations Magazine, vol.8 no.1, pp, 40-47, overview of complete network architecture. The

February 2001.

UCAN system provides more information of [2] N.Nantavechsanti: Interworking between algorithm of proxy client and relay path

Ad hoc Network and Supporting Network, discovery and maintenance. The iCAR system

in ACS Seminar, IKR University of gives more intention to the allocation of fixed

Stuttgart, 2003.

ARSs, in this case the number and the location of [3] W.Fu: Routing Mechanism in Ad hoc required ARSs. The PARCelS tries to analyze

Networks, in ACS Seminar, IKR University some situation where mobile clients can also be

of Stuttgart, 2003.

used as a relay node. The PARCelS also [4] M. Schopp: Lecture Notes of Mobile enhances the protocol, and achieves higher

Communication II, University of Stuttgart & performance of getting more load-balance

ICM Siemens AG, 2004. network. At the end the CAMA system [5] J.Zyren, A.Petrick: IEEE 802.11 Tutorial,

introduces a new network element called CAMA

agents, to control all mobile nodes in the ad hoc [6] C.E.Perkins: Mobile Networking Through networks. The CAMA agents support not only

Mobile IP, in IEEE Internet Computing routing and relay procedure for mobile clients,

Magazine, 1998.

but also their AAA function and security aspects. [7] T. Buergstein: Security Issues in Commu- In general, all of the proposed architecture

nication Systems, in ACS Seminar, IKR fulfilled the objectives. The users who are

University of Stuttgart, 2003. located in the blank spots of cellular networks [8] C.Qiao, H.Wu, O.Tonguz: Integrated

can still establish a call connection. Call blocking cellular and Ad hoc relay systems, in IEEE probability of the networks is decreased. The

International Conference on Computer network can balance the load between hot and

Communication and Network, 2000. cold cells. Cellular and WLAN channel can be [9] X.Wu, B.Mukherjee, S.-H.G.Chan, B.Bhar- used more efficiently. The users of cellular

gava: Assuring Communications by networks can have higher data transfer rata when

Balancing Cell Load in Cellular Network, in using the WLAN channel and infrastructure. The

IEICE Transaction Communications, users of WLAN networks can be more mobile

Vol.E86-B, No.10, October 2003. and still maintain their connection to the [10] H.Li, M.Lott, W. Zirwas, M.Weckler, E.

networks by relaying the link from one cell to Schulz: Hierarchical Cellular Multihop another cell with help of cellular networks. More

Networks, in EPMCC, March 2003. detail of the value of the experiment and [11] H.Li, M.Lott, M.Weckerle, W.Zirwas,

measurement results can be found in the related E.Schulz: Multihop Communications in papers.

Future Mobile Networks, in Proceeding PIMRC, September 2002.

The combination of each limited scope of [12] H.Luo, R.Ramjee, P.Sinha, L.Li, S.Lu: researches should give more powerful network

UCAN: A Unified Cellular and Ad-hoc performance and a complete scope of network

Jurusan Teknik Elektro, Fakultas Teknologi Industri – Universitas Kristen Petra

Cellular Multihop Networks: State of the Art

[Teddy Sutanto Tarsono et al.]

Network Architecture, in MobiCom '03, September 2003.

[13] S.De, O.Tonguz, H.Wu, C.Qiao: Integrated Cellular and Ad hoc Relay (iCAR) System: Pushing the Performance Limits of Conven- tional Wireless Networks, in Proc. of the 35th International Conference on System Sciences, 2002.

[14] J.Zhou, Y.R.Yang: PARCelS: Pervasive Ad-hoc Relaying for Cellular Systems, Department of Computer Science, Yale University, 2003.

[15] B.Bhargava, X. Wu, Y. Lu, W.Wang: Inte- grating Heterogeneous Wireless Technolo- gies: A Cellular Aided Mobile Ad hoc Network (CAMA), in ACM Mobile Network and Applications, 2003.

Jurusan Teknik Elektro, Fakultas Teknologi Industri – Universitas Kristen Petra

125

Dokumen yang terkait

Analisis Komparasi Internet Financial Local Government Reporting Pada Website Resmi Kabupaten dan Kota di Jawa Timur The Comparison Analysis of Internet Financial Local Government Reporting on Official Website of Regency and City in East Java

19 819 7

Analisis Komposisi Struktur Modal Pada PT Bank Syariah Mandiri (The Analysis of Capital Structure Composition at PT Bank Syariah Mandiri)

23 288 6

Improving the Eighth Year Students' Tense Achievement and Active Participation by Giving Positive Reinforcement at SMPN 1 Silo in the 2013/2014 Academic Year

7 202 3

An Analysis of illocutionary acts in Sherlock Holmes movie

27 148 96

Improping student's reading comprehension of descriptive text through textual teaching and learning (CTL)

8 140 133

Teaching speaking through the role play (an experiment study at the second grade of MTS al-Sa'adah Pd. Aren)

6 122 55

Enriching students vocabulary by using word cards ( a classroom action research at second grade of marketing program class XI.2 SMK Nusantara, Ciputat South Tangerang

12 142 101

The Effectiveness of Computer-Assisted Language Learning in Teaching Past Tense to the Tenth Grade Students of SMAN 5 Tangerang Selatan

4 116 138

Analysis On Students'Structure Competence In Complex Sentences : A Case Study at 2nd Year class of SMU TRIGUNA

8 98 53

The correlation between listening skill and pronunciation accuracy : a case study in the firt year of smk vocation higt school pupita bangsa ciputat school year 2005-2006

9 128 37