2013
Yi, Jiazi; Cordero, Juan Antonio; Clausen, Thomas
Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks Inproceedings
In: The 16th International Conference on Network-Based Information Systems (NBiS-2013), 2013.
Abstract | Links | BibTeX | Tags: Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks, sogrid
@inproceedings{Clausen2013g,
title = {Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Juan Antonio Cordero and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Jitter-Considerations-in-On-Demand-Route-Discovery-for-Mobile-Ad-Hoc-Networks.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6685393},
doi = {10.1109/NBiS.2013.28},
year = {2013},
date = {2013-09-01},
publisher = {The 16th International Conference on Network-Based Information Systems (NBiS-2013)},
abstract = {Jittering (a small, random variation in timing of control message emission) is widely used in protocols for wireless communication, in order to avoid simultaneous packet transmis- sions over the same channel by adjacent nodes in the network. Used for both regularly scheduled packets, for event-triggered packets, and for scheduled resets in the network, jittering is a particularly important mechanism when a network event may cause multiple adjacent nodes to react concurrently. Introduced in the proactive MANET routing protocol OLSR, the “LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation” (LOADng), a derivative of AODV, is specified so as to also use jitter for flooding Route Request (RREQ) messages during route discovery. This use of jitter in RREQ flooding is, however, not without drawbacks, which are identified and addressed in this paper within the framework of a more general study of jitter mechanisms used for route discovery in reactive routing protocols. The paper studies the behavior of route discovery when using “naive” jitter (simply, delaying RREQ retransmission by a small uniformly distributed random delay), in order to identify and analyze the problems hereof, mostly related to route sub-optimality and excessive control traffic overhead. A Window Jitter mechanism is then proposed to address these issues – with the performance hereof, when compared to “naive” jitter being evaluated by way of modeling, theoretical analysis and experiments. The paper shows that the use of Window Jitter improves indeed the efficiency of route discovery in AODV and overcome the drawbacks identified for “naive” jitter.},
keywords = {Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks, sogrid},
pubstate = {published},
tppubtype = {inproceedings}
}
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas; Baccelli, Emmanuel
Enabling Multihop Communication in Spontaneous Wireless Networks Book Chapter
In: Haddadi, Hamed; Bonaventure, Olivier (Ed.): Recent Advances in Networking, Chapter 9, pp. 413-457, ACM SIGCOMM, 2013.
Links | BibTeX | Tags: Ad-Hoc, lln, loadng, MANET, MPR, olsr, OSPF
@inbook{Cordero2013,
title = {Enabling Multihop Communication in Spontaneous Wireless Networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen and Emmanuel Baccelli},
editor = {Hamed Haddadi and Olivier Bonaventure},
url = {http://sigcomm.org/education/ebook/SIGCOMMeBook2013v1_chapter9.pdf},
year = {2013},
date = {2013-08-01},
booktitle = {Recent Advances in Networking},
pages = {413-457},
publisher = {ACM SIGCOMM},
chapter = {9},
keywords = {Ad-Hoc, lln, loadng, MANET, MPR, olsr, OSPF},
pubstate = {published},
tppubtype = {inbook}
}
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas
Optimization of jitter configuration for reactive route discovery in wireless mesh networks Inproceedings
In: 2013 11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), , IEEE , 2013, ISBN: 978-1-61284-824-2.
Abstract | Links | BibTeX | Tags: Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks
@inproceedings{Clausen2013c,
title = {Optimization of jitter configuration for reactive route discovery in wireless mesh networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Optimization-of-jitter-configuration-for-reactive-route-discovery-in-wireless-mesh-networks.pdf
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6576467},
isbn = {978-1-61284-824-2},
year = {2013},
date = {2013-05-01},
booktitle = {2013 11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), },
publisher = {IEEE },
abstract = {Jitter is a small, random variation of timing before message emission that is widely used in non-synchronized wireless communication. It is employed to avoid collisions caused by simultaneous transmissions by adjacent nodes over the same channel. In reactive (on-demand) routing protocols, such as AODV and LOADng, it is recommended to use jitter during the flooding of Route Request messages. This paper analyzes the cost of jitter mechanisms in route discovery of on-demand routing protocols, and examines the drawbacks of the standard and commonly used uniformly distributed jitter. The main studied drawback is denominated delay inversion effect. Two variations on the jitter mechanism --window jitter and adaptive jitter-- are proposed to address this effect, which take the presence and the quality of traversed links into consideration to determine the per-hop forwarding delay. These variations allow to effectively reduce the routing overhead, and increase the quality of the computed paths with respect to the standard uniform jitter mechanism. Simulations are also performed to compare the performance of different jitter settings in various network scenarios.},
keywords = {Ad-Hoc, jitter, loadng, MANET, MESH, Sensor Networks},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
Yi, Jiazi; Clausen, Thomas
In: The 15th International Conference on Network-Based Information Systems (NBiS-2012), 2012.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, security, SMF, SMF Security
@inproceedings{Yi2012,
title = {Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Vulnerability-Analysis-of-Relay-Set-Selection-Algorithms-for-the-Simplified-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6354835},
doi = {10.1109/NBiS.2012.48},
year = {2012},
date = {2012-09-01},
publisher = {The 15th International Conference on Network-Based Information Systems (NBiS-2012)},
abstract = {After more than a decade of research and stan-dardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in “the real world” also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This paper studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.},
keywords = {Ad-Hoc, MANET, MESH, security, SMF, SMF Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Radu, Dan; Avram, Camelia; Aştilean, Adina; Parrein, Benoît; Yi, Jiazi
Acoustic noise pollution monitoring in an urban environment using a VANET network Inproceedings
In: 2012 IEEE International Conference on Automation Quality and Testing Robotics (AQTR), pp. 244-248, IEEE, Cluj-Napoca, 2012, ISBN: 978-1-4673-0701-7.
Abstract | Links | BibTeX | Tags: MANET, multipath, olsrv2, svc, vanet
@inproceedings{yi-vanet-2011,
title = {Acoustic noise pollution monitoring in an urban environment using a VANET network},
author = {Dan Radu and Camelia Avram and Adina Aştilean and Benoît Parrein and Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Acoustic-noise-pollution-monitoring-in-an-urban-environment-using-a-VANET-network.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6237711
},
doi = {10.1109/AQTR.2012.6237711},
isbn = {978-1-4673-0701-7},
year = {2012},
date = {2012-05-24},
booktitle = {2012 IEEE International Conference on Automation Quality and Testing Robotics (AQTR)},
pages = {244-248},
publisher = {IEEE},
address = {Cluj-Napoca},
abstract = {The main objective of this work is the development of a Vehicle Ad Hoc NETwork (VANET) to collect data from GPS equipped mobile phones used as noise detectors. In this system, sensor nodes perioadically transmit acoustic noise levels to neighboring cars, data packets being shared and temporary stored by participating VANET nodes and ultimately forwarded to a collector node connected to the Internet, providing public real-time data. A routing technique called MP-OLSR that takes into account the spatially separation between the multiple paths is used, for better transmission reliability and congestion avoidance as well as for control message overhead minimization.},
keywords = {MANET, multipath, olsrv2, svc, vanet},
pubstate = {published},
tppubtype = {inproceedings}
}
2011
Herberg, Ulrich; Cole, Robert; Yi, Jiazi
Performance analysis of SNMP in OLSRv2-routed MANETs Inproceedings
In: IEEE 7th International Conference on Network and Service Management, IEEE, 2011, ISSN: 2165-9605.
Links | BibTeX | Tags: MANET, olsrv2, snmp
@inproceedings{yi-snmp-olsrv2-2011,
title = {Performance analysis of SNMP in OLSRv2-routed MANETs},
author = {Ulrich Herberg and Robert Cole and Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Performance-analysis-of-SNMP-in-OLSRv2-routed-MANETs.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6103976},
issn = {2165-9605},
year = {2011},
date = {2011-10-24},
booktitle = {IEEE 7th International Conference on Network and Service Management},
publisher = {IEEE},
keywords = {MANET, olsrv2, snmp},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Parrein, Benoit; Radu, Dan
Multipath routing protocol for manet: Application to H.264/SVC video content delivery Inproceedings
In: Wireless Personal Multimedia Communications (WPMC), 2011 14th International Symposium on, 2011, ISBN: 1347-6890.
Abstract | Links | BibTeX | Tags: MANET, multipath, olsr, svc
@inproceedings{yi-svc-2011,
title = {Multipath routing protocol for manet: Application to H.264/SVC video content delivery},
author = {Jiazi Yi and Benoit Parrein and Dan Radu},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/MP-OLSR-SVC_WPMC2011_v0.1.pdf
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6081479},
isbn = {1347-6890},
year = {2011},
date = {2011-10-03},
booktitle = {Wireless Personal Multimedia Communications (WPMC), 2011 14th International Symposium on},
abstract = {Multi-Path OLSR is an extension of the single path routing protocol OLSR. The QoS has been demonstrated in simulation and testbed. In this paper, we attempt to confirm those results at the application layer specially for critical applications as video services over wireless networks. The standard H264/SVC is chosen for its enormous potential in video delivery in lossy networks. Still vulnerable to packet losses, we combine the scalable source coding to an Unequal Error Protection (UEP) scheme in order to improve a simple Quality of Experience (QoE) measurements i.e PSNR. In a new simulation framework called SVCEval, the combination of path diversity and scalable protection insures a significant 2 dB gain in QoE for sensitive contents and mobile scenarios in comparison with just MP-OLSR. Within the same context, single path strategy delivers non acceptable video services as soon as nodes are mobile.
},
keywords = {MANET, multipath, olsr, svc},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi; Clausen, Thomas; Herberg, Ulrich
Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks Inproceedings
In: IEEE CPSCom 2011, 2011, (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260).
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, security, SMF, SMF Security
@inproceedings{Yi2011c,
title = {Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6142260
http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-CPScom-Vulnerability-Analysis-of-the-Simple-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/iThings/CPSCom.2011.63},
year = {2011},
date = {2011-10-01},
publisher = {IEEE CPSCom 2011},
abstract = {If deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside of purely experimental settings, protocols operating such MANETs must be able to preserve network integrity, even when faced with careless or malicious participants. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol(s), managing the connectivity. Understanding how these routing protocols can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. One routing protocol for MANETs, developed by the Internet Engineering Task Force (IETF) as a multicast routing protocol for efficient data dissemination, is denoted "Simplified Multicast Forwarding'' (SMF). This protocol is analyzed, and its vulnerabilities described, in this paper. SMF consists of two independent components: (i) duplicate packet detection and (ii) relay set selection, each of which presents its own set of vulnerabilities that an attacker may exploit to compromise network integrity. This paper explores vulnerabilities in each of these, with the aim of identifying attack vectors and thus enabling development of countermeasures.},
note = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260},
keywords = {Ad-Hoc, MANET, MESH, security, SMF, SMF Security},
pubstate = {published},
tppubtype = {inproceedings}
}
2008
Yi, Jiazi
A Survey on the security of MANETs Technical Report
Polytech'Nantes Nantes, France, 2008.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, security, survey
@techreport{yi-manet-security-2008,
title = {A Survey on the security of MANETs},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/20080330_A_Survey_on_the_security_of_MANETs.pdf},
year = {2008},
date = {2008-03-30},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {ad hoc networks. The purpose of this note is to give a quick review on the security related problems in MANETs, and to answer the question “at the moment, what do we have to deal with the security”. We first introduce the basic concepts of network security, and then come to the security changes and requirements. The key management and secure routing schemes are presented in section 3 and section 4. },
keywords = {Ad-Hoc, MANET, security, survey},
pubstate = {published},
tppubtype = {techreport}
}
Yi, Jiazi; Cizeron, Eddy; Hamma, Salima; Parrein, Benoit
Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks Inproceedings
In: 2008 IEEE Wireless Communications and Networking Conference, pp. 2235 - 2240, IEEE, Las Vegas, NV, 2008, ISSN: 1525-3511.
Abstract | Links | BibTeX | Tags: MANET, multipath, olsr
@inproceedings{yi-mpolsr-2008,
title = {Simulation and Performance Analysis of MP-OLSR for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Eddy Cizeron and Salima Hamma and Benoit Parrein},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4489426
http://jiaziyi.com/wp-content/uploads/2016/08/IEEE-Simulation-and-Performance-Analysis-of-MP-OLSR-for-Mobile-Ad-hoc-Networks.pdf},
doi = {10.1109/WCNC.2008.395},
issn = {1525-3511},
year = {2008},
date = {2008-03-11},
booktitle = {2008 IEEE Wireless Communications and Networking Conference},
volume = {2235 - 2240},
pages = {2235 - 2240},
publisher = {IEEE},
address = {Las Vegas, NV},
abstract = {Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data without reliance on a fixed base station or a wired backbone network, which makes routing a crucial issue for the design of a ad hoc networks. In this paper we discussed a hybrid multipath routing protocol named MP-OLSR. It is based on the link state algorithm and employs periodic exchange of messages to maintain topology information of the networks. In the mean time, it updates the routing table in an on-demand scheme and forwards the packets in multiple paths which have been determined at the source. If a link failure is detected, the algorithm recovers the route automatically. Concerning the instability of the wireless networks, the redundancy coding is used to improve the delivery ratio. The simulation in NS2 shows that the new protocol can effectively improve the performance of the networks.
},
keywords = {MANET, multipath, olsr},
pubstate = {published},
tppubtype = {inproceedings}
}
Yi, Jiazi
A Survey on the Applications of MANET Technical Report
Polytech'Nantes Nantes, France, 2008.
Abstract | Links | BibTeX | Tags: Ad-Hoc, application, MANET
@techreport{yi-manet-survey-2008,
title = {A Survey on the Applications of MANET},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/20080229_A_Survey_on_the_Applications_of_MANET.pdf},
year = {2008},
date = {2008-02-01},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {This report examined the applications of MANET nowadays. The report not only reviews the pure general-purpose MANET, but also other specified MANETs: mesh networks, opportunistic networks, vehicular ad hoc networks and wireless networks. We can see that, although pure general-purpose MANET does not yet exist in the real world, the multihop ad hoc networking paradigm was successfully applied in several classes of networks that are penetrating the mass market.},
keywords = {Ad-Hoc, application, MANET},
pubstate = {published},
tppubtype = {techreport}
}
2007
Yi, Jiazi
Summary of Routing Protocols in Mobile ad hoc Networks Technical Report
Polytech'Nantes Nantes, France, 2007.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, routing, survey
@techreport{yi-manet-routing-survey-2007,
title = {Summary of Routing Protocols in Mobile ad hoc Networks},
author = {Jiazi Yi},
url = {http://jiaziyi.com/wp-content/uploads/2016/08/Summary_of_Routing_Protocol_in_Mobile_Ad_Hoc_Networks_distribution.pdf},
year = {2007},
date = {2007-02-11},
address = {Nantes, France},
institution = {Polytech'Nantes},
abstract = {This was a survey of MANETs finished at the beginning of my master project. },
keywords = {Ad-Hoc, MANET, routing, survey},
pubstate = {published},
tppubtype = {techreport}
}