- Introduction
- Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks
- Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks
- Classification of Transport Layer Solutions
- TCP over Ad Hoc Wireless Networks
- Other Transport Layer Protocols for Ad Hoc Wireless Networks
- Security in Ad Hoc Wireless Networks
- Network Security Requirements
- Issues and Challenges in Security Provisioning
- Network Security Attacks
- Key Management
- Secure Routing in Ad Hoc Wireless Networks
- Summary
- Problems
- Bibliography
9.14 PROBLEMS
-
Assume that when the current size of the congestion window is 48 KB, the TCP sender experiences a timeout. What will be the congestion window size if the next three transmission bursts are successful? Assume that MSS is 1 KB. Consider (a) TCP Tahoe and (b) TCP Reno.
-
Find out the probability of a path break for an eight-hop path, given that the probability of a link break is 0.2.
-
Discuss the effects of multiple breaks on a single path at the TCP-F sender.
-
What additional state information is to be maintained at the FP in TCP-F?
-
Mention one advantage and one disadvantage of using probe packets for detection of a new path.
-
Mention one advantage and one disadvantage of using LQ and REPLY for finding partial paths in TCP-BuS.
-
What is the impact of the failure of proxy nodes in split-TCP?
-
During a research discussion, one of your colleagues suggested an extension of split-TCP where every intermediate node acts as a proxy node. What do you think would be the implications of such a protocol?
-
What are the pros and cons of assigning the responsibility of end-to-end reliability to the application layer?
-
What is the default value of β used for handling induced traffic in ATP and why is such a value chosen?
-
Explain how network security requirements vary in the following application scenarios of ad hoc wireless networks:
-
Home networks
-
Classroom networks
-
Emergency search-and-rescue networks
-
Military networks
-
-
Explain how security provisioning in ad hoc wireless networks differs from that in infrastructure-based networks?
-
Explain the key encrypting key (KEK) method.
-
Nodes A and B want to establish a secure communication, and node A generates a random key 11001001. Suppose the function used by both nodes A and B for encryption is XOR, and let node A generate a random transport key 10010101, and let node B generate 00101011. Explain the three-pass Shamir protocol exchanges.
-
Why is it not advisable to use natural-language passwords directly for cryptographic algorithms?
-
Consider the certificate graph shown in Figure 9.17, with the local certificate repositories of nodes A and B as indicated. Find the possible paths of trust from node A to node B which can be obtained using a chain of keys.
Figure 9.17 Certificate graph.
-
List a few inherent security flaws present in the following types of routing protocols: (a) table-driven and (b) on-demand routing.
-
List and explain how some of the inherent properties of the wireless ad hoc networks introduce difficulties while implementing security in routing protocols.
-
Mark the paths chosen by the following secure-routing protocols for the network topology shown in Figure 9.18: (a) Shortest path routing and (b) SAR protocol. Assume that node 2 is a secure node. (c) If node 2 (which lies in the path chosen by SAR protocol) is suddenly attacked and becomes a malicious node, then mark an alternative path chosen by SAODV protocol.
Figure 9.18 Example network topology.