In the near future, a large volume of the data traversing wireless networks will not only be requested and/or reported by humans but also by machines (e.g., the Internet-of-things and machine-tomachine applications). This mandates the availability of enormous radio spectrum resources and an end-toend reliable information transfer. Currently, many wireless devices are equipped with two wireless interfaces with heterogeneous radio access technologies. Thus, the usage of a transport layer designed for multi-homed devices such as multipath transmission control protocol (MPTCP) is inevitable. This paper presents an experimental performance study of three congestion control algorithms, which can be used by MPTCP, namely, Cubic, linked-increases algorithm (LIA), and opportunistic LIA (OLIA). The testbed comprises real (not simulated) LTE and WiFi networks that are used to connect dual-homed wireless nodes to one another. We comparatively study the throughput performance of the three algorithms under varying factors, including the receiver buffer size, number of parallel connections, data volume, and flow lifetime. Our key findings reveal that, although Cubic is not designed with multipath in mind, it outperforms the multipath-based LIA and OLIA, whenever the LTE per-node capacity is higher than its WiFi counterpart. Also, in a reversed situation (WiFi per-node capacity is higher) Cubic outperforms OLIA and LIA for short-lived flows. INDEX TERMS Multipath TCP, congestion control, heterogeneous, radio access technologies.
Mobility is frequently a problem for providing security services in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passively monitor traffic in the network can able to detect a Sybil attacker which uses a number of network identities simultaneously. We can do through simulation that this detection can be done by a single node, or multiple trusted nodes can join to improve the accuracy of detection. We then show that although the detection mechanism will falsely identify groups of nodes traveling together as a Sybil attacker, we can extend the protocol to monitor collisions at the MAC level to differentiate between a single attacker spoofing many addresses and a group of nodes traveling in close proximity.
The multipath transmission control protocol (MPTCP) is considered a promising wireless multihoming solution, and the 3rd generation partnership project (3GPP) includes it as a standard feature in the fifth-generation (5G) networks. Currently, ns-3 (Network Simulator-3) is widely used to evaluate the performance of wireless networks and protocols, including the emerging MPTCP protocol. This paper investigates the fidelity of the Linux kernel implementation of MPTCP in the ns-3 direct code execution module. The fidelity of MPTCP simulation is tested by comparing its performance with a real Linux stack implementation of MPTCP using a hardware testbed for two different setups. One setup emulates the existence of a bottleneck link between the sending and receiving networks, whereas the other setup does not have such a bottleneck. The fidelity of ns-3’s simulation is tested for four congestion control algorithms, namely Cubic, linked-increases algorithm (LIA), opportunistic LIA (OLIA) and wVegas for relatively short and long data flows. It is found that the uplink MPTCP throughput performance exhibited by the ns-3 simulator matches the hardware testbed results only if the flows are long-lived and share no common bottleneck link. Likewise, the MPTCP throughput achieved during a downlink scenario using the ns-3 simulator and the hardware testbed are close to each other across all algorithms except wVegas regardless of the flow size if there is no bottleneck link. Moreover, it is observed that the impact of LTE handover on MPTCP throughput is less significant in the simulator than the real hardware testbed, and it is setup-dependent.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.