Spring 2022
ENSC 833: NETWORK PROTOCOLS AND PERFORMANCE

FINAL PROJECTS:


  • 1. Hardeep Kaur Ranu and Ali Tajvidy
        (hranu at sfu.ca, ata145 at sfu.ca)

    Simulation and evaluation of MANET routing protocols in a 5G-IoT network using ns-3

    Abstract:
    The Internet of things (IoT) has a key role in the future of wireless networks [1 and 2]. In recent years, the Internet network has had a rapid growth because of widespread coverage of LTE (Long Term Evolution) networks. Therefore, so all electronic devices can be easily connected to the Internet [2]. Moreover, 5G network has an exclusive bandwidth for IoT applications which has created a golden opportunity to form a new generation of IoT networks which can easily communicate with each other in every corner [2]. Based on architecture of 5G-IoT, there is an IoT gateway in this architecture which is a low power wide area network (LPWAN) for IoT applications. Accordingly, we are going to select Wi-Fi as a LPWAN [2] due to being available in NS3 and evaluate MANET (mobile ad-hoc networks) routing protocols [3] in a 5G-IoT network where being low power of devices can be a challenge for these routing protocols [3-5].

    References:
    [1] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," in IEEE Access, vol. 7, pp. 82721-82743, 2019, doi: 10.1109/ACCESS.2019.2924045.
    [2] L. Chettri and R. Bera, "A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems," in IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, Jan. 2020, doi: 10.1109/JIOT.2019.2948888.
    [3] S. Vemuri and S. Mirkar, "A Performance Comparison of MANET Routing Protocols," 2021 Innovations in Power and Advanced Computing Technologies (i-PACT), 2021, pp. 1-5, doi: 10.1109/i-PACT52855.2021.9696785.
    [4] H. Kharrufa, H. A. A. Al-Kashoash and A. H. Kemp, "RPL-Based Routing Protocols in IoT Applications: A Review," in IEEE Sensors Journal, vol. 19, no. 15, pp. 5952-5967, 1 Aug.1, 2019, doi: 10.1109/JSEN.2019.2910881.
    [5] K. Kodali and B. Kirti, "NS-3 Model of an IoT network," 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), 2020, pp. 699-702, doi: 10.1109/ICCCA49541.2020.9250808.


  • 2. Nawshaad Khan, Hossain Mahbub, and Rohil Malhotra
        (mnk7 at sfu.ca, hmm7 at sfu.ca, rma118 at sfu.ca)

    Vulnerability assessment of ad hoc networks under different simulation scenarios

    Abstract:
    An ad hoc system is a set of wireless mobile nodes that is creating a temporary dynamic network without using any existing network structure or centralized network system. To communicate with each other, nodes use different routing protocols to forward packets of data to other nodes in the network. There are different classes of wireless ad hoc networks, such as mobile ad hoc networks, vehicular ad hoc networks, wireless sensor networks, etc. Nowadays, ensuring security in Mobile Ad hoc Network (MANET) is a challenging issue due to the lack of centralized privileges and limited resources. Sybil and Wormhole attacks are the two most severe security threats in ad-hoc networks. Hence, significant security measures are essential for secured packet delivery operations. In our project, we would like to explore the effects of Sybil and Wormhole attacks in mobile ad hoc networks for a routing protocol under different simulation scenarios. We will simulate different scenarios by using the network simulator of Riverbed Modeler Academic Edition 17.5. The performance results of our project work will be evaluated based on parameters such as different number of nodes, transmit power, throughput, packet loss, delay times, etc. We would like to present the behavior of performance parameters when there is an attack to assess security vulnerabilities in mobile ad hoc networks.

    References:
    [1] S. Goyal, T. Bhatia and A. K. Verma, "Wormhole and Sybil attack in WSN: A review," 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 2015, pp. 1463-1468.
    [2] R. Das et al., "Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5," 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2016, pp. 1-9, doi: 10.1109/UEMCON.2016.7777831.
    [3] S. Sinha, A. Paul and S. Pal, "The sybil attack in Mobile Adhoc Network: Analysis and detection," Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 2013, pp. 458-466, doi: 10.1049/cp.2013.2629.
    [4] C. Piro, C. Shields and B. N. Levine, "Detecting the Sybil Attack in Mobile Ad hoc Networks," 2006 Securecomm and Workshops, 2006, pp. 1-11, doi: 10.1109/SECCOMW.2006.359558.
    [5] A. Gupta, V. J. Priyanka, and S. Upadhyay, "Analysis of Wormhole Attack in AODV based MANET using OPNET Simulator," International Journal of Computing, Communications and Networking, vol. 1, no. 2, Oct. 2012.


  • 3. Animesh, Nikita Banga, and Aiman Sania Meenai
        (aaa170 at sfu.ca, nba45 at sfu.ca, asm24 at sfu.ca)

    Analysis of selfish miner attack on hybrid blockchain network

    Abstract:
    Blockchains are becoming increasingly famous especially in finance, Medical, government services, and smart home devices. Main reason behind this popularity is the underlying principle of being decentralized and immutability. Although the security of blockchain abounds in various fields, concerns in terms of network communication (Links to an external site.) and security are gradually increasing. Because of the lack of reliable attack analysis systems, privacy theft attacks are challenging. Initially blockchain was introduced in Bitcoins which followed the public peer to peer network architecture that was decentralized and entities no longer had the power to make any unethical changes in the network. Recent developments in blockchain networking have introduced a hybrid model in which the whole infrastructure is a combination of public and private blockchain. One of the main uses of this kind of network include reduced transaction time and cost. In the hybrid blockchain bitcoin network, transactions and records are kept in a private network while all the other components such as blocks and hash values are kept in public for everyone to see and mine. Important entities can be monitored and managed within a private network while all the mining and block synchronization can be done on a public network. Hybrid blockchain enables the organization that runs the blockchain to make sure no user can gain more than 50% control of authentication; 51% attacks are no longer a problem in the network. Hybrid blockchain is still not immune to Selfish miner attack as unethical miners can still hold the mined block in private and then add them later causing fair miner to lose on computation and energy, eventually wasting resources without gaining any profit. In our study, we are planning to replicate a selfish miner attack over a hybrid blockchain network and understand the various factors of the attack. We will run multiple simulations for different scenarios of selfish mining’s and if time persists we can also check the factors which govern the timing for Proof of Work mechanism in blockchain and try to implement it on our hybrid network to understand if we can reduce the POW time, hence make selfish miner attack less effective.

    References:
    [1] B. D. Cahya Putri and R. Fitri Sari, "The Effect of Latency on Selfish-Miner Attack on Block Receive Time Bitcoin Network Using NS3," 2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2018, pp. 1-5, doi: 10.1109/TSSA.2018.8708772.
    [2] W. Hyun, "Hybrid peer-to-peer network based layered blockchain architecture for enhancement of synchronization performance," 2021 International Conference on Information and Communication Technology Convergence (ICTC), 2021, pp. 1461-1463, doi: 10.1109/ICTC52510.2021.9621046.
    [3] I. G. A. K. Gemeliarana and R. F. Sari, "Evaluation of Proof of Work (POW) Blockchains Security Network on Selfish Mining," 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2018, pp. 126-130, doi: 10.1109/ISRITI.2018.8864381
    [4] Yourong Chen, Hao Chen, Yang Zhang, Meng Han, Madhuri Siddula, Zhipeng Cai, A survey on blockchain systems: Attacks, defenses, and privacy preservation, High-Confidence Computing, Volume 2, Issue 2, 2022, 100048, ISSN 2667-2952, https://doi.org/10.1016/j.hcc.2021.100048.
    [5] Michal K., Patryk K., Michal S., and Piotr J. (2020) Analysis of Blockchain Selfish Mining Attacks. In: Borzemski, L., Swiatek, J., Wilimowska, Z. (eds) Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019. Advances in Intelligent Systems and Computing, vol 1050. Springer, Cham.


  • 4. Mary Joseph and Mohammed Shuhad
        (mja103 at sfu.ca, msa325 at sfu.ca)

    Analysis of routing protocols in wireless mesh networks (WMN) using ns-3

    Abstract:
    Wireless Mesh Network (WMN) is a wireless, ad hoc, communication network made up of two or more wireless radio nodes arranged in mesh topology. The radio nodes are less dynamic and more static, causing the nodes to spend more time in delivering the data rather than updating the routes. The nodes seek to create the most optimum path to deliver the data from the first node that received the information to the destination node. One of the contributing factors that impact the performance of a WMN is the underlying routing protocol used. In this project, we aim to simulate a WMN as well as apply different routing protocols on it. The performance of the different protocols will be analyzed based on routing parameters using the ns-3 simulation software.

    References:
    [1] Kirill Andreev and Pavel Boyko, "IEEE 802.11s Mesh Networking NS-3 Model", in Workshop on ns-3, 2010.
    [2] B. Paul, S. Konwar, U. Gogoi, A. Chakraborty, N. Yeshmin, and S. Nandi, "Implementation and performance evaluation of AODV in wireless mesh networks using ns-3", in International Conference on Education Technology and Computer, vol. 5, 2010, pp. 298-303.
    [3] A H Mozumder, T Acharjee, S Roy, "Scalability performance analysis of batman and HWMP protocols in wireless mesh networks using ns-3", in International Conference On Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 , pp. 1-5.
    [4] K. Matsuo, T. Oda, D. Elmazi, S. Sakamoto and L. Barolli, "Performance Evaluation of AODV, OLSR and HWMP Protocols in Ad-Hoc Networks and MANET Scenarios", in International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015, pp. 15-21.
    [5] D. Dugaev and E. Siemens, "A wireless mesh network NS-3 simulation model: implementation and performance comparison with a real testbed," International Conference on Applied Innovations in IT (ICAIIT), March 2014, pp. 1-5.
    [6] N. S. Benni, S. S. Manvi, and A. T. H, "Performance analysis of hybrid routing protocols in wireless mesh networks using variation in maximum speed," in International Conference on Communications and Signal Processing (ICCSP), April 2015, pp. 1370-1373.


  • 5. Wenpei Li and Meng Zhang
        (wenpeil at sfu.ca, mza117 at sfu.ca)

    Simulation and performance analysis of Tor networks

    Abstract:
    Tor (The Onion Routing) network, a network that helps users browse network anonymously, is well known for its anonymity and privacy protection feature, especially in the period when many agencies fancy about learning users' location or tracking users' browsing habits. This specific routing algorithm bounces internet traffic through "relays" run by intermediate nodes in the network which employ secure and encrypted protocols to protect users' online privacy. This project aims at simulating its property of anonymity and analyzing the corresponding performance. A simplified Tor network is implemented using the NS-3 simulation environment. Some performance metrics such as the number of packets received, average end-to-end delay, bandwidth utilization, and comparative analysis are provided according to different topological scenarios.

    References:
    [1] H. K. Wardana, L. F. Handianto and B. W. Yohanes, "The onion routing performance using shadow-plugin-TOR," 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017, pp. 1-5, doi: 10.1109/EECSI.2017.8239183.
    [2] Tor Performance [Online]. Available: https://metrics.torproject.org/torperf.html
    [3] McCoy, D., Bauer, K., Grunwald, D., Kohno, T., & Sicker, D. (2008, July). Shining light in dark places: Understanding the Tor network. In International symposium on privacy enhancing technologies symposium (pp. 63-76). Springer, Berlin, Heidelberg. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-540-70630-4_5
    [4] Dingledine, R., Mathewson, N., and Syverson, P. (2004). Tor: The second-generation onion router. Naval Research Lab Washington DC. [Online]. Available: https://www.freehaven.net/anonbib/cache/tor-design.pdf
    [5] Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected areas in Communications, 16(4), 482-494. [Online]. Available: https://www.onion-router.net/Publications/JSAC-1998.pdf
    [6] Dahal, S., Lee, J., Kang, J., and Shin, S. (2015, January). Analysis on end-to-end node selection probability in Tor network. In 2015 International Conference on Information Networking (ICOIN) (pp. 46-50). IEEE. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7057855
    [7] Jansen, R., Bauer, K. S., Hopper, N., and Dingledine, R. (2012, August). Methodically Modeling the Tor Network. In CSET. [Online]. Available: https://www.usenix.org/conference/cset12/workshop-program/presentation/jansen


  • 6. Jason Epp, Chuan Jiang, and Yanyan Zhang
        (jea24 at sfu.ca, chuanj at sfu.ca, yza585 at sfu.ca)

    Implementation of MPTCP with ns-3 and analysis

    Abstract:
    Multipath TCP (MPTCP) is a protocol that utilizes multiple network interfaces, such as Wi-Fi, and Mobile networks simultaneously to balance the load on each interface creating a reliable connection. This is also beneficial for smooth handover from one network to another when moving between Wi-Fi and mobile connections by creating a reliable connection to one network before closing the other. With the additional bandwidth and MPTCP should be able to provide reliable low latency, high bandwidth video streaming to users by balancing loads over different networks and having redundant data links in case of interruptions of service. This project implements a MPTCP with ns-3 and evaluated the performance of real-time video transmission in terms of latency, bandwidth, and reliability. The expectation is that MPTCP should have a better performance compared to TCP in video streaming. This project is intended to show illustrations of the performance improvement.

    References:
    [1] Kheirkhah, M and Wakeman I and Parisis, G (2015) Multipath-TCP in ns-3 [Source code]. https://github.com/mkheirkhah/mptcp.
    [2] M. Coudron and S. Secci, "An implementation of multipath TCP in ns3," Archives of Computer Networks, vol. 116, pp. 1-11, Feb 2017.
    [3] M. Morawski and P. Ignaciuk, "A Price to Pay for Increased Throughput in MPTCP Transmission of Video Streams," 2020 24th International Conference on System Theory, Control and Computing (ICSTCC), 2020, pp. 673-678, doi: 10.1109/ICSTCC50638.2020.9259712.
    [4] B. Chihani and D. Collange, "A Multipath TCP model for ns-3 simulator," arXiv:1112.1932v1 [cs.NI] 8 Dec 2011.
    [5] M. Prakash and A. Abdrabou, "On the Fidelity of NS-3 Simulations of Wireless Multipath TCP Connections," Sensors (Basel), vol. 20, no. 24, pp. 7289, Dec 2020, doi:10.3390/s20247289.
    [6] M. Kheirkhah and I. Wakeman and G. Parisis, "Multipath-TCP in ns-3" arXiv:1510.07721v1 [cs.NI] 26 Oct 2015.


  • 7. Licheng Bao, Linqi Cheng, and Yiran Wang
        (lichengb at sfu.ca, linqic at sfu.ca, ywa391 at sfu.ca)

    Performance analysis of video streaming using Riverbed Modeler

    Abstract:
    Nowadays, video streaming plays an important role in the networks, due to the wide usage of multimedia. In this case, it is more important to examine the performance of network topologies and protocol. In protocol IEEE802.11, it defines several multicast protocols which can improve the reliability of audio and video transmission. In this project, we try to use Riverbed modeler to simulate and analyze the video streaming in different situations and consider the conditions such as latency, etc.

    References:
    [1] Su, Su, X., Bai, Y., Wang, M., Vasilakos, A. V., and Wang, H. (2015). QoE in video streaming over wireless networks: perspectives and research challenges. Wireless Networks, 22(5), 1571-1593. https://doi.org/10.1007/s11276-015-1028-7
    [2] Kim, and Park, S. (2017). Delay model of multicast protocols co-existing with legacy unicast in IEEE 802.11 wireless local area network. IET Communications, 11(9), 1438-1445. https://doi.org/10.1049/iet-com.2016.0660
    [3] Krishan, and Laxmi, V. (2015). IEEE 802.11 WLAN Load Balancing for Network Performance Enhancement. Procedia Computer Science, 57, 493-499. https://doi.org/10.1016/j.procs.2015.07.371
    [4] Ghadiyaram, Pan, J., and Bovik, A. C. (2018). Learning a Continuous-Time Streaming Video QoE Model. IEEE Transactions on Image Processing, 27(5), 2257-2271. https://doi.org/10.1109/TIP.2018.2790347
    [5] Ashwin Rao et al. "Network Characteristics of Video Streaming Traffic", presented at the 11: Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies, December 2011, Article No.: 25, Pages 1-12, https://doi.org/10.1145/2079296.2079321


  • 8. Lok Hin Ng, Shenze Sun, and Zining Zhao
        (lhn5 at sfu.ca, ssa472 at sfu.ca, zza246 at sfu.ca)

    Analysis of mobile gaming performance under 4G/Wi-Fi using Riverbed Modeler academic edition 17.5

    Abstract:
    Mobile games are becoming more and more popular nowadays. By the end of 2019 the mobile gaming market had grown to an estimated worth of $65.5Bn and accounted for almost 50% of the total global game market[1]. Speed of the network is crucial for gaming experience. Players can experience buffering effects when playing fast paced games due to the unideal network environment[5]. With the continuous popularity of mobile phones, mobile game players also increase. It is necessary to analyze and simulate the gaming performance in different network environments. This will provide great reference value for future game development and help improve the experience of gamers. 4G is one of the standards of mobile phone networking and communication [3]. It stands for "The fourth generation of mobile phone mobile communication technology standards". It is mainly designed to provide internet for smartphones, tablets and other mobile devices. 4G utilizes radio waves, with a standard indicated by International Telecommunication Union (ITU), which allows users to enjoy internet speed of up to 100 Mbits/second even moving physically at high speed. On the other hand, WiFi is a networking protocol that provides internet connectivity within a fixed location. WiFi requires a router or another device that's capable of wireless transmission [4]. Once a router has been strategically set up at your home, it transmits data and sends out a signal for devices within its range[2]. 4G and Wi-Fi are both wireless connection methods widely used on mobile devices. We believe that analyzing gaming performance in the 4G/Wi-Fi environment has high research value.

    References:
    [1] Y. Liu, H. Dar, and R. Sharp, "Mobile Gamer Modelling and Game Performance Preference Measurement," 2020 IEEE Conference on Games (CoG), 2020, pp. 632-635, doi: 10.1109/CoG47356.2020.9231860.
    [2] The Lowdown on LTE and WiFi: What Exactly is the Difference? https://www.globe.com.ph/go/technology/article/lte-wifi-difference.html#gref
    [3] E. T. Tchao, J. D. Gadze, and J. O. Agyapong, "Performance Evaluation of a Deployed 4G LTE Network", https://arxiv.org/ftp/arxiv/papers/1804/1804.05771.pdf , (IJACSA) International Journal of Advanced Computer Science and Application, Vol. 9, No. 3, 2018.
    [4] J. Sebastian Nixon and Roba Seyoum Tola, "Analyzing Wireless Local Area Network Traffic Authentication Delay in Different Metrics to Improve Its Performance", http://www.warse.org/IJATCSE/static/pdf/file/ijatcse105862019.pdf, International Journal of Advanced Trends in Computer Science and Engineering, Volume 8, No. 6, 2019
    [5] Peter Christiansen and Kevin Parrish Edited by Cara Haynes, Christiansen, P., and Parrish, K. (2022, January 7). How much speed do I need for online gaming? HighSpeedInternet.com. Retrieved February 14, 2022, from https://www.highspeedinternet.com/resources/how-much-speed-do-i-need-for-online-gaming


    Last modified: Sat 19 Mar 2022 13:12:26 PDT.