Connectivity-Based Survivability Analysis with Border Effects for Wireless Ad Hoc Network

  • Zhipeng Yi
  • Tadashi DohiEmail author
  • Hiroyuki Okamura
Part of the Management and Industrial Engineering book series (MINEN)


Taking account of border effects in communication network areas is one of the most important problems to quantify accurately the performance/dependability of wireless ad hoc networks (WAHNs), because the assumption on uniformity of network node density is often unrealistic to describe the actual communication areas. This problem appears in both modeling the node behavior of WAHNs and quantification of their network survivability. In this article, we focus on the border effects in WAHNs and reformulate the network survivability models based on a semi-Markov process, where two kinds of communication network areas are considered; square area and circular area. Based on some geometric ideas, we improve the quantitative network survivability measures for three stochastic models by taking account of the border effects, and revisit the existing lower and upper bounds of connectivity-based network survivability. While some analytical formulas on the quantitative network survivability have been proposed, they have not been validated yet by comparing with the exact value of network survivability in a comprehensive way. We develop a simulation model in two communication areas. It is shown through simulation experiments that the analytical solutions often fail the exact network survivability measurement in some parametric circumstances.


Network survivability Network connectivity WAHN Semi-Markov model Dos attack Border effects Simulation 


  1. 1.
    R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff and N. Mead, “Survival network systems: an emerging discipline,” Technical Report of SEI/CMU, CMU/SEI-97-TR-013 (1997).Google Scholar
  2. 2.
    J. C. Knight and K. J. Sullivan, “On the definition of survivability,” Technical Report of Dept. of Computer Science/University of Virginia, CS-TR-33-00 (2000).Google Scholar
  3. 3.
    S. C. Liew and K. W. Lu, “A framework for characterizing disaster-based network survivability,” IEEE Transactions on Selected Areas in Communications, vol. 12, no. 1, pp. 52–58 (1994).Google Scholar
  4. 4.
    A. Zolfaghari and F. J. Kaudel, “Framework for network survivability performance,” IEEE Transactions on Selected Areas in Communications, vol. 12, no. 1, pp. 46–51 (1994).Google Scholar
  5. 5.
    D. Chen, S. Garg and K. S. Trivedi, “Network survivability performance evaluation: a quantitative approach with applications in wireless ad-hoc networks,” Proceeding of ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM-2002), pp. 61–68, ACM (2002).Google Scholar
  6. 6.
    L. Cloth and B. R. Haverkort, “Model checking for survivability,” Proceeding of the 2nd IEEE Conference on Quantitative Evaluation of Systems (QEST-2005), pp. 145–154, IEEE CPS (2005).Google Scholar
  7. 7.
    P. E. Heegaard and K. S. Trivedi, “Netrwork survaivability modeling,” Computer Networks, vol. 53, pp. 1215–1234 (2009).Google Scholar
  8. 8.
    Y. Liu, V. B. Mendiratta and K. S. Trivedi, “Survaivability analysis of telephone access network,” Proceeding of the 15th IEEE International Symposium on Software Reliability Engineering (ISSRE-2004), pp. 367–378, IEEE CPS (2004).Google Scholar
  9. 9.
    Y. Liu and K. S. Trivedi, “Survaivability quantification: the analytical modeling approach,” International Journal of Performability Engineering, vol. 2, no. 1, pp. 29-44 (2006).Google Scholar
  10. 10.
    J. Zheng, H. Okamura and T. Dohi, “Survivability analysis of VM-based intrusion tolerant systems,” IEICE Transactions on Information & Systems (D), vol. E98-D, no. 12, pp. 2082-2090 (2015).Google Scholar
  11. 11.
    F. Xing and W. Wang, “Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes,” Proceeding of IEEE Conference on Communications (ICC-2006), pp. 1879–1884, IEEE CPS (2006).Google Scholar
  12. 12.
    F. Xing and W. Wang, “On the survivability of wireless ad hoc networks with node misbehaviors and failures,” IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 3, pp. 284–299 (2010).Google Scholar
  13. 13.
    C. Bettstetter, “On the minimum node degree and connectivity of a wireless multihop network,” Proceeding of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc-2002), pp. 80–91, ACM (2002).Google Scholar
  14. 14.
    C. Bettstetter, J. Klinglmayr and S. Lettner, “On the degree distribution of k-connected random networks,” Proceeding of IEEE Conference on Communications (ICC-2010), pp. 1–6, IEEE CPS (2010).Google Scholar
  15. 15.
    Z. Yi, T. Dohi, “Survivability analysis for a wireless ad hoc network based on semi-Markov model,” IEICE Transactions on Information & Systems, vol. E95-D, no. 12, pp. 2844–2851 (2012).Google Scholar
  16. 16.
    H. Okamura, Z. Yi, T. Dohi: Network survivability modeling and analysis for a power-aware MANETs by Markov regenerative processes, Telecommunication Systems Journal, vol. 60, pp. 471–484 (2015).Google Scholar
  17. 17.
    L. Laranjeira and G. N. Rodrigues, “Border effect analysis for reliability assurance and continuous connectivity of wireless sensor networks in the presence of sensor failures,” IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4232–4246 (2014).Google Scholar
  18. 18.
    [18] C. Bettstetter, “On the connectivity of ad hoc networks,” The Computer Journal, vol. 47, no. 4, pp. 432–447 (2004).Google Scholar
  19. 19.
    G. D. Caro, F. Ducatelle and L. M. Gambardella, “AntHocNet: An adaptive nature-inspired algorithm for routing in mobile ad hoc networks,” European Transactions on Telecommunications, vol. 16, no. 5, pp. 443–455 (2005).Google Scholar
  20. 20.
    L. Guo, “A new and improved algorithm for dynamic survivable routing in optical WDM networks,” Computer Communications, vol. 30, no. 6, pp. 1419–1423 (2007).Google Scholar
  21. 21.
    Z. Yi, T. Dohi and H. Okamura, “Survivability quantification of wireless ad hoc network taking account of border effects,” Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), pp. 149–158 (2015).Google Scholar
  22. 22.
    P. Valko and J. Abate, “Numerical inversion of laplace transform with multiple precision using the complex domain,”

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Information EngineeringHiroshima UniversityHigashi-HiroshimaJapan

Personalised recommendations