Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zygmunt J. Haas is active.

Publication


Featured researches published by Zygmunt J. Haas.


IEEE Network | 1999

Securing ad hoc networks

Lidong Zhou; Zygmunt J. Haas

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework.


ieee international conference on universal personal communications | 1997

A new routing protocol for the reconfigurable wireless networks

Zygmunt J. Haas

We propose a new routing protocol, the Zone Routing Protocol (ZRP), for the reconfigurable wireless networks, a large scale, highly mobile ad-hoc networking environment. The novelty of the ZRP protocol is that it is applicable to large flat-routed networks. Furthermore, through the use of the zone radius parameter, the scheme exhibits the adjustable hybrid behavior of proactive and reactive routing schemes. We evaluate the performance of the protocol, showing the reduction in the number of control messages, as compared with other reactive schemes, such as flooding.


international conference on computer communications | 1999

Predictive distance-based mobility management for PCS networks

Ben Liang; Zygmunt J. Haas

This paper presents a mobile tracking scheme that exploits the predictability of user mobility patterns in wireless PCS networks. Instead of the constant velocity fluid-flow or the random-walk mobility model, a more realistic Gauss-Markov model is introduced, where a mobiles velocity is correlated in time to a various degree. Based on the Gauss-Markov model, a mobiles future location is predicted by the network based on the information gathered from the mobiles last report of location and velocity. When a call is made, the network pages the destination mobile at and around the predicted location of the mobile and in the order of descending probability until the mobile is found. A mobile shares the same prediction information with the network and reports its new location whenever it reaches some threshold distance away from the predicted location. We describe an analytical framework to evaluate the cost of mobility management for the proposed predictive distance-based scheme. We then compare this cost against that of the regular, non-predictive distance-based scheme, which is obtained through simulations. Performance advantage of the proposed scheme is demonstrated under various mobility and call patterns, update cost, page cost, and frequencies of mobile location inspections.


mobile ad hoc networking and computing | 2003

The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way)

Tara Small; Zygmunt J. Haas

In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizing the delay or maximizing the capacity. However, in between these extremes, there are schemes that allow instantiations of various degrees of this tradeoff. Infostations, which offer geographically intermittent coverage at high speeds, are one such an example. Indeed, through the use of the Infostation networking paradigm, the capacity of a mobile network can be increased at the expense of delay. We propose to further extend the Infostation concept by integrating it with the ad hoc networking technology. We refer to this networking model as the Shared Wireless Infostation Model (SWIM). SWIM allows additional improvement in the capacity-delay tradeoff through a moderate increase in the storage requirements. To demonstrate how SWIM can be applied to solve a practical problem, we use the example of a biological information acquisition system - radio-tagged whales - as nodes in an ad hoc network. We derive an analytical formula for the distribution of end-to-end delays and calculate the storage requirements. We further extend SWIM by allowing multi-tiered operation; which in our biological information acquisition system could be realized through seabirds acting as mobile data collection nodes.


symposium on applications and the internet | 2003

Secure link state routing for mobile ad hoc networks

Panagiotis Papadimitratos; Zygmunt J. Haas

Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.


mobile ad hoc networking and computing | 2000

On the impact of alternate path routing for load balancing in mobile ad hoc networks

Marc R. Pearlman; Zygmunt J. Haas; Peter Sholander; Siamak S. Tabrizi

Alternate path routing (APR) can provide load balancing and route failure protection by distributing traffic among a set of diverse paths. These benefits make APR appear to be an ideal candidate for the bandwidth limited and mobile ad-hoc networks. However, we find that APRs potential is not fully realized in ad-hoc networks because of route coupling resulting from the geographic proximity of candidate paths between common endpoints. In multiple channel networks, coupling occurs when paths share common intermediate nodes. The coupling problem is much more serious in single channel networks, where coupling also occurs where one path crosses the radio coverage area of another path, The networks inherent route coupling is further aggravated by the routing protocol, which may provide an incomplete view of current network connectivity. Through analysis and simulation, we demonstrate the impact of route coupling on APRs delay performance in ad-hoc networks. In multiple channel environments, APR is able to provide a 20% reduction in end-to-end delay for bursty data streams. Though these gains are appreciable, they are about half what we would expect from APR with independently operating routes. Route coupling is so severe in single channel networks that APR provides only negligible improvements in quality of service.


IEEE ACM Transactions on Networking | 2006

Gossip-based ad hoc routing

Zygmunt J. Haas; Joseph Y. Halpern; Li Li

Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations of flooding, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. Gossiping exhibits bimodal behavior in sufficiently large networks: in some executions, the gossip dies out quickly and hardly any node gets the message; in the remaining executions, a substantial fraction of the nodes gets the message. The fraction of executions in which most nodes get the message depends on the gossiping probability and the topology of the network. In the networks we have considered, using gossiping probability between 0.6 and 0.8 suffices to ensure that almost every node gets the message in almost every execution. For large networks, this simple gossiping protocol uses up to 35% fewer messages than flooding, with improved performance. Gossiping can also be combined with various optimizations of flooding to yield further benefits. Simulations show that adding gossiping to AODV results in significant performance improvement, even in networks as small as 150 nodes. Our results suggest that the improvement should be even more significant in larger networks


vehicular technology conference | 2005

Interference-aware IEEE 802.16 WiMax mesh networks

Hung-Yu Wei; Samrat Ganguly; Rauf Izmailov; Zygmunt J. Haas

The IEEE 802.16 WiMax standard provides a mechanism for creating multi-hop mesh, which can be deployed as a high speed wide-area wireless network To realize the full potential of such high-speed IEEE 802.16 mesh networks, two efficient wireless radio resource allocation extensions were developed The objective of this paper is to propose an efficient approach for increasing the utilization of WiMax mesh through appropriate design of multi-hop routing and scheduling. As multiple-access interference is a major limiting factor for wireless communication systems, we adopt here an interference-aware cross-layer design to increase the throughput of the wireless mesh network. In particular, our scheme creates a tree-based routing framework, which along with scheduling is interference aware and results in a much higher spectral efficiency. Performance evaluation results show that the proposed interference-aware scheme achieves significant throughput enhancement over the basic IEEE 802.16 mesh network.


acm special interest group on data communication | 2005

Resource and performance tradeoffs in delay-tolerant wireless networks

Tara Small; Zygmunt J. Haas

Wireless and mobile network technologies often impose severe limitations on the availability of resources, resulting in poor and often unsatisfactory performance of the commonly used wireless networking protocols. For instance, power and memory/storage constraints of miniaturized network nodes reduce the throughput capacity and increase the network latency. Through various approaches and technological advances, researchers attempt to somehow compensate for such hardware limitations. However, this is not always necessary. Sometimes, the required performance of such networks does not need to adhere to the level of services that would be required for performance-critical applications. For example, for some applications of sensor networks, minimal latency is not a critical factor and it could be traded off for a more limited resource, such as energy or throughput. Such networks are termed delay-tolerant networks. Thus, to reduce the energy expenditure, transmission range of such sensor nodes would be quite short, leading to network topologies in which the average number of neighbors of the network nodes is very small. If the sensor nodes are mobile, then most of the time a node has <u>no</u> neighbors; only infrequently another node migrates into its neighborhood. This means that the classical networking approach of store-and-forward would not work well, as there is nearly never an intact path between a source and a destination. Several routing protocols have been proposed for this type of networking environment, one example is the Shared Wireless Infostation Model (SWIM), where a packet propagates through the network by being copied (rather than forwarded) from a node to a node, as links are sporadically created. The goal is that one of the copies of the packet reaches the destination. SWIM is an example of the way that non-critical performance could be traded off for insufficient resources, such as the tradeoffs between energy, delay, storage, capacity, and processing complexity. In this paper, we examine some of these tradeoffs, exposing the ways in which resources could be saved by compromising on the level of performance, as to satisfy the particular limitations of network technologies.


IEEE ACM Transactions on Networking | 2003

Predictive distance-based mobility management for multidimensional PCS networks

Ben Liang; Zygmunt J. Haas

This paper presents a mobile tracking scheme that exploits the predictability of user mobility patterns in wireless PCS networks. In this scheme, a mobiles future location is predicted by the network, based on the information gathered from the mobiles recent report of location and velocity. When a call is made, the network pages the destination mobile around the predicted location. A mobile makes the same location prediction as the network does; it inspects its own location periodically and reports the new location when the distance between the predicted and the actual locations exceeds a threshold. To more realistically represent the various degrees of velocity correlation in time, a Gauss-Markov mobility model is used. For practical systems where the mobility pattern varies over time, we propose a dynamic Gauss-Markov parameter estimator that provides the mobility parameters to the prediction algorithm.Based on the Gauss-Markov model, we describe an analytical framework to evaluate the cost of mobility management for the proposed scheme. We also present an approximation method that reduces the computational complexity of the cost evaluation for multidimensional systems. We then compare the cost of predictive mobility management against that of the regular, nonpredictive distance-based scheme, for both the case with ideal Gauss-Markov mobility pattern and the case with time-varying mobility pattern.The performance advantage of the proposed scheme is demonstrated under various mobility patterns, call patterns, location inspection cost, location updating cost, mobile paging cost, and frequencies of mobile location inspections. As a point of reference, prediction can reduce the mobility management cost by more than 50% for all systems, where a the mobile users have moderate mean velocity and where performing a single location update is as least as expensive as paging a mobile in one cell.

Collaboration


Dive into the Zygmunt J. Haas's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jing Deng

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Ben Liang

University of Toronto

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard D. Gitlin

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge