tions) the simple configuration generates shorter av-
erage paths (2.7 hops versus 3.2) and there is a big
difference is in the distribution of the MPR selector
set sizes as reported in figure 2(e) (for a total of 36
against 47). In figure 2(e) metric M1 is compared, the
curves seem very close but the difference in the MPR
selector set sizes makes the same threshold value cor-
respond to a different number of firewalls in the net-
work. If instead of comparing the MPR threshold the
two curves are compared using the number of fire-
walls per simulation (roughly this can be done shift-
ing the curve for the simple scenario two units left),
then an average 10% difference can be measured. In
conclusion this comparison suggests that the MPR se-
lector size threshold used as an approximation of cen-
trality seems to be independent from the topology at
this network size and that the simple scenario overes-
timates the firewall performance compared to a real-
istic one due to the shorter average path.
5 CONCLUSIONS
Cooperative firewalls can positively impact the per-
formances of ad-hoc and mesh networks. They play
a useful role in the enforcement of security policies,
for reactive security when the network is under attack,
to perform traffic shaping or to limit the diffusion of
traffic without relying on the support of applications.
Nevertheless, large rule-sets are hard to be handled
by the limited computation power of common mo-
bile devices. In this paper the impact of the com-
putational overhead has been measured showing that
thousands of rules introduce a large delay in RTT. It
has been shown that limiting the number of firewalls
in the network still allows to filter a high percentage
of unwanted traffic and that without adding complex-
ity, the performances can be improved using the in-
formation produced by OLSR. Since the behavior of
a routing protocol is very scenario-dependent a net-
work simulator with realistic mobility and path-loss
models has been realized on top of Omnet++ plat-
form. The source code is available on the project site:
www.pervacy.eu.
ACKNOWLEDGEMENTS
Financed by Provincia di Trento under The Trentino
programme of research, training and mobility of
post-doctoral researchers, incoming Post-docs 2010
CALL 1, PCOFUND-GA-2008-226070
REFERENCES
Alicherry, M., Keromytis, A., and Stavrou, A. (2008).
Distributed firewall for manets. Technical report,
Columbia University.
Alicherry, M., Keromytis, A. D., and Stavrou, A. (2009).
Evaluating a collaborative defense architecture for
manets. In Conference on Internet multimedia ser-
vices architecture and applications, IMSAA.
Fantacci, R., Maccari, L., Ayuso, P., and Gasca, R. (2008).
Efficient packet filtering in wireless ad hoc networks.
Communications Magazine, IEEE, 46(2):104 –110.
Ioannidis, S., Keromytis, A. D., Bellovin, S. M., and Smith,
J. M. (2000). Implementing a distributed firewall. In
ACM Conference on Computer and Communications
Security, Athens, Greece.
Katsaros, D., Dimokas, N., and Tassiulas, L. (2010). Social
network analysis concepts in the design of wireless ad
hoc network protocols. Network, IEEE, 24(6):23 –29.
Li, J., Wang, H., and Khan, S. U. (2012). A semantics-
based approach to large-scale mobile social network-
ing. ACM/Springer Mobile Networks and Applica-
tions, 17.
Musolesi, M. and Mascolo, C. (2006). A community based
mobility model for ad hoc network research. In In-
ternational workshop on Multi-hop ad hoc networks:
from theory to reality, REALMAN ’06.
Neira, P., Gasca, R., Maccari, L., and Lefevre, L. (2008).
Stateful firewalling for wireless mesh networks. In
New Technologies, Mobility and Security, NTMS ’08.
Sommer, C., Eckhoff, D., German, R., and Dressler, F.
(2011). A Computationally Inexpensive Empirical
Model of IEEE 802.11p Radio Shadowing in Urban
Environments. In 8th Conference on Wireless On de-
mand Network Systems and Services (WONS 2011).
Taghizadeh, M., Khakpour, A., Liu, A., and Biswas, S.
(2011). Collaborative firewalling in wireless net-
works. In Joint Conference of the IEEE Computer and
Communications Societies, INFOCOM 2011.
Zhang, H., DeCleene, B., Kurose, J., and Towsley, D.
(2008). Bootstrapping deny-by-default access control
for mobile ad-hoc networks. In Military Communica-
tions Conference, 2008. MILCOM 2008. IEEE.
Zhao, H. and Bellovin, S. M. (2009). Source prefix filtering
in ROFL. Technical Report CUCS-033-09, Depart-
ment of Computer Science, Columbia University.
Zhao, H. and Bellovin, S. M. (2010). High performance
firewalls in MANETs. In International Conference on
Mobile Ad-hoc and Sensor Networks.
Zhao, H., Chau, C.-K., and Bellovin, S. M. (2008a).
ROFL: Routing as the firewall layer. In New Security
Paradigms Workshop.
Zhao, H., Lobo, J., Roy, A., and Bellovin, S. M. (2011).
Policy refinement of network services for MANETs.
In The 12th IFIP/IEEE International Symposium on
Integrated Network Management (IM 2011).
Zhao, S., Aggarwal, A., Liu, S., and Wu, H. (2008b). A
secure routing protocol in proactive security approach
for mobile ad-hoc networks. In Wireless Communica-
tions and Networking Conference, WCNC 2008.
ACollaborativeFirewallforWirelessAd-HocSocialNetworks
295