I. Next Generation Wireless Communications Systems 1. Transmission Protocols A) TCP Performance in Satellite Communications Systems B) Handoff Management in Wireless Heterogeneous Networks 2. Mobility Management and Quality of Service Routing A) Traffic Engineering in Satellite Communications Systems B) Mobility Management in Mobile IPv6 C) Routing in VANET Networks D) Efficient Use of Energy in Sensor Networks 3. II. On-Demand Multimedia Transmission Internet Security 1. Early Detection of Internet Worms 2. Detection of Denial of Service Attacks in Hybrid Wired/Wireless Networks 3. Intrusion Detection Systems for Encrypted Attacks Next Generation Wireless Communications Systems Transmission Protocols TCP Performance in Satellite Communication Systems In this research work, we examine some issues that affect the efficiency and fairness of the Transmission Control Protocol (TCP), the backbone of Internet protocol communication, in multi-hops satellite network systems. We propose a scheme that allows satellite systems to automatically adapt to any change in the number of active TCP flows due to handover occurrence, the free buffer size, and the bandwidth-delay product of the network. An extension of this research work to terrestrial networks, particularly to “one-to-many” network topologies where a set of servers provide a potential number of users with a plethora of services (ex. Video-on-Demand -- VoD), is also examined. The proposed scheme has two major design goals: Increasing the system efficiency and improving its fairness. The system efficiency is controlled by matching the aggregate traffic rate to the sum of the link capacity and total buffer size. On the other hand, the system min-max fairness is achieved by allocating bandwidth among individual flows in proportion with their Round Trip Times (RTTs). The proposed scheme is dubbed Recursive, Explicit, and Fair Window Adjustment (REFWA). The extended version of REFWA to terrestrial networks is called Terrestrial- REFWA (T-REFWA). Simulation results elucidate that the REFWA and T-REFWA schemes substantially improve the system fairness, reduce the number of packet drops, and make better utilization of the bottleneck link. The results demonstrate also that the proposed schemes work properly in more complicated environments where connections traverse multiple bottlenecks and the available bandwidth may change over data transmission time. Handoff Mangament in Wireless Heterogeneous Networks Recent trends in telecommunication industry are toward the development of ubiquitous information systems where the provision of a plethora of advanced multimedia services should be possible regardless of time and space limitations. An efficient and seamless delivery of multimedia services over various types of wireless networks is still a challenging task. The underlying difficulty consists in the disparity in the bandwidth availability over each network type. Indeed, the fundamental challenge upon a handoff phenomenon in a heterogeneous wireless network consists in an efficient probing of the bandwidth availability of the new network, followed by a prompt adjustment of the data delivery rate. In this research work, we design and evaluate a cross layer approach that involves five layers, namely physical, data link, application, network, and transport layers. The three former layers are used to anticipate the handoff occurrence and to locate the new point of attachment to the network. Based on their feedback, the transport layer is used then to probe the resources of the new network using low-priority dummy packets. This bandwidth probing operation is called Dummy Segment based Bandwidth Probing (DSBP). Being the most widely used protocols for multimedia delivery, this research work addresses multimedia applications based on TCP and RTP protocols. The design of the whole cross layer architecture is discussed and enhancements to the two protocols are proposed. The performance of the enhanced TCP and RTP protocols is evaluated and compared with existing schemes through extensive simulations. The obtained results are encouraging and promising for the delivery of multimedia services in heterogeneous wireless networks. Mobility Management and Quality of Service Routing Traffic Engineering in Satellite Communications Systems Due to geographical and/or climatic constraints, the community of future satellite users will exhibit a significant variance in its density over the Globe. This density variance will yield a scenario where some satellite links are congested while others are underutilized. To ensure an intelligent engineering of traffic over satellite networks, this research work envisions a routing protocol that enables neighboring satellites to explicitly exchange information on their congestion status. A satellite that is about to get congested requests its neighboring satellites to decrease their data forwarding rates. In response, the neighboring satellites search for less congested paths that do not include the satellite in question and communicate a portion of data, primarily destined to the satellite, via the retrieved paths. By so doing, congestion, and the resulting packet drops, can be avoided. A better distribution of traffic among satellites can be guaranteed as well. The proposed scheme is dubbed “Explicit Load Balancing” (ELB) scheme. A set of simulations is conducted to evaluate the performance of the ELB scheme using the Network Simulator. In terms of Quality of Service, encouraging results are obtained: better traffic distribution, higher throughput, and lower packet drops. While this research work considers the case of satellite communications systems, the proposed mechanism can be easily applied also to terrestrial networks where nodes are aware of their neighboring nodes. Mobility Management in Mobile IPv6 Recent trends in telecommunications industry are toward ubiquitous information technologies. Communications over emerging mobile networks are thus gaining a tremendous interest at both industrial and academic levels. A major concern for mobile networks consists in finding efficient ways to handle the user mobility so that the handover process has minimum effect on user's ongoing sessions. Given the dominance of Internet-based applications in next-generation mobile networks, Mobile IP has become an important protocol to accommodate the IP mobility. To overcome the excessive delay and signaling involved in the first version of Mobile IP, the Hierarchical Mobile IPv6 (HMIPv6) protocol has been introduced. The key concept behind HMIPv6 is to locally handle handovers by the usage of an entity called Mobility Anchor Point (MAP). While the new protocol provides a more efficient way for the mobility management in IP networks, it does not control traffic among multiple MAPs in the network. As a result, in many cases the selected MAP is overloaded and extensive delays are experienced during the routing process. To tackle this problem, this research work portrays a new technique called Dynamic and Efficient MAP Selection (DEMAPS). In the proposed scheme, the most optimum MAP with the lightest traffic load is selected. This selection is based on an estimation of MAP load transition using the Exponential Moving Average (EMA) method. Simulation results demonstrate that DEMAPS can balance the signaling traffic load efficiently among MAPs and provides a superior network performance compared to traditional HMIP schemes. Routing in VANET Networks Internetworking over Vehicle Ad-hoc Networks (VANETs) is getting increasing attention from all major car manufacturers. The design of effective vehicular communications poses a series of technical challenges. Guaranteeing a stable and reliable routing mechanism over VANETs is an important step towards the realization of effective vehicular communications. In current ad-hoc routing protocols, the control messages in reactive protocols and route update timers in proactive protocols are not used to anticipate link breakage. They solely indicate presence or absence of a route to a given node. Consequently, the route maintenance process at both protocol types is initiated only after a link breakage event takes place. This research work argues the use of information on vehicle headings to predict a possible link breakage event prior to its occurrence. Vehicles are grouped according to their velocity vectors. When a vehicle shifts to a different group and a route, involving the vehicle, is to be broken, the proposed protocol searches for a more stable and “more durable” route that includes vehicles from the same group. The proposed scheme is dubbed Velocity-Heading based Routing Protocol (VHRP). The proposed scheme can be implemented on any existing routing protocol and its performance is evaluated through computer simulations. Simulation results indicate that knowledge on the vehicles’ heading adds major benefits to routing in terms of reducing the number of link breakage events and increasing the end-to-end throughput. Efficient Use of Energy in Sensor Networks In this research work, we consider the use of LEO satellites to build a global and energy-efficient sensor network. To reduce the total cost of the architecture, a heterogeneous environment with two types of nodes is envisioned. Exploiting the multicast capabilities of the satellites, a set of signaling packets is introduced to guarantee an efficient use of the nodes energy. Nodes are grouped into dynamically changing clusters based on their distance to cluster heads. Their transmission powers are accordingly adjusted. This directionality-based transmission fashion helps to largely minimize the energy drainage at each node. At each coverage area, a single cluster head gathers data from its neighboring cluster heads and transmits it to the satellite on behalf of them. This yields to an efficient use of the cluster heads energy. From these characteristics, the proposed approach is expected to achieve some savings in the scarce energy of nodes and thus to increase the lifetime of the sensor network. By substituting LEO systems with High-Altitude Platforms (HAP) or Unmanned Airborne Vehicles (UAV), a more cost-effective system can be realized. On-Demand Multimedia Transmission Since the number of Internet users is rapidly increasing day by day and even the most powerful server system will always be resource limited, one of the challenges faced by multimedia-on-demand system designers is how to configure a system that can support a potentially large number of customers and a large multimedia library to satisfy users’ needs at affordable rates. In this research work, we propose an approach to provide a significantly scalable multimedia-on-demand service in a multicast environment. The basic idea is to repeatedly transmit popular video items on staggered channels. If a request comes in between staggered start times, the user joins to the most recently started multicast session and then requests the missing part from a nearby neighbor. Users must have enough buffer space to buffer data between staggered transmissions. We refer to the proposed architecture as Neighbors-Buffering Based Video-on-Demand (NBB-VoD) architecture. Based on a combination of satellite systems and terrestrial networks, we build also a global, large-scale, and efficient Video-on-Demand (VoD) architecture. A hybrid network made of fixed and mobile nodes is considered. The key idea of the architecture is to service fixed nodes according to the NBB policy, while mobile nodes are served directly from the local server. To allow users to receive their multimedia applications with higher degree of mobility, issues related to mobility management are discussed and a simple scheme is proposed to guarantee a smooth streaming of video data. The entire architecture is referred to as a “Theatre in the Sky”. The importance of the proposed architecture is verified by numerical results. In case of requests coming from fixed nodes within the reach of terrestrial networks, analytical results elucidate the good performance of the architecture in terms of both increasing the system capacity and reducing the disk-bandwidth requirements. Conducted simulations indicate how efficient the proposed system is in smoothening handoffs. Internet Security Early Detection of Internet Worms Internet worms pose a serious threat to the Internet. In this research work, we propose a signature-based Intrusion Detection System (IDS) to detect worms. An anomaly analysis module is embedded in the IDS to detect novel worms. The proposed system detects novel worms and instantly generates their signatures, making it possible to check the spread of any kind of worm –known or unknown ones. We envision a two-layer hierarchical architecture comprising of local security managers, metropolitan security managers, and a global security manager. Local managers collect worm-like or suspicious flows and hand them to metropolitan managers. Metropolitan managers then use cluster analysis to sort worms from the suspicious flows. These sorted worms are used to generate worm signatures. The global manager relays the signature to the local managers. We also present a scheme to automatically decide optimum values for the system parameters that best suit the prevailing network state. We evaluate the proposed scheme using real network traffic that contains traces of worms. Through experiments using real network traffic, we show that the proposed method is capable of detecting worms at the early phase of their propagations. Detection of Denial of Service Attacks in Hybrid Wired/Wireless Networks Protection of Mobile IP networks from Denial-of-Service (DoS) attacks, a serious security threat in today’s Internet, is a one major step toward making this paradigm a reality. The paper proposes a method to detect DoS attacks, issued from mobile users, in the vicinity of flooding sources and in early stages before they cripple the targeted system. The fundamental challenge in attack detection consists in distinguishing between simple flash events and DoS attacks so as not to deprive innocent users from having legitimate accesses. In this research work, this distinction is based on the fact that legitimate TCP flows obey the congestion control protocol, whereas misbehaving sources remain unresponsive. Suspicious flows are sent a test feedback and are required to decrease their sending rates. Legitimacy of such flows is decided based on their responsiveness. The scheme performance is evaluated through a set of simulations and encouraging results are obtained: short detection latency and high detection accuracy. Intrusion Detecion Systems for Encrypted Attacks Most modern servers run equipped with cryptographic or encrypted protocols such as Secure Socket Layer (SSL), Transport Layer Security (TLS), and Secure Socket protocol (SSH). These encrypted protocols, however, themselves are subject to exploits, unauthorized access and attacks. By monitoring such activities in the network, it is possible to cut off such attacks before they cause serious damage to the intended target. The objective of this research work is to offer an anomaly based detection system against attacks on cryptographic protocols. Upon detecting such an attack, the proposed system will take action against the attacker by tracing back to the attack source. The detection, prevention and tracing back are carried out at distributed monitor stubs which are simply network-sniffers without modifying incoming or outgoing network packets.