• Title/Summary/Keyword: 무선응용프로토콜

Search Result 326, Processing Time 0.031 seconds

A Study on the Energy Efficient MAC Layer ARQ Protocol for Wireless Ubiquitous Networks (무선 유비쿼터스 네트워크를 위한 에너지 효율적인 MAC Layer ARQ 프로토콜에 대한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 2011
  • The development of wireless sensor networks (WSN) can be motivated by several types of applications. However, these applications demand an energy-efficient WSN that can prolong the network lifetime and can provide high throughput, low latency and delay. Designing wireless sensor networks with the capability of prolonging network lifetime catch the attention of many researchers in wireless system and network field. Contrasts with Mobile Ad Hoc Network system, Wireless Sensor Networks designs focused more on survivability of each node in the network instead of maximizing data throughput or minimizing end-to-end delay. In this paper, we will study part of data link layer in Open Systems Interconnection (OSI) model, called medium access control (MAC) layer. Since the MAC development of energy aware MAC Protocol for wireless sensor layer controls the physical radio part, it has a large impact on the overall energy consumption and the lifetime of a node. This paper proposes a analytical approach that tries to reduce idle energy consumption, and shows the increasement of network end-to-end arrival rate due to efficiency in energy consumption from time slot management.

Delegation-based Authentication Protocol for Cognitive Radio Network (인지무선네트워크를 위한 위임기반 인증 프로토콜)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.79-86
    • /
    • 2015
  • Cognitive radio networks (CRNs) offer the promise of intelligent radios that can learn from and adapt to their environment. CRN permits unlicensed users to utilize the idle spectrum as long as it does not introduce interference to the primary users due to the Federal Communications Commission's recent regulatory policies. Thereby, the security aspects in CRNs should be different with the other networks. The purpose of this paper is to devise a new delegation-based authentication protocol (NDAP) by extracting out the security aspects for unlicensed user authentication over CRNs from Tsai et al's delegation-based authentication protocol (TDAP). First of all, we will provide security analyses on the TDAP and set design goal for unlicensed user authentication. Then, we will propose a NDAP as a remedy mechanism for the TDAP and a new protocol for CRNs. The NDAP could be used as a security building block for the CRNs and various convergence applications.

Seamless and Robust Vehicular MIPv6: VMIPv6 for Vehicular Ad hoc Network (자동차 무선 네트워크 환경에서 연속적이고 견고한 IPv6기반의 이동성 프로토콜)

  • Oh, Ha-Young;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.122-134
    • /
    • 2010
  • With the rapidly increasing demand of traffic applications, the need to support seamless and robust multimedia services in the Vehicular Ad hoc Network is growing. Fast handover for the MIPv6 (FMIPv6) developed to solve the MIPv6's problem as well as Mobile IPv6 (MIPv6) for basic mobility protocol have been developed to support seamless handover in mobile environment. However, MIPv6 and FMIPv6 are useless for Quality-of-Service (QoS) services such as multimedia applications due to the long handover latency and the packet loss problem. In this paper, we propose a seamless and robust handover scheme that supports multimedia services in Vehicular Ad hoc Network using oCoA and background DAD. Through performance evaluation, we show that the proposed scheme is more proper for Vehicular Ad hoc Network than other schemes.

A Routing Protocol of Optimal Medium per Hop based on a Max-Win Method (OMH-MW) for Overlapped Maritime Data Networks with Multiple Media (다중무선매체로 중첩된 해상데이터망을 위한 최다승기반 홉 단위 최적매체 경로배정 프로토콜)

  • Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.35 no.5
    • /
    • pp.667-674
    • /
    • 2011
  • Data networks at sea will be overlapped networks with not only traditional carriers such as RF, satellites but also BWA like wireless LAN, WiBro, and WCDMA in near future. In this paper, an overlapped MANET model for data networks at sea, and a routing protocol (OMH-MW) selecting optimal transmission medium for each hop in routes are proposed. OMH-MW measures the optimality of each medium regarding the transmission characteristics of each application and those of the medium in together. The most suitable medium to each link is selected as the link in routes. Performances are compared with those of the MWR (Max-Win based Routing protocol searching optimal routes with only one medium).

Optimization of multiplication-techniques for a Pairing for sensor network security protocol based on bilinear map (Bilinear map 기반 센서네트워크 보안프로토콜을 위한 Pairing용 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Lee, Dong-Geon;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06a
    • /
    • pp.166-170
    • /
    • 2010
  • 센서네트워크는 유비쿼터스 환경을 실현할 수 있는 기술로서, 최근 무인 경비 시스템이나 에너지 관리, 환경 모니터링, 홈 자동화, 헬스케어 응용 등과 같은 다양한 응용 분야에 활용되고 있다. 하지만 자신의 정보가 무선통신상에 쉽게 노출됨으로써 도청과 전송 메시지에 대한 위변조, 서비스 거부 공격을 받을 위험이 있다. 더욱이 센서네트워크의 자원 제약성(적은 메모리, 컴퓨팅 성능의 제약)과 키분배 관리의 어려움으로 인해 기존의 공개키, 대칭키 기반의 면안프로토콜을 대체할 수 있는 프로토콜이 필요하다. 그러므로 키분배 관리에 장 접을 가지는 Bilinear map 기반 프로토콜은 적합한 대안이다. 하지만 프로토콜에 사용되는 Pairing연산은 높은 컴퓨팅 성능이 요구된다. 따라서 제한된 성능을 가진 센서상의 구현을 위해서는 Computation Cost를 줄이고 연산 수행 속도를 가속화 할 필요성이 있다. 본 논문에서는 프로토콜 구현에 필요한 Pairing의 핵심 연산인 Multiplication을 대표적인 센서노드 프로세서인 MSP430상에서 최적화 구현함으로써 성능을 개선한다.

  • PDF

Optimization Protocol using Load Balancing for Hierarchical Wireless Sensor Network (무선센서네트워크에서 부하 균등화를 위한 클러스터링 최적화 프로토콜)

  • Choi, Hae-Won;Kim, Sang-Jin;Pye, Su-Young;Chang, Chu-Seock
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.419-429
    • /
    • 2013
  • The Wireless sensor network(WSN) consisting of a large number of sensors aims to gather data in a variety of environments. The sensor nodes operate on battery of limited power. so, To extend network life time is major goals of research in the WSN. In this paper, we state the key point of a energy consumption with minimum&load balancing. The proposed protocol guarantee balance of number of cluster member nodes using the node memory threshold and optimization of distribution of cluster head using the optimized clustering method. The results show that the proposed protocol could support the load balancing and high energy efficiency by distributing the clusters with a reasonable number of member nodes. The simulation results show that our schme ensure longer life time in WSN as compare with existing schemes such as LEACH and CBLM.

The Simple Wakeup Scheduling Protocols Considering Sensing Coverage in Wireless Sensor Networks (무선 센서 네트워크에서 센싱 커버리지를 고려한 Wake-up 스케줄링 프로토콜)

  • Cho, Jae-Kyu;Kim, Gil-Soo;Kwon, Tae-Kyoung;Choi, Yang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1A
    • /
    • pp.41-49
    • /
    • 2009
  • A crucial issue in deploying wireless sensor networks is to perform a sensing task in an area of interest in an energy-efficient manner since sensor nodes have limited energy Power. The most practical solution to solve this problem is to use a node wake-up scheduling protocol that some sensor nodes stay active to provide sensing service, while the others are inactive for conserving their energy In this paper, we present a simple wake-up scheduling protocol, which can maintain sensing coverage required by applications and yet increase network lifetime by turning off some redundant nodes. In order to do this, we use the concept of a weighted average distance. A node decides whether it is active or inactive based on the weighted average distance. The proposed protocol allows sensor nodes to sleep dynamically while satisfying the required sensing coverage.

Optimization of the Handover Technology for IP-Base Realtime Application in Mobile Networks (IP기반의 모바일 네트워크에서 실시간 응용을 지원하기 위한 핸드오버 기술의 최적화)

  • Lee, Jae-Suk;Jeong, Jong-Pil
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.277-279
    • /
    • 2012
  • 이동성관리는 미래의 IP 무선 네트워크에 대한 중요한 연구 과제이다. 이동성관리를 효율적으로 제공하기 위해 IETF에 의해 MIP 프로토콜이 제안되었으며, 이후 단점을 보안하기 위한 다양한 형태의 프로토콜들이 제안되었다. 이 프로토콜들은 이동 중에 높은 품질을 유지하기 위해 핸드오프 지연 최소화에 초점을 맞추고 있으며 핸드오프 시그널링 분석을 위한 기법들이 제안되었다. 이러한 분석기법을 이용하여 각 프로토콜들을 수학적으로 평가하고 시그널링에 대하여 분석한다. 이 논문에서는 다양한 이동성 프로토콜에 대하여 특정 엔티티의 지연 시간이 증가할 때 미치는 영향에 대해서 분석하여 효율적인 프로토콜 선택에 대해 평가하고자 한다.

Vulnerabilities Analysis for Authentication Protocol of Passive RFID Security Tag (수동형 RFID 보안태그와 리더의 인증 및 데이터 보호 프로토콜 보안 취약점 분석)

  • Chu, Sangho;Kim, Seongyun;Kim, Howon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1177-1179
    • /
    • 2010
  • RFID는 태그가 부착된 사물의 정보를 무선통신을 통해 인식하는 기술로써 바코드를 대체하는 등 다양한 영역으로 응용 범위가 확대되고 있다. 따라서 각 응용에 필요한 보안 문제도 중요시 되고 있다. 본 논문에서는 지금까지 RFID시스템의 보안 취약성을 해결하기 위해 제안된 많은 인증 프로토콜들 중 한국정보통신기술협회에서 제정한 잠정표준인 "수동형 RFID 보안태그와 리더의 인증 및 데이터 보호 프로토콜"에 대하여 프라이버시 침해, 위치추적, 비동기화 공격 가능 및 전방향 안전성을 만족하지 못하는 등의 보안 취약점이 있음을 보이고, 이에 대한 분석을 하였다.

A Simulation Study of MAC Protocol Based on Beacon Mode for Considering IEEE 802.15.7 Star Topology Visible Personal Area Network System (IEEE 802.15.7 스타 토폴로지 VPAN 시스템을 고려한 비콘 모드 기반 MAC 프로토콜 성능 평가)

  • Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.247-256
    • /
    • 2013
  • According to the complete standard document for PHY/MAC layer of visible light communication through the IEEE 802.15.7 WG on Sept. 2011, visible light communication lays a good foundation for developing a variety of application services. Thus, visible light communication moves to the advanced research period for developing application services, but most of applications are limited only to PtP service model. However, PtMP communication environment for VLC is required to accommodate more various applications. In this paper, we analyze an effect of key parameters on network performance in the star topology based visible personal area network system. We implement a simulator with considering attributes of PHY and MAC layer which are defined by IEEE 802.15.7 standard documents, and analyze the VLC performance.