• Title/Summary/Keyword: 애드-혹 네트워크

Search Result 649, Processing Time 0.027 seconds

A Multicast Routing Protocol for Reducing the Control Overhead in Mobile Ad-Hoc Networks (이동 애드-혹 네트워크 환경에서 컨트롤 오버 헤드를 줄이기 위한 멀티캐스트 라우팅 프로토콜)

  • Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.459-465
    • /
    • 2002
  • Ad-hoc networks have the dynamic topology characteristics and most of the applications on ad-hoc networks require the group communication capability. Previously proposed multicast mechanisms on mobile ad-hoc networks build multicast-infrastructures like the tree or mesh for the group communication and these infrastructures nay cause significant overhead especially in a highly dynamic mobile ad-hoc network environment. Therefore, in this paper, we propose a new multicast mechanism supporting multicast services based on only the underlying unicast routing tables, hence any multicast-related infrastructures like trees and meshes are not required to be constructed.

Secure ID-Based Key Agreement Protocol with Anonymity for Mobile Ad Hoc Networks (이동 애드혹 네트워크에서의 익명성을 제공하는 아이디 기반의 안전한 키 교환 프로토콜)

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.92-101
    • /
    • 2012
  • Security support is a significant factor in ad hoc networks. Especially in dynamic topologies, key agreement with private key updating is essential in providing a secure system. And it is also necessary to protect the identities of individual nodes in wireless environments to avoid personal privacy problems. However, many of the existing key agreement schemes for ad hoc networks do not consider these issues concurrently. This paper proposes an anonymous ID-based private key update scheme and a key agreement scheme for mobile ad hoc networks. We also suggest a method of rekeying between different domains using service-coordinators. These schemes are secure against various attacks and are suitable for service-oriented mobile ad hoc networks.

A Routing Protocol for Improving Path Stability in Mobile Ad-hoc Networks (애드혹 네트워크에서 경로 안정성 향상을 위한 라우팅 프로토콜)

  • Kim, Hyungjik;Choi, Sunwoong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1561-1567
    • /
    • 2015
  • Nodes of Mobile ad-hoc network usually use the energy-limited battery. Balanced energy consumptionis important to maintain path's stability. In this paper, we focus on improving the stability of the routing path in mobile ad-hoc networks. For that purpose, we propose a new routing protocol to find the highest minimum node residual energy path among shortest paths. The largest path of minimum value of the remain energy has a longer life than other paths to improve the reliability to data-transmission. Using ns-3 simulator, we show that the proposed routing protocol can provide more long-life stable routing path than AODV and EA-AODV.

Interference Aware Channel Estimation for Wireless Ad Hoc Networks (무선 애드혹 네트워크에서의 간섭 제어 채널 추정 기법)

  • Lee, Byungju;Park, Sunho;Shim, Byonghyo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.27-28
    • /
    • 2013
  • 본 논문에서는 간섭 제한 적인 상황에서 지정된 채널을 추정해야 하는 실제적인 무선 애드혹 네트워크에서 비모수 선형 MMSE 필터 기반의 간섭 제어 채널 추정 기법을 사용하여 네트워크 성능을 개선시키는 새로운 기법을 제안한다. 제안하는 채널 추정 기법은 간섭의 정도에 따라 노드를 활성화 시키고 지정된 채널 추정을 한다. 실제적인 무선 애드혹 네트워크 모의실험을 통해 제안된 기법이 기존의 채널 추정 기법에 비해 상당한 전송 캐패시티 이득을 얻을 수 있음을 확인할 수 있다.

  • PDF

An Ad-Hoc Network Routing Scheme based on Mechanism Design Approach (메커니즘 디자인 접근방식에 기반을 둔 애드혹 네트워크 라우팅 기법)

  • Lee, Jin-Hyung;Kim, Sung-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.198-203
    • /
    • 2010
  • In this paper, a new routing protocol is proposed to manage selfish nodes which make a strategic choice to maximize only their own profits. To provide incentives to nodes on the path, VCG mechanism is introduced. Therefore, based on the collaborative actions among nodes, the entire network performance can be improved. With a simulation study, the proposed scheme can approximate an optimized solution while ensuring a well-balanced network performance under widely diverse network environments.

A robust linear MMSE receiver for Wireless Ad Hoc Networks (무선 애드혹 네트워크에서 효율적인 선형 MMSE 수신기)

  • Lee, Byungju;Park, Sunho;Lim, Chaehee;Shim, Byonghyo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.107-108
    • /
    • 2012
  • 본 논문에서는 수신단에서 간섭 단말들의 채널상태정보가 불완전한 무선 애드혹 네트워크에서 비모수 선형 MMSE 수신기를 사용하여 네트워크 전송 용량을 향상시키는 기법을 제안한다. 비모수 선형 MMSE 수신기는 수신신호의 자기 상관을 이용한다. 지정된 채널정보를 간섭과 잡음으로만 이루어진 관측들에 포함시킴으로써, 제안된 기법은 최적의 MMSE 전송 용량의 상당한 부분을 달성한다. 실제적인 애드혹 네트워크 시스템의 전송용량 모의실험을 통해 제안된 기법이 기존의 수신 알고리즘에 비해 상당한 성능 이득을 얻을 수 있음을 확인하였다.

  • PDF

A Design of ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc (애드 혹 네트워크에서 위치 정보와 홉 카운트 기반 ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.73-81
    • /
    • 2012
  • This paper proposes an ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) design based on positional information and hop count on Ad-Hoc Network. The ETWAD technique is designed for generating GAK(Group Authentication Key) to ascertain the node ID and group key within Ad-hoc Network and authenticating a member of Ad-hoc Network by appending it to RREQ and RREP. In addition, A GeoWAD algorithm detecting Encapsulation and Tunneling Wormhole Attack by using a hop count about the number of Hops within RREP message and a critical value about the distance between a source node S and a destination node D is also presented in ETWAD technique. Therefore, as this paper is estimated as the average probability of Wormhole Attack detection 91%and average FPR 4.4%, it improves the reliability and probability of Wormhole Attack Detection.

A Tabu Search Algorithm for Minimum Energy Cooperative Path Problem in Wireless Ad hoc Networks (무선 애드 혹 네트워크에서 최소 에너지 협력 경로 문제를 위한 타부 서치 알고리즘)

  • Jang, Kil-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1444-1451
    • /
    • 2016
  • This paper proposes a Tabu search algorithm to minimize the required energy to send data between a source and a destination using the cooperative communication in wireless ad hoc networks. As the number of nodes in wireless ad hoc networks increases, the amount of calculation for establishing the path between nodes would be too much increased. To obtain the optimal cooperative path within a reasonable computation time, we propose a new Tabu search algorithm for a high-density wireless network. In order to make a search more efficient, we propose some efficient neighborhoods generating operations of the Tabu search algorithm. We evaluate those performances through some experiments in terms of the minimum energy required to send data between a source and a destination as well as the execution time of the proposed algorithm. The comparison results show that the proposed algorithm outperforms other existing algorithms.

IPv6 Address Autoconfiguration for AODV in Mobile Ad Hoc Networks (이동 애드혹 네트워크 환경에서 AODV를 위한 IPv6 주소 자동 설정)

  • Ahn, Sang-Hyun;Kim, Young-Min;Lee, Young-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2007
  • An advantage of the mobile ad hoc network (MANET) is that mobile nodes can self-organize the network topology without the help of network infrastructure. However, for the perfect self-organization of the MANET, each mobile node needs to self-configure its address. Even though a mobile node configures a unique address during the booting time, its address may conflict with nodes in other MANETs since MANETs containing the same address can be merged. The address autoconfiguration protocol implemented in this work consists of the strong DAD (Duplicate Address Detection) and the weak DAD. A unique address of a node is assigned by the strong DAD during the booting time and the weak DAD is used to detect address conflict and resolve address conflict during the ad hoc routing. In this work, we have implemented address autoconfiguration in the IPv6-based MANET using AODV as the routing protocol. We describe how the IPv6 address autoconfiguration is implemented and verify our implementation by showing the test scenarios on our testbed.

The Design, Implementation, and Evaluation of a User-Level Mobile Ad Hoc Network Routing with COTS Devices (사용자 계층 모바일 애드혹 라우팅 네트워크 설계와 실제 환경에서의 성능 검증)

  • Kim, Joon-Gyum;Gong, Taesik;Lee, Sung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.845-851
    • /
    • 2019
  • We design, implement, and evaluate a user-level ad hoc network routing protocol on the COTS (commercial off-the-shelf) mobile devices. In situations such as disaster recovery, emergency communication between mobile devices is necessary. For wide deployability and usability of such a system, we design and implement the networking protocols on the user level instead of modifying the kernel of mobile devices. In order to support reliable data transfer in high mobility scenarios, we selected to implement AODV (Ad Hoc On-Demand Distance Vector) as the routing protocol and TCP as the transport layer protocol. With our implementation of ad hoc networking stack on COTS smartphones, we conducted experiments in various networking environments. Our experimental results show that ad hoc networking is possible in up to 12 hops in a line topology and 5 concurrent devices in a star topology.