• Title/Summary/Keyword: 802.11i

Search Result 136, Processing Time 0.033 seconds

The IEEE 802.11 MAC Protocol to solve Unfairness Problem in Multihop Wireless Ad Hoc Networks (다중 무선 에드혹 네트워크에서 불공정 문제를 해결하기 위한 802.11 MAC 프로토콜)

  • Nam, Jae-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.91-94
    • /
    • 2007
  • In the IEEE 802.11 Wireless Local Area Networks (WLANs), network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. The BEB scheme suffers from a fairness problem and low throughput under high traffic load. In this paper, I propose a new backoff algorithm for use with the IEEE 802.11 Distributed Coordination Function.

  • PDF

A Session Key Exchange Scheme for Secure Vehicle Communication in V2I-based VANET Environments (V2I 기반의 VANET 환경에서 안전한 차량 통신을 위한 세션 키 교환 기법)

  • Ryu, Seung-Ho;Jung, Sou-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.311-317
    • /
    • 2008
  • This paper proposes a session key exchange scheme for providing secure communication between Vehicles and Infrastructure in VANET. In the current VANET environment, IEEE 802.11i or PKI based mechanism is used to provide secure communication between V2I. However, since the vehicles and the frequent changes of network topology, VANET nodes have some difficulties to exchange the session key using IEEE 802.11i or PKI method. In the proposed scheme, Local Router is newly defined for exchanging the session key between moving vehicles and infrastructure. A session key is generated by XOR operation based on the random values between Local Router and OBU. As a result, the proposed scheme has a noticeable advantage on the fastness of key exchange by exchanging session keys between LR and OBU.

Survey on the Authentication and Key Management of 802.11s

  • Lam, Jun Huy;Lee, Sang-Gon;Tan, Whye Kit
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

A Proposal of separation distance to minimize interference between 802.11a WLANs (802.11a 무선랜간 간섭최소화를 위한 이격거리 제안)

  • 손호경;이성수;이형수
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2002.11a
    • /
    • pp.191-195
    • /
    • 2002
  • 실내.외 환경에서 무선을 이용하여 데이터를 송수신하는 무선 LAN(Local Area Network)은 고속성과 이동성의 우수성으로 인하여 관심이 고조되고 있고, ETSI에 의한 HIPERLAN/2 와 IEEE 802.11 가 5㎓ 주파수대역에서 표준화되었고 개발 중이다. 본 논문에서는 향후 서비스 예정인 802.11a 무선랜간 간섭을 최소화시키기 위해 셀간 거리를 얼마나 이격 시켜야 되는지에 대하여 다룬다. 먼저 표준화 내용을 바탕으로 802.11a 무선랜의 C/I 비에 따른 성능평가를 수행하였고, 거리에 따른 처리율(throughput)을 시뮬레이션 하였다. 그리고 동일한 주파수를 사용하는 동일 셀에 의한 간섭의 영향을 보기 위하여 최악을 시나리오를 가정하여, 셀간 거리에 따른 무선랜의 성능의 변화를 보았고, 간섭을 최소화시키기 위해 최소한의 이격거리를 제안하였다.

  • PDF

Performance Evaluation of Throughput of 802.11e MAC Protocol for Supporting Internet QoS (인터넷 트래픽의 QoS 지원을 위한 802.11e MAC 프로토콜의 트래픽 처리율 성능평가)

  • Byun, Tae-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.446-452
    • /
    • 2006
  • In this paper, I evaluated the throughput of various multimedia traffic by using computer simulation over wireless LAN environment based on 802.11e MAC protocol. The number of mobile terminals which generate various traffic and have different Internet QoS varies to improve the reliability of performance evaluation by simulation. Therefore, we investigate throughput of traffic that each mobile terminal generates. I expect that the result of study will be utilized as a fundamental data to control priorities of various types of traffic in case of formulating a scheduling policy supporting a variety of Internet QoS over wired and wireless networks.

Binary Negative-Exponential Backoff Algorithm to Enhance The Performance of IEEE 802.11 WLAN (IEEE 802.11 무선랜의 성능 향상을 위한 Binary Negative-Exponential Backoff 알고리즘)

  • Ki, Hyung-Joo;Choi, Seung-Hyuk;Chung, Min-Young;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1229-1237
    • /
    • 2006
  • IEEE 802.11 has employed distributed coordination function (DCF) adopting carrier sense multiple access with collision avoidance (CSMA/CA). To effectively resolve collisions, DCF uses binary exponential backoff (BEB) algorithm with three parameters, i.e., backoff stage, backoff counter and contention window. If a collision occurs, stations involving in the collision increase their backoff stages by one and double their contention window sizes. However, DCF with BEB wastes wireless resource when there are many contending stations. Therefore, in this paper, to enhance the performance of wireless LAN, we propose binary negative-exponential backoff (BNEB) algorithm which maintains a maximum contention window size during collisions and reduces a contention window size to half after successful transmission of a frame without retransmissions. For IEEE 802.11, 802.11a and 802.11b standards, we also compare the performance of DCF with BEB to that with BNEB.

Inter-AP Security Transition Mechanism and Its FSM in WLAN AP Supporting Fast Roaming (이동 무선랜 접속장치의 접속점 보안 천이 메커니즘과 유한상태머신)

  • Chung ByungHo;Kang You Sung;Oh KyungHee;Kim SangHa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.601-606
    • /
    • 2005
  • Recently with the high expectation of voice over WLAN service, to supped fast inter-AP security transition in WLAN AP is one of the most actively investigating issues. It is also very important to minimize inter-AP security transition latency, while maintaining constantly the secure association from old AP when a station transits to new AP. Hence, this paper first defines secure transition latency as a primary performance metric of AP system in WLAN supporting IEEE802.11i, 802.1x, and 802.11f, and then presents low latency inter-AP security transition mechanism and its security FSM whose objective is to minimize inter-AP transition latency. Experiment shows that the proposed scheme outperforms the legacy 802.1X AP up to $79\%$ with regard to the transition latency.

Analytical Modeling of TCP Dynamics in Infrastructure-Based IEEE 802.11 WLANs

  • Yu, Jeong-Gyun;Choi, Sung-Hyun;Qiao, Daji
    • Journal of Communications and Networks
    • /
    • v.11 no.5
    • /
    • pp.518-528
    • /
    • 2009
  • IEEE 802.11 wireless local area network (WLAN) has become the prevailing solution for wireless Internet access while transport control protocol (TCP) is the dominant transport-layer protocol in the Internet. It is known that, in an infrastructure-based WLAN with multiple stations carrying long-lived TCP flows, the number of TCP stations that are actively contending to access the wireless channel remains very small. Hence, the aggregate TCP throughput is basically independent of the total number of TCP stations. This phenomenon is due to the closed-loop nature of TCP flow control and the bottleneck downlink (i.e., access point-to-station) transmissions in infrastructure-based WLANs. In this paper, we develop a comprehensive analytical model to study TCP dynamics in infrastructure-based 802.11 WLANs. We calculate the average number of active TCP stations and the aggregate TCP throughput using our model for given total number of TCP stations and the maximum TCP receive window size. We find out that the default minimum contention window sizes specified in the standards (i.e., 31 and 15 for 802.11b and 802.11a, respectively) are not optimal in terms of TCP throughput maximization. Via ns-2 simulation, we verify the correctness of our analytical model and study the effects of some of the simplifying assumptions employed in the model. Simulation results show that our model is reasonably accurate, particularly when the wireline delay is small and/or the packet loss rate is low.

Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN (802.11 무선랜에서 1 비트를 이용한 패킷 인증 방안)

  • Lee Sungryoul;Kang Jimyung;Moon hogun;Lee myungsoo;Kim Chong-Kwon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.465-472
    • /
    • 2005
  • IEEE 802.11 wireless LAN technology is essential for wireless internet, next generation converged network and home network. But, it is certain that user's privacy must be provided to expand the applicable area in IEEE 802.11 WLAN. Recently, WEP and 802.11i security scheme can be used in MAC Layer. But with VPN technology which is applied to WLAN user, it means that suity mechanism is used redundantly. One bit authentication mechanism was already proposed to solve this redundancy. In this paper, we analyze problems of 1-bit Authentication mechanism which are failure of synchronization and waste of packet. And we propose new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information. We show that our algorithm improves success probability of packet authentication up to $98\%$ and efficiency of authentication bit stream up to $97\%$.

A multi-hop Communication Scheme in Vehicular Communication Systems (차량통신시스템에서의 멀티홉 전송 방법)

  • Cho, Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.111-116
    • /
    • 2012
  • Vehicular communication is one of main convergence technologies which combines information and communication technology (ICT) with vehicle and road industries. In general, vehicular communication adopts IEEE 802.11p standard which is commonly referred as wireless access in vehicular environments (WAVE). In this paper, we investigate a multi-hop communication scheme for IEEE 802.11p based communication systems which support both vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communications. First, we briefly overview the performance of IEEE 802.11p based communication systems. Then, a multi-hop communication scheme is introduced for both broadcast and unicast. The performance of proposed scheme is presented via experimental measurements.