• Title/Summary/Keyword: Ad Hoc 무선망

Search Result 234, Processing Time 0.025 seconds

A Study on Efficient Security Technique in Ad Hoc Network (Ad hoc Network에서 효율적인 보안 기법에 관한 연구)

  • Yang, Hwan-Seok;Kim, Jong-Min;Jeong, Jong-Pil;Lee, Woong-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1189-1192
    • /
    • 2004
  • Ad hoc network는 중앙 집중화된 관리나 표준화된 지원 서비스의 도움 없이 임시 망을 구성하는 무선 이동 호스트들의 집합으로서 제한된 무선 채널을 통해 이동 노드간의 통신을 수행하는 멀티 홉(multi-hop) 무선 네트워크이다. 따라서 중앙 집중화된 보안 기반구조가 아니기 때문에 보안 공격을 받기가 쉽게 된다. 기존의 보안 방법중의 하나인 threshold cryptography는 키의 유지와 분배를 위한 효율적인 구조를 제공하였으나 라우팅의 오버헤드가 증가하였고, 네트워크 전역의 트래픽이 증가되었다. 본 논문에서는 threshold cryptography에 의해 야기되는 오버헤드를 줄이고 인증된 패킷 전달을 돕기 위한 새로운 접근 방법을 제안한다.

  • PDF

Study on Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (이동 Ad Hoc 망에 대한 동적 소스 라우팅 프로토콜에 관한 연구)

  • 하재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1219-1224
    • /
    • 2001
  • There can exist unidirectional links due to asymmetric property of mobile terminals or current wireless environments on practical mobile ad hoc networks. However, at present, the existing mobile ad hoc routing protocols are implemented to support only bidirectional links. Thus, in this paper, we extend the existing dynamic source routing protocol in order to implement a new routing protocol, which is fit to mobile ad hoc networks containing unidirectional links. For performance evaluation, we use combinations of mobility scenario files and connection pattern files from Carnegimelon Univ. We consider received data rate and average route discovery time as evaluation items, which are compared and evaluated for three suggested route discovery methods.

  • PDF

Energy-Aware Routing Protocol for Mobile Ad Hoc Network (노드의 여유 에너지 기반 이동 Ad Hoc 네트워크의 라우팅 프로토콜)

  • Kwon, Soo-Kun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1108-1118
    • /
    • 2005
  • A mobile Ad Hoc network is a dynamic mobile wireless network that can be formed without the need for any pre-existing wired or wireless infrastructure. A mobile ad hoc node has limited battery capacity. Hence, Ad Hoc routing protocol ought to be energy conservative. Previous energy aware routing has limit in fairness among nodes and network wide power consumption. In this research, we propose a new routing protocol called Clustering Based Energy-Aware Routing(CBEAR) which can improve the problems. Simulation results show that the routing protocol improves fairness and network wide power consumption as well as life time of nodes.

  • PDF

Energy-Efficient Routing Protocol for Hybrid Ad Hoc Networks (하이브리드 애드 혹 네트워크에서의 에너지 효율성을 고려한 라우팅 알고리즘)

  • Park, Hye-Mee;Park, Kwang-Jin;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.133-140
    • /
    • 2007
  • Currently, as the requirement for high quality Internet access from anywhere at anytime is consistently increasing, the interconnection of pure ad hoc networks to fixed IP networks becomes increasingly important. Such integrated network, referred to as hybrid ad hoc networks, can be extended to many applications, including Sensor Networks, Home Networks, Telematics, and so on. We focus on some data communication problems of hybrid ad hoc networks, such as broadcasting and routing. In particular. power failure of mobile terminals is the most important factor since it affects the overall network lifetime. We propose an energy-efficient routing protocol based on clustering for hybrid ad hoc networks. By applying the index-based data broadcasting and selective tuning methods, the infra system performs the major operations related to clustering and routing on behalf of ad hoc nodes. The proposed scheme reduces power consumption as well as the cost of path discovery and maintenance, and the delay required to configure the route.

  • PDF

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Program Develop Network (Ad-hoc 통신망에서 요구되는 라우팅 알고리즘 프로그램 개발연구)

  • Lee, Dong chul;Kim, Sung gwun;Cho, Se hyun;Lee, Hye soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.623-625
    • /
    • 2012
  • The nodes of Ad-hoc network are made up of location registration for sending informations and a great number of packet transmissions to maintain routing route among the nodes. Under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extent of the traffic in order to control the traffics of the multi-hop in Ad-hoc.

  • PDF

Autonomous Broadcast Pruning Scheme using Coverage Estimation in Wireless Ad Hoc Network (무선 Ad Hoc 망에서 영역 추정을 통한 ABP 브로드캐스트 기법)

  • Bae Ki chan;Kim Nam gi;Yoon Hyun soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.170-177
    • /
    • 2005
  • Due to the redundant rebroadcast packets, network-wide broadcasting is a costly operation in wireless mobile ad hoc networks. To reduce this redundancy, most of previous approaches implicitly or explicitly require periodic refreshing of neighborhood information which continuously imposes additional broadcast overheads. In this paper, we propose a practical broadcast pruning scheme based on the local prediction of a remained coverage area. As the proposed scheme uses only information available in the on-going broadcast process, it can minimize the overheads prevalent in previous approaches.

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

Performance Improvement of Channel Access Control Method in Wireless Mesh Networks (무선 메쉬 네트워크에서 성능향상을 위한 채널접속 제어 방법)

  • Lee, Soon-Sik;Yun, Sang-Man;Lee, Sang-Wook;Jeon, Seong-Geun;Kim, Eung-Soo;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.572-580
    • /
    • 2010
  • The Wireless Mesh Network uses a wireless communication technology with transmission rates simular to a cable which is used as a backbone networks. The topology structure is in a Mesh form which resembles an Ad-hoc networks. However, a metric is needed in order to set the channel access control method to operate intentions and interior motions are different. In this document, an efficient channel for delivering datas to improve access controls to a wireless mesh networks. The improved performance of the proposed plan is for a hidden and exposed mesh client through an exclusive channels to perform a proposed and analyzed methods.

Secure Routing Protocol in Ad-Hoc Network (Ad-Hoc 라우팅 프로토콜에서의 보안)

  • Kim, Min-Jeong;Kim, Kee-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.1273-1276
    • /
    • 2003
  • Ad-Hoc 네트워크는 네트워크 내의 노드들이 이동 노드로서의 역할 뿐 아니라 라우터로서의 역할도 담당하여 기존의 인프라를 통한 중앙관리 및 지원 없이 네트워크 내의 무선 이동 노드들만으로 망을 구성하며, 네트워크의 특성상 보안이 취약하다는 단점이 있다. 현재 Ad-Hoc 네트워크는 그 적용 범위와 활용 빈도가 확대되고 있으며, 네트워크 분야에서의 비중이 증가하고 있으므로 유선에서 제공하는 수준의 보안을 제공할 수 있도록 해야 한다. 그러나 관련연구는 아직 취약한 실정이므로 현재 표준으로 제안된 라우팅 프로토콜을 기반으로 보안을 제공하기 위챈 제안된 프로토콜에 관해 살펴본다.

  • PDF

Design and Implementation of a Simulator for Wireless Personal Area Network over Bluetooth (블루투스 기반 개인영역망을 위한 시뮬레이터 설계 및 구현)

  • 정경인;정영삼;이혁준;정광수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.271-273
    • /
    • 2001
  • 최근들어 블루투스 기술은 정보 기기간의 케이블 통신을 대체하는 저가격의 무선 통신 기술로서 많은 관심을 끌고 있으며 블루투스 칩, 프로토콜 스택 및 응용 제품 개발이 활발히 진행되고 있다. 특히 블루투스는 1개의 마스터와 최대 7개의 슬레이브로 구성되는 피코넷과 다수의 피코넷으로 구성되는 스캐터넷의 형성이 가능하여 이를 이용한 ad hoc PAN 네트워킹에 대한 연구가 시작되고 있다. 블루투스 ad hoc PAN 연구를 위해서는 시뮬레이터의 이용이 필수적이다. 본 논문은 블루투스 피코넷에서의 ad hoc 네트워킹을 위한 Glomosim 기반 시뮬레이터의 설계 및 구현에 관한 내용이다. 이 시뮬레이터는 Glomosim 시뮬레이터의 MAC 계층 모듈에 블루투스 baseband 및 LM 래이어를 추가하여 ad hoc IP 라우팅이 가능하도록 설계되어 있다.

  • PDF