• Title/Summary/Keyword: Ad Hoc Networks

Search Result 1,360, Processing Time 0.032 seconds

Distributed Resource Allocation in Multimedia Ad Hoc Local Area Networks Based on OFDM-CDMA (OFDM-CDMA 기반 멀티미디어 무선 Ad Hoc LAN에서의 분산적 자원 할당 방식)

  • Yang, Hyun-ho;Jeon, Hee-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1250-1256
    • /
    • 2001
  • A resource management scheme for ad hoc wireless local area networks (AWLAN's) is presented. This scheme combines distributed resource management scheme and orthogonal frequency division multiplexing-code division multiple access(OFDM-CDMA) technique to support multimedia services with QoS guarantees. The performance evaluation has done in terms of blocking rates and QoS loss probability.

  • PDF

Supporting Mobile IP in Ad Hoc Networks with Wireless Backbone (무선 백본 기반 Ad Hoc 네트워크에서의 Mobile IP지원)

  • 신재욱;김응배;김상하
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.223-226
    • /
    • 2003
  • In this paper, we propose new agent discovery and route discovery schemes to support Mobile IP (MIP) in Ad Hoc networks with wireless backbone. The wireless backbone consisting of stationary wireless routers and Internet gateways (IGs) is a kind of wireless access network of IP-based core network. The proposed scheme utilizes favorable features of wireless backbone such as stable links and no energy constraints. In the agent discovery scheme, backbone-limited periodic Agent Advertisement (AA) and proxy-AA messages are used, which reduce network-wide broadcasting overhead caused by AA and Agent Solicitation messages and decentralize MIP processing overhead in IGs. In order to reduce delay time and control message overhead during route discovery far the destination outside Ad Hoc network, we propose a cache-based scheme which can be easily added to the conventional on-demand routing protocols. The proposed schemes can reduce control overhead during agent discovery and route discovery, and efficiently support MIP in Ad Hoc network with wireless backbone.

  • PDF

A Ring-Oriented Multicast Architecture over Mobile Ad Hoc Sensor networks

  • Yang, Yubai;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1259-1262
    • /
    • 2004
  • Detecting environmental hazards and monitoring remote terrain are among many sensor network applications. In case of fire detection, it is significantly valuable to monitor fire-spot's shape and trend in time. Mobile ad hoc sensor nodes right round are responsible for sensoring, processing and networking packets, or even launching extinguisher. In this paper, we proposed a ring-oriented Multicast architecture based on "Fisheye State Routing" (MFSR) to organize a group of mobile ad hoc sensor nodes in a multicast way. It is familiar with traditional mesh-based multicast protocol [1] in mobile ad hoc network, trying to concentrates on efficiency and robustness simultaneously. Certain applications-based solution for hazards is proposed, quantitative results including architecture and recovery algorithms of MFSR are also investigated in this paper.

  • PDF

An Efficient Node Life-Time Management of Adaptive Time Interval Clustering Control in Ad-hoc Networks (애드혹 네트워크에서 적응적 시간관리 기법을 이용한 클러스터링 노드 에너지 수명의 효율적인 관리 방법)

  • Oh, Young-Jun;Lee, Knag-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.495-502
    • /
    • 2013
  • In the mobile Ad hoc Network(MANET), improving technique for management and control of topology is recognized as an important part of the next generation network. In this paper, we proposed an efficient node life time management of ATICC(Adaptive Time Interval Clustering Control) in Ad-hoc Networks. Ad-hoc Network is a self-configuration network or wireless multi-hop network based on inference topology. This is a method of path routing management node for increasing the network life time through the periodical route alternation. The proposed ATICC algorithm is time interval control technique depended on the use of the battery energy while node management considering the attribute of node and network routing. This can reduce the network traffic of nodes consume energy cost effectively. As a result, it could be improving the network life time by using timing control method in ad-hoc networks.

A re-route method for reliable data transport in Ad Hoc Networks (Ad Hoc 망에서 신뢰성 있는 데이터 전송을 위한 경로 재설정 기법)

  • 한정안;백종근;김병기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3A
    • /
    • pp.276-287
    • /
    • 2004
  • An ad hoc network is infra(Base Sstation or Access Point) free wireless mobile communication technology. Mobile nodes function as routers and servers in ad hoc networks. Many routing protocols for ad hoc network have been proposed. If any route is broken owing to moving node, source must repair broken route again. But route repair technology after route collapses is not suitable to transmit real-time data packet for QoS guarantee. So this paper presents route repair technology that prevents route from breaking. If intermediate node moves to critical section, the node issues handoff packet and sends the packet to the next node. After next node receives handoff packet, the node broadcasts route request packet to the previous node for intermediate node. Finally, even if intermediate node moves out of the routing region, the source can continuously transmit data packets to the destination through the new path.

A State Management MAC Protocol for Vehicle to Vehicle Communication Using Directional Antenna (차량 간 통신 환경에 적합한 방향성 안테나를 이용한 상태관리 MAC Protocol)

  • Park, Sang-Wook;Jung, Sung-Dae;Jung, Jong-In;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.526-535
    • /
    • 2008
  • Recently, several MAC protocols using the directional antennas have been proposed for wireless mobile ad hoc networks. In the theory, it can improve spatial reuse and communication throughput in the Mobile Ad-hoc networks. But, or However even though direction transmissions using the Directional MAC protocol(D-MAC) are expected to provide significant improvements, they causes other problems such as deafness problem and fairness problem. In this paper, we analyze the D-MAC protocol in Mobile Ad-hoc network for Vehicle to vehicle(V2V) communication. Through the results of the analysis, We the fundamental problem of D-MAC protocol and finally we suggest new D-MAC protocol for V2V networks.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Is the Store-and-Forward Delivery Still the Best in Ad Hoc Networks?

  • Park, Jiwon;Moh, Sangman
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.329-337
    • /
    • 2013
  • In multihop routed ad hoc networks, the conventional store-and-forward delivery has been used. However, we may ask a question: "Is the store-and-forward delivery still the best?" This paper presents a pipeline-through MAC (PT-MAC) protocol for ad hoc networks, in which nodes have two 3-channel interfaces in order to use limited radio resources efficiently and improve network performance. The proposed protocol reduces end-to-end delay significantly in multihop routed transmission by exploiting a novel pipeline-through technique rather than using the conventional store-and-forward. This results in improved network performance without increasing control overhead. Our extensive performance study shows that the proposed PT-MAC shows 20-40 percent shorter end-to-end delay and 25-55 percent better goodput compared to the IEEE 802.11 DCF with two 3-channel interfaces.

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks

  • Lee, Yun-Ho;Yoo, Sang-Guun;Lee, Soo-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1874-1893
    • /
    • 2012
  • An approach to detect abnormal activities based on reputations created individually by each node is vulnerable to a false accusation since intrusion detection in ad-hoc networks is done in a distributed and cooperative manner. Detection of false accusation is considered important because the efficiency or survivability of the network can be degraded severely if normal nodes were excluded from the network by being considered as abnormal ones in the intrusion detection process. In this paper, we propose an improved reputation-based intrusion detection technique to efficiently detect and manage false accusations in ad-hoc networks. Additionally, we execute simulations of the proposed technique to analyze its performance and feasibility to be implemented in a real environment.

Cooperation Models and Cooperative Routing for Exploiting Hop-by-Hop Cooperative Diver sity in Ad Hoc Networks

  • Shin, Hee-Wook;Moh, Sang-Man;Chung, Il-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1559-1571
    • /
    • 2011
  • In wireless ad hoc networks, nodes communicate with each other using multihop routed transmission in which hop-by-hop cooperative diversity can be effectively employed. This paper proposes (i) two cooperation models for per-link cooperation (PLC) and per-node cooperation (PNC) for exploiting cooperative diversity in wireless ad hoc networks and (ii) a cooperative routing algorithm for the above models in which best relays are selected for cooperative transmission. First, two cooperation models for PLC and PNC are introduced and represented as an edge-weighted graph with effective link quality. Then, the proposed models are transformed into a simplified graph and a cooperative routing algorithm with O(n2) time is developed, where n is the number of nodes in the network. The effectiveness of the algorithm is confirmed for the two cooperation models using simulation.