• Title/Summary/Keyword: Ad Hoc Networks

Search Result 1,360, Processing Time 0.025 seconds

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

An Address Autoconfiguration Mechanism for Connected MANET with Multiple Gateways having a Same Network Prefix (동일한 네트워크 프리픽스를 갖는 다중 게이트웨이 기반의 connected MANET에서 주소 자동 설정 방법)

  • Lee, Jae-Hwoon;Lee, Beom-Jae;Jung, Woo-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.405-412
    • /
    • 2009
  • Mobile ad hoc networks (MANETs) allow mobile nodes to communicate among themselves via wireless multiple hops without the help of the wired infrastructure. In the MANET, it is required not only a route setup mechanism that makes nodes not within each other's transmission range communicate but also mechanism in order for a node to auto-configure a unique address. In this paper, we propose an address auto-configuration mechanism when MANET is connected to the Internet via several Internet Gateways and all gateways advertise the same network prefix. By using the proposed mechanism, once a node configures an Internet topologically correct and globally unique IP address, then the node can utilize the configured address even though the node moves within the MANET. Through the simulations, we analyze the performance of our proposed mechanism and, from the simulation results, we show that out proposed mechanism outperforms the existing mechanism.

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN

  • Kakarla, Jagadeesh;Majhi, Banshidhar;Battula, Ramesh Babu
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1229-1242
    • /
    • 2017
  • In this paper, an interference aware distributed multi-channel MAC (IDMMAC) protocol is proposed for wireless sensor and actor networks (WSANs). The WSAN consists of a huge number of sensors and ample amount of actors. Hence, in the IDMMAC protocol a lightweight channel selection mechanism is proposed to enhance the sensor's lifetime. The IDMMAC protocol divides the beacon interval into two phases (i.e., the ad-hoc traffic indication message (ATIM) window phase and data transmission phase). When a sensor wants to transmit event information to the actor, it negotiates the maximum packet reception ratio (PRR) and the capacity channel in the ATIM window with its 1-hop sensors. The channel negotiation takes place via a control channel. To improve the packet delivery ratio of the IDMMAC protocol, each actor selects a backup cluster head (BCH) from its cluster members. The BCH is elected based on its residual energy and node degree. The BCH selection phase takes place whenever an actor wants to perform actions in the event area or it leaves the cluster to help a neighbor actor. Furthermore, an interference and throughput aware multi-channel MAC protocol is also proposed for actor-actor coordination. An actor selects a minimum interference and maximum throughput channel among the available channels to communicate with the destination actor. The performance of the proposed IDMMAC protocol is analyzed using standard network parameters, such as packet delivery ratio, end-to-end delay, and energy dissipation, in the network. The obtained simulation results indicate that the IDMMAC protocol performs well compared to the existing MAC protocols.

A study on the overseas expansion strategy of domestic ICT companies in the post-corona era -Focusing on case studies of ICT companies- (포스트 코로나 시대의 국내 ICT기업의 해외 진출 전략에 관한 연구 -ICT 기업 사례분석을 중심으로-)

  • Park, Sang-Hee;Kim, Ki-Yoon;Jung, Hyun-Seung;Hyun, Daiwon
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.163-173
    • /
    • 2021
  • The purpose of this study was to explore a support model for domestic ICT companies to advance into overseas markets suitable for the post-corona era along with the rapidly changing global economic situation. As a result of the analysis, first, by analyzing the internationalization cases of domestic ICT companies through the realization theory, in the COVID-19 situation, domestic ICT companies organically respond to crisis situations through ad hoc responses, use of international networks, use of external organizations, and resource-based practices. Through qualitative analysis, we were able to confirm that we are growing overseas while achieving our goals. In addition, strategies for domestic ICT companies to grow through internationalization were derived. Ultimately, it was interpreted as a part that required advancement of government policy according to the government's overseas expansion support system.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

A Secure Communication Scheme without Trusted RSU Setting for VANET (신뢰 RSU 세팅이 필요 없는 VANET 보안통신 기법)

  • Fei, He;Kun, Li;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.75-87
    • /
    • 2010
  • Secure communication has been one of the main challenges in vehicular ad hoc networks(VANET) since broadcast messages from nearby vehicles contain life-critical information for drivers and passengers. So far various secure communication schemes have been proposed to secure the communication in VANET, and they satisfy most security requirements. However most of them need to put trust on roadside units(RSUs), which are usually deployed in unattended area and vulnerable to compromise. In this paper, we propose a secure communication scheme, which does not need to put trust on RSUs. And we adopt a grouping technique to averagely divide the huge burden in the server without jeopardizing the anonymity of users. Moreover we design a complete set of protocols to satisfy common security requirements with a relatively lower hardware requirement. At last, we evaluate the scheme with respect to security requirements, communication overhead, storage overhead and network performance.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

A Design of Sensor Web service Framework for Wireless Sensor Networks Environment (무선 센서 네트워크 환경에 대한 센서 웹 서비스 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Byung-Joo;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.123-131
    • /
    • 2009
  • In this paper, we design ZigBee RF based framework for mobile web service on collected data by sensor node and transmitting data to data base by sensor network and remote sensing server through wireless connection. The proposed system is an integrated platform of sensor network for the sensor management and providing SOA based sensor web access. This paper combines SOA technology with sensor network. composes sensor node as web view, and provides high capability. extensiveness, reliability, and usability to the user who accesses to sensor web. The mobile message conversion module, SOAP message processing module. WSDL message generator, and mobile web service module is embodied for improving the capacity of the framework. The capacity evaluation of local wireless communication system which is proposed in this paper is analyzed through NS-2 simulation.

Design of a Multi-Band Network Selection System for Seamless Maritime Communication Networks (단절 없는 해상 통신 네트워크를 위한 멀티대역 네트워크선택기 시스템 설계)

  • Cho, A-ra;Yun, Changho;Lim, Yong-kon;Choi, Youngchol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1252-1260
    • /
    • 2017
  • As digital communication technology evolves, the diversity of maritime communication methods has benn increasing due to the emergence of new maritime communication technologies such as digital very high frequency (VHF) communication systems and LTE-M as well as traditional conventional maritime communication systems. At sea, all maritime communication methods may be available, but only some communication methods may be available depending on the location. In this paper, we propose a multi-band network selection (MNS) system that can provide seamless maritime communication service by switching to an optimal communication band among available communication systems, depending on network environment and user requirements. The proposed MNS system in the middleware layer is designed to be able to interface with two types of digital VHF communication systems that satisfy Annex 1 and Annex 4 of ITU-R M. 1842-1, LTE, and high frequency (HF) communication systems. We assign priority to each communication band, and design an optimal communication band determination algorithm based on this priority.

Design and Evaluation of a Fuzzy Logic based Multi-hop Broadcast Algorithm for IoT Applications (IoT 응용을 위한 퍼지 논리 기반 멀티홉 방송 알고리즘의 설계 및 평가)

  • Bae, Ihn-han;Kim, Chil-hwa;Noh, Heung-tae
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.17-23
    • /
    • 2016
  • In the future network such as Internet of Things (IoT), the number of computing devices are expected to grow exponentially, and each of the things communicates with the others and acquires information by itself. Due to the growing interest in IoT applications, the broadcasting in Opportunistic ad-hoc networks such as Machine-to-Machine (M2M) is very important transmission strategy which allows fast data dissemination. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose a fuzzy logic based probabilistic multi-hop broadcast (FPMCAST) algorithm which statistically disseminates data accordingly to the remaining energy rate, the replication density rate of sending node, and the distance rate between sending and receiving nodes. In proposed FPMCAST, the inference engine is based the fuzzy rule base which is consists of 27 if-then rules. It maps input and output parameters to membership functions of input and output. The output of fuzzy system defines the fuzzy sets for rebroadcasting probability, and defuzzification is used to extract a numeric result from the fuzzy set. Here Center of Gravity (COG) method is used to defuzzify the fuzzy set. Then, the performance of FPMCAST is evaluated through a simulation study. From the simulation, we demonstrate that the proposed FPMCAST algorithm significantly outperforms flooding and gossiping algorithms. Specially, the FPMCAST algorithm has longer network lifetime because the residual energy of each node consumes evenly.