• Title/Summary/Keyword: Ad hoc Wireless Network

Search Result 712, Processing Time 0.026 seconds

Adaptive Resource Allocation for Efficient Power Control Game in Wireless Networks (무선 네트워크에서 효율적인 전력 제어 게임을 위한 적응 자원 할당 기법)

  • Wang, Jin-Soo;Park, Jae-Cheol;Hwang, Sung-Hyun;Kim, Chang-Joo;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.221-228
    • /
    • 2009
  • We consider distributed resource allocation among the links in a wireless network to minimize the total transmit power of the network while meeting the target rate required by each link. The problem to be solved is how to change the amount of wireless resource allocated and the number of links sharing the resource according to the interference environment so that the following distributed power control game converges to a stable point. To provide a distributed method with less complexity and lower information exchange than the centralized optimal method, we define the resource sharing level among the links from which the size of resource allocated and the links sharing the resource are determined distributively. It is shown that the performance of the proposed method is better than that of the conventional methods, orthogonal resource allocation only and resource sharing only, as well as it approaches to that of the optimal method.

QoS Mesh Routing Protocol for IEEE 802.16 based Wireless Mesh Networks (IEEE 802.16 기반의 무선 메쉬 네트워크를 위한 QoS 메쉬 라우팅 프로토콜)

  • Kim, Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1226-1237
    • /
    • 2007
  • This paper proposes QoS mesh routing protocol for IEEE 802.16 based wireless mesh networks. QoS mesh routing protocol proposed in this paper is a proactive hop-by-hop QoS routing protocol. The goal of our routing protocol is not only to find a route from a source to a destination, but also optimal route that satisfies QoS requirements, given in terms of bandwidth and delay as default QoS parameters. In this paper, we first analyze possible types of routing protocols that have been studied for MANET and show proactive hop-by-hop routing protocols are the most appropriate for wireless mesh networks. Then, we present a network model for IEEE 802.16 based wireless mesh networks and propose a proactive hop-by-hop QoS routing protocol. Through our simulation, we represent that our routing protocol outperforms QOLSR protocol in terms of end-to-end delay, packet delivery ratio and routing overhead.

A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks

  • Quan, Hou-De;Du, Chuan-Bao;Cui, Pei-Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.941-955
    • /
    • 2015
  • In dual-channel networks (DCNs), all frequency hopping (FH) sequences used for data channels are chosen from the original FH sequence used for the control channel by shifting different initial phases. As the number of data channels increases, the hitting frequency point problem becomes considerably serious because DCNs is non-orthogonal synchronization network and FH sequences are non-orthogonal. The increasing severity of the hitting frequency point problem consequently reduces the resource utilization efficiency. To solve this problem, we propose a novel hitting frequency point collision avoidance method, which consists of a sequence-selection strategy called sliding correlation (SC) and a collision avoidance strategy called keeping silent on hitting frequency point (KSHF). SC is used to find the optimal phase-shifted FH sequence with the minimum number of hitting frequency points for a new data channel. The hitting frequency points and their locations in this optimal sequence are also derived for KSHF according to SC strategy. In KSHF, the transceivers transmit or receive symbol information not on the hitting frequency point, but on the next frequency point during the next FH period. Analytical and simulation results demonstrate that unlike the traditional method, the proposed method can effectively reduce the number of hitting frequency points and improve the efficiency of the code resource utilization.

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

IoL Field Gateway: An Integrated IoT Agent using Networked Smart LED Lighting Controller

  • Mariappan, Vinayagam;Jung, Soonho;Lee, Sangwoon;Cha, Jaesang
    • Information and Communications Magazine
    • /
    • v.34 no.2
    • /
    • pp.12-19
    • /
    • 2017
  • The LED technology advancement introduce cuttingedge technology on Internet of Things (IoT) to connect the physical world to the digital realm, using digital smart lighting infrastructure called Internet of light (IoL). This paper proposes an Integrated IoT agent on networked smart LED lighting controller called IoL Filed Gateway using lighting infrastructure in which a lighting system that can connect to a network and can be monitored and controlled from a centralized system or via the cloud. The IoL Field Gateway defines new world of smart connected intelligence, lighting can become an integral and responsive part of everyday human life environments. The proposed connected lighting gateway uses the concept of multi-hop ad hoc network using visible light communication (VLC) with RF wireless technologies and Wired PLC (Power Line Communication). This connectivity and intelligence integrated into LED-based luminaires form the backbone of smart buildings and cities and make the Internet of Things (IoT) vision feasible and enables the lighting administrator can control numerous lightings easily and visitors can get visual information from the lightings with their smart devices. The proposed IoL gateway design is emulated on Arduino based HW platform with VLC, RF, and PLC connectivity and evaluated with four sensor interface.

A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network (Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구)

  • Choi, Young-Min;Sung, Bo Hyon;Youn, Jong Taek;Kim, Young-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

On Generating Backbone Based on Energy and Connectivity for WSNs (무선 센서네트워크에서 노드의 에너지와 연결성을 고려한 클러스터 기반의 백본 생성 알고리즘)

  • Shin, In-Young;Kim, Moon-Seong;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.41-47
    • /
    • 2009
  • Routing through a backbone, which is responsible for performing and managing multipoint communication, reduces the communication overhead and overall energy consumption in wireless sensor networks. However, the backbone nodes will need extra functionality and therefore consume more energy compared to the other nodes. The power consumption imbalance among sensor nodes may cause a network partition and failures where the transmission from some sensors to the sink node could be blocked. Hence optimal construction of the backbone is one of the pivotal problems in sensor network applications and can drastically affect the network's communication energy dissipation. In this paper a distributed algorithm is proposed to generate backbone trees through robust multi-hop clusters in wireless sensor networks. The main objective is to form a properly designed backbone through multi-hop clusters by considering energy level and degree of each node. Our improved cluster head selection method ensures that energy is consumed evenly among the nodes in the network, thereby increasing the network lifetime. Comprehensive computer simulations have indicated that the newly proposed scheme gives approximately 10.36% and 24.05% improvements in the performances related to the residual energy level and the degree of the cluster heads respectively and also prolongs the network lifetime.

  • PDF

Analysis of TDM-based Ad Hoc Network Transmission Technologies (다중시간분할 방식 기반의 에드혹 망 전송기술 분석)

  • Chung, Jong-Moon;Cho, Hyung-Weon;Jin, Ki-Yong;Cho, Min-Hee;Kim, Ji-Hyun;Jeong, Wun-Cheol;Joo, Seong-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8A
    • /
    • pp.618-624
    • /
    • 2009
  • In the evolution from wireless sensor networks(WSNs) to ubiquitous sensor networks(USNs), technologies that can support intensive data-traffic loads, large number of users, improved interoperability, and extreme longevity are required. Therefore, efficient communication time coordination control and low power consumption becomes one of the most important design goals for USN MAC protocols. So far several time division multiplexed (TDM) MAC protocols have been proposed. However, since the pros and cons of existing protocols are not easy to analyze, it becomes a challenging task to design improved TOM MAC protocols. Based on this objective, this paper provides a novel protocol analysis along with a message complexity derivation and comparison of the existing TDM MAC protocols.

Design and Implementation of DYMO Protocol Using NanoQplus in Wireless Sensor Networks (무선 센서 네트워크에서 NanoQplus를 이용한 DYMO 프로토콜 설계와 구현)

  • Oh, Su-Taek;Bae, Jang-Sik;Jeong, Hong-Jong;Kim, Dong-Kyun;Park, Jung-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.184-191
    • /
    • 2008
  • NanoQplus, which is an embedded operating system for wireless sensor networks (WSNs) and developed by Electronics and Telecommunications Research Institute (ETRI), provides programmer-friendly preemptive multi-threading programming technique, but it has poor network protocol stack, as compared to TinyOS, one of the famous operating systems for WSNs. In this paper, we apply dynamic MANET on-demand routing (DYMO) protocol, which is being standardized in Internet Engineering Task Force (IETF), to NanoQplus. Since DYMO has been proposed for mobile ad-hoc networks (MANETs) and MANETs have less resource restrictions than WSNs, the basic DYMO protocol cannot be applied to WSNs without modifications. Moreover, coherence with MAC protocol should be considered in order to eliminate redundant data between MAC and network layers. Thus, we propose a modified version of the basic DYMO protocol for NanoQplus. The experimental results from a real sensor network test-bed show that the DYMO implementation using NanoQplus works efficiently in WSNs.