• Title/Summary/Keyword: Ad hoc networking

Search Result 168, Processing Time 0.021 seconds

Performance Analysis of Ad hoc Networks on Real world Test-bed for High Speed Video Streaming (고속 영상 데이터 전송을 위한 애드혹 네트워크의 테스트베드 기반 성능 분석)

  • Ahmed, Md Shohel;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.141-150
    • /
    • 2013
  • Simulation is an important technique to test and verify routing protocol correctness. However, simulation does not guarantee that the protocol works expectedly on a real world environment because it needs to rely on assumptions and simplified properties such as radio characteristics and effects of geographical constraints that may not reflect the real world networking environments. Therefore, a real world experiments are necessary to gain a practical insight into the actual performance of ad hoc networks. In this paper, we build a test-bed to evaluate multi-hop ad hoc networks for high speed video streaming inside a building using AODV-UU routing protocol. Our observation indicates that the considered ad hoc network can provide a sufficient performance for a low rate streaming data in terms of throughput, PDR (Packet delivery ratio) and the average delay.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

Routing Protocol Based on Zone Master for Hybrid Wireless Networks (하이브리드 무선 네트워크를 위한 존 마스터 기반의 라우팅 프로토콜)

  • Lim, Se-Young;Kim, Hun;Yoo, Myung-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.269-275
    • /
    • 2007
  • Since being constructed without any infrastructure-based network, ad hoc network has been received much attention as a key technology for ubiquitous networks. Due to high bit error rate and dynamically changing network topology in ad hoc network, the routing protocol that provides stable multi-hop communication path is the one of the key issues to address. The previously proposed ad hoc routing protocols have their limitations on network overhead, stability, and scalability. In this paper, we consider hybrid wireless network, which can overcome shortcomings of ad hoc network, and propose a novel routing protocol called zone master-based routing protocol. We verify with computer simulations that the proposed routing protocol outperforms other existing routing protocols in the various wireless environments.

Seamless and Robust Vehicular MIPv6: VMIPv6 for Vehicular Ad hoc Network (자동차 무선 네트워크 환경에서 연속적이고 견고한 IPv6기반의 이동성 프로토콜)

  • Oh, Ha-Young;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.122-134
    • /
    • 2010
  • With the rapidly increasing demand of traffic applications, the need to support seamless and robust multimedia services in the Vehicular Ad hoc Network is growing. Fast handover for the MIPv6 (FMIPv6) developed to solve the MIPv6's problem as well as Mobile IPv6 (MIPv6) for basic mobility protocol have been developed to support seamless handover in mobile environment. However, MIPv6 and FMIPv6 are useless for Quality-of-Service (QoS) services such as multimedia applications due to the long handover latency and the packet loss problem. In this paper, we propose a seamless and robust handover scheme that supports multimedia services in Vehicular Ad hoc Network using oCoA and background DAD. Through performance evaluation, we show that the proposed scheme is more proper for Vehicular Ad hoc Network than other schemes.

Power-Aware Dynamic Source Routing in Wireless Ad-hoc Networks (무선 애드혹 망에서의 전력 인식 동적 소스 라우팅)

  • 정혜영;신광욱;임근휘;이승학;윤현수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.519-531
    • /
    • 2004
  • Ad-hoc networks are temporary wireless systems composed of mobile nodes without any fixed infrastructure. The life time of each node in the ad-hoc network significantly affects the life time of whole ad-hoc network. A node which drained out its battery may incur the partition of whole network in some network topology The life time of each node depends on the battery capacity of each node. Therefore if all mobile nodes in the network live evenly long, the life time of the network will be longer. In this paper, we propose Power-Aware Dynamic Source Routing (PADSR) which selects the best path to make the life time of the network be longer. In PADSR, when a source node finds a path to the destination node, it selects the best path that makes nodes in the network live evenly long. To find the best path, PADSR considers the consumption of transmission energy and residual battery capacity of nodes upon the path. Consequently the network lives longer if we use PADSR.

Efficient Authentication for Mobile Nodes in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 이동 노드에 대한 효율적인 인증 메커니즘)

  • Lee Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.27-34
    • /
    • 2005
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In this paper, we address the problem of efficient authentication of distributed mobile users in geographically large networks. In particular, we propose a new authentication scheme for this case of MANETs. The proposed scheme exploits Randomized Groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority (CA). We then evaluate the performance of authentication using Randomized Groups.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

A Load-balancing Routing Protocol in Ad Hoc Networks (애드 흑 네트워크에서 부하 균등을 고려한 라우팅 프로토콜)

  • 안상현;임유진;김경춘
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.252-259
    • /
    • 2003
  • In the case of link congestion, most of the existing ad-hoc routing protocols like AODV and DSR do not try to discover a new route if there is no change in the network topology. Hence, with low mobility, traffic may get concentrated on some specific nodes. Since mobile devices have low battery power and low computing capability, traffic concentration on a specific node is not a desirable phenomenon. Therefore, in this paper, we propose a new protocol called SLAP (Simple Load-balancing Ad-hoc routing Protocol) which resolves the traffic concentration problem by letting each node check its own load situation and give up its role as a packet forwarder gracefully in the case of high traffic load. We compare the performance of SLAP with that of AODV and DSR in terms of the forwarding traffic distribution.

Reliable Extension Scheme using Multiple Paths in Wireless Ad-hoc Networks (무선 애드-혹 네트워크의 다중 경로를 이용한 신뢰적인 확장 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.218-225
    • /
    • 2007
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless mobile ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an extension scheme of a wireless mobile ad-hoc network based on limited multiple paths source routing protocol. This scheme reduces the overhead of route re-establishment and re-registration by maintaining link/node non-disjoint multiple paths between mobile hosts in a wireless mobile ad-hoc network or a mobile host in a wireless mobile ad-hoc network and a base station supporting fixed network services. By maintaining multiple paths, our scheme provides short end-to-end delay and is reliable extension scheme of a wireless mobile ad-hoc network to a fixed network. In this paper, our simulations show that our scheme outperforms existing schemes with regards to throughput and end-to-end delay. Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.