• Title/Summary/Keyword: Ad- hoc Network

Search Result 1,665, Processing Time 0.025 seconds

An Efficient Anonymous Authentication Protocol Based on Multiple Anonymous Certificates in VANET (VANET에서 다중 익명 인증서 기반 효율적인 익명 인증 프로토콜)

  • Jung, Chae-Duk;Sur, Chul;Park, Young-Ho;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.589-596
    • /
    • 2009
  • Until now, some protocols have been presented to provide vehicle's anonymity and unlinkability in VANET by means of issuing multiple anonymous certificates to each vehicle from the trust authority, or shot-time anonymous certificate to a vehicle after mutual authentication between a Roadside Unit (RSU) and the vehicle. However, these protocols have high overheads of the trust authority, RSUs and vehicles for generating anonymous certificate. In this paper, we propose an efficient anonymous authentication protocol, in which RSUs can issue multiple shot-time anonymous certificates to a vehicle to alleviate system overheads for mutual authentication between vehicles and RSUs. Several simulations are conducted to verify the efficiency of the proposed protocol in terms of RSU valid serve ratio and vehicle's computational costs. Moreover, the proposed protocol provides unlinkability and traceability when multiple RSUs are compromised, whereas previous protocols do not provide unlinkability and traceability.

Analysis for Protocol Layer Technical Requirements of Wireless Mesh Networks Optimization (무선 메쉬 네트워크의 최적화를 위한 프로토콜 계층별 기술적 요구사항에 관한 분석)

  • Lee, Soon-Sik;Yun, Sang-Man;Lee, Sang-Wook;Jeon, Seong-Geun;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.77-88
    • /
    • 2010
  • Wireless Mesh Networks are consist of mobility mesh clients and mesh routers. WMNs can communicate with heterogeneous networks such as IEEE 802.11, IEEE 802.15, IEEE 802.16 and sensor networks. WMNs which is based on ad hoc network are on research and developing to enhance WLANs, WPANs, or WMANs. WMNs can offer environment to serve human, service to person area, campus, and metro. But WMNs has many problems to solve about enhancing performance and generalization. Among them, Existing protocol layers has many problems enhancing to optimize WMNs. This document issues problems about WMNs in protocol layer and suggest the solutions. Also, suggests the requirements and the methods of QoS supporting issue.

Performance Improvement of AODV Routing Algorithm Using Timestamp (Timestamp를 이용한 AODV 라우팅 알고리즘의 성능 개선)

  • Lee Jae-Suk;Park Hae-Ryeon;Lee Kee-Hyun;Suk Jung-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.830-836
    • /
    • 2006
  • One of the seminal operation parameters of AODV is the node-to-node travel time of data, which is currently set to fixed value of 40 ms in the RFC3561 and widely used to compute other parameters such as the expected round-trip time of the connection setup message, etc. We have naturally thought the network performance could be improved by dynamically varying the node-to-node travel time with respect to the traffic condition in the networt rather than using the fixed value, which motivates this work. To this end, we apply the idea of using timestamp; every node places the current time in the message before sending it out, and the receiver node computes the node travel time based on the moving average algorithm by considering not only the current value but also the previous ones in an accumulated and exponentially decreasing fashion with time. We evaluate the performance of the proposed scheme in respect of the number of RREQ messages generated, throughput, and delay as a function of traffic load and node mobility, and compare the result with the original AODV scheme. The results show that the proposed scheme presents noticeable performance improvements, expecially under the condition of high node mobility and high traffic load.

Intrusion Detection Technique using Distributed Mobile Agent (Distributed Mobile Agent를 이용한 침입탐지 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae;Yang, Jeong Mo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.69-75
    • /
    • 2012
  • MANET(Mobile Ad-hoc Network) is target of many attacks because of dynamic topology and hop-by-hop data transmission method. In MANET, location setting of intrusion detection system is difficult and attack detection using information collected locally is more difficult. The amount of traffic grow, intrusion detection performance will be decreased. In this paper, MANET is composed of zone form and we used random projection technique which reduces dimension without loss of information in order to perform stable intrusion detection in even massive traffic. Global detection node is used to detect attacks which are difficult to detect using only local information. In the global detection node, attack detection is performed using received information from IDS agent and pattern of nodes. k-NN and ZBIDS were experimented to evaluate performance of the proposed technique in this paper. The superiority of performance was confirmed through the experience.

Autonomous Self-Estimation of Vehicle Travel Times in VANET Environment (VANET 환경에서 자율적 자가추정(Self-Estimation) 통행시간정보 산출기법 개발)

  • Im, Hui-Seop;O, Cheol;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.4
    • /
    • pp.107-118
    • /
    • 2010
  • Wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) enable the development of more sophisticated and effective traffic information systems. This study presents a method to estimate vehicular travel times in a vehicular ad hoc network (VANET) environment. A novel feature of the proposed method is estimating individual vehicle travel times through advanced on-board units in each vehicle, referred to as self-estimated travel time in this study. The method uses travel information including vehicle position and speed at each given time step transmitted through the V2V and V2I communications. Vehicle trajectory data obtained from the VISSIM simulator is used for evaluating the accuracy of estimated travel times. Relevant technical issues for successful field implementation are also discussed.

Unmanned aerial vehicle routing algorithm using vehicular communication systems (차량 통신 시스템 기반 UAV 라우팅 알고리즘)

  • Kim, Ryul;Joo, Yang-Ick
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.622-628
    • /
    • 2016
  • The prosperity of IT technologies and the removal of restrictions regarding Unmanned Aerial Vehicles (UAVs), also known as drones, have driven growth in their popularity. However, without a proper solution to the problem of accident avoidance for UAVs, this popularity increases the potential for collisions between UAVs and between UAV and terrain features. These collisions can occur because UAVs to date have flown using radio control or image recognition based autonomous navigation. Therefore, we propose efficient UAV routing schemes to tackle the collision problem using vehicular communication systems. Performance evaluation by computer simulation shows that the proposed methods effectively reduce the collision probability and improve the routing efficiency of the UAV. Furthermore, the proposed algorithms are compatible and can be directly applied with small overhead to the commercial vehicular communication system implementation.

An Energy-efficient Data Dissemination Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 데이타 전달 프로토콜)

  • Yi, Seung-Hee;Lee, Sung-Ryoul;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.165-174
    • /
    • 2006
  • Data dissemination using either flooding or legacy ad-hoc routing protocol is not realistic approach in the wireless sensor networks, which are composed of sensor nodes with very weak computing power, small memory and limited battery. In this paper, we propose the ELF(Energy-efficient Localized Flooding) protocol. The ELF is energy-efficient data dissemination protocol for wireless sensor networks. In the ELF protocol, there are two data delivery phases between fixed source and mobile sink node. The first phase, before the tracking zone, sensing data are forwarded by unicasting. After that, within the tracking zone, sensing data are delivered by localized flooding. Namely, the ELF Properly combines advantages from both unicasting and flooding. According to evaluation results by simulation, the proposed ELF protocol maintains very high data delivery ratio with using a little energy. Also, the property of average delay is better than others. From our research results, the ELF is very effective data dissemination protocol for wireless sensor networks.

Efficient Counter-Based Broadcast Scheme for High Reachability and Energy Efficiency (높은 접근성과 에너지 효율을 갖는 계수기반 브로드캐스트 기법)

  • Jung, Ji-Young;Seo, Dong-Yoon;Lee, Jung-Ryun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1780-1792
    • /
    • 2016
  • In this paper, we propose an efficient counter-based broadcast scheme for high reachability and energy efficiency. To achieve this, we propose a method to calculate additional coverage when a node receives the same broadcast message from both nodes, in order to rebroadcast by a node who can cover an large area. We also propose a formula to determine random access delay (RAD) considering addition coverage, distance, density, and remaining battery information, and a formula to determine count threshold ($C_{th}$) considering density and remaining battery information. In addition, we evaluate the performance of the proposed broadcast scheme compared with the existing counter-based broadcast schemes through simulation.

Implementation of Policy Based MANET Management System based on Active PDP Discovery (Active PDP Discovery에 기반한 정책 기반 MANET 관리 시스템 구현)

  • Huh, Jee-Wan;Song, Wang-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3176-3182
    • /
    • 2009
  • The PBNM on MANET is being researched to ensure the reliability and efficiency between mobile nodes. Therefore, it is essential to determine the cluster effectively which will perceive the movements of nodes and distribute the policies. In PBNM mechanism, to determine the node cluster for PDP and manage PEP nodes, Active PDP Discovery Protocol is proposed as a mechanism which is more efficient than preexistent techniques. While k-hop cluster selects the PEP nodes which PDP node manages, Active PDP Discovery actively selects the PDP node among the moving PEP node. This method prevents orphan nodes that are not connected to PDP and reduces continual broadcasting messages. This paper implements Active PDP Discovery which determines cluster in the real networks and analyzes its capability, expanding COPS-PR to detect the movement of nodes and adding MNL to PDP node.

Medium Access Control Using Channel Reservation Scheme in Underwater Acoustic Sensor Networks (해양센서네트워크에서 채널예약방식을 이용한 매체접근제어)

  • Jang, Kil-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.955-963
    • /
    • 2009
  • In this paper, we propose a medium access control(MAC) protocol for reducing the energy efficiency and for improving the transmission efficiency in underwater acoustic sensor networks. In underwater environment, the transmission delay is longer and bandwidth is smaller than terrestrial environment. Considering these points, we propose a new MAC protocol to enhance throughput and to manage efficiently the energy of nodes. The proposed protocol operates as a channel reservation scheme to decrease data collisions, and uses a mechanism to control the hidden node problem and the exposed node problem occurred in ad hoc networks. The proposed protocol consists of the slotted based transmission frame and reduces data collisions between nodes by putting separately the reservation period in the transmission frame. In addition, it is able to solve the hidden node problem and the exposed node problem by reservation information between nodes. We carry out the simulation to evaluate the proposed protocol in terms of the average energy consumption, the ratio of collision, throughput, and the average transmission delay, and compare the proposed protocol to a traditional MAC protocol in the underwater environment. The simulation results show that the proposed protocol outperforms the traditional protocol under a various of network parameters.