• Title/Summary/Keyword: Ad-Hoc

Search Result 2,477, Processing Time 0.048 seconds

The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network (무선 Ad hoc 네트워크의 효율적인 위장 공격 방지 메커니즘에 관한 연구)

  • Hong, Soon-Jwa;Park, Hyun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.135-149
    • /
    • 2006
  • Securing wireless Ad hoc network including the secure mechanism design and implementation is generally more difficult for vulnerability of channels and nodes, the absence of infrastructure, topology that change dynamically, and etc, than ire network. The efforts of early researches are based on the adaptation of securing methods for the wire network to wireless ad hoc network. However, wireless ad hoc network could not get effective study finding because network has essential problems. This paper proposes that some new problems are being came to light over the survivability and availability of the network itself, that are caused by the massive packet attack of more than one or two nodes, and proves the consequence of this phenomenon. Also, we propose an effective prevention mechanism of masquerade attacks for survivability reinforcement that escape standard of the early way by survivability of wireless Ad hoc network and approaches for performance elevation and reflect special quality of wireless Ad hoc network.

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

A Study on Delayed ACK Scheme for TCP Traffic in Ad-hoc Network (Ad-hoc 네트워크에서 지연 ACK를 이용한 TCP성능 향상에 관한 연구)

  • Park Kwang-Chae;Na Dong-Geon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1654-1662
    • /
    • 2006
  • An ad hoc network is multi-hop network composed of radio links. and the transmission quality of a radio link is more unstable than that of a wired circuit. Packet loss thus occurs frequently in an ad hoc network, and the consequent connection failure results in a severe deterioration of TCP performance. TCP performance also deteriorates because of the collision of data packets and ACK packets in the radio channel. In this paper we study to improve the performance of the Mobile Ad-hoc network by using Delayed ACK algorithm with our proposed ODA(Ordering-Delayed ACK) method. The proposed ODA algorithm increases the number of the data packets orderly at the receiver side which is going to be applied for the Mobile Ad-hoc network. We accomplished a computer simulation using NS-2. From the simulation results, we find the proposed ODA algorithm obviously enlarge the channel capacity and improve the network performance at the situation of multi-hop of ad-hoc network than the existing Delayed ACK algorithm.

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.

A Robust Route Maintenance Scheme Considering Node Mobility in Wireless Ad-hoc Networks (무선 Ad-hoc 네트워크에서 노드 이동성을 고려한 견고한 경로 관리 기법)

  • Kim, Kwan-Woong;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4A
    • /
    • pp.309-315
    • /
    • 2009
  • Wireless Ad-hoc networks are dynamic networks that consist of mobile nodes. Nodes in Ad-hoc networks are usually laptops, PDAs or mobile phones. These devices feature Bluetooth and/or IEEE 802.11 (WiFi) network interfaces and communicate in a decentralized manner. Due to characteristics of Ad-hoc networks, Mobility is a key feature of routing protocol design. In this paper, we present an enhanced routing maintenance scheme that cope with topology changes pre-actively. The key feature of the proposed scheme is to switch next-hop node to alternative neighbor node before link breakage for preventing route failure. From extensive experiments by using NS2, the performance of the proposed scheme has been improved by comparison to AODV protocol.

Performance Analysis of TCP Traffic over AODV Routing Protocol in Ad-Hoc Wireless Network (Ad-Hoc 무선망에서 AODV 라우팅 프로토콜을 이용한 TCP 트래픽의 성능분석)

  • 고영웅;마주영;육동철;박승섭
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.9-17
    • /
    • 2001
  • Ad-Hoc networks consist of a set of mobile hosts that communicate using wireless links, without the use of other communicate support facilities (such as base stations). The topology of an Ad-Hoc network changes due to the movement of mobile host. which may lead to sudden packet loss. Recently, a large amount of research has focused on the routing protocols needed in such an environment. but researches about Internet traffic performance analysis were unexhausted. Accordingly, we have simulated Ad-Hoc mobile network that using AODV routing protocol and Ad-Hoc mobile network topology size and node speed as simulation estimation-factor to analysis traffic performance. As the result of the simulation, we identify that TCP /Reno was more sensitive than TCP/Sack about node speed and a number of the node.

  • PDF

Efficient Spectrum Sensing for Multi-Copter (멀티콥터를 위한 효율적인 스펙트럼 센싱)

  • Jung, Kuk Hyun;Lee, Sun Yui;Park, Ji Ho;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.20-25
    • /
    • 2014
  • In this paper, we provide efficient spectrum sensing technology for smooth use of frequency and energy charge of multi-copter. The proposed structures focus on improving performance of spectrum sensing that is based on Ad-hoc network. First, we explain basic principles and disadvantages of cooperative spectrum sensing and ad-hoc based spectrum sensing. To solve these problems, in this paper, we employ the beamforming technology that guarantees higher transmit primary users' signal power to secondary users in ad-hoc network. The performance of proposed algorithm is analyzed in terms of detection probabilities, and the results of this paper can be applied to the various ad-hoc based Cognitive Radio system.

Ad-hoc 네트워크 역추적 기술 동향

  • Lee, Dong-Hee;Yeo, Dong-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.85-94
    • /
    • 2010
  • Ad-hoc 네트워크는 노드가 자유롭게 이동하면서 네트워크를 구성하며, 어떠한 고정된 AP(Access Point)의 도움 없이 자신들의 연결만을 통해 통신망을 제공한다. Ad-hoc 네트워크에서는 기존 인터넷 망에서 존재하는 공격이 가능하다. 이런 공격에 대응하기 위하여 기존 유선망에서의 IP기반 역추적 기술을 바탕으로 ad-hoc 네트워크에서의 역추적 연구가 이루어지고 있다. 본 논문에서는 ad-hoc 네트워크 및 기존 유선망에서의 IP기반 역추적 기술들에 대하여 알아 본 후, 최근 발표된 ad-hoc 네트워크기반의 역추적 대표적인 기술들의 기법들에 대해 살펴본다.

Efficient Routing Protocol for Ad-­Hoc Nework (Ad-­Hoc 네트워크를 위한 효율적 Routing 프로토콜)

  • 김민정;김기천;성연주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.571-573
    • /
    • 2003
  • Ad­Hoc 네트워크에서는 노드의 위상 변화가 빈번히 발생하므로 경로 탐색 및 관리가 중요하다. 그러나 자원의 사용이 제한된 무선망에서 경로 탐색과 관리에 많은 자원을 소비하게 되면, 데이터 처리시의 자원사용에 영향을 미치게되므로 네트워크의 효율이 저하된다. 효율적인 Ad­hoc 네트워크를 구성하기 위해서는 효율적인 라우팅 프로토콜의 설계가 매우 중요하다. 현재 표준으로 제정된 Ad­Hoc 라우팅 프로토콜들과 그 개선방안에 대해 살펴보고, 보안에 취약한 Ad­Hoc 네트워크에서 보안성을 제공하기 위해 제안된 프로토콜에 관해 살펴본다.

  • PDF

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Network (이동 Ad-hoc 무선망에서 효율적인 라우팅 알고리즘에 관한 연구)

  • Lee, Dong-Chul;Kim, Ki-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.58-64
    • /
    • 2005
  • The nodes of Ad-hoc network are made up of location registration for sending information and a great number of packet transmissions to maintain routing route among the nodes. under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extend of the traffic in order to control the traffics of the multi-hop in Ad-hoc.