• Title/Summary/Keyword: Ad-hoc Method

Search Result 460, Processing Time 0.026 seconds

Energy Efficient Spectrum Sensing for Ad-hoc Cognitive Radio (애드혹 인지무선시스템을 위한 효과적 에너지 검출 방식)

  • Lee, So-Young;Kim, Eun-Cheol;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.113-119
    • /
    • 2010
  • Wireless ad hoc network composed of low power devices has been operated in ISM bands. However, with the growing proliferation of wireless services, these bands are increasingly getting congested. In order to relieve the spectrum scarcity and inefficient spectrum utilization, ad ho cognitive radio was proposed. In this paper we propose the efficient spectrum sensing method to reduce power consumption and detect white space in ad hoc cognitive radio system. The wireless channel between a licensed user and CR systems is modeled as Gaussian channel, the distance between a licensed user and CR systems is assumed differently. Also, the wireless channel among CR systems is assumed as the perfect channel and the distance among CR systems is assumed close distance. CR systems sense the spectrum of the licensed user by using a energy detection method. From the simulation results, spectrum sensing performance of combining sensing result of CR systems with high received energy shows higher than combining sensing result of all CR systems and we can refer to the proposed sensing method in order to perform effective spectrum sensing with low power consumption.

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol (Ad hoc 네트워크에서 GRID-Location Aided Routing 프로토콜을 이용한 분산 CA 구성)

  • Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.59-69
    • /
    • 2005
  • Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.

1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C (MIL-STD-188-220C 기반 전술 무선 이동 Ad-Hoc 망에서 1-hop내 데이터 트래픽 감소 방법)

  • You, Ji-Sang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.15-24
    • /
    • 2008
  • The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

TCP Performance Optimization Using Congestion Window Limit in Ad Hoc Networks with MAC Frame Aggregation (MAC Frame Aggregation이 가능한 에드혹 네트워크에서의 Congestion Window Limit을 통한 TCP 성능의 최적화)

  • Kang, Min-Woo;Park, Hee-Min;Park, Joon-Sang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.52-59
    • /
    • 2010
  • MAC frame aggregation is a method that combines multiple MPDUs (MAC protocol data units) into one PPDU (PHY protocol data units) to enhance network performance at the MAC layer. In ad hoc networks, TCP underperforms due to the congestion window overshooting problem and thus by setting CWL (congestion window limit) TCP performance can be improved. In this paper, we investigate the problem of setting CWL for TCP performance optimization in ad hoc networks with MAC frame aggregation.

Clustering Ad hoc Network Scheme and Classifications Based on Context-aware

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.475-479
    • /
    • 2009
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Current research activity for the Minimum Energy Multicast (MEM) problem has been focused on devising efficient centralized greedy algorithms for static ad hoc networks. In this paper, we consider mobile ad hoc networks(MANETs) that could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method, the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that CACH could find energy efficient depth of hierarchy of a cluster.

A Reservation-based MAC Protocol for QoS Support in Mobile Ad-Hoc Networks (이동 애드혹 망에서 QoS 지원을 위한 예약 기반의 MAC 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.866-871
    • /
    • 2006
  • This paper presents the design of a reservation-based MAC protocol to support multimedia traffic over mobile ad-hoc networks and evaluates its performance. Our MAC protocol is based on a hierarchical approach consisting of two sub-layers. The lower sub-layer of the MAC protocol with reservation provides a fundamental access method using CSMA/CA in order to support asynchronous data traffic over mobile ad-hoc networks. The upper sub-layer supports real-time periodic data by making a slot reservation before transmitting actual data. The proposed protocol has been validated through simulations using ns-2. The results show that the proposed MAC protocol can offer higher throughput and lower delay than standard implementations of the IEEE 802.11.

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안)

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.304-308
    • /
    • 2014
  • As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.

A Study on the "Annulment" of ICSID Arbitration Award - Focused on Comparison with the Arbitration Act of Korea - (ICSID 중재판정의 취소에 관한 연구 - 우리 중재법과의 비교를 중심으로 -)

  • Kim, Yong-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.133-158
    • /
    • 2008
  • The purpose of this article is to examine the "Annulment" of ICSID Arbitration Award. Most of the international conventions provide for arbitration as the preferred method of dispute settlement. In general they either provide for ad hoc arbitration under the UNCITRAL Rules or under the rules of an acceptable arbitration institution, e.g. ICC, AAA, LCIA and in particular ICSID. The most distinctive feature of ICSID arbitration is the self-contained and exhaustive nature of its review procedures. Unlike other arbitration regimes, control is exercised by internal procedures rather than by the courts. Remedies against the award are limited to those provided for in the Convention and do not include court involvement. Especially, the annulment of the ICSID award by an ad hoc committee must be considered as jeopardizing ICSID Arbitration because it clearly depart from the current trends of international commercial arbitration which limits any kinds of judicial review and excludes any kinds of review on the merits. I wish that the future decisions of the ad hoc committees will restore a narrow scope to the ICSID procedure of annulment in order not to endanger the ICSID Arbitration mechanism.

  • PDF