• Title/Summary/Keyword: Adhoc

Search Result 41, Processing Time 0.033 seconds

Cryptanalysis on Authentication Protocol over Vehicular Adhoc Network (차량 애드혹 네트워크를 위한 인증 프로토콜에 대한 취약성 분석)

  • Seo, Junhyuk;Kim, Hyunsung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.442-445
    • /
    • 2019
  • 차량 애드혹 네트워크에서 효율적인 인증을 위한 다양한 연구들이 진행되었다. 최근에 Ying과 Nayak은 이러한 문제를 해결하기 위해서 익명성을 제공하는 새로운 인증 프로토콜을 제안하였다. 본 논문에서는 Ying과 Nayak의 인증 프로토콜에 대한 리뷰를 통해서 이 프로토콜이 식별자 검증을 위한 서비스 거부 공격에 취약함을 보인다. 또한, 검증자 테이블 사용으로 인하여 Ying과 Nayak의 인증 프로토콜이 익명성을 제공하지 못함을 보인다. 즉, Ying과 Nayak의 인증 프로토콜은 보안과 프라이버시가 중요한 차량 애드혹 네트워크에 적절하지 못함을 보인다.

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.139-144
    • /
    • 2022
  • The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

A Development of Protable Mesh Network Gateway for Disaster Relief (재난 구조 통신망 구축을 위한 휴대형 메쉬 네트워크 게이트웨이의 개발)

  • Ryu, Dae-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.99-105
    • /
    • 2011
  • Typically, quick and easily deployed communication for a clear disaster management is required in a disaster situation. But it is not easy because lack of backbone network and poor conditions of disaster site. it is possible to obtain a wide service coverage and low power with portable wireless mesh network technology. In this paper, we developed portable wireless mesh network gateway with a network processor and evaluate it's performance including throughput, latency delay, packet loss, etc. The experiments show our wireless mesh network gateway has basic performance and can be used in various environments like disaster site.

Implementation of Demo Program for Visual Communication in Compliance with MPEG-21 Part 22: User Description (MPEG-UD 표준을 준수하는 비쥬얼 커뮤니케이션 데모 프로그램 개발)

  • Lim, Hea-Jin;Choi, Jang-Sik;Jeon, Jin-Young;Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.297-301
    • /
    • 2016
  • ISO/IEC JTC1/SC29WG11 MPEG has been standardizing UD(user description) to give a user personalized recommendation services. Besides, CD(context description), service description(SD), and recommendation description(RD) are recently being standardized by UD Adhoc Group in MPEG with an advanced UD to cope with needs of current and upcoming services such as augmented reality and social network. The descriptions was reflected to MPEG-UD WD(Working Draft) at MPEG $107^{th}$ meeting and the document was finally approved as international standard by national bodies with standard number(ISO/IEC IS 21000-22 UD) at $114^{th}$ MPEG meeting. In addition, reference software WD to validate conformance of UD standard was approved at $113^{th}$ MPEG meeting. In this paper, we developed a demo program for visual communication according to guideline defined in reference software WD to validate the reference software as well as UD standard.

Study of Piconet Auto-Configuration for WPAN (WPAN 피코넷 자동 구성에 대한 연구)

  • Cho, Moo-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.7
    • /
    • pp.67-72
    • /
    • 2005
  • If the PNC is shutting down or wants to leave the WPAN, it uses the handover process to give control to another device in the piconet. However when the PNC is selected, only the device capability information is checked in the WPAN standard specification and no detail criteria is described. In this paper, the PNC selection method with considering the number and density of device to maximize the piconet data throughput in the WPAN is studied. From the numerical analysis results, the considering with the devices concentration has higher data throughput compared with the uniform distribution. For the efficient performance, the device distribution within the piconet should be considered in the PNC selection.

Detection of Malicious Node using Timestamp in USN Adapted Diffie-Hellman Algorithm (Diffie-Hellman 알고리즘이 적용된 USN에서 타임스탬프를 이용한 악의적인 노드 검출)

  • Han, Seung-Jin;Choi, Jun-Hyeog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.115-122
    • /
    • 2009
  • In this paper, we proposed scheme that we use a difference of timestamp in time in Ubiquitous environments as we use the Diffie-Hellman method that OTP was applied to when it deliver a key between nodes, and can detect a malicious node at these papers. Existing methods attempted the malicious node detection in the ways that used correct synchronization or directed antenna in time. We propose an intermediate malicious node detection way at these papers without an directed antenna addition or the Trusted Third Party (TTP) as we apply the OTP which used timestamp to a Diffie-Hellman method, and we verify safety regarding this. A way to propose at these papers is easily the way how application is possible in Ubiquitous environment.

A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks

  • Jiang Ning;Hua Kien A.;Liu, Danzhou
    • Journal of Communications and Networks
    • /
    • v.9 no.1
    • /
    • pp.56-66
    • /
    • 2007
  • Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.

On-Time Internal Pedestrian Localization Algorithm Based on Ad-Hoc Networks (애드혹 네트워크 기반의 실내 보행자 위치 추적 알고리즘)

  • Han, Ji-Yong;Jang, Jae-Min;Han, Junghee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1000-1008
    • /
    • 2014
  • Situation awareness for vehicles and pedestrians is very critical to ensure safety. While on-board sensors or systems can easily detect line-of-sight pedestrians, it is difficult to locate the positions of out-of-sight pedestrians especially with no GPS service. This paper proposes a method for accurate and on-time localization of indoor pedestrians by nearby vehicles. The proposed method is based on mobile ad-hoc networks among vehicles and pedestrians, without relying on infrastructures such as GPS, WiFi AP, and Bluetooth-based systems. Also, this paper develops a genetic algorithm to accurately and promptly locate pedestrians. Finally, simulation results are presented to quantitatively evaluate the proposed method compared to other studies.

Design and Analysis of Fire Detection and Alarm System using Bio-adhoc Network (바이오 애드 혹 네트워크를 이용한 재난 조기 경보 시스템 설계 및 분석)

  • Lee, Dong-Eun;Lee, Goo-Yeon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.33-38
    • /
    • 2006
  • 인프라가 필요 없는 특성을 갖고 있어 임시 구성용 네트워크나 군사용 망에서 많이 개발되어온 애드 혹 네트워크는 산악과 같은 고립된 지역에 설치하여 산불과 같은 재난의 조기 경보 시스템에 이용한다면 효과적이다. 그러나 넓은 산악지역을 모두 커버할 수 있는 애드 혹 노드들을 설치 운영하는 것은 경제적으로 불가능하다. 또한 인포스테이션은 전송지연에 민감하지 않는 정보들을 적은 비용으로 효율적으로 전송할 수 있는 시스템이다. 우리는 본 논문에서 동물들에 애드 혹 노드들을 탑재한 이동 애드 혹 네트워크와 인포스테이션을 결합하여 화재와 같은 재난에 조기 대처할 수 있는 재난 조기 경보 시스템을 제안한다. 동물들의 이동성이 노드들간의 연결성을 향상시키므로서, 합리적인 수의 동물 노드로서 원하는 조기 경보의 효과를 만들어 낼 수 있다. 우리는 또한 제안된 시스템의 성능을 수식으로 분석하여 이를 시뮬레이션과 비교해 보았고, 실제 시스템 구축시 필요한 비용을 분석해 보았다. 이는 시스템 구축 시 필요한 파라미터를 제공할 것이다. 이 제안된 시스템을 실제 환경에 적용하면 산악지역에서의 화재등의 재난에 조기대응을 할 수 있을 것이며, 또한 피해를 최소화 할 수 있을 것이다.

  • PDF