• Title/Summary/Keyword: Blackhole

Search Result 22, Processing Time 0.027 seconds

A simulation analysis on the effect of counterbeam lighting for the tunnel entrance zones (터널 입구부 카운터빔조명의 효과에 대한 시뮬레이션 연구)

  • Lee, Young-Q;Lee, Seung-Ho
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.9 no.4
    • /
    • pp.377-385
    • /
    • 2007
  • Drivers passing through a tunnel fare some difficulties caused by the visual differences between outside and inside of the tunnel. The blackhole phenomenon at a tunnel entrance lone severely decreases the driver's visibility during the daytime. A counterbeam lighting is generally recommended for the prevention of it. This paper simulates an entrance zone with a blackhole phenomenon to verify the effect of counterbeam lighting. Even though the tunnel lighting is important, It Is not easy to consider many lighting alternatives at the stage of tunnel design due to the complexity of tunnel renditions. This paper is expected to contribute improving the visibility in tunnels, especially at the entrance zone.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions (다중침해가 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.257-262
    • /
    • 2012
  • In this paper, transmission performance for serval VoIP traffics is meaured and analysised over MANET(Mobile Ad-hoc Networks) under some types of intrusions. VoIP simulator based on NS-2 is used for performance measure. In the simulation, MOS, network delay, packet loss rate and call connection rate is measured for transmission performance. With analysis of measued data, characteristics of each traffics for transmission performance parameters is showed on MANET under multi intrusions, As a results of this paper, some recommendation condtion for codec selection and blackhole intrusion is suggested to implement VoIP services on MANET under multi intrusions like as DDoS and blockhole intrusions.

Intrusion Detection System based on Cluster (클러스터를 기반으로 한 침입탐지시스템)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.479-484
    • /
    • 2009
  • Security system of wireless network take on importance as use of wireless network increases. Detection and opposition about that is difficult even if attack happens because MANET is composed of only moving node. And it is difficult that existing security system is applied as it is because of migratory nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system using cluster head in order to detect malicious attack and use resources efficiently. we used method that gathering of rules is defined and it judges whether it corresponds or not to detect intrusion more exactly. In order to evaluate performance of proposed method, we used blackhole, message negligence, jamming attack.

  • PDF

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

A Study on Attack Detection using Hierarchy Architecture in Mobile Ad Hoc Network (MANET에서 계층 구조를 이용한 공격 탐지 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.75-82
    • /
    • 2014
  • MANET has various types of attacks. In particular, routing attacks using characteristics of movement of nodes and wireless communication is the most threatening because all nodes which configure network perform a function of router which forwards packets. Therefore, mechanisms that detect routing attacks and defense must be applied. In this paper, we proposed hierarchical structure attack detection techniques in order to improve the detection ability against routing attacks. Black hole detection is performed using PIT for monitoring about control packets within cluster and packet information management on the cluster head. Flooding attack prevention is performed using cooperation-based distributed detection technique by member nodes. For this, member node uses NTT for information management of neighbor nodes and threshold whether attack or not receives from cluster head. The performance of attack detection could be further improved by calculating at regular intervals threshold considering the total traffic within cluster in the cluster head.

Implementation of Anti-Spam Server and Android Application Using Self-Authentication Mechanism (송신자 자가인증 기법을 적용한 스팸차단 서버와 안드로이드 애플리케이션 구현)

  • Yang, Inshik;Baik, Jeanseong;Kang, Kyungtae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.35-36
    • /
    • 2017
  • 이메일 서비스 사용자들은 스패머가 무차별적으로 발송하는 스팸메일에 의한 정신적 경제적 피해를 입고 있다. 이러한 피해를 막기 위해 필터링, RBL (Real-time Blackhole List)과 같은 스팸차단 기법이 등장하였고 많은 메일서버에서 사용되고 있다. 그러나 이는 스팸메일의 근본적인 원인은 해결하지 못하며, 높은 차단율을 유지하기 위해서는 지속적인 관리 및 업데이트가 필요하다. 이러한 한계점을 극복하기 위한 기법으로 송신자 자가인증 기법이 있다. 본 논문에서는 송신자 자가인증 기법을 적용하여, 스팸메일을 근본적으로 차단하고 지속적인 업데이트가 필요 없는 스팸차단 서버 및 애플리케이션을 구현하였다.

  • PDF

The BAT AGN Spectroscopic Survey: concept, status, and future perspectives

  • Oh, Kyuseok;Ueda, Yoshihiro;Koss, Michael;Ricci, Claudio;Schawinski, Kevin;Trakhtenbrot, Benny;Lamperti, Isabella
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.2
    • /
    • pp.32.4-33
    • /
    • 2018
  • We present the BAT AGN Spectroscopic Survey (BASS) which is an optical/NIR spectroscopic survey of the least biased sample of hard X-ray selected local AGN. For more than a thousand AGN that identified through Swift-BAT hard X-ray all-sky survey, we are conducting dedicated spectroscopic observing runs using world-class telescopes such as ESO-VLT, Magellan, and Palomar. The goal of the project is measuring black hole mass, investigating supermassive blackhole growth and its structure, and providing a baseline for future X-ray missions that will perform deeper observations of more distant AGN. In this presentation, we briefly introduce the concept of the project, past and the current status, and future work.

  • PDF

Transmission Performance of MANET under Grayhole Attack (Grayhole 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.639-642
    • /
    • 2015
  • As attack to routing function on MANET(Mobile Ad-Hoc Network), hole attack make cause some critical effects. MANET is easily influenced with hole attack and can be critically effected on transmission performance, because it is configured with terminal device as temporary network and dose not have effective means for malicious attack. In this paper, effects of grayhole attack to network performance on MANTE is analyzed with computer simulation. Voice traffic is used in simulation, effects of grayhole attack is compaerd with blackhole attack. The method and result of this paper can be used for data to study grayhoke attack.

  • PDF

Transmission Performance of Large Scale MANETs with IDS (IDS가 있는 대규모 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.642-645
    • /
    • 2012
  • MANET has disadvantage for information intrusion caused from non-infra structure. That is based on mixed problems caused from terminal devices has no capability of various resources using abilities to run intrusion prevention function, and also from difficulty of no easy using infra structural server like as firewall. In this paper, transmission performances, be effected from information intrusion and IDS(Intrusion Detection System), are analyzed for large scale MANET, and weakness from information intrusion of MANET are studied. This study is for large scale MANET which has some large communication area and lots of nodes, voice traffic, based on VoIP protocols, is considered as application services be transmitted over MANETs. Computer simulation using NS-2 is used to measure and show MOS and call connection ratios.

  • PDF