• 제목/요약/키워드: Channel routing

Search Result 275, Processing Time 0.024 seconds

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

A Solution for Congestion and Performance Enhancement using Dynamic Packet Bursting in Mobile Ad Hoc Networks (모바일 애드 혹 네트워크에서 패킷 버스팅을 이용한 혼잡 해결 및 성능향상 기법)

  • Kim, Young-Duk;Yang, Yeon-Mo;Lee, Dong-Ha
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.409-414
    • /
    • 2008
  • In mobile ad hoc networks, most of on demand routing protocols such as DSR and AODV do not deal with traffic load during the route discovery procedure. To solve the congestion and achieve load balancing, many protocols have been proposed. However, the existing load balancing schemes has only considered avoiding the congested route in the route discovery procedure or finding an alternative route path during a communication session. To mitigate this problem, we have proposed a new scheme which considers the packet bursting mechanism in congested nodes. The proposed packet bursting scheme, which is originally introduced in IEEE 802.11e QoS specification, is to transmit multiple packets right after channel acquisition. Thus, congested nodes can forward buffered packets promptly and minimize bottleneck situation. Each node begins to transmit packets in normal mode whenever its congested status is dissolved. We also propose two threshold values to define exact overloaded status adaptively; one is interface queue length and the other is buffer occupancy time. Through an experimental simulation study, we have compared and contrasted our protocol with normal on demand routing protocols and showed that the proposed scheme is more efficient and effective especially when network traffic is heavily loaded.

Re-Analysis of Clark Model Based on Drainage Structure of Basin (배수구조를 기반으로 한 Clark 모형의 재해석)

  • Park, Sang Hyun;Kim, Joo Cheol;Jeong, Dong Kug;Jung, Kwan Sue
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2255-2265
    • /
    • 2013
  • This study presents the width function-based Clark model. To this end, rescaled width function with distinction between hillslope and channel velocity is used as time-area curve and then it is routed through linear storage within the framework of not finite difference scheme used in original Clark model but analytical expression of linear storage routing. There are three parameters focused in this study: storage coefficient, hillslope velocity and channel velocity. SCE-UA, one of the popular global optimization methods, is applied to estimate them. The shapes of resulting IUHs from this study are evaluated in terms of the three statistical moments of hydrologic response functions: mean, variance and the third moment about the center of IUH. The correlation coefficients to the three statistical moments simulated in this study against these of observed hydrographs were estimated at 0.995 for the mean, 0.993 for the variance and 0.983 for the third moment about the center of IUH. The shape of resulting IUHs from this study give rise to satisfactory simulation results in terms of the mean and variance. But the third moment about the center of IUH tend to be overestimated. Clark model proposed in this study is superior to the one only taking into account mean and variance of IUH with respect to skewness, peak discharge and peak time of runoff hydrograph. From this result it is confirmed that the method suggested in this study is useful tool to reflect the heterogeneity of drainage path and hydrodynamic parameters. The variation of statistical moments of IUH are mainly influenced by storage coefficient and in turn the effect of channel velocity is greater than the one of hillslope velocity. Therefore storage coefficient and channel velocity are the crucial factors in shaping the form of IUH and should be considered carefully to apply Clark model proposed in this study.

Development of Hydrologic Simulation Model to Predict Flood Runoff in a Small Mountaineous Watershed (산지 소유역의 홍수유출 예측을 위한 모의발생 수문모형의 개발)

  • 권순국;고덕구
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.30 no.3
    • /
    • pp.58-68
    • /
    • 1988
  • Most of the Korean watersheds are mountaineous and consist of various soil types and land uses And seldom watersheds are found to have long term hydrologic records. The SNUA, a hydrologic watershed model was developed to meet the unique characteristics of Korean watershed and simulate the storm hydrographs from a small mountaineous watershed. Also the applicability of the model was tested by comparing the simulated storm hydrographs and the observed from Dochuk watershed, Gwangjugun, Kyunggido The conclusions obtained in this study could be summarized as follows ; 1. The model includes the simulation of interception, evaporation and infiltration for land surface hydrologic cycle on the single storm basis and the flow routing features for both overland and channel systems. 2. Net rainfall is estimated from the continuous computation of water balance at the surface of interception storage accounting for the rainfall intensities and the evaporation losses at each time step. 3. Excess rainfall is calculated by the abstraction of infiltration loss estimated by the Green and Ainpt Model from the net rainfall. 4. A momentum equation in the form of kinematic wave representation is solved by the finite differential method to obtain the runoff rate at the exit of the watershed. 5. The developed SNUA Model is a type of distributed and event model that considers the spatial distribution of the watershed parameters and simulates the hydrograph on a single storm basis. 6. The results of verification test show that the simulated peak flows agree with the observed in the occurence time but have relative enors in the range of 5.4-40.6% in various flow rates and also show that the simulated total runoff have 6.9-32% of relative errors against the observed. 7. To improve the applicability of the model, it was thought that more studies like the application test to the other watersheds of various types or the addition of the other hydrologk components describing subsurface storages are needed.

  • PDF

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

Analysis on the Runoff of Urban Watershed using MIKE SWMM Model (MIKE SWMM모형을 이용한 도시유역 유출분석에 관한 연구)

  • Kim Jong Seok;Choe Gyeong Rok;Ahn Jae Hyun;Moon Young Il
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.862-866
    • /
    • 2005
  • For urban watershed models, the ILLUDAS and SWMM are the popular rainfall-runoff models used in Korea. However, combined sewage systems in urban areas produced problems when a flood occured because of the surcharged precipitation amount which drained to the streams directly. Also, the lack of pipe line data and the difficulties of modeling yield inappropriate modeling results in urban runoff analysis. In addition, rainfall-runoff models in urban areas which use channel routing could have inaccurate and complicated processes. In this paper, the MIKE SWMM model has been applied for the stable runoff analysis of urban areas. Watershed and pipe line data were established by using past inundated records, DEM data, and the numerical pipe line data. For runoff modelings, the runoff block was adapted to a basin and the Extran block using dynamic equations was applied to the sewage system. After comparing to models that exist, it is concluded that the MIKE SWMM model produces reliable and consistence results without distorting the Parameters of the model.

  • PDF

Analysis of Numerical Unstable Factors in Channel Routing Model (하도추적모형의 수치적 불안정성 요인 분석)

  • Lee, Eul-Rae;Lee, Geun-Sang;Kim, Young-Sung;Hwang, Eui-Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.775-779
    • /
    • 2009
  • 최근 이상기후 및 국지성 돌발호우 등 여러 가지 형태의 예기치 못한 기상이변으로 인하여 매년 수재해는 빈번히 발생하고 있으며, 이를 위해 하천에서 실시간으로 신속하고 안정성있는 수리학적 하도추적모형의 구축은 지속적으로 연구해야 할 사항이다. 현재 주요 수계 홍수통제소에서는 홍수예보를 위해 주로 수리학적 및 수문학적 모형이 병행되어 적용되고 있으나, 한강과 금강하류를 제외한 나머지 수계에서는 아직까지 개념적 수문학적 모형만을 이용하여 홍수예보를 수행하고 있는 실정이다. 그러나, 신속하고 안정적인 수문학적 모형이 가지고 있는 몇가지 장점에도 불구하고, 실시간 분석 및 신속한 상황대처를 위해서는 정교한 하천흐름해석 기술인 수리학적분석이 반드시 필요하다. 그러나, 대부분의 모형운영자가 직면하게 되는 수리학적 하도추적모형에서 발생하는 수치적 불안정성인 발산의 문제점은 상당한 어려움으로 작용하고 있다. 이는 다양한 원인들이 있을 수 있으나, 대표적으로 단면의 불규칙성을 고려할 수 있다. 실제단면들을 모형에 반영할 때 수치계산의 과정 중에 급확대/급축소/특이단면에 따른 잦은 발산이 발생하게 되며, 이를 방지하기 위해서 단면의 보간 및 평활화 작업 등을 수행하게 된다. 이때 단면의 형상을 최대한 반영한 보간 및 평활화 작업이 되지 않으면, 물리적 개념이 무시된 비합리적인 계산이 수행될 수 있다. 발산의 요인을 제거한 최적의 단면형태를 선정하는 것은 모형의 안정성을 확보하는 데 중요한 요인이 된다. 또한 모형수행에 있어 발산의 요인으로서 하구와 만나게 되는 지점에서의 경계조건으로서 조위영향이 있다. 수리학적 하도추적모형의 중요한 요인인 하구에서의 흐름을 조위와 연계하여 가장 합리적인 하류 경계조건을 제시하는 것이 모형의 발산 방지 및 정확도를 향상시키는데 중요한 인자로 작용하고 있다. 본 연구에서는 이와 같은 수리학적 하도추적모형의 안정성 검증을 위하여, 아직까지 수리학적 하도추적모형이 구축되어 있지 않는, 금강상류구간인 용담댐$^{\sim}$대청댐구간을 설정하여 수리학적 모형의 입력자료를 구축하고, 그에 따른 영향검토를 지속적으로 추진할 계획이다. 대상구간에서 향후 검증될 다양한 수리학적 안정화 기술은 향후 타 수계에서 적용시, 신속하고 합리적인 입력자료 구축에 많은 도움을 줄것이며, 현재 하천에서 발생하는 계산의 불안정성을 빠르게 수정하는 것이 가능하다.

  • PDF

Analyis of stormwater and runoff characteristics in Anseongcun basin using HEC-HMS (HEC-HMS을 이용한 안성천 유역의 강우 유출 특성 분석)

  • Hwang, Byung-Gi;Yang, Seung-Bin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.17-24
    • /
    • 2018
  • The HEC-HMS model was applied to identify the rainfall-runoff processes for the Anseongchun basin, where the lower part of the stream has been damaged severely by tropical storms in the past. Modeling processes include incorporating with the SCS-CN model for loss, Clark's UH model for transformation, exponential recession model for baseflow, and Muskingum model for channel routing. The parameters were calibrated through an optimization technique using a trial and error method. Sensitivity analysis after calibration was performed to understand the effects of parameters, such as the time of concentration, storage coefficient, and base flow related constants. Two storm water events were simulated by the model and compared with the corresponding observations. Good accuracy in predicting the runoff volume, peak flow, and the time to peak flow was achieved using the selected methods. The results of this study can be used as a useful tool for decision makers to determine a master plan for regional flood control management.

Power, mobility and wireless channel condition aware connected dominating set construction algorithm in the wireless ad-hoc networks (무선 에드 혹 네트워크에서 전력, 이동성 및 주변 무선 채널 상태를 고려한 연결형 Dominating Set 구성 방법)

  • Cho Hyoung-Sang;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.274-286
    • /
    • 2005
  • In this paper, we propose a new power-efficient and reliable connected dominating set based routing protocol in the mobile ad hoc networks. Gateway nodes must be elected in consideration of residual energy and mobility because frequent reconstruction of connected dominating set result in transmission error for route losses. If node density is high, it results in a lot of contentions and more delays for network congestion. Therefore, in this paper, we propose a new construction method of connected dominating set that supports reliable and efficient data transmission through minimizing reconstruction of connected dominating set by delaying neighbor set advertisement message broadcast in proportion to weighted sum of residual energy, mobility, and the number of neighbor nodes. The performance of the proposed protocol is proved by simulation of various conditions.

Resource Allocation in Spectrum Sharing ad-hoc Cognitive Radio Networks Based on Game Theory: An Overview

  • Abdul-Ghafoor, Omar B.;Ismail, Mahamod;Nordin, Rosdiadee;El-Saleh, Ayman Abd
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.2957-2986
    • /
    • 2013
  • The traditional approach of fixed spectrum allocation to licensed networks has resulted in spectrum underutilisation. Cognitive radio technology is envisioned as a promising solution that can be used to resolve the ineffectiveness of the fixed spectrum allocation policy by accessing the underutilised spectrum of existing technologies opportunistically. The implementation of cognitive radio networks (CRNs) faces distinct challenges due to the fact that two systems (i.e., cognitive radio (CR) and primary users (PUs)) with conflicting interests interact with each other. Specially, in self-organised systems such as ad-hoc CRNs (AHCRNs), the coordination of spectrum access introduces challenges to researchers due to rapid utilisation changes in the available spectrum, as well as the multi-hop nature of ad-hoc networks, which creates additional challenges in the analysis of resource allocation (e.g., power control, channel and rate allocation). Instead, game theory has been adopted as a powerful mathematical tool in analysing and modelling the interaction processes of AHCRNs. In this survey, we first review the most fundamental concepts and architectures of CRNs and AHCRNs. We then introduce the concepts of game theory, utility function, Nash equilibrium and pricing techniques. Finally, we survey the recent literature on the game theoretic analysis of AHCRNs, highlighting its applicability to the physical layer PHY, the MAC layer and the network layer.