• Title/Summary/Keyword: Cluster Member

Search Result 180, Processing Time 0.024 seconds

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.

A study of set route path avoiding traffic concentration in Mobile Ad hoc Network (MANET에서 트래픽 집중현상을 회피하는 경로설정에 관한 연구)

  • Oh, Dong-keun;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.781-783
    • /
    • 2014
  • Mobile ad hoc network(MANET) consists of node that has mobility. MANET has increased overhead that caused by frequent topology changes. For reducing overhead, hierarchical network that communicates through cluster head node has been researched. When traffic is concentrated on cluster head node, cluster member node can't send message. To solve this problem, we proposed Step Parent algorithm. Proposed algorithm, cluster member node checks traffic of cluster head node using route path of other cluster head node in efficient coverage area. When cluster head node has increased traffic, cluster member node make a new route path by route path by routing path to another cluster head node. So cluster member node sends a message to destination node, we check improving delivery ratio.

  • PDF

A Study of Load Tolerance Node using Load-balance in Mobile Ad hoc Networks (모바일 애드 혹 네트워크에서 로드 밸런스를 이용한 분산 노드 설정에 관한 연구)

  • Oh, Dong-Keun;Oh, Young-Jun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.1001-1008
    • /
    • 2015
  • Mobile Ad hoc Network(MANET) consists of a node that has mobility. In MANET, the node has routing, the node builds a network of their own, no dependent infrastructure. Topology are exchanged due to node mobility in MANET. For reducing the change of topology, hierarchical network algorithm has been investigated. In hierarchical network, cluster member node communicates through cluster head node. When the load-balancing of cluster head node is exceed, assigned cluster member node can't communicate with base station. To solve this problem, we proposed Load Tolerance algorithm. The proposed algorithm, when cluster member node can't send a message by cluster head node that exceed load-balancing, then the cluster member node sends a message by selected load tolerance node. Through a simulation, the proposed algorithm improves packet delivery ratio in cluster routing.

Initial Rendezvous Protocol using Multicarrier Operation for Cognitive Radio Ad-hoc Networks

  • Choi, Ik-Soo;Yoo, Sang-Jo;Seo, Myunghwan;Han, Chul-Hee;Roh, Bongsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2513-2533
    • /
    • 2018
  • In cognitive radio technology, the overall efficiency of communications systems can be improved without allocating additional bands by allowing a secondary system to utilize the licensed band when the primary system, which has the right to use the band, does not use it. In this paper, we propose a fast and reliable common channel initialization protocol without any exchange of initialization messages between the cluster head and the member nodes in cognitive ad-hoc networks. In the proposed method, the cluster and member nodes perform channel-based spectrum sensing. After sensing, the cluster head transmits a system activation signal through its available channels with a predetermined angle difference pattern. To detect the cluster head's transmission channels and to join the cluster, each member node implements fast Fourier transform (FFT) and computes autocorrelation for the angle difference sequence of the received signal patterns. This is compared to the predetermined reference angle difference pattern. The join-request and channel-decision procedures are presented in this paper. Performance evaluation of the proposed method is presented in the simulation results.

A Study on Attack Detection using Hierarchy Architecture in Mobile Ad Hoc Network (MANET에서 계층 구조를 이용한 공격 탐지 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.75-82
    • /
    • 2014
  • MANET has various types of attacks. In particular, routing attacks using characteristics of movement of nodes and wireless communication is the most threatening because all nodes which configure network perform a function of router which forwards packets. Therefore, mechanisms that detect routing attacks and defense must be applied. In this paper, we proposed hierarchical structure attack detection techniques in order to improve the detection ability against routing attacks. Black hole detection is performed using PIT for monitoring about control packets within cluster and packet information management on the cluster head. Flooding attack prevention is performed using cooperation-based distributed detection technique by member nodes. For this, member node uses NTT for information management of neighbor nodes and threshold whether attack or not receives from cluster head. The performance of attack detection could be further improved by calculating at regular intervals threshold considering the total traffic within cluster in the cluster head.

A Novel Jamming Detection Technique for Wireless Sensor Networks

  • Vijayakumar, K.P.;Ganeshkumar, P.;Anandaraj, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4223-4249
    • /
    • 2015
  • A novel jamming detection technique to detect the presence of jamming in the downstream direction for cluster based wireless sensor networks is proposed in this paper. The proposed technique is deployed in base station and in cluster heads. The proposed technique is novel in two aspects: Firstly, whenever a cluster head receives a packet it verifies whether the source node is legitimate node or new node. Secondly if a source node is declared as new node in the first step, then this technique observes the behavior of the new node to find whether the new node is legitimate node or jammed node. In order to monitor the behavior of the existing node and new node, the second step uses two metrics namely packet delivery ratio (PDR) and received signal strength indicator (RSSI). The rationality of using PDR and RSSI is presented by performing statistical test. PDR and RSSI of every member in the cluster is measured and assessed by the cluster head. And finally the cluster head determines whether the members of the cluster are jammed or not. The CH can detect the presence of jamming in the cluster at member level. The base station can detect the presence of jamming in the wireless sensor network at CH level. The simulation result shows that the proposed technique performs extremely well and achieves jamming detection rate as high as 99.85%.

A redshift survey of the nearby galaxy cluster Abell 2107: Global rotation of the cluster and its connection to large-scale structures in the universe

  • Song, Hyunmi;Hwang, Ho Seong;Park, Changbom;Smith, Rory;Einasto, Maret
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.2
    • /
    • pp.37.2-37.2
    • /
    • 2018
  • We present the results from a spectroscopic survey of the nearby galaxy cluster Abell 2107 at z=0.04 that has been known as a rotating cluster. By combining 978 new redshifts from the MMT/Hectospec observations with the data in the literature, we construct a large sample of 1968 galaxies with measured redshifts at R<60', which results in high (80%) and spatially uniform completeness at $m_{r,Petro,0}<19.1$. We use this sample to study the global rotation of the cluster and its connection to the large-scale structures in the universe. We first apply the caustic method to the sample and identify 285 member galaxies in Abell 2107 at R<60'. We then measure the rotation amplitude and the position angle of rotation axis. The member galaxies show strong global rotation at R<20' ($V/{\sigma}{\sim}0.60-0.70$) with a significance of >3.8 ${\sigma}$, which is confirmed by two independent methods. The rotation becomes weaker in outer regions. We find at least four filamentary structures at $R<30h^{-1}Mpc$ smoothly connected to the cluster galaxies, which can suggest that the global rotation of the cluster is induced by the inflow of galaxies from the surrounding large-scale structures in the universe.

  • PDF

Properties of Brightest Cluster Galaxies as a Function of Cluster Classification Type

  • Eom, Heungjin;Shim, Hyunjin
    • Journal of the Korean earth science society
    • /
    • v.36 no.5
    • /
    • pp.427-436
    • /
    • 2015
  • We classified Abell clusters using the magnitude differences between two or three bright member galaxies and investigated how such classification was correlated with the properties of brightest cluster galaxies (BCGs). S-type BCGs being clearly brighter than the rest of the member galaxies were likely to be red, luminous, and evolved as early type galaxies. On the other hand, T-type BCGs being not dominant at all were less luminous than early type galaxies. A small fraction of BCGs was currently forming stars, and all of the star-forming BCGs were T-type BCGs. Active galactic nuclei were most frequent for S-type BCGs. Through these quantitative analyses of the BCG properties, we discussed the possible scenario of BCG formation and the differences between S-type and T-type of BCGs.

SPATIAL DISTRIBUTION OF THE SPIN VECTORS OF THE DISK GALAXIES IN THE VIRGO CLUSTER

  • YUAN Q. R.;HU F. X.;HE X. T.
    • Journal of The Korean Astronomical Society
    • /
    • v.29 no.spc1
    • /
    • pp.55-56
    • /
    • 1996
  • In order to investigate the spatial orientation of the spin vectors of galaxies in the Virgo cluster, we carried out a detailed identification of all the certain and possible member disk galaxies with four UK Schmidt Telescope (UKST) III a-j direct plates digitized by the Automated Plate Measuring System (APM). As a result, a relatively large and complete database with no selection effect of the member galaxies has been established. We provide the APM measured values of the position angle (P.A.) and diameters at the isophotal level of 24.5 $m_j / arcsec^2$. Based on this newly generated database, an initial study on the spatial orientation of the spin vectors of galaxies in the Virgo cluster is shown.

  • PDF

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.