• 제목/요약/키워드: Constraint-Based Routing

검색결과 54건 처리시간 0.021초

A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network

  • Abdurohman, Maman;Supriadi, Yadi;Fahmi, Fitra Zul
    • Journal of Information Processing Systems
    • /
    • 제16권4호
    • /
    • pp.845-858
    • /
    • 2020
  • This paper proposes a modified end-to-end secure low energy adaptive clustering hierarchy (ME-LEACH) algorithm for enhancing the lifetime of a wireless sensor network (WSN). Energy limitations are a major constraint in WSNs, hence every activity in a WSN must efficiently utilize energy. Several protocols have been introduced to modulate the way a WSN sends and receives information. The end-to-end secure low energy adaptive clustering hierarchy (E-LEACH) protocol is a hierarchical routing protocol algorithm proposed to solve high-energy dissipation problems. Other methods that explore the presence of the most powerful nodes on each cluster as cluster heads (CHs) are the sparsity-aware energy efficient clustering (SEEC) protocol and an energy efficient clustering-based routing protocol that uses an enhanced cluster formation technique accompanied by the fuzzy logic (EERRCUF) method. However, each CH in the E-LEACH method sends data directly to the base station causing high energy consumption. SEEC uses a lot of energy to identify the most powerful sensor nodes, while EERRCUF spends high amounts of energy to determine the super cluster head (SCH). In the proposed method, a CH will search for the nearest CH and use it as the next hop. The formation of CH chains serves as a path to the base station. Experiments were conducted to determine the performance of the ME-LEACH algorithm. The results show that ME-LEACH has a more stable and higher throughput than SEEC and EERRCUF and has a 35.2% better network lifetime than the E-LEACH algorithm.

Ad-Hoc 무선 환경의 발행/구독 시스템을 위한 구독주제 유사도 기반의 이벤트 라우팅 알고리즘 (Topic Similarity-based Event Routing Algorithm for Wireless Ad-Hoc Publish/Subscribe Systems)

  • 웬중휴;오상윤
    • 한국컴퓨터정보학회논문지
    • /
    • 제14권10호
    • /
    • pp.11-22
    • /
    • 2009
  • 동적이고 자원 제한적인 무선 애드혹 네트워크 환경에서, 발행/구독을 위한 이벤트 라우팅 알고리즘은 네트워크의 성능을 결정하는 중요한 역할을 한다. 지금까지는 노드간의 거리 정보를 이용하여 네트워크 오버헤드를 최소화하려는 이벤트 라우팅 알고리즘이 대표적으로 사용되어 왔다. 본 논문에서는 네트워크 오버헤드 중심의 이벤트 라우팅 알고리즘을 기반으로, 구독되는 주제의 유사도를 추가적으로 고려하여 발행/구독 트리에서의 노드 부모를 결정하는 새로운 알고리즘, TopSim을 제안한다. 본 제안 알고리즘은 기반이 되는 ShopParent 알고리즘을 이용하여 네트워크 오버헤드를 계산하고, 이를 기반으로 부모 후보 집합을 만든 후 새로 가입하는 노드와 부모 후보 노드들의 구독주제의 유사도를 계산하여 이를 기반으로 부모를 결정한다. 그럼으로써 노드들이 다수의 구독 주제를 가지는 경우에 보다 효과적으로 네트워크 오버헤드를 줄이도록 하였다. 성능평가를 통해 기존의 네트워크 오버헤드기반의 알고리즘에 비해 제안 알고리즘이 네트워크 성능을 향상시키는 것을 확인하였다.

A Real-Time MAC Protocol with Extended Backoff Scheme for Wireless Sensor Networks

  • Teng, Zhang;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • 제9권3호
    • /
    • pp.341-346
    • /
    • 2011
  • Wireless sensor networks (WSNs) are formed by a great quantity of sensor nodes, which are consisted of battery-powered and some tiny devices. In WSN, both efficient energy management and Quality of Service (QoS) are important issues for some applications. Real-time services are usually employed to satisfy QoS requirements in critical environment. This paper proposes a real-time MAC (Medium Access Control) protocol with extended backoff scheme for wireless sensor networks. The basic idea of the proposed protocol employs (m,k)-firm constraint scheduling which is to adjust the contention window (CW) around the optimal value for decreasing the dynamic failure and reducing collisions DBP (Distant Based Priority). In the proposed protocol, the scheduling algorithm dynamically assigns uniform transmitting opportunities to each node. Numerical results reveal the effect of the proposed backoff mechanism.

용량제약이 있는 다경로 오리엔티어링 문제의 해법에 관한 연구 (A Heuristic Algorithm for Multi-path Orienteering Problem with Capacity Constraint)

  • 황학;박금애;오용희
    • 대한산업공학회지
    • /
    • 제33권3호
    • /
    • pp.303-311
    • /
    • 2007
  • This study deals with a type of vehicle routing problem faced by manager of some department stores during peak sales periods. The problem is to find a set of traveling paths of vehicles that leave a department store and arrive at a destination specified for each vehicle after visiting customers without violating time and capacity constraints. The mathematical model is formulated with the objective of maximizing the sum of the rewards collected by each vehicle. Since the problem is known to be NP-hard, a heuristic algorithm is developed to find the solution. The performance of the algorithm is compared with the optimum solutions obtained from CPLEX for small size problems and a priority-based Genetic Algorithm for large size problems.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

동적 멀티캐스트를 위한 주 송신원 기탄 트리 (Dominant Source Based Tree for Dynamic Multicasting)

  • 남홍순;김대영;이규욱
    • 한국멀티미디어학회논문지
    • /
    • 제3권6호
    • /
    • pp.633-642
    • /
    • 2000
  • 본 논문에서는 대규모의 동적 멀티캐스트를 효율적으로 제공하기 위한 국부적 경로 배정 방법인 주 송신원기반 트리(Dominant Source-Based Tree : DSBT)를 제안하고 종단간 경비 특성을 분석하였다. 대규모의 동적 멀티캐스트는 그룹 구성 멤버가 많고 가입과 탈퇴가 빈번하기 때문에 중앙에서 경로를 배정하기에는 계산이 복잡하고, 경로 재배정 없이 경비를 제한하기 곤란하다. 이러한 문제를 개선하기 위하여 DSBT는 멀티캐스트 그룹을 주 송신원(Dominant Source : DS)과 정규화 경비 여유도(Normalized Cost Margin : NCM)의 쌍인 (DS, NCM)으로 표현하여, 그룹에 가입하려는 노드에 DS에 대하여 NCM을 만족하는 국부적인 경로를 배정한다. 이 방법은 트리닝상의 모든 경로가 NCM을 만족하므로 멤버가 추가되는 경우에도 기존 경로를 재배정하지 않고 종단간 경비를 제한다. 시뮬레이션 결과 제안된 알고리즘은 Nave 알고리즘보다 전체적인 경비를, Greedy 알고리즘보다 종단간 경비를 개선할 수 있음을 보인다.

  • PDF

KREONET OpenFlow 네트워크 테스트베드 기반의 QoS 라우팅 경로 제어 구현 (Implementation of a QoS routing path control based on KREONET OpenFlow Network Test-bed)

  • 김승주;민석홍;김병철;이재용;홍원택
    • 대한전자공학회논문지TC
    • /
    • 제48권9호
    • /
    • pp.35-46
    • /
    • 2011
  • 미래인터넷은 효과적인 이동성 처리, 유연한 트래픽 엔지니어링 기술 및 다양한 새로운 응용 지원이 이루어져야 한다. 이에 따라 많은 트래픽 엔지니어링 기술들이 제안되고 개발되어 왔지만 이를 실제 운용 중인 상용 인터넷 망에 적용하는 것은 매우 어려운 것이 사실이다. 이 문제를 해결하기 위해 다양한 네트워킹 관련 응용을 지원하는 컨트롤러를 사용해 망의 장비를 제어할 수 있는 OpenFlow 기법이 제안되었다. 이는 소프트웨어 적으로 정의된 망으로 연구자들이 자신 만의 트래픽 엔지니어링 기법을 컨트롤러에 적용하여 그 유용성을 검증할 수 있다. 한편 고속 패킷 처리를 지원하는 OpenFlow 망의 구축을 위해 4개의 1G 인터페이스를 가지는 프로그래밍 가능한 NetFPGA 카드와 상용 Procurve 스위치 들이 사용될 수 있다. 본 논문에서는 하드웨어 가속 기능이 지원되는 NetFPGA 카드와 Procurve 스위치를 KREONET 망에 적용한 OpenFlow 테스트베드를 구축하고 가장 보편적인 QoS 라우팅 기법인 CSPF 알고리즘을 구축한 대규모 테스트베드 상에 적용하여 멀티미디어 트래픽 엔지니어링 기법의 성능 및 유효성 검증을 수행하였다.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.

성능과 보안성을 함께 개선한 MIPv6 바인딩 갱신 (MIPv6 Binding Update scheme to improve performance and security)

  • 원유석;조경산
    • 인터넷정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.81-91
    • /
    • 2007
  • MIPv6에서 경로 최적화를 제공하기 위한 바인딩 갱신은 다양한 공격에 취약할 수 있다. 따라서 안전한 바인딩 갱신이 MIPv6의 중요한 연구 과제가 되었으며, 이를 위한 여러 프로토콜들이 제안되었다. 본 연구에서는 MIPv6가 기본적으로 제공하는 RR과 기존의 대표적인 프로토콜인 SUCV와 OMIPv6를 상세히 분석하여 MN의 암호화 연산 및 각 프로토콜의 공격 취약성, 주소 생성 및 관리와 확장성의 문제점을 제시하고, 안전한 바인딩 갱신을 위한 설계 목표를 제시한다. 이를 근거로 새로운 바인딩 갱신 프로토콜을 제안한다. 제안 프로토콜은 기존 프로토콜들보다 다양한 공격에 대한 방어를 강화하며, 주소관리와 확장성을 개선하고, 위치 보안성을 제공하며, 제한된 계산 능력을 갖는 MN의 연산 부하를 감소시킨다.

  • PDF

The Method of Reducing the Delay Latency to Improve the Efficiency of Power Consumption in Wireless Sensor Networks

  • Ho, Jang;Son, Jeong-Bong
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.199-204
    • /
    • 2008
  • Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad-hoc method of deployment. Considerable research has been focused at overcoming these deficiencies through faster media accessing, more energy efficient routing, localization algorithms and system design. Our research attempts to provide a method of improvement MAC performance in these issues. We show that traditional carrier-sense multiple access(CSMA) protocols like IEEE 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size, We present more efficient method of a medium access for real-time wireless sensor networks. Proposed MAC protocol is a randomized CSMA protocol, but unlike previous legacy protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports, it carefully decides a fixed-size contention window, non-uniform probability distribution of transmitting in each slot within the window. We show that it can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using widely used simulator ns-2. We, finally show that proposed MAC scheme comes close to meeting bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for real-time wireless sensor networks which is sensitive to latency.

  • PDF