• Title/Summary/Keyword: Cooperative protocol

Search Result 222, Processing Time 0.031 seconds

An IDS in MANET with Cross Layer Concept (크로스 층에서의 MANET을 이용한 IDS)

  • Kim, Sang-Eun;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.41-48
    • /
    • 2010
  • Intrusion detection forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. We have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes. The information available across different layers of protocol stack are exploited in order to improve the accuracy of detection. We have used cooperative and distributive anomaly intrusion detection with data mining technique to enhance the proposed architecture. The simulation of the proposed architecture is done in OPNET simulator and the results are analyzed.

Performance Analysis for Relay System of Fixed-Path Vehicle (고정 경로 차량의 중계기화에 대한 성능 분석)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.51-55
    • /
    • 2015
  • In this paper, we proposed scheme that obtain diversity gain in the cooperative communication to mitigate, applied to the effects of fading in the vehicle communication. Relay used bus that can available in the city environment. In addition, we applied the double rayleigh fading environment so that can applied in real-environments. Therefore, proposed scheme through this paper applied to vehicle communication, user can acquire a high quality service and the operation efficiency of the network is improved. Finally, performance of the proposed protocol is analyzed in terms of bit error rate.

ENC-MAC: Energy-efficient Non-overlapping Channel MAC for Cognitive Radio enabled Sensor Networks

  • Kim, Bosung;Kim, Kwangsoo;Roh, Byeong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4367-4386
    • /
    • 2015
  • The concept of Internet of Things (IoT) has shed new light on WSN technologies. MAC protocol issues improving the network performance are important in WSNs because of the increase in demand for various applications to secure spectrum resources. Cognitive radio (CR) technology is regarded as a solution to the problems in this future wireless network. In recent years, energy efficiency has become an issue in CR networks. However, few relevant studies have been conducted. In this paper, an energy-efficient non-overlapping channel MAC (ENC-MAC) for CR-enabled sensor networks (CRSNs) is proposed. Applying the dedicated control channel approach, ENC-MAC allows the SUs to utilize channels in a non-overlapping manner, and thus spectrum efficiency is improved. Moreover, the cooperative spectrum sensing that allows an SU to use only two minislots in the sensing phase is addressed to en-hance energy efficiency. In addition, an analytical model for evaluating the performance, such as saturation throughput, average packet delay, and network lifetime, is developed. It is shown in our results that ENC-MAC remarkably outperforms existing MAC protocols.

The Performance of Multistage Cooperation in Relay Networks

  • Vardhe, Kanchan;Reynolds, Daryl
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.499-505
    • /
    • 2015
  • We analyze the performance of multistage cooperation in decode-and-forward relay networks where the transmission between source and destination takes place in $T{\geq}2$ equal duration and orthogonal time phases with the help of relays. The source transmits only in the first time phase. All relays that can decode the source's transmission forward the source's message to the destination in the second time phase, using a space-time code. During subsequent time phases, the relays that have successfully decoded the source message using information from all previous transmitting relays, transmit the space-time coded symbols for the source's message. The non-decoding relays keep accumulating information and transmit in the later stages when they are able to decode. This process continues for T cooperation phases. We develop and analyze the outage probability of multistage cooperation protocol under orthogonal relaying. Through analytical results, we obtain the near-optimal placement strategy for relays that gives the best performance when compared with most other candidate relay location strategies of interest. For different relay network topologies, we also investigate an interesting tradeoff between an increased SNR and decreased spectral efficiency as the number of cooperation stages is increased. It is also shown that the largest multistage cooperation gain is obtained in the low and moderate SNR regime.

Wireless-Powered Cooperative Multihop Transmission Method (무선 전력공급 기반 협력적 멀티홉 전송 방법)

  • Choi, Hyun-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.499-502
    • /
    • 2018
  • We propose a wireless-powered multihop transmission scheme using inter-node cooperation in a linear network topology. The proposed protocol determines the energy transfer time for each node to make the lifetime of the each node be equal in order to maximize the lifetime of the multihop path. To make the lifetime of each node the same, we apply the flocking algorithm which imitates the behavior of a bird flock flying at the same velocity, so that the lifetime of the nodes is averaged locally. Simulation results show that the proposed algorithm can maximize the lifetime of the multihop path by making all nodes have the same lifetime.

  • PDF

Performance Analysis for Selection Decode-and-Forward Relay Networks with Differential Modulation over Rayleigh Fading Channels (레일리 페이딩 채널에서 차등 변조기법을 이용한 선택적 복호 후 재전송 중계 네트워크의 성능 분석)

  • Kong, Hyung-Yun;Bao, Vo Nguyen Quoc
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.1-9
    • /
    • 2010
  • This paper offers performance analysis of selection decode and forward (DF) networks with differential modulation/demodulation for an arbitrary number of relays in independent but not identically distributed Rayleigh fading channels. We have shown that the selection DF protocol with differential modulation can achieve full diversity in both independent identically distributed (i.i.d.) and independent but not identically distributed (i.n.d.) Rayleigh fading channels, and the performance loss due to using non-coherent detection is not substantial. Furthermore, we study the impact of combining techniques on the performance of the system by comparing a system that uses selection combining (SC) to one that uses maximum ratio combining (MRC). Simulations are performed and show that they match exactly with analytic ones in high SNR regime.

Virtual Standards Development Environments for Concurrent Standardization Process

  • Kim, Hyoung-Jun;Park, Ki-Shik;Chin, Byoung-Moon;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.21 no.1
    • /
    • pp.55-71
    • /
    • 1999
  • Recently, the increased handling of on-line standards information has emerged as an important feature of information and communications technology (ICT) standardization. In order to meet market needs for on-time standards deployment, most standards organizations are actively seeking more efficient ways of standardization using electronic means in order to accelerate the standards making process. This paper suggests a virtual standard development environment designed for standards developers to carry out their standards-related activities on-line. In this paper, we outline a conceptual model of a concurrent standardization process and describe the design and implementation of an Extranet-based network system called standards information cooperative network (SICN). The system was created with a view to fostering faster standards development with functionalities such as a virtual management of networked standards developers, collaboration support tools, a workflow-based electronic signature system, and dynamic links for ready retrieval of standards information stored in a database. We conclude this paper with an introduction to the concept of a virtual standards development organization (VSDO) that supports all the features needed by the relevant standards making bodies to carry out their activities in a dynamic on-line environment.

  • PDF

A Study on Flooding Attack Detection and Response Technique in MANET (MANET에서 플러딩 공격 탐지 및 대응 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.41-46
    • /
    • 2013
  • Routing protocol using in the existing wire network cannot be used as it is for efficient data transmission in MANET. Because it consists of only mobile nodes, network topology is changing dynamically. Therefore, each mobile node must perform router functions. Variety of routing attack like DoS in MANET is present owing to these characteristic. In this paper, we proposed cooperative-based detection method to improve detection performance of flooding attack which paralyzes network by consuming resource. Accurate attack detection is done as per calculated adaptively threshold value considered the amount of all network traffic and the number of nodes. All the mobile nodes used a table called NHT to perform collaborative detection and apply cluster structure to the center surveillance of traffic.

Enhancing Write Performance in Cooperative Cache using Extensible 2-Phase Protocol (확장 가능한 두 단계 프로토콜을 이용한 상호 협력 캐쉬의 쓰기 성능 향상)

  • Hwang In-Chul;Maeng Seung-Ryoul;Cho Jung-Wan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.37-39
    • /
    • 2005
  • 요즘 네트웍과 PC의 성능이 향상됨에 따라 값싼 PC를 빠른 네트웍으로 묶어 높은 성능을 얻고자 하는 클러스터 시스템에 대하여 많이 연구 되어 왔다. 이러한 연구의 한 분야로서 클러스터 I/O 하위 시스템의 성능을 향상시키고자 하는 상호 협력 캐쉬가 제시되었다. 기존 상호 협력 캐쉬에 대한 연구는 주로 효율적인 캐쉬 공유 기법에만 집중되어있고 쓰기 성능에 대한 고려는 하지 않고 있다. 또한 대부분의 읽기 데이터는 상호 협력 캐쉬를 통하여 처리되지만 쓰기 데이터는 디스크에 접근하기 때문에 쓰기가 병목현상이 될 수 있다. 따라서 상호 협력 캐쉬에서 읽기 뿐 아니라 쓰기 성능 향상 기법에 대한 연구가 필요하다. 본 논문에서는 상호 협력 캐쉬에서 쓰기 성능 향상 기법으로 확장 가능한 두 단계 프로토콜을 제시한다. 확장 가능한 두 단계 프로토콜은 기존 두 단계 프로토콜과 같이 파일에 읽기/쓰기 접근을 연속된 읽기/쓰기 단계로 나누고, 쓰기 단계에서 연속된 쓰기사이의 불필요한 동작을 제거할 뿐 아니라 쓴 데이터에 대한 일시적 버퍼링을 수행함으로서 쓰기 성능을 향상시킨다. 그리고 확장 가능한 두 단계 프로토콜을 상호 협력 클러스터 파일 시스템의 홈 기반 상호 협력 캐쉬에 적용하여 성능을 비교, 분석한다.

  • PDF

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF