• Title/Summary/Keyword: Distributed gateway

Search Result 98, Processing Time 0.027 seconds

THERA: Two-level Hierarchical Hybrid Road-Aware Routing for Vehicular Networks

  • Abbas, Muhammad Tahir;SONG, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3369-3385
    • /
    • 2019
  • There are various research challenges in vehicular ad hoc networks (VANETs) that need to be focused until an extensive deployment of it becomes conceivable. Design and development of a scalable routing algorithm for VANETs is one of the critical issue due to frequent path disruptions caused by the vehicle's mobility. This study aims to provide a novel road-aware routing protocol for vehicular networks named as Two-level hierarchical Hybrid Road-Aware (THERA) routing for vehicular ad hoc networks. The proposed protocol is designed explicitly for inter-vehicle communication. In THERA, roads are distributed into non-overlapping road segments to reduce the routing overhead. Unlike other protocols, discovery process does not flood the network with packet broadcasts. Instead, THERA uses the concept of Gateway Vehicles (GV) for the discovery process. In addition, a route between source and destination is flexible to changing topology, as THERA only requires road segment ID and destination ID for the communication. Furthermore, Road-Aware routing reduces the traffic congestion, bypasses the single point of failure, and facilitates the network management. Finally yet importantly, this paper also proposes a probabilistical model to estimate a path duration for each road segment using the highway mobility model. The flexibility of the proposed protocol is evaluated by performing extensive simulations in NS3. We have used SUMO simulator to generate real time vehicular traffic on the roads of Gangnam, South Korea. Comparative analysis of the results confirm that routing overhead for maintaining the network topology is smaller than few previously proposed routing algorithms.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

Security Architecture for OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경을 위한 보안 아키텍처)

  • 박대하;김영갑;문창주;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.259-272
    • /
    • 2004
  • This paper suggests a new security architecture for facilitating secure OSGi service platform environment. The security architecture includes 1) user authentication mechanism, 2) bundle authentication mechanism, 3) key sharing mechanism, and 4) authorization mechanism. The user authentication mechanism supplies SSO(single sign-on) functions which are useful for safe and easy user authentications. The bundle authentication mechanism utilizes both PKI-based and MAC-based digital signatures for efficiently authenticating service bundles. The key sharing mechanism, which is performed during bootstrapping phase of a service gateway, supplies a safe way for sharing secret keys that are required for authentication mechanisms. Finally, the authorization mechanism suggests distributed authorization among service providers and an operator by establishing their own security policies. The main contributions of the parer are twofold. First, we examine several security requirements of current OSGi specification when its security functions can be applied in real OSGi environments. Second, we describe the ways to resolve the problems by means of designing and implementing concrete security mechanisms.

The Architectural Characteristics and the Confucian Order of Jeong-Gak (정각(旌閣)의 건축적(建築的) 특성(特性)과 예적(禮的) 질서(秩序) -전북지방을 중심으로-)

  • Hong, Seung-Jae;Ahn, Seon-Ho
    • Journal of architectural history
    • /
    • v.9 no.3 s.24
    • /
    • pp.37-49
    • /
    • 2000
  • Jeong-Gak is one of the Confucian architecture in Cho-Sun Dynasty. This study is founded on the architectural characteristics and the Confucian order of Jeong-Gak. The Cho-Sun Dynasty had put in operation positive Jeong-Pyo Policy for diffusion Confusion ethics and educate the people. Prize methods of Jeong-Pyo Policy are Jeong-Ryeo, Jeong-moon, remit corvee, present a post and present goods. Jeong-Moon and Jeong-Ryeo is red gate. Vocabularies of Jeong-Moon and Jeong-Ryeo have used mixing but I think that both meaning is different essentially each other. The red gate that elected in front of gate or gateway is Jeong-Moon and another red gate that elected an entrance a village is Jeong-Ryeo. Jeong-Moon and Jeong-Ryeo have no roof, so they are many problem for maintenance and management. Accordingly Jeong-Gak come out from the reign of King Jung-Jong because shelter of Jeong-Moon and Jeong-Ryeo. The function of the Jeong-Gak is shelter of the Jeong-Moon and Jeong-Ryeo, encouragement of Sam-Gang(三綱) ethics, and ostentation of a family. Besides it has a monumental characteristic. It has been distributed the whole country land that Jeong-Gak is closely related with the community of same family (rural community) the latter period of the Cho-Sun Dynasty. The architectural particularity of the Jeong-Gak is brilliance of building materials as compared with different Confucian architecture and appearance of various architectural type. It is that a type of Jeong-Gak appeared Jeong-Ryeo-Gak type, a lofty gate type, and Stone Jeong-Ryeo type. And there are keeping a rule that is to say Confucian order clearly.

  • PDF

Performace Evaluation of Global MANET adapted to Internet Access solution (인터넷 억세스 솔루션을 적용한 Global MANET의 성능 분석)

  • Jung, Chan-Hyuk;Oh, Se-Duk;Kim, Hyun-Wook;Lee, Kwang-Bae;Yu, Choung-Ryoul;Mun, Tae-Su
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.75-86
    • /
    • 2006
  • The MANET that can make autonomous distributed Network with Routing function has many differences than past wireless communication. For upcoming ALL-IP environment, MANET device should be connected with wired Internet Network and MANET is required to have a gateway to bridge two different networks to share information from any place. In this paper, Using the GMAHN Algorithm proposed Proactive, Reactive, Hybrid method that provides Inteface between Wired Internet network and MANET, we learned each method's the advantage and disadvantage through the various network environments. And also, we presented the optimization method of Hybrid combined Proactive with Reactive.

  • PDF

Design of a Secure Session Key Exchange Method for tow Latency Handoffs (Low Latency Handoffs를 위한 안전한 세션 키 교환 기법 설계)

  • Kim Hyun-Gon;Park Chee-Hang
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.25-33
    • /
    • 2004
  • Mobile IP Low Latency Handoffs(l) allow greater support for real-time services on a Mobile IP network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authentication the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that performs a trusted thirty party. The proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation.

  • PDF

Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks (네트워크 대역폭 고갈 공격에 대한 정책 기반 재구성 가능 대역폭제어기)

  • Park Sang-kil;Oh Jin-tae;Kim Ki-young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.951-958
    • /
    • 2004
  • Nowadays NGN is developed for supporting the e-Commerce, Internet trading, e-Government, e-mail, virtual-life and multimedia. Internet gives us the benefit of remote access to the information but causes the attacks that can break server and modify information. Since 2000 Nimda, Code Red Virus and DSoS attacks are spreaded in Internet. This attack programs make tremendous traffic packets on the Internet. In this paper, we designed and developed the Bandwidth Controller in the gateway systems against the bandwidth saturation attacks. This Bandwidth con-troller is implemented in hardware chipset(FPGA) Virtex II Pro which is produced by Xilinx and acts as a policing function. We reference the TBF(Token Bucket Filter) in Linux Kernel 2.4 and implemented this function in HDL(Hardware Description Language) Verilog. This HDL code is synthesized in hardware chipset and performs the gigabit traffic in real time. This policing function can throttle the traffic at the rate of band width controlling policy in bps speed.

Design and Performance Analysis of A Novel P2P-SIP Architecture for Network-based Mobility Support in Intelligent Home Networks (지능형 홈네트워크에서 네트워크 기반의 이동성 지원을 위한 P2P-SIP 구조의 설계 및 성능분석)

  • Kim, SeungWon;Jeong, JongPil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.293-302
    • /
    • 2013
  • Home network providers have many worries about providing home network services with an expandable, reliable, flexible and low-cost structure according to the expanding market environment. The existing client-server system has various problems such as complexity and high costs in providing home network services. In this paper we propose the P2P-SIP structure. P2P communication terminal supporting access of distributed resources provides functions which the existing SIP-based network devices have. Because diverse terminals in a home network access through networks, also, partitioning network domains with home gateways to manage, and applying the network-based PMIPv6(Proxy Mobile IPv6) technology considering mobility of terminals would help to have a more efficient home network structure. Especially, the proposed P2P-SIP structure proves itself as a very efficient structure to have an outstanding expandability among different home networks in a region, and to reduce maintenance costs.

Design and Implementation of the Multi-resolution Interoperation Simulation using HLA/RTI (표준연동 아키텍처(HLA/RTI)기반 다해상도 연동 시뮬레이션 설계 및 구현)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.9-16
    • /
    • 2015
  • In this paper, the multi-resolution simulation of standard linkage architecture is consists of the engineering-level (QUEST), engagement-level (SADM), the mission-level (EADSIM). It was developed the engineering-level model using battle experiment integrated development environment in the battle experimental engineering system. The engagement level model was developed using the SADM and the mission-level model was developed using EADSIM. The standard linkage architecture is designed and implemented in order to interlocking model of multiple layers. Each different simulation programs in a distributed environment was designed by HLA interface specifications for satisfying interworking. Also the integrated interoperation gateway was developed for relaying the each different simulation programs. The effective naval weapon system for measure of effectiveness develops using to improve the fidelity of the model between the various layers through multi-resolution interoperation simulation. According to the operator requirement is quickly battlefield environment can be constructed. The other simulation program that being designed through standards linkage architecture can linkage easily and efficiently.

Theoretical Performance Analysis between Attack Prevention Schemes and Attack Mitigation Schemes (공격차단 기법과 공격경감 기법 간 이론적 성능 분석)

  • Ko Kwang-Sun;Eom Young-Ik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.84-92
    • /
    • 2006
  • To defeat abnormal traffic driven by DoS (Denial-of-Service) or DDoS (Distributed DoS), there has been a variety of researches or studies in a few decades. In this paper, we present the results of theoretical performance analysis between attack prevention schemes and attack mitigation schemes. The former is a scheme that prevents abnormal incoming traffic from forwarding into a specific network based on filtering rules, and the latter is a scheme that makes some perimeter or intermediate routers, which exist on the traffic forwarding path, prevent abnormal traffic based on their own abnormal traffic information, or that mitigates abnormal traffic by using quality-of-service mechanisms at the gateway of the target network. The aspects of theoretical performance analysis are defined as the transit rates of either normal traffic or false-positive traffic after an attack detection routine processes its job, and we also present the concrete network bandwidth rates to control incoming traffic.