• Title/Summary/Keyword: Flooding Algorithm

Search Result 139, Processing Time 0.024 seconds

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.

Detection of Traffic Flooding Attack using SNMP (SNMP를 이용한 트래픽 폭주 공격 검출)

  • 김선영;박원주;유대성;서동일;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.48-54
    • /
    • 2003
  • Recently it frequently occur that remote host or network device breaks down because of various traffic flooding attacks. This kind of attack is classified an one of the most serious attacks of it can be used to a need of other hackings. This research is gathering system's informations for detecting a traffic flooding attack using the SNMP MIB. We analyze the traffic characteristic applying the critical value commonly used in analytical procedure of traffic flooding attacks. As a result or this analysis, traffic flooding attacks have a special character of its on. The proposed algorithm in this paper would be more available to a previous detecting method and a previous protecting method.

  • PDF

A Study of Survivable Alternate Routing Algorithm (생존성있는 대체 경로 라우팅 알고리즘 연구)

  • Park, Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.535-539
    • /
    • 2007
  • We study an degree of alternativeness and a survivability of alternate routing algorithm in mobile ad-hoc tactical communication networks. The common channel signaling scheme is used and flood search routing algorithm is used for analysis. We also study a connectivity performance for flood search routing, restricted flooding and hybrid routing. From the results we expect low blocking probabilities with alternate routing and the conventional flood search routing shows better connectivity performance which results in high survivability.

Classification and Analysis of Korea Coastal Flooding Using Machine Learning Algorithm (기계학습 알고리즘에 기반한 국내 해수범람 유형 분류 및 분석)

  • CHO, KEON HEE;EOM, DAE YONG;PARK, JEONG SIK;LEE, BANG HEE;CHOI, WON JIN
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • In this study, Information for the case of seawater flooding and observation data over a period of 10 years (2009~2018) was collected. Using machine learning algorithms, the characteristics of the types of seawater flooding and observations by type were classified. Information for the case of seawater flooding was collected from the reports of the Korea Hydrographic and Oceanographic Agency (KHOA) and the Korea Land and Geospatial Informatics Corporation. Observation data for ocean and meteorological were collected from the KHOA and the Korea Meteorological Agency (KMA). The classification of seawater flooding incidence types is largely categorized into four types, and into 5 development types through combination of 4 types. These types were able to distinguish the types of seawater flooding according to the marine weather environment. The main characteristics of each was classified into the following groups: tidal movement, low pressure system, strong wind, and typhoon. Besides, in consideration of the geographical characteristics of the ocean, the thresholds of ocean factors for seawater flooding by region and type were derived.

DDoS Attack Detection using SNMPGET (SNMPGET을 이용한 DDoS 공격 탐지)

  • 박한상;유대성;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.278-282
    • /
    • 2004
  • Recently traffic flooding attack has happened faster and faster owing to expansion of the worm attack and development of the method of traffic flooding attack. The method in the past time is problematic in detecting the recent traffic flooding attacks, which are running quickly. Therefore, this paper aims to establish the algorithm which reduces the time of detection to traffic flooding attack in collecting and analyzing traffics.

  • PDF

Design and Implementation of an SNMP-Based Traffic Flooding Attack Detection System (SNMP 기반의 실시간 트래픽 폭주 공격 탐지 시스템 설계 및 구현)

  • Park, Jun-Sang;Kim, Sung-Yun;Park, Dai-Hee;Choi, Mi-Jung;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.13-20
    • /
    • 2009
  • Recently, as traffic flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems (IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network traffic. In this paper we propose an SNMP-based lightweight and fast detection algorithm for traffic flooding attacks, which minimizes the processing and network overhead of the detection system, minimizes the detection time, and provides high detection rate. The attack detection algorithm consists of three consecutive stages. The first stage determines the detection timing using the update interval of SNMP MIB. The second stage analyzes attack symptoms based on correlations of MIB data. The third stage determines whether an attack occurs or not and figure out the attack type in case of attack.

Intrusion Detection Algorithm based on Artificial Immune System

  • Yang, Jae-Won;Sim, Kwee-Bo;Lee, Dong-Wook;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.35.4-35
    • /
    • 2002
  • $\textbullet$ Intrusion Detection Algorithm based on Artificial Immune System 1. Introduction 2. Research Background 3. The adaptation algorithm of SYN flooding attack 4. SIMULATION 5. Conclusion 6. References

  • PDF

Change of Carabid Beetle (Coleoptera, Carabidae) Diversity and Species Composition after Flooding Events in Woopo Wetlands (우포늪 범람에 의한 먼지벌레류(딱정벌레목, 딱정벌레과)의 다양성과 종조성 변화)

  • Do, Yun-O;Jang, Min-Ho;Kim, Dong-Kyun;Joo, Gea-Jae
    • Korean Journal of Ecology and Environment
    • /
    • v.40 no.2
    • /
    • pp.346-351
    • /
    • 2007
  • Change of carabid beelte (Coleoptera, Carabidae) diversity and population structures in Woopo Wetlands (Changneung-Gun, Gyeungsangnam-Do, S. Korea) were investigated after flooding events. During the investigation period, 11 species belonging to five genera were identified. Dolichus halensis halensis(Schaller), Chlaenius (Ch.) pallipes Gebler, Ch. (Ilaenchus) naeviger Morawitz, and Pheropsophus (Stenaptinus) jessoensis Morawitz were the predominant species in Woopo Wetlands. Floods occurred twice, August and September in 2004. After the flooding events, species diversity decreased and species assemblage structures changed dramatically. Changes of the diversity and species assemblage structures were more evident in August then in September, because water level was much higher and inundation period was longer than September. A non-linear patterning algorithm of the Self-Organizing Map (SOM) was applied to discover the relationship between flooding events and carabid beetles community dynamics. Although abundance of the majority species decreased after the flooding events, that of the predominant species increased. Further detailed studies on species distribution and emigration patterns will likely bring a new insight in understanding of the adaptation mechanism of carabid beetles in wetlands.

Newly Modified Watershed Algorithm Determining Dynamic Region Merging or Watershed Line in the Flooding Process (담수과정에서 동적 영역 병합과 분수령선을 결정하는 개선된 분수령 알고리즘)

  • Kim, Sang-Gon;Jeoune, Dae-Seong;Lee, Jae-Do;Kim, Hwi-Won;Yoon, Young-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.6
    • /
    • pp.113-119
    • /
    • 2001
  • In this paper, we propose an improved watershed algorithm that resolves the oversegmentation problem shown in the previous watershed algorithm and its modifications when the spatial video segmentation is performed. The principal idea of the proposed algorithm is merging the shallow catchment basin whose depth is less than a given threshold into the deeper one during flooding step. In the flooding process, the growth of the existing catchment basins and the extraction of newly flooded ones are accomplished. We present the experimental results using several MPEG test sequences in the last part of the paper. As a consequence, the proposed algorithm shows good segmentation results according to the thresholds applied by adding very small amount of calculations.

  • PDF

A Time Synchronization Protocol of Sensor Nodes Combining Flooding-Routing Protocol with Bidirectional LTS (플러딩 라우팅 프로토콜과 양방향 LTS를 결합한 센서 노드의 시간 동기화 기법)

  • Shin, Jae-Hyuck;Oh, Hyun-Su;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.119-126
    • /
    • 2011
  • In wireless sensor networks Time synchronization used to be performed after routing tree is constructed. It results in increasing the number of packets and energy consumption. In this paper, we propose a time synchronization algorithm combined with flooding routing tree construction algorithm, which applies LTS (Lightweight Time Synchronization) information packed into the forwarding and backward routing packets. Furthermore, the proposed algorithm compensates the time error due to clock drift using the round time with fixed period. We prove that the proposed algorithm could synchronize the time of among sensor nodes more accurately compared to TSRA (Time Synchronization Routing Algorithm) using NS2 simulation tool.