• 제목/요약/키워드: Forwarding nodes

검색결과 191건 처리시간 0.02초

무선 센서 네트워크에서 위조 데이터 주입 공격의 탐지 (Detection of False Data Injection Attacks in Wireless Sensor Networks)

  • 이해영;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제18권3호
    • /
    • pp.83-90
    • /
    • 2009
  • 무선 센서 네트워크는 개방된 환경에 배치된 이후에 방치되므로 공격자는 센서 노드를 물리적으로 포획할 수 있다. 공격자는 포획한 노드의 정보를 사용하여 실재하지 않는 사건을 보고하는 위조 데이터 주입 공격을 수행할 수 있다. 위조 데이터는 허위 경보와 전달 노드들의 제한된 에너지 자원을 고갈시킬 수 있다. 위조 데이터를 전달 과정 중 탐지하여 폐기하기 위한 다양한 보안 기법들이 제안되고 있다. 그러나 이들은 추가적인 작업을 수반하는 예방 기반의 기법들로, 공격이 발생하지 않은 경우에는 에너지 효율적이지 않을 수 있다. 본 논문에서는 추가 비용 없이 위조 데이터 주입 공격을 탐지할 수 있는 기법을 제안한다. 시뮬레이션을 통해 위조 데이터 주입 공격의 서명을 도출하고 이를 기반으로 탐지 기법을 설계한다. 제안 기법은 각 이벤트별로 보고한 노드들의 수, 보고서들의 정확도, 보고 노드 수의 변화량을 기반으로 공격을 탐지한다. 시뮬레이션을 통해 제안 기법이 대부분의 공격을 탐지할 수 있음을 보인다.

R3: A Lightweight Reactive Ring based Routing Protocol for Wireless Sensor Networks with Mobile Sinks

  • Yu, Sheng;Zhang, Baoxian;Yao, Zheng;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5442-5463
    • /
    • 2016
  • Designing efficient routing protocols for a wireless sensor network with mobile sinks (mWSN) is a challenging task since the network topology and data paths change frequently as sink nodes move. In this paper, we design a novel lightweight reactive ring based routing protocol called R3, which removes the need of proactively maintaining data paths to mobile sinks as they move in the network. To achieve high packet delivery ratio and low transmission cost, R3 combines ring based forwarding and trail based forwarding together. To support efficient ring based forwarding, we build a ring based structure for a network in a way such that each node in the network can easily obtain its ring ID and virtual angle information. For this purpose, we artificially create a virtual hole in the central area of the network and accordingly find a shortest cycled path enclosing the hole, which serves as base ring and is used for generating the remaining ring based structure. We accordingly present the detailed design description for R3, which only requires each node to keep very limited routing information. We derive the communication overhead by ring based forwarding. Extensive simulation results show that R3 can achieve high routing performance as compared with existing work.

A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET

  • Xu, Guoai;Liu, Boya;Xu, Guosheng;Zuo, Peiliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권9호
    • /
    • pp.3104-3123
    • /
    • 2022
  • The development of Vehicular Ad hoc Network (VANET) has greatly improved the efficiency and safety of social transportation, and the routing strategy for VANET has also received high attention from both academia and industry. However, studies on dynamic matching of routing policies with the message types of VANET are in short supply, which affects the operational efficiency and security of VANET to a certain extent. This paper studies the message types in VANET and fully considers the urgency and reliability requirements of message forwarding under various types. Based on the diversified types of messages to be transmitted, and taking the diversified message forwarding strategies suitable for VANET scenarios as behavioral candidates, an adaptive routing method for the VANET message types based on reinforcement learning (RL) is proposed. The key parameters of the method, such as state, action and reward, are reasonably designed. Simulation and analysis show that the proposed method could converge quickly, and the comprehensive performance of the proposed method is obviously better than the comparison methods in terms of timeliness and reliability.

A Forwarder Based Temperature Aware Routing Protocol in Wireless Body Area Networks

  • Beom-Su Kim;Ki-Il Kim;Babar Shah;Sana Ullah
    • Journal of Internet Technology
    • /
    • 제20권4호
    • /
    • pp.1157-1166
    • /
    • 2019
  • A Wireless Body Area Network (WBAN) allows the seamless integration of miniaturized sensor nodes in or around a human body, which may cause damage to the surrounding body issue due to high temperature. Although various temperature aware routing protocols have been proposed to prevent temperature rise of sensor nodes, most of them accommodate single traffic transmission with no mobility support. We propose a Forwarder based Temperature Aware Routing Protocol (FTAR) that supports multiple traffic transmission for normal and critical data. Normal data is forwarded directly to the sink through forwarding nodes which are selected among mobile nodes attached to the arms and legs, while critical data is forwarded to the sink through static nodes attached to fixed body parts with no mobility. We conduct extensive simulations of FTAR, and conclude that FTAR has good performance in terms of hot spot generation ratio, hot spot duration time, and packet delivery ratio.

차량 애드혹 네트워크의 링크 단절 문제 해결을 위한 효율적인 라우팅 알고리즘 (An Efficient Routing Algorithm for Solving the Lost Link Problem of Vehicular Ad-hoc Networks)

  • 임완선;김석형;서영주
    • 한국통신학회논문지
    • /
    • 제33권12B호
    • /
    • pp.1075-1082
    • /
    • 2008
  • 그리디 포워딩(Greedy forwarding) 기법은 주변 노드들의 정보만을 이용해 패킷을 전달하는 기법으로, 전체 라우팅 경로를 유지해야 하는 다른 애드혹 라우팅 프로토콜에 비해 경로 유지가 쉽기 때문에 토폴로지가 자주 변하는 차량간 애드혹 네트워크에 적합한 방식이라고 할 수 있다. 그리디 포워딩 기법에서는 주기적인 비콘 전송을 통해 이웃 노드들의 위치를 획득하고, 패킷을 전달할 때 수신 노드와 가장 가까운 노드를 전달 노드로 선택한다. 이러한 그리디 포워딩의 성능을 떨어뜨리는 주요 원인 중 하나는 이웃 노드가 원래의 위치에서 벗어나면서 발생하는 링크 단절 문제이다. 본 논문에서는 그리디 포워딩 기반의 라우팅 프로토콜인 Greedy Perimeter Stateless Routing (GPSR) 프로토콜을 바탕으로 링크 단절 문제를 해결하기 위한 새로운 알고리즘을 제안한다. 제안하는 알고리즘은 이웃 노드의 위치와 비콘을 수신한 시간 등을 고려해 효율적이면서도 안정적인 라우팅 경로를 찾는 것을 목표로 한다. 다양한 환경에서의 실험 결과를 통해 우리는 제안하는 알고리즘이 GPSR과 기존의 연구 결과들에 비해 더 뛰어난 성능을 보이는 것을 확인하였다.

Adjusting Transmission Power for Real-Time Communications in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • 제10권1호
    • /
    • pp.21-26
    • /
    • 2012
  • As the new requirements for wireless sensor networks are emerging, real-time communications is becoming a major research challenge because resource-constrained sensor nodes are not powerful enough to accommodate the complexity of the protocol. In addition, an efficient energy management scheme has naturally been a concern in wireless sensor networks for a long time. However, the existing schemes are limited to meeting one of these two requirements. To address the two factors together, we propose real-time communications with two approaches, a protocol for satisfied conditions and one for unsatisfied. Under the satisfied requirement, existing real-time protocol is employed. On the other hand, for the unsatisfied requirement, the newly developed scheme replaces the existing scheme by adjusting the transmission range of some surplus nodes. By expanding the transmission range, the end-to-end delay is shortened because the number of intermediate nodes decreases. These nodes conserve their energy for real-time communications by avoiding other activities such as sensing, forwarding, and computing. Finally, simulation results are given to demonstrate the feasibility of the proposed scheme in high traffic environments.

MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구 (The Study of Hierarchical Intrusion Detection Based on Rules for MANET)

  • 정혜원
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

무선 Ad-hoc 망에서 라우팅 에너지 소비의 균형 기법 (Balancing of Routing Energy Consumption in Wireless Ad-hoc Networks)

  • 강용혁;엄영익
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2000년도 추계학술대회 논문집
    • /
    • pp.97-101
    • /
    • 2000
  • Energy consumption is considered as a principal ingredient in mobile wireless ad-hoc networks. In such a network, most of mobile nodes takes a role in forwarding messages received from neighbor nodes. Energy of these nodes is consumed in different rates depending on message traffic routes. This paper proposes a scheme to balance routing energy consumption by transferring routing function from node with small residual energy to node with enough residual energy. This scheme requires additional local message transfer, increasing the energy consumption of nodes to transfer routing function, and increasing total energy consumption of ad-hoc network. But balancing of energy consumption make the system lifetime the longer and increase the average node lifetime.

  • PDF

동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법 (A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System)

  • 이상진;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.