• Title/Summary/Keyword: Intra-Node Communication

Search Result 14, Processing Time 0.021 seconds

A Hierarchical Multicast Routing Protocol based on Zone Routing Technique for Wireless multi-hop Network (무선 다중 홉 네트워크에서의 지역 기반의 계층적 멀티캐스트 라우팅 프로토콜)

  • Gui, Yi-Qi;Zhang, Jie;Yang, Dong-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.149-156
    • /
    • 2011
  • In wireless multi-hop network, many applications need multicast communication where the group leader needs to send data to all members of the group. Multicast routing provides a balanced, efficient, and fairness network environment for the group members. However, large load for transmission management to leader node and signal interference between several paths for multi-hop links always took long transmission delay and low throughput efficiency. In this paper, we propose a Zone-based Hierarchical Multicast Routing Protocol (ZHMP). This routing protocol is designed based on zone routing schemes, where proactive routing is applied for intra-zone node level multicasting and reactive routing is used for searching inter-zone paths. By each hierarchical and independent multicast working in separated zones, load of multicast source node will be distributed by several zone-level routings for a better load balance and signal interference between each multi-hop paths will be resisted for a maximum multicast throughput.

Sector-based Charging Schedule in Rechargeable Wireless Sensor Networks

  • Alkhalidi, Sadam;Wang, Dong;Al-Marhabi, Zaid A. Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4301-4319
    • /
    • 2017
  • Adopting mobile chargers (MC) in rechargeable wireless sensors network (R-WSN) to recharge sensors can increase network efficiency (e.g., reduce MC travel distance per tour, reduce MC effort, and prolong WSN lifetime). In this study, we propose a mechanism to split the sensing field into partitions that may be equally spaced but differ in distance to the base station. Moreover, we focus on minimizing the MC effort by providing a new charging mechanism called the sector-based charging schedule (SBCS), which works to dispatch the MC in charging trips to the sector that sends many charging requests and suggesting an efficient sensor-charging algorithm. Specifically, we first utilize the high ability of the BS to divide the R-WSN field into sectors then it select the cluster head for each sector to reduce the intra-node communication. Second, we formulate the charging productivity as NP-hard problem and then conduct experimental simulations to evaluate the performance of the proposed mechanism. An extensive comparison is performed with other mechanisms. Experimental results demonstrate that the SBCS mechanism can prolong the lifetime of R-WSNs by increasing the charging productivity about 20% and reducing the MC effort by about 30%.

A Polynomial-based Study on the Protection of Consumer Privacy (소비자 프라이버시 보호에 관한 다항식 기반 연구)

  • Piao, Yanji;Kim, Minji
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.145-158
    • /
    • 2020
  • With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication. In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal's attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton's method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.

An Efficient Data Dissemination Protocol for Cluster-based Wireless Sensor Networks (클러스터 기반의 무선 센서네트워크에서 통신량을 줄인 데이터 보급방법)

  • Cho, Ji-Eun;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.222-230
    • /
    • 2009
  • A sensor network is an important element of the ubiquitous and it consists of sensor fields that contain sensor nodes and sink nodes that collect data from sensor nodes. Since each sensor node has limited resources, one of the important issues covered in the past sensor network studies has been maximizing the usage of limited energy to extend network lifetime. However, most studies have only considered fixed sink nodes, which created various problems for cases with multiple mobile sink nodes. Accordingly, while maintaining routes to mobile sink nodes, this study aims to deploy the hybrid communication mode that combines single and multi-hop modes for intra-cluster and inter-cluster transmission to resolve the problem of failed data transmission to mobile sink nodes caused by disconnected routes. Furthermore, a 2-level hierarchical routing protocol was used to reduce the number of sensor nodes participating in data transmission, and cross-shape trajectory forwarding was employed in packet transmission to provide an efficient data dissemination method.