• Title/Summary/Keyword: MANET

Search Result 600, Processing Time 0.026 seconds

A Study on Dynamic Address Allocation Protocol for MANET(Mobile Ad hoe NETwork) (MANET에서의 동적 주소 할당 기법011 관한 연구)

  • 김세훈;정현구;이은주;윤현주;이준원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.4-6
    • /
    • 2003
  • MANET(Mobile Ad hoc NETwork)은 기간망(infrastructure network)에 대한 의존 없이 필요에 따라 노드(node)들이 자발적으로 임시적인 네트워크를 형성해 데이터를 주고 받는 형태이다. 지금까지 MANET에 관한 대부분의 연구는 노드들이 네트워크에 합류하기 전에 IP주소를 할당받는다는 가정하에 이루어졌다. 기존의 네트워크에서는 IPv4주소의 부족으로 모든 노드에게 영구적으로 IP주소를 할당 할 수 없어 동적으로 IP주소를 할당할 필요가 있을 때 DHCP를 이용해 노드들에게 IP주소를 할당했다. 그러나 MANET의 경우 노드의 이동성으로 인해 중앙집중화 된 DHCP 서버로의 접근을 항상 보장할 수 없다 그러므로 본 논문에서는 MANET의 노드들에게 유일한 IP주소를 동적으로 할당하기 위한 토큰-기반 동적 주소 할당 프로토콜을 제안하였다.

  • PDF

Power Dissipation Considered AODV for Fair Energy Distribution in MANET (MANET에서 에너지 균등분배를 위해 전원상태를 고려한 AODV)

  • Song, Sang-Bok;Lee, Soong-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.469-477
    • /
    • 2008
  • The standard routing protocol of MANET(Mobile Ad-hoc NETwork), AODV(Ad-hoc On-demand Distance Vector), only considers the shortest path for routing, which may cause traffic concentration to a node at the critical path. Hence, the battery of the node will be dissipated rapidly to reduce the lifetime of the whole network. In this paper, power dissipation considered AODV is proposed for fair energy distribution in MANET, and verified using the computer simulation.

An Effective Authentication in Mobile Ad Hoc Networks (Mobile Ad Hoc Networks에서 효과적인 인증서비스)

  • Kim Yoon-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.121-134
    • /
    • 2005
  • The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.

  • PDF

Collaboration Model Design to Improve Malicious Node Detection Rate in MANET (MANET에서 악의적 노드 탐지율 향상을 위한 협업모델 설계)

  • Shin, Eon-Seok;Jeon, Seo-In;Park, Gun-Woo;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.35-45
    • /
    • 2013
  • MANET has a weak point because it allows access from not only legal nodes but also illegal nodes. Most of the MANET researches had been focused on attack on routing path or packet forwarding. Nevertheless, there are insuffcient studies on a comprehensive approach to detect various attacks on malicious nodes at packet forwarding processes. In this paper, we propose a technique, named DTecBC (detection technique of malicious node behaviors based on collaboration), which can handle more effciently various types of malicious node attacks on MANET environment. The DTecBC is designed to detect malicious nodes by communication between neighboring nodes, and manage malicious nodes using a maintain table. OPNET tool was used to compare with Watchdog, CONFIDANT, SRRPPnT for verifying effectiveness of our approach. As a result, DTecBC detects various behaviors of malicious nodes more effectively than other techniques.

IDS Performance on MANET with Packet Aggregation Transmissions (패킷취합전송이 있는 MANET에서 IDS 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.695-701
    • /
    • 2014
  • Blackhole attacks having a unauthorized change of routing data will cause critical effects for transmission performance. The transmission performance will be improved to the a certain level by using or having IDS(Intrusion Detection System)/IPS(Intrusion Prevention System) as countermeasures to blackhole attacks. In this papar, the effects of IDS to ene-to-end performance of packet aggregation transmission are analyzed on MANET(Mobile Ad-hoc Network) with IDS under blackhole attacks. MANET simulator based on NS-2 is used to analyze performance parameters as MOS, connection ratio, delay and packet loss rate as standard performance parameters, an another performance factor which is suggested in this paper. VoIP(Voice over Internet Protocol) traffics, one of voice services, is used for performance analysis. A suggestion for IDS implementation on MANET with packet aggregations under blackhole is shown as one of results.

A Mobility Management Scheme Using GQS based on the Fuzzy-logic in Wireless Mobile Ad-Hoc Networks (에드-혹 망에서 퍼지로직 기반 GQS를 이용한 이동성 관리방법)

  • Yoon, Il;Oh, Sun-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.431-435
    • /
    • 2005
  • Mobile Ad-Hoc network is the network(MANET) of mobile nodes which has no fixed infrastructure, and mobile node in MANET can move and communicate freely each other. Recently, many researches for mobility management of mobile nodes are actively carried out by using the location information of mobile nodes. The location management is an important issue in MANET because location information of mobile node is frequently changed in MANET. In this paper, an adaptive mobility management scheme using fuzzy-logic based GQS by considering the mobile locality is proposed in order to manage location information of mobile nodes in MANET efficiently. The proposed scheme selects mobility databases adaptively from GQS by considering the locality of mobile node. The performance of the mobility management scheme proposed in this paper is evaluated by an analytic model and compared with that of existing UQS based mobility management scheme.

  • PDF

A Study on DDoS Attack Mitigation Technique in MANET (MANET 환경에서 DDoS 공격 완화 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.3-8
    • /
    • 2012
  • MANET composed wireless nodes without fixed infrastructure provides high flexibility, but it has weak disadvantage to various attack. It has big weakness to DDoS attack because every node perform packet forwarding especially. In this paper, packet transmission information control technique is proposed to reduce damage of DDoS attack in MANET and search location of attacker when DDoS attacks occur. Hierarchical structure using gateway node is adopted for protect a target of attack in this study. Gateway node in cluster is included like destination nodes surely when source nodes route path to destination nodes and it protects destination nodes. We confirmed efficiency by comparing proposed method in this study with CUSUM and measured the quantity consumed memory of cluster head to evaluate efficiency of information control using to location tracing.

A Study on MD5 Security Routing based on MANET (MANET 기반 MD5 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.797-803
    • /
    • 2012
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

Movement Pattern Analysis based on Transmission Performance over Underwater MANET (수중 MANET에서 전송성능기반 이동패턴분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1083-1088
    • /
    • 2019
  • Even though the transmission performance is very important factor for not only study and development but also for design, implementation, and operation of underwater MANET. There is a trend of using it as a measurement factor for comparing and analyzing degree of network performance. In this paper, movement pattern using transmission performance is analyzed to enlarge the use of transmission performance in underwater MANET. The relation between transmission performance and movement pattern is firstly considered and then through this consideration, causing effects of movement pattern to transmission performance is studied. Results of this study can be used as an important base to predict and analyze movement pattern through measuring of transmission performance of moving objects in underwater environments.

A Study on the VoIP Intrusion prevention over MANET (MANET 기반 VoIP의 침해방지에 관한 연구)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.543-545
    • /
    • 2011
  • The concern which is abundant in MANET VoIP for comprising the mobility guarantee and mobile network is received without the infrastructure system between the mobile terminal node. However, because the access of system and border is easy, the issue which is big in the security problem becomes more than the wired network system with this convenience by the foreign network attacker differently. In this paper, we would like to the fundamental web network, NAT and concluding the security problem technology in which Firewall can inquire on MANET VoIP and whether it is appropriate or not which can solve this is proposed.

  • PDF