• 제목/요약/키워드: MANETs

검색결과 156건 처리시간 0.027초

Energy Efficient IDS Node Distribution Algorithm using Minimum Spanning Tree in MANETs

  • Ha, Sung Chul;Kim, Hyun Woo
    • 스마트미디어저널
    • /
    • 제5권4호
    • /
    • pp.41-48
    • /
    • 2016
  • In mobile ad hoc networks(MANETs), all the nodes in a network have limited resources. Therefore, communication topology which has long lifetime is suitable for nodes in MANETs. And MANETs are exposed to various threats because of a new node which can join the network at any time. There are various researches on security problems in MANETs and many researches have tried to make efficient schemes for reducing network power consumption. Power consumption is necessary to secure networks, however too much power consumption can be critical to network lifetime. This paper focuses on energy efficient monitoring node distribution for enhancing network lifetime in MANETs. Since MANETs cannot use centralized infrastructure such as security systems of wired networks, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method to cover all the nodes in a network and enhance the network lifetime. Simulation results show that the proposed algorithm has better performance in comparison with the existing algorithms.

Raspberry Pi 기반 MANETs 환경에서 야외 Video Streaming 실험 (Outdoor Experiments on video streaming over a Raspberry Pi-based MANETs)

  • 이영미;김병정;송성호;박섭형
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.147-151
    • /
    • 2014
  • 최근에 Raspberry Pi와 같은 싱글 보드 소형 컴퓨터가 많이 등장하면서 비교적 저렴한 비용으로 MANETs(Mobile Ad hoc Networks) 실험 환경을 구축할 수 있게 되었다. 이 논문에서는 802.11 무선랜 모듈과 동적 라우팅 알고리즘이 장착된 Raspberry Pi를 이용하여 MANETs의 노드를 구현하였다. 야외에서 다수의 노드들이 이동을 하면서 동적으로 망을 재구성하는 환경에서 비디오 카메라를 설치한 노드가 실시간으로 스트리밍하는 데이터를 다른 한 노드까지 전송하는 실험을 진행하였다. 또한 각 노드에 디스플레이 장치를 연결하여 MANETs에서 동적 라우팅과 비디오 스트리밍 성능을 분석하기 위한 데이터 등을 수시로 확인할 수 있도록 하였으며, 각 노드에 저장된 데이터를 자동으로 수집하여 분석할 수 있는 소프트웨어를 구현하였다.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

An Algorithm to Detect Bogus Nodes for a Cooperative Intrusion Detection Architecture in MANETs

  • Hieu Cao Trong;Dai Tran Thanh;Hong Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1117-1120
    • /
    • 2006
  • Wide applications because of their flexibilities and conveniences of Wireless Mobile Ad-hoc Networks (MANETs) also make them more interesting to adversaries. Currently, there is no applied architecture efficient enough to protect them against many types of attacks. Some preventive mechanisms are deployed to protect MANETs but they are not enough. Thus, MANETs need an Intrusion Detection System (IDS) as the second layer to detect intrusion of adversaries to response and diminish the damage. In this paper, we propose an algorithm for detecting bogus nodes when they attempt to intrude into network by attack routing protocol. In addition, we propose a procedure to find the most optimize path between two nodes when they want to communicate with each other. We also show that our algorithm is very easy to implement in current proposed architectures.

  • PDF

Fuzzy Logic based Mobility Management Scheme in MANETs

  • Oh, Sun Jin;Lee, Young Dae
    • International Journal of Advanced Culture Technology
    • /
    • 제1권2호
    • /
    • pp.7-12
    • /
    • 2013
  • Mobility management is an important issue in Mobile Ad Hoc Networks (MANETs) because location information of mobile nodes is frequently changed and it aggravates the performance in MANETs drastically. In this paper, we propose a fuzzy logic based mobility management scheme using group quorum system by considering the mobile nodes' locality in order to manage location information of mobile nodes in MANETs efficiently. The proposed scheme selects mobility databases adaptively from group quorum system by considering the degree of locality of a mobile node. The performance of the proposed scheme is evaluated by an analytical model and compared with that of existing mobility management scheme.

  • PDF

익명성을 보장하는 클러스터 기반 이동 애드혹 네트워크에서의 클러스터 갱신 프로토콜 (Cluster Reconfiguration Protocol in Anonymous Cluster-Based MANETs)

  • 박요한;박영호
    • 전자공학회논문지
    • /
    • 제50권8호
    • /
    • pp.103-109
    • /
    • 2013
  • 이동 애드혹 네트워크는 역동적인 구조를 가지는 단독적 네트워크로서 기반 시설을 필요로 하지 않는다. 애드혹 네트워크에서 사용자의 안전성을 제공하기 위해서는 기본적이면서도 다양한 보안 서비스가 제공되어야 한다. 특히 모바일 상업 시장을 고려할 때, 사용자의 프라이버시 보호는 중요하게 고려 되여야 할 보안 요구사항이다. 최근 클러스터 기반 이동 애드혹 네트워크 환경에서 익명성을 보장하는 보안 시스템이 연구되고 있다. 본 논문에서는 익명성을 보장하는 클러스터 기반 이동 애드혹 네트워크에서 네트워크의 안정성을 향상시키기 위한 클러스터 갱신 프로토콜을 제안한다. 제안하는 방식을 통해서 개선된 익명성을 보장하는 이동 애드혹 네트워크는 특정 클러스터 헤더의 비정상적인 상태에서도 네트워크 구조를 회복할 수 있다.

MANETs에서 정책기반 망 관리를 위한 Active PDP Discovery (Active PDP Discovery for PBNM in MANETs)

  • 이경진;송왕철
    • 한국통신학회논문지
    • /
    • 제31권5B호
    • /
    • pp.390-396
    • /
    • 2006
  • Mobile Ad-hoc Networks(MANETs)에서 정책기반 네트워크 관리를 위해서는 기존의 유선망 관리 방법으로는 신뢰성과 효율성을 보장 할 수 없다. 그러므로 MANETs 관리는 노드들을 효과적으로 클러스터하고 이동 관리를 하는 것이 필수적이다. 본 논문에서는 분산 되어 있는 PDP(Policy Decision Point)를 발견하는 Active PDP Discovery Protocol과 PEP(Policy Enforcement Point)노드 이동 감지를 위해 COPS-PR을 확장하고 PDP에 MNL(Management Node List)를 추가하여 PEP노드를 관리하는 방법을 제안한다. 그리고 시뮬레이션을 통해 얻은 결과를 분석하고 결론으로 끝맺는다.

Black Hole along with Other Attacks in MANETs: A Survey

  • Tseng, Fan-Hsun;Chiang, Hua-Pei;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.56-78
    • /
    • 2018
  • Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.

Self-Organized Authentication in Mobile Ad-Hoc Networks

  • Caballero-Gil, Pino;Hernandez-Goya, Candelaria
    • Journal of Communications and Networks
    • /
    • 제11권5호
    • /
    • pp.509-517
    • /
    • 2009
  • This work proposes a new distributed and self-organized authentication scheme for mobile ad-hoc networks (MANETs). Apart from describing all its components, special emphasis is placed on proving that the proposal fulfils most requirements derived from the special characteristics of MANETs, including limited physical protection of broadcast medium, frequent route changes caused by mobility, and lack of structured hierarchy. Interesting conclusions are obtained from an analysis of simulation experiments in different scenarios.

Secure Private Key Revocation Scheme in Anonymous Cluster -Based MANETs

  • Park, YoHan;Park, YoungHo
    • 한국멀티미디어학회논문지
    • /
    • 제18권4호
    • /
    • pp.499-505
    • /
    • 2015
  • Security supports are a significant factor in the design of mobile ad hoc networks. In the dynamic topology where the node changes frequently, private key generation and revocation for newly joining and leaving nodes must be considered. In addition, the identities of individual nodes must be protected as well in mobile networks to avoid personal privacy concerns. This paper proposes ID-based private key revocation scheme and non-interactive key agreement scheme in anonymous MANETs. The proposed scheme provides the user privacy using pseudonyms and private key generation and revocation schemes with consideration of dynamic user changes. Therefore, our schemes can be applied in dynamic and privacy-preserving MANETs which are helpful to share multimedia data.