• Title/Summary/Keyword: Mobile Ad hoc network

Search Result 809, Processing Time 0.026 seconds

Autonomous routing control protocol for mobile ad-hoc networks

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.17-20
    • /
    • 2008
  • A clustering scheme for ad hoc networks is aimed at managing a number of mobile devices by utilizing hierarchical structure of the networks. In order to construct and maintain an effective hierarchical structure in ad hoc networks where mobile devices may move at high mobility, the following requirements must be satisfied. The role of each mobile device for the hierarchical structure is adaptive to dynamic change of the topology of the ad hoc networks. The role of each mobile device should thus change autonomously based on the local information. The overhead for management of the hierarchical structure is small. The number of mobile devices in each cluster should thus be almost equivalent. This paper proposes an adaptive multihop clustering scheme for highly mobile ad hoc networks. The results obtained by extensive simulation experiments show that the proposed scheme does not depend on mobility and node degree of mobile devices in the ad hoc network, which satisfy the above requirements.

  • PDF

An Efficient Routing Algorithm for Balanced Energy Consumption in Wireless Ad-hoc Network Environments (무선 ad-hoc 네트워크 환경에서 균형화된 에너지 소비를 위한 효율적인 라우팅 알고리즘)

  • Kim, Hyun-Ho;Kim, Jung-Hee;Kang, Yong-Hyeog;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1120-1129
    • /
    • 2006
  • It is very important to maximize the battery durability of mobile host in wireless ad-hoc network environments, because it extends the durability and Performance of the system. Since mobile hosts play a routing role, the network structure and the location of mobile hosts create a difference of energy consumption of mobile hosts. In this paper, each mobile host maintains energy tree and evaluates the amount of the energy of the neighboring mobile hosts by using message tree packet by periods. When mobile host sets up a routing path to send a packet, it selects the most proper path in order to consume energy effectively by using energy tree and breadth first search. In this paper, we suggest that, in wireless ad-hoc network environments, if each mobile host consumes balanced energy, mobile hosts of which energy capacity is limited can work as long as it can. Therefore, the durability and performance of the system can be extended.

Reliable Extension Scheme using Multiple Paths in Wireless Ad-hoc Networks (무선 애드-혹 네트워크의 다중 경로를 이용한 신뢰적인 확장 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.218-225
    • /
    • 2007
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless mobile ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an extension scheme of a wireless mobile ad-hoc network based on limited multiple paths source routing protocol. This scheme reduces the overhead of route re-establishment and re-registration by maintaining link/node non-disjoint multiple paths between mobile hosts in a wireless mobile ad-hoc network or a mobile host in a wireless mobile ad-hoc network and a base station supporting fixed network services. By maintaining multiple paths, our scheme provides short end-to-end delay and is reliable extension scheme of a wireless mobile ad-hoc network to a fixed network. In this paper, our simulations show that our scheme outperforms existing schemes with regards to throughput and end-to-end delay. Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.

An Efficient Multi-Hop Cluster Routing Protocol in Mobile Ad Hoc Network (이동 임시무선망에서의 효율적인 다중 홉 클러스터 라우팅 프로토콜)

  • Kim Si-Gwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2005
  • An ad hoc wireless networks forms temporary network without the aid of fixed networks or centralized administration with a collection of wireless mobile hosts. In this case, it is necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. This paper presents an efficient cluster-based routing protocol scheme for ad hoc networks. The cluster is used for path setup and data delivery. Our cluster-based routing algorithm is designed for the improvement of the load balance. Our simulation results show the improved performance for low mobility networks comparing with the previous works.

  • PDF

Routing Attack Detection for Performance Enhancement of AODV Protocol In Mobile Ad Hoc Networks (모바일 Ad Hoc 네트워크에서 AODV 프로토콜의 성능 향상을 위한 라우팅 공격 탐지)

  • Lee, Jae-Young;Choi, Seung-Kwon;Lee, Byong-Rok;Kim, Sun-Chul;Sin, Byoung-Gon;Cho, Yong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.632-641
    • /
    • 2007
  • Since the mobile node acts as the router, the Mobile Ad Hoc network requires the security methods that are different from that of network of the wire environment. Also, since the total network can't be included in the transmission area of the mobile node, when one node sends the message to the other node, we need the middle node. But if the middle node is the unreliable malicious node, we can't guarantee the secure message transmission. Also, because all nodes configuring the network are the mobile nodes, they use the restricted battery capacity and the restricted resources. Therefore, because we have trouble performing the encryption that many resources are required when we sending the message, it is vulnerable to the security than the network of the wire environment. Last, because the network topology continues to change by the mobility of nodes configuring the network, we need the security measure that matches the network characteristics. We suggest the routing attack detection for performance enhancement of AODV protocol in Mobile Ad Hoc networks.

An Effective Intrusion Detection System for MobileAdHocNetwork (모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템)

  • Shrestha, Rakesh;Park, Kyu-Jin;Park, Kwang-Chae;Choi, Dong-You;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

A Ring-Oriented Multicast Architecture over Mobile Ad Hoc Sensor networks

  • Yang, Yubai;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1259-1262
    • /
    • 2004
  • Detecting environmental hazards and monitoring remote terrain are among many sensor network applications. In case of fire detection, it is significantly valuable to monitor fire-spot's shape and trend in time. Mobile ad hoc sensor nodes right round are responsible for sensoring, processing and networking packets, or even launching extinguisher. In this paper, we proposed a ring-oriented Multicast architecture based on "Fisheye State Routing" (MFSR) to organize a group of mobile ad hoc sensor nodes in a multicast way. It is familiar with traditional mesh-based multicast protocol [1] in mobile ad hoc network, trying to concentrates on efficiency and robustness simultaneously. Certain applications-based solution for hazards is proposed, quantitative results including architecture and recovery algorithms of MFSR are also investigated in this paper.

  • PDF

An Address Autoconfiguration Algorithm of Mobile IPv6 through Internet Gateway in Ad-Hoc Networks (Mobile IPv6기반 Ad-Hoc 네트워크에서의 Internet Gateway를 통한 IP주소 자동 할당 방법)

  • Choi Jung-Woo;Park Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.150-155
    • /
    • 2006
  • A hybrid Ad-hoc network connected to the Internet needs an IP address configuration to communicate with the Internet. Most of proposed address autoconfiguration algorithms are node based. The node based address autoconfiguration algorithms waste bandwidth and consume much battery in mobile ad-hoc networks. In this paper, we propose the address allocation algorithm in hybrid Mobile ad-hoc network (MANET). The proposed algorithm reduces network traffic by transferring address configuration packet to the internet gateway by unicast method. Moreover, our IP address configuration algorithm also reduces battery consumption and address configuration time by decreasing number of configuration packets on internet gateway.

An Efficient Core Migration Protocol for Tree Building in Mobile Ad Hoc Multicast Protocol (Ad Hoc네트워크에서 효율적인 코어-기반 멀티캐스트 트리 구축)

  • 이창순;김갑식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.99-104
    • /
    • 2003
  • Ad-hoc is the wireless network and consists of moving Hosts in environments which don't have a network-based Frame. Because ad-hoc is considered as broadcast network and network which has useful benefits, multicast muting protocols have been studied on ad-hoc network For this work we scrutinized ad-hoc and multicast routing protocols presented in previous works. And we presents a protocol for Ad-hoc network.

  • PDF

Extended Trust Evaluation Mechanism Considered Confidence Value of Distributed Service in Mobile Ad-hoc Network (Mobile Ad-hoc Network 상에서 분산된 서비스에 대한 확신 값을 고려한 확장된 신뢰도 평가 기법)

  • Jang, Jong-Deok;Yoon, Chang-Pyo;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.51-57
    • /
    • 2010
  • This paper proposes extended trust evaluation mechanism which is able to become the standard of the node selection which provides a better service by using the basic transaction message which occurs from within the mobile Ad-hoc network and the additional transaction message and add confidence value. Furthermore, throughout the simulation shows the efficiency of the proposed trust evaluation mechanism.