• Title/Summary/Keyword: Mobile Ad-hoc Wireless Network

Search Result 319, Processing Time 0.025 seconds

A Study on the Effective Routing Algorithm for Mobile NB IoT Wireless Network (이동 무선망에서의 라우팅 알고리즘 구현을 위한 NB IoT 가스미터기 개발연구)

  • Lee, Dong-Chul;Baek, Seong Jun;Lee, Yuen Sun;Kwon, Tae-Oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.607-608
    • /
    • 2017
  • 이동 Ad-hoc 무선망은 고정 라우터나 호스트, 무선 기지국에 관계없이 순수하게 무선기반의 인프라 구조로 구성된 망이다. 기존의 무선망 인프라는 기반 구축 비용이 많이 들고 기반구조가 파괴되었을 때 서비스 제공이 불가능한 단점이 있다. Ad-hoc 무선망은 이러한 단점을 보안하기 위해 라우팅 알고리즘을 구현하여 기존의 통신망보다 Ad-hoc 무선망을 이용하면 지진으로 인한 유 무선망의 통화단절 등을 막을 수 있고, 이동전화 품질서비스, 저렴한 가격, 떨어져 있는 동일 사업장내에서 무료 통화가 가능하여 이동통신 사업자에게 통신료를 지불할 필요가 없다. 본고에서는 이를 실현화 시킬 수 있는 알고리즘 개발과 시험을 통한 결과를 제시하고자 한다.

  • PDF

Distance Based Dynamic Probabilistic Broadcasting in Ad Hoc Wireless Networks

  • Kim Jae-Soo;Kim Jeong-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1613-1622
    • /
    • 2005
  • Broadcasting is fundamental and effective data dissemination mechanism for route discovery, address resolution, and many other network services in mobile ad hoc networks. Although many approaches for broadcasting have been proposed to minimize the number of retransmissions, none of them guarantee the best-suited bounds of retransmissions. Appropriate use of probabilistic method can lower the chance of contention and collision among neighboring nodes, so that it reduces the number of rebroadcasts. In this paper, we propose a probabilistic approach that dynamically adjusts the rebroadcasting probability according to the distance between the sender and the receiver. While the rebroadcast probabilities of a mobile node close to sender will be set lower, the rebroadcast probabilities of a mobile node far away from sender wi1l be set to higher, The rebroadcast probability of a node wi1l be set according to the distance from sender. We evaluate the performance of proposed approach by comparing it with flooding as well as a fixed probabilistic broadcast approach. Simulation results showed that the performance of proposed scheme outperforms by about $70\%$ than flooding scheme and outperforms by about $20\%$ than fixed probabilistic scheme.

  • PDF

An Effective Cross Layer-based Multimedia Transmission Algorithm over Multi-hop Mobile Ad Hoc Network (다중 홉 이동 애드 혹 네트워크에서 크로스레이어 기반의 효과적인 멀티미디어 전송 알고리즘)

  • Lee, Gyeong-Cheol;Kim, Wan;Song, Hwang-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5A
    • /
    • pp.474-481
    • /
    • 2010
  • In this paper, we present an effective cross layer-based video transmission algorithm over multi-hop mobile ad hoc networks. The proposed algorithm selects the most efficient PHY mode of wireless LAN multi-rate service at each node in a distributed way based on the available information at application, MAC, and physical layers in order to minimize end-to-end delay and maintain packet loss rate in tolerable range at the receiver. Finally, experimental results are provided to show superior performance of the proposed algorithm.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Routing Protocol for Network Lifetime Extension in MANET (MANET에서 네트워크 수명 연장을 위한 라우팅 프로토콜)

  • Kim, Kyoung-Ja;Han, Sang-Hoon;Koo, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.120-129
    • /
    • 2010
  • MANET(Mobile Ad Hoc NETwork) is a collection of mobile nodes that are free to move and organize themselves in an arbitrary manner without any fixed infrastructures. These mobile nodes are connected by wireless links and act as routers for all other nodes in the network. As a router each node in MANET consumes its batteries when forwarding a message, and the selection of the best path to minimize the total power needed to route packets is needed to maximize the lifetime of all nodes. In this paper, we propose a routing protocol considering the remaining battery capacity of nodes in the routing paths. The proposed scheme prevents the battery of each node from being overused and increases the lifetime of the network.

Mobility-Aware Ad Hoc Routing Protocols for Networking Mobile Robot Teams

  • Das, Saumitra M.;Hu, Y. Charlie;Lee, C.S. George;Lu, Yung-Hsiang
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.296-311
    • /
    • 2007
  • Mobile multi-robot teams are useful in many critical applications such as search and rescue. Explicit communication among robots in such mobile multi-robot teams is useful for the coordination of such teams as well as exchanging data. Since many applications for mobile robots involve scenarios in which communication infrastructure may be damaged or unavailable, mobile robot teams frequently need to communicate with each other via ad hoc networking. In such scenarios, low-overhead and energy-efficient routing protocols for delivering messages among robots are a key requirement. Two important primitives for communication are essential for enabling a wide variety of mobile robot applications. First, unicast communication (between two robots) needs to be provided to enable coordination and data exchange. Second, in many applications, group communication is required for flexible control, organization, and management of the mobile robots. Multicast provides a bandwidth-efficient communication method between a source and a group of robots. In this paper, we first propose and evaluate two unicast routing protocols tailored for use in ad hoc networks formed by mobile multi-robot teams: Mobile robot distance vector (MRDV) and mobile robot source routing (MRSR). Both protocols exploit the unique mobility characteristics of mobile robot networks to perform efficient routing. Our simulation study show that both MRDV and MRSR incur lower overhead while operating in mobile robot networks when compared to traditional mobile ad hoc network routing protocols such as DSR and AODV. We then propose and evaluate an efficient multicast protocol mobile robot mesh multicast (MRMM) for deployment in mobile robot networks. MRMM exploits the fact that mobile robots know what velocity they are instructed to move at and for what distance in building a long lifetime sparse mesh for group communication that is more efficient. Our results show that MRMM provides an efficient group communication mechanism that can potentially be used in many mobile robot application scenarios.

Construction of Wireless Sensor Network for Intelligent Home (지능형 홈을 위한 무선 센서 네트워크 구성)

  • Whang Se-Hee;Jang In-Hun;Sim Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.695-700
    • /
    • 2005
  • In the sensor network, a lot of sensor nodes are scattered sparsely and organizes a united communication network between each node. After that, environmental information around each sensor node are gathered and analyzed. Because each node operates under resource constraint, the efficiency and hardware specification of a node should be maximized. There exist technical constraints until now but recent technical progress in IC fabrication and wireless network enables to construct a tiny embedded system, which has the properties of low cost, low power consumption, multi functions. Wireless sensor network becomes a modern research field with technical improvements, is studied in numerous laboratories, and is called as diverse different project names - Wireless Integrated Network Sensors (WINS), Mobile Ad hoc NETwork (MANET), Ubiquitous Sensor Network (USN). TinyOS is one of leading project and is widely used. In this paper, we suggest a sensor network, which uses TinyOS platforms and aims for context awareness in a home environment.

A Study on Attack Detection using Hierarchy Architecture in Mobile Ad Hoc Network (MANET에서 계층 구조를 이용한 공격 탐지 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.75-82
    • /
    • 2014
  • MANET has various types of attacks. In particular, routing attacks using characteristics of movement of nodes and wireless communication is the most threatening because all nodes which configure network perform a function of router which forwards packets. Therefore, mechanisms that detect routing attacks and defense must be applied. In this paper, we proposed hierarchical structure attack detection techniques in order to improve the detection ability against routing attacks. Black hole detection is performed using PIT for monitoring about control packets within cluster and packet information management on the cluster head. Flooding attack prevention is performed using cooperation-based distributed detection technique by member nodes. For this, member node uses NTT for information management of neighbor nodes and threshold whether attack or not receives from cluster head. The performance of attack detection could be further improved by calculating at regular intervals threshold considering the total traffic within cluster in the cluster head.

An Algorithm to Detect Bogus Nodes for a Cooperative Intrusion Detection Architecture in MANETs

  • Hieu Cao Trong;Dai Tran Thanh;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1117-1120
    • /
    • 2006
  • Wide applications because of their flexibilities and conveniences of Wireless Mobile Ad-hoc Networks (MANETs) also make them more interesting to adversaries. Currently, there is no applied architecture efficient enough to protect them against many types of attacks. Some preventive mechanisms are deployed to protect MANETs but they are not enough. Thus, MANETs need an Intrusion Detection System (IDS) as the second layer to detect intrusion of adversaries to response and diminish the damage. In this paper, we propose an algorithm for detecting bogus nodes when they attempt to intrude into network by attack routing protocol. In addition, we propose a procedure to find the most optimize path between two nodes when they want to communicate with each other. We also show that our algorithm is very easy to implement in current proposed architectures.

  • PDF

Control Network using Bluetooth with Wire Network (유선 네트워크 기반의 근거리 무선 통신을 이용한 제어용 네트워크)

  • Gwak, Jae-Hyeok;Im, Jun-Hong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.476-479
    • /
    • 2003
  • Recently, Bluetooth has been regarded as a new technology for short-range wireless connection. Although initial application of Bluetooth technology has been focused mainly on replacing cables between hand-held devices due to a limited packet size and short-range, general wireless telecommunication such as PAN and Ad hoc networks via Bluetooth-equipped devices is expected to be one of the most popular applications. Wireless equipments have been used to exchange data between host and mobile unit. The exchanging data may be several bytes of control command and the value of sensors with ultra-sonic, vision sensor, and encoder from mobile robot. However, most wireless equipments have some drawbacks such as lack of authentication, large size and high price. On the other hand, the benefits of Bluetooth are small size, low power, low price except short-range. Especially, there are some difficulties when wireless modules are used in indoor environments. In this paper, a method of using wire network in Bluetooth network is investigated as a solution to overcome the short-range problem of Bluetooth and difficulty in indoor environment.

  • PDF