• Title/Summary/Keyword: Mobile host

Search Result 377, Processing Time 0.028 seconds

Design and Implementation of SIP System for Supporting Mobility Based on JAIN (이동성 지원을 위한 JAIN 기반 SIP 시스템의 설계 및 구현)

  • Lee Jong eon;Cha Si ho;Kim Dae young;Lee Jae oh;Cho Kuk hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.144-152
    • /
    • 2005
  • Mobile IP(MIP) and SIP have been proposed to support mobility in the wireless internet working at different layers of the protocol stack. However MIP has some problems such as triangle routing, the need of each host's home address, the overhead of tunneling and the lack of wide deployment. Thus we proposed a scheme for supporting mobility based on SIP in this research. A novel SIP system to provide a hierarchical registration has been designed according to this scheme. Our SIP system has been established by implementing JAIN technologies which follow next generation network standards to support the mobility of wireless terminal. This system successfully satisfied ITU-T recommendation.

Improving TCP Performance through Pre-detection of Route Failure in Mobile Ad Hoc Networks (Ad Hoc 망에서 경로단절 사전감지를 통한 TCP 성능향상)

  • Lee Byoung-Yeul;Lim Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.900-910
    • /
    • 2004
  • Route failure is mainly caused by mobility of mobile host in ad hoc networks. Route failure, which may lead to sudden packet losses and delays, is losing the route from source to destination. In this situation, TCP assumes that congestion has occurred within the network and also initiates the congestion control procedures. Congestion control algorithm provides the means for the source to deal with lost packets. TCP performance in ad hoc environments will be degraded as TCP source cannot distinguish congestion from route failure. In this paper, we propose TCP-P as pre-detection approach to deal with route failure. TCP-P freezes TCP through pre-detection of route failure. Route failure information of the proposed mechanism is obtained not by routing protocol but by MAC protocol. The intermediated node, obtaining route failure information by its MAC layer, relays the information to TCP source and lets TCP source stop the congestion control algorithm. Results reveal that TCP-P responding with proactive manner outperforms other approaches in terms of communication throughput under the presence of node mobility.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

Enhanced Mobility Management Framework for Future Generation Networks (차세대 이동통신 네트워크를 위한 향상된 이동성 관리 프레임워크)

  • Kim, Moon;Moon, Tae-Wook;Cho, Sung-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.710-720
    • /
    • 2009
  • The Future Generation Networks(FGNs) are proposed to integrate various heterogeneous access technologies, and further expected to support both vertical and seamless handovers. In this motivation, the IEEE 802.21 specifies Media Independent Handover(Mlli) services to enhance the mobile user experience by optimizing handovers between heterogeneous access networks. Additionally, Fast handover for MIPv6(FM1Pv6) is introduced to provide transparent host mobility and to improve handover performance by reducing handover delay as well. This paper focuses on the coordination of FMIPv6 and MIH, and introduces an enhanced mobility management framework suited for FGN. This novel framework replaces handover signaling messages used in wireless networks with novel MIH messages and local primitives. Moreover, Serving Access Router(SAR) performs most of handover processes instead of Mobile Node(MN). Therefore, the proposed mobility management framework reduces handover latency, packet loss, and signaling overhead significantly. We further evaluate the performance of the proposed framework by using both numerical analysis and network simulations.

The Authentication Framework in Access Network based on Home Gateway (홈 게이트웨이에 기반한 가입자망에서의 인증 프레임워크)

  • Yoon Hwa-Mook;Choi Byung-Sun;Lee Seoung-Hyeon;Lee Jae-Kwang;Lee Won-Goo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.160-168
    • /
    • 2005
  • Today, home networking security shows the complicated and various characteristics of requirements for consideration because of the variety of information appliances and share of resources among them. Therefore, security framework to satisfy with security functions is arranged ,regardless of the variety of communication medium and protocols. Thus, we construct security framework for mobile host(or user) to securely control devices in home-network through the variety of suggested mechanism, with security mechanism to be available for future home networking model, and verified the performance of our model.

  • PDF

Measurement Method of Posture and Movement for the Aged Person using an Accelerometer

  • Sugimoto, Takao;Mori, Kentarou
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.87-91
    • /
    • 2004
  • High aged society is rapidly progressing in Japan. The rate of aged person more than 65 years old in the population are estimated 25 % in 2017 and rate of younger population will be decreased at same time. As a result, it is estimated that the human resources that is looking after or supporting for the aged person will be drained in Japan. In the other hand, the society has to provide high quality of life in order to be improved living environment for aged person. To decrease the share of nursing and caring for the aged person, it is required that new supporting systems for aged person have to build up as soon as possible. But it is required that various kind of measurement for posture and movement in activities with a simple and single detector for the aged person. The measurement instrument has to be lightweight and simple structure. The results give us a simple measurement method are classified that the posture of sitting down, lying down in stationary statuses and walking, running and going to up and down on the stairs in moving statuses. The detected data will plane to transmit to wireless mobile system to the host computer.

  • PDF

Location-Awareness Management in IP-based IMT Network Platform ($IP^2$)

  • NamGung, Jung-Il;Shin, Soo-Young;Jung, Byeong-Hwa;Park, Hyun-Moon;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.901-910
    • /
    • 2010
  • $IP^2$, as an extended concept of the next generation IMT network, is a concept of basically supporting mobility using two steps of IP address (i.e. IPha (IP Host address) and IPra (IP routing address)) in IP backbone network. Current $IP^2$system has a shortcoming of excess usage of network resources caused by sending paging messages to all cells in LA (Location Area) in paging procedure. Considering the evolving direction of network, which is taking mobility with various speed and integration of devices into consideration, this shortcoming must be overcome. In this paper, we proposed a method to reduce time and memory for paging by maintaining current information of MN (Mobile Node) not in Active state with proxy server. Performance evaluation based on NS-2 simulations has shown that the efficiency of network resources is improved in the proposed method.

A study on designing a level gauge for cryogenic liquefied storage vessel by using a differential pressure sensor (차압센서를 이용한 극저온 액화가스 저장용기의 액면측정장치 설계에 관한 연구)

  • Choi, Dong-Joon;Lim, Hyung-Il;Doh, Deog-Hee;Cho, Jong-Rae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.384-390
    • /
    • 2013
  • The sizes of cryogenic vessels and storage tanks are becoming bigger due to strong demands from semiconductor and LCD industry as well as high-tech electronic industry. Conventional level and pressure gauges used for cryogenic vessels were analog types which made exact measurement difficult for the remained quantity at lower levels due to their poor accuracy. In this study, a design for a digital type gas level gauge which can measure the pressure and level inside of the cryogenic liquefied gas storage tanks has been proposed by using a differential pressure sensor, in which the measured data are monitored by a host PC and are transferred to a mobile printer for data confirmation at local station.

PMIPv6-based Mobility Management Scheme for Vehicular Communication Networks (차량통신망 지원을 위한 PMIPv6 기반 이동성 관리 기법)

  • Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.66-71
    • /
    • 2010
  • This paper proposes mobility management schemes providing Internet session continuity to moving vehicles in the V2I (Vehicle-to-Infrastructure) environment of the vehicular communication networks. Since PMIPv6 is localized mobility management protocol, PMIPv6 can not be directly applied to the vehicular communication network requiring global mobility coverage. Therefore, in this paper, we derive two scenarios of applying PMIPv6 to vehicular communication network environment and propose PMIPv6-based global mobility management schemes for those scenarios. Through simulations, we show that the proposed schemes can significantly decrease the Internet service discontinuity.