• 제목/요약/키워드: Mobile nodes

검색결과 1,155건 처리시간 0.02초

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Paramasivan, Balasubramanian;Viju Prakash, Maria Johan;Kaliappan, Madasamy
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.75-83
    • /
    • 2015
  • In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.

애드-혹 망에서 모바일의 지역 중요도를 고려한 퍼지로직 기반 쿼럼의 설계 및 평가 (Design and Evaluation of Fuzzy-Logic based Quorum System considering the Gravity of Locality of Mobile in MANETs)

  • 오선진
    • 한국인터넷방송통신학회논문지
    • /
    • 제8권2호
    • /
    • pp.9-14
    • /
    • 2008
  • 모바일 애드-혹 망(MANET)은 고정 인프라 구조 없이 모바일 노드들이 자유롭게 이동하면서 통신하는 무선망이다. 망 내의 모바일 노드들은 빈번하게 이동하므로 위치정보 관리는 MANET에서 중요한 문제이다. 본 논문에서는 MANET 내의 모든 모바일 노드에 대한 위치정보를 효율적으로 관리하기 위해 모바일의 이동성을 퍼지논리를 이용하여 지역 중요도를 적응적으로 적용한 새로운 쿼럼 시스템을 제안한다. 제안하는 쿼럼 시스템의 성능은 분석적 방법으로 평가하였고, 그 성능을 기존의 UQS와 DQS 시스템과 비교하였다.

  • PDF

IEEE 802.11 PSM을 적용한 다중 홉애드 혹 네트워크에서 우회경로의 최소화 (Minimizing non-optimal paths in multi-hop ad hoc network adopted IEEE 802.11 PSM)

  • 황도현;이장수;김성천
    • 정보처리학회논문지C
    • /
    • 제14C권7호
    • /
    • pp.583-588
    • /
    • 2007
  • 이동 애드 혹 네트워크는 기반 망의 도움 없이 모바일 노드의 자유로운 참여와 이탈에 의해 임시적인 네트워크를 구성하기 용이하다. 이러한 모바일 노드는 한정된 에너지에 의존한다. 그래서 무선 애드 혹 네트워크에서 에너지와 관련된 문제들이 중요한 연구과제로 다루어진다. 모바일 노드의 에너지 소비를 줄이기 위해 IEEE 802.11 PSM를 적용한 다중 홉 애드 혹 네트워크 모델에 대해서 최근 많은 연구가 이루어졌다. IEEE 802.11 PSM은 단일 홉 애드 혹을 가정하고 제안되었다. IEEE 802.11 PSM을 다중 홉 애드 혹 네트워크에 적용을 하게 될 경우 경로설정 메시지를 받지 못한 모바일 노드에 의해 우회하는 경로가 발생하게 된다. 우회하는 경로는 전송지연뿐만 아니라 모바일 노드의 에너지 소비를 증가시키게 된다. 본 논문에서는 경로 설정 메시지를 전송받지 못한 모바일 노드에 의해 발생하는 우회하는 경로를 최적의 경로로 재설정하는 알고리즘을 제안하였다. 모바일 노드는 자신의 송수신 범위에 있는 노드들의 데이터를 엿들을 수 있다. 무선 매체는 동일한 대역을 사용하는 모든 모바일 노드에 의해 공유되어진다. 이러한 매체의 특성을 이용하여 모든 모바일 노드들은 우회경로를 감시하고 우회경로가 발생하였을 경우 자신의 라우팅 테이블의 정보를 수정하거나 이웃한 모바일 노드에게 라우팅 업데이트 요청 메시지를 보내어 최적의 경로로 재설정하게 된다. 우회경로를 최적의 경로로 재설정함으로써 전송지연과 불필요한 에너지 소비를 줄일 수 있었다. 시뮬레이션을 통해 제안 알고리즘을 수행하기위한 오버헤드는 무시할 수 있을 정도로 작다는 것을 알 수 있었다.

Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계 (A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting)

  • 오상윤;정재열;정익래;변진욱
    • 정보보호학회논문지
    • /
    • 제31권6호
    • /
    • pp.1247-1260
    • /
    • 2021
  • 최근, 무선 센서 네트워크에서 더욱 효율적인 노드의 에너지 관리를 위해 센서 데이터를 대신 수집해주는 모바일 싱크 노드에 관한 연구가 있었다. 대표적인 모바일 싱크 노드로는 UAV (Unmanned Aerial vehicle)가 사용되며, 학계에서는 최적의 UAV 경로를 계산하는 알고리즘을 제시하는 위주로 IoD (Internet of Drones) 환경의 급격한 발전을 만들어냈다. 동시에, 보안 관점에서 다수의 노드와 세션키를 효율적으로 만들어야 하는 IoD의 특성에 맞춰 상호 인증 및 안전한 키 교환을 목표로 하는 기법들이 몇몇 제시되었다. 하지만, 모바일 싱크 노드 환경에서의 안전한 통신을 제안한 대부분 논문은 종단 간 데이터 프라이버시가 지켜지지 않았다. 따라서 본 논문에서는 모바일 싱크 노드와 센서 노드 간 인증부터 모바일 싱크 노드가 센서 데이터를 기지국까지 안전하게 중계하는 통합적 보안 모델을 처음으로 제안한다. 또한, 제안한 프로토콜의 안전성을 비공식적으로 입증하고 알려진 다양한 공격으로부터 안전함을 보인다. 마지막으로 기존에 제시된 IoD 환경에서 안전한 키 교환을 주제로 한 기법들과 통신 오버헤드를 비교해 본 논문에서 제시한 기법이 우수하다는 것을 보여준다.

Efficient Context-Aware Scheme for Sensor Network in Ubiquitous Devices

  • Shim, Jong-Ik;Sho, Su-Hwan
    • 한국멀티미디어학회논문지
    • /
    • 제12권12호
    • /
    • pp.1778-1786
    • /
    • 2009
  • Many sensor network applications have been developed for smart home, disaster management, and a wide range of other applications. These applications, however, generally assume a fixed base station as well as fixed sensor nodes. Previous research on sensor networks mainly focused on efficient transmission of data from sensors to fixed sink nodes. Recently there has been active research on mobile sink nodes, sink mobility is one of the most comprehensive trends for information gathering in sensor networks, but the research of an environment where both fixed sink nodes and mobile sinks are present at the same time is rather scarce. This paper proposes a scheme for context-aware by ubiquitous devices with the sink functionality added through fixed sinks under a previously-built, cluster-based multi-hop sensor network environment. To this end, clustering of mobile devices were done based on the fixed sinks of a previously-built sensor network, and by using appropriate fixed sinks, context gathering was made possible. By mathematical comparison with TTDD routing protocol, which was proposed for mobile sinks, it was confirmed that performance increases by average 50% in energy with the number of mobile sinks, and with the number of movements by mobile devices.

  • PDF

Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks

  • Anand, Anjali;Aggarwal, Himanshu;Rani, Rinkle
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.938-947
    • /
    • 2016
  • A mobile ad hoc network (MANET) is a collection of mobile nodes communicating in an infrastructure-less environment without the aid of a central administrating authority. Such networks entail greater dependency on synergy amongst the nodes to execute fundamental network operations. The scarcity of resources makes it economically logical for nodes to misbehave to preserve their resources which makes secure routing difficult to achieve. To ensure secure routing a mechanism is required to discourage misbehavior and maintain the synergy in the network. The proposed scheme employs a partially distributed dynamic model at each node for enhancing the security of the network. Supplementary information regarding misbehavior in the network is partially distributed among the nodes during route establishment which is used as a cautionary measure to ensure secure routing. The proposed scheme contemplates the real world scenario where a node may exhibit different kinds of misbehavior at different times. Thus, it provides a dynamic decision making procedure to deal with nodes exhibiting varying misbehaviors in accordance to their severity. Simulations conducted to evaluate the performance of the model demonstrate its effectiveness in dealing with misbehaving nodes.

Simulation of a Mobile IoT System Using the DEVS Formalism

  • Im, Jung Hyun;Oh, Ha-Ryoung;Seong, Yeong Rak
    • Journal of Information Processing Systems
    • /
    • 제17권1호
    • /
    • pp.28-36
    • /
    • 2021
  • This paper proposes two novel methods to model and simulate a mobile Internet of Things (IoT) system using the discrete event system specification (DEVS) formalism. In traditional simulation methods, it is advantageous to partition the simulation area hierarchically to reduce simulation time; however, in this case, the structure of the model may change as the IoT nodes to be modeled move. The proposed methods reduce the simulation time while maintaining the model structure, even when the IoT nodes move. To evaluate the performance of the proposed methods, a prototype mobile IoT system was modeled and simulated. The simulation results show that the proposed methods achieve good performance, even if the number of IoT nodes or the movement of IoT nodes increases.

Novel Architecture of Self-organized Mobile Wireless Sensor Networks

  • Rizvi, Syed;Karpinski, Kelsey;Razaque, Abdul
    • Journal of Computing Science and Engineering
    • /
    • 제9권4호
    • /
    • pp.163-176
    • /
    • 2015
  • Self-organization of distributed wireless sensor nodes is a critical issue in wireless sensor networks (WSNs), since each sensor node has limited energy, bandwidth, and scalability. These issues prevent sensor nodes from actively collaborating with the other types of sensor nodes deployed in a typical heterogeneous and somewhat hostile environment. The automated self-organization of a WSN becomes more challenging as the number of sensor nodes increases in the network. In this paper, we propose a dynamic self-organized architecture that combines tree topology with a drawn-grid algorithm to automate the self-organization process for WSNs. In order to make our proposed architecture scalable, we assume that all participating active sensor nodes are unaware of their primary locations. In particular, this paper presents two algorithms called active-tree and drawn-grid. The proposed active-tree algorithm uses a tree topology to assign node IDs and define different roles to each participating sensor node. On the other hand, the drawn-grid algorithm divides the sensor nodes into cells with respect to the radio coverage area and the specific roles assigned by the active-tree algorithm. Thus, both proposed algorithms collaborate with each other to automate the self-organizing process for WSNs. The numerical and simulation results demonstrate that the proposed dynamic architecture performs much better than a static architecture in terms of the self-organization of wireless sensor nodes and energy consumption.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

Compromise-Resistant Pairwise Key Establishments for Mobile Ad hoc Networks

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • ETRI Journal
    • /
    • 제28권3호
    • /
    • pp.375-378
    • /
    • 2006
  • This letter presents a pairwise key establishment scheme that is robust against the compromise of nodes in mobile ad hoc networks. Each node establishes local keys with its neighbor nodes that are at most three hops away at network boot-up time. When any two nodes establish a pairwise key, they receive the secret information from the nodes on the route between them, and construct the pairwise key using the secret information. Here, the local keys are utilized by the nodes on the route to send the secret information securely. The simulation results have proven that the proposed scheme provides better security than the key pre-distribution-based scheme.

  • PDF