• Title/Summary/Keyword: Neighbor list

Search Result 42, Processing Time 0.031 seconds

A Novel Algorithm for Fast Node-search and Redundancy Reduction in Gossip-based P2P Network (빠른 노드 검색과 부하감소를 위한 새로운 가쉽기반 P2P 네트워크 알고리즘)

  • Zhu, Xiao-Wei;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.619-622
    • /
    • 2009
  • P2P networks are undergoing rapid progress and inspiring numerous developments by gossip-based protocol. Gossip-based protocols for group communication have attractive scalability and reliability properties. We propose a self-organizing algorithm in the sense that the size of neighbor list achieved without any node knowing the group size. We also propose an efficient mechanism to reduce the redundancy of the system by backing up the nodes in the neighbor list. We present the design, theoretical analysis, and a detailed evaluation of the proposed algorithm and its refinements.

  • PDF

A Design of SWAD-KNH Scheme for Sensor Network Security (센서 네트워크 보안을 위한 SWAD-KNH 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1462-1470
    • /
    • 2013
  • This paper proposes an SWAD-KNH(Sybil & Wormhole Attack Detection using Key, Neighbor list and Hop count) technique which consists of an SWAD(Sybil & Wormhole Attack Detection) module detecting an Worm attack and a KGDC(Key Generation and Distribution based on Cluster) module generating and an sense node key and a Group key by the cluster and distributing them. The KGDC module generates a group key and an sense node key by using an ECDH algorithm, a hash function, and a key-chain technique and distributes them safely. An SWAD module strengthens the detection of an Sybil attack by accomplishing 2-step key acknowledgement procedure and detects a Wormhole attack by using the number of the common neighbor nodes and hop counts of an source and destination node. As the result of the SWAD-KNH technique shows an Sybil attack detection rate is 91.2% and its average FPR 3.82%, a Wormhole attack detection rate is 90%, and its average FPR 4.64%, Sybil and wormhole attack detection rate and its reliability are improved.

Management of Neighbor Cell Lists and Physical Cell Identifiers in Self-Organizing Heterogeneous Networks

  • Lim, Jae-Chan;Hong, Dae-Hyoung
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.367-376
    • /
    • 2011
  • In this paper, we propose self-organizing schemes for the initial configuration of the neighbor cell list (NCL), maintenance of the NCL, and physical cell identifier (PCI) allocation in heterogeneous networks such as long term evolution systems where lower transmission power nodes are additionally deployed in macrocell networks. Accurate NCL maintenance is required for efficient PCI allocation and for avoiding handover delay and redundantly increased system overhead. Proposed self-organizing schemes for the initial NCL configuration and PCI allocation are based on evolved universal terrestrial radio access network NodeB (eNB) scanning that measures reference signal to interference and noise ratio and reference symbol received power, respectively, transmitted from adjacent eNBs. On the other hand, the maintenance of the NCL is managed by adding or removing cells based on periodic user equipment measurements. We provide performance analysis of the proposed schemes under various scenarios in the respects of NCL detection probability, NCL false alarm rate, handover delay area ratio, PCI conflict ratio, etc.

The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN

  • Li, Jianpo;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2223-2242
    • /
    • 2019
  • Distance Vector-Hop (DV-Hop) algorithm is widely used in node localization. It often suffers the wormhole attack. The current researches focus on Double-Wormhole-Node-Link (DWNL) and have limited attention to Multi-Wormhole-Node-Link (MWNL). In this paper, we propose a security DV-Hop algorithm (AMLDV-Hop) to resist MWNL. Firstly, the algorithm establishes the Neighbor List (NL) in initialization phase. It uses the NL to find the suspect beacon nodes and then find the actually attacked beacon nodes by calculating the distances to other beacon nodes. The attacked beacon nodes generate and broadcast the conflict sets to distinguish the different wormhole areas. The unknown nodes take the marked beacon nodes as references and mark themselves with different numbers in the first-round marking. If the unknown nodes fail to mark themselves, they will take the marked unknown nodes as references to mark themselves in the second-round marking. The unknown nodes that still fail to be marked are semi-isolated. The results indicate that the localization error of proposed AMLDV-Hop algorithm has 112.3%, 10.2%, 41.7%, 6.9% reduction compared to the attacked DV-Hop algorithm, the Label-based DV-Hop (LBDV-Hop), the Secure Neighbor Discovery Based DV-Hop (NDDV-Hop), and the Against Wormhole DV-Hop (AWDV-Hop) algorithm.

An Enhanced Greedy Message Forwarding Protocol for High Mobile Inter-vehicular Communications (고속으로 이동하는 차량간 통신에서 향상된 탐욕 메시지 포워딩 프로토콜)

  • Jang, Hyun-Hee;Yu, Suk-Dae;Park, Jae-Bok;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.3
    • /
    • pp.48-58
    • /
    • 2009
  • Geo-graphical routing protocols as GPSR are known to be very suitable and useful for vehicular ad-hoc networks. However, a corresponding node can include some stale neighbor nodes being out of a transmission range, and the stale nodes are pone to get a high priority to be a next relay node in the greedy mode. In addition, some useful redundant information can be eliminated during planarization in the recovery mode. This paper deals with a new recovery mode, the Greedy Border Superiority Routing(GBSR), along with an Adaptive Neighbor list Management(ANM) scheme. Each node can easily treat stale nodes on its neighbor list by means of comparing previous and current Position of a neighbor. When a node meets the local maximum, it makes use of a border superior graph to recover from it. This approach improve the packet delivery ratio while it decreases the time to recover from the local maximum. We evaluate the performance of the proposed methods using a network simulator. The results shown that the proposed protocol reveals much better performance than GPSR protocol. Please Put the of paper here.

Short-cut Routing Algorithm Using Neighbor Node List in Hierarchical Routing for 6LoWPAN (6LoWPAN의 계층적 라우팅 기법에서 이웃 노드 리스트를 이용한 Short-cut 라우팅 알고리즘)

  • Kang, Moon-Kyoung;Jin, Kyo-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.296-305
    • /
    • 2007
  • The HiLow, a hierarchical routing protocol for 6LoWPAN, needs smaller memory allocation and energy than other routing protocols. However, the HiLow has a weak point that does not provide the optimized routing path. In this paper, we propose the algorithm that can find the optimum next hop using neighboring nodes around the source node as well as hierarchical routing path information. We evaluate the performance of proposed algorithm using the computer simulation, and we can acquire results that decreases a number of hop count and transmitted message.

  • PDF

A Low Complexity Candidate List Generation for MIMO Iterative Receiver via Hierarchically Modulated Property (MIMO Iterative 수신기에서 계층적 변조 특성을 이용한 낮은 복잡도를 가지는 후보 리스트 발생 기법)

  • Jeon, Eun-Sung;Yang, Jang-Hoon;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.500-505
    • /
    • 2009
  • In this paper, We present a low complexity candidate list generation scheme in iterative MIMO receiver. Since QAM modulation can be decomposed into HP symbols and LP symbol and HP symbol is robust in error capability, we generate HP symbol list with simple ZF detector output and its corresponding neighbor HP symbols, Then, based on HP symbol list, the LP symbol list is generated by using the sphere decoder. From the second iteration, since apriori value from channel decoder is available, the candidate list is updated based on demodulated apriori value. Through the simulation, we observe that at the first iteration, the BER performance is worse than LSD. However, as the number of iteration is increased, the proposed scheme has almost same performance as LSD. Moreover, the proposed one has reduced candidate list generation time and lower number of candidate list compared with LSD.

LIST INJECTIVE COLORING OF PLANAR GRAPHS WITH GIRTH AT LEAST FIVE

  • Hongyu Chen
    • Bulletin of the Korean Mathematical Society
    • /
    • v.61 no.1
    • /
    • pp.263-271
    • /
    • 2024
  • A vertex coloring of a graph G is called injective if any two vertices with a common neighbor receive distinct colors. A graph G is injectively k-choosable if any list L of admissible colors on V (G) of size k allows an injective coloring 𝜑 such that 𝜑(v) ∈ L(v) whenever v ∈ V (G). The least k for which G is injectively k-choosable is denoted by χli(G). For a planar graph G, Bu et al. proved that χli(G) ≤ ∆ + 6 if girth g ≥ 5 and maximum degree ∆(G) ≥ 8. In this paper, we improve this result by showing that χli(G) ≤ ∆ + 6 for g ≥ 5 and arbitrary ∆(G).

Cooperative Incumbent System Protection MAC Protocol for Multi-channel Ad-hoc Cognitive Radio Networks

  • Yi, Ke;Hao, Nan;Yoo, Sang-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1976-1996
    • /
    • 2011
  • Cognitive radio (CR) MAC protocol provides access control of unused spectrum resources without causing interference to primary users. To achieve this goal, in this paper a TDMA based cooperative multi-channel cognitive radio MAC (MCR-MAC) protocol is proposed for wireless ad hoc networks to provide reliable protection for primary users by achieving cooperative detection of incumbent system signals around the communication pair. Each CR node maintains transmission opportunity schedules and a list of available channels that is employed in the neighbor discovery period. To avoid possible signal collision between incumbent systems and cognitive radio ad hoc users, we propose a simple but efficient emergency notification message exchanging mechanism between neighbor CR nodes with little overhead. Our simulation results show that the proposed MCR-MAC can greatly reduce interference with primary users and remarkably improve the network throughput.