• 제목/요약/키워드: Network Protocols

검색결과 1,531건 처리시간 0.023초

Attack and Correction: How to Design a Secure and Efficient Mix Network

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • 제8권1호
    • /
    • pp.175-190
    • /
    • 2012
  • Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally proven. An attack against the soundness of this shuffling scheme is presented in this paper. Such an attack compromises the soundness of the mix network based on it. Two new shuffling protocols are designed on the basis of Groth's shuffling and batch verification techniques. The first new protocol is not completely sound, but is formally analyzed in regards to soundness, so it can be applied to build a mix network with formally proven soundness. The second new protocol is completely sound, so is more convenient to apply. Formal analysis in this paper guarantees that both new shuffling protocols can be employed to build mix networks with formally provable soundness. Both protocols prevent the attack against soundness in Groth's scheme. Both new shuffling protocols are very efficient as batch-verification-based efficiency-improving mechanisms have been adopted. The second protocol is even simpler and more elegant than the first one as it is based on a novel batch cryptographic technique.

Performance Evaluation of Mobile Ad Hoc Network Routing Protocols Using Geography Based Mobility Model (지형기반 이동성모델을 이용한 Ad Hoc망에서의 경로배정 프로토콜 성능분석)

  • 박범진;안홍영
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 I
    • /
    • pp.153-156
    • /
    • 2003
  • Conventional simulations for mobile ad hoc network so far are based on the "random walk" of the mobile nodes, which are not constrained by their surrounding spatial environments. In this paper, we present a geography-based mobility model, which reflects more realistic movements of the real world. This mobility model is used for performance evaluation of MANET routing protocols.protocols.

  • PDF

MAC Protocols for Ad Hoc Networks with Directional Antennas: Overview and Comparison

  • Khatiwada, Bipula;Moh, Sang-Man
    • Information and Communications Magazine
    • /
    • 제28권12호
    • /
    • pp.69-82
    • /
    • 2011
  • In recent years, the employment of directional antennas in ad hoc networks has significantly increased. MAC protocols for ad hoc networks with directional antennas have the potentiality of spatial reuse, large coverage range and network capacity, which mitigates the negative effects associated with omnidirectional antenna systems. However, they suffer from some issues such as hidden terminal problems, deafness, neighbor discovery, flaws with directional carrier sensing, etc. In this paper, we have surveyed the MAC protocols for ad hoc networks with directional antennas, which have been published in the literature, and compared them qualitatively in terms of major characteristics and network performances.

Fuzzy based Energy-Efficient Adaptive Routing Algorithm for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 퍼지 기반 적응형 라우팅 알고리즘 및 시뮬레이션)

  • Hong, Soon-Oh;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • 제14권4호
    • /
    • pp.95-106
    • /
    • 2005
  • Recent advances in wireless sensor networks have led to many routing protocols designed for energy-efficiency in wireless sensor networks. Despite that many routing protocols have been proposed in wireless sensor networks, a single routing protocol cannot be energy-efficient if the environment of the sensor network varies. This paper presents a fuzzy logic based Adaptive Routing (FAR) algorithm that provides energy-efficiency by dynamically changing protocols installed at the sensor nodes. The algorithm changes protocols based on the output of the fuzzy logic which is the fitness level of the protocols for the environment. A simulation is performed to show the usefulness of the proposed algorithm.

  • PDF

Modeling and Simulation for using Multiple Routing Protocols in Wireless Sensor Networks (무선 센서 네트워크에서 다중 라우팅 프로토콜 사용을 위한 모델링과 시뮬레이션)

  • Nam, Su Man;Cho, Tae Ho;Kim, Hyung Jong
    • Journal of the Korea Society for Simulation
    • /
    • 제29권3호
    • /
    • pp.73-82
    • /
    • 2020
  • In the fourth industrial revolution, wireless sensor networks (WSNs) are an important element of collecting and analyzing data in a variety of environments without human intervention. This sensor network is greatly affected by topology and routing protocols. Routing protocols, which affect energy consumption, are executed after deploying sensor nodes. Once built, they are difficult to change. Before the WSN is deployed, a routing protocol is carefully selected in view of various environments and the performance of the protocol is evaluated. In this paper, we propose a model to simulate multiple routing protocols using a discrete event system specification (DEVS). The DEVS-based proposed model simulates various situations without changes and structures of the its model as algorithms of the routing protocols are implemented in its coordinators model. To verify normal behaviors of the proposed model, the number of report delivery and the energy consumption of the sensor network were compared using representative protocols LEACH and Dijkstra. As a result, it was confirmed that the proposed model executes normally in both routing protocols.

Performance Analysis of Ad-Hoc Network Protocols under Vehicular Communication Environments (차량 통신 환경에서 애드혹 네트워크 프로토콜의 성능분석)

  • Shin, Sung-Kwon;Kim, Doo-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제11권6호
    • /
    • pp.2234-2239
    • /
    • 2010
  • In this paper, the performance of ad-hoc wireless network protocols is analyzed under the vehicular communication environments. We estimate the throughput and delay of the protocols with packet sizes and various data traffics in expressways and metropolis by using QualNet simulator. It turns out that the performance of DSR protocol is better in expressways and the performance of AODV works well in metropolitan areas. Therefore, it is necessary that the proper protocols should be selected to provide the better performance according to the vehicular communication environments.

Performance Analysis of Key Exchange Protocols on ETSI Standard (ETSI 표준 키 교환 프로토콜의 성능 분석)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • 제8권6호
    • /
    • pp.520-527
    • /
    • 2015
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks

  • Widanapathirana, Chathuranga H.;Sekercioglu, Y. Ahmet;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.1909-1928
    • /
    • 2011
  • Node cooperation during packet forwarding operations is critically important for fair resource utilization in Community Wireless Mesh Networks (CoWMNs). In a CoWMN, node cooperation is achieved by using fairness protocols specifically designed to detect and isolate malicious nodes, discourage unfair behavior, and encourage node participation in forwarding packets. In general, these protocols can be split into two groups: Incentive-based ones, which are managed centrally, and use credit allocation schemes. In contrast, reputation-based protocols that are decentralized, and rely on information exchange among neighboring nodes. Centrally managed protocols inevitably suffer from scalability problems. The decentralized, reputation-based protocols lacks in detection capability, suffer from false detections and error propagation compared to the centralized, incentive-based protocols. In this study, we present a new fairness protocol management scheme, called Hybrid FPMS that captures the superior detection capability of incentive-based fairness protocols without the scalability problems inherently expected from a centralized management scheme as a network's size and density grows. Simulation results show that Hybrid FPMS is more efficient than the current centralized approach and significantly reduces the network delays and overhead.

Analysis of Several Digital Network Technologies for Hard Real-time Communications in Nuclear Plant

  • Song, Ki-Sang;No, Hee-Cheon;Kim, Dong-Hun;Koo, In-Soo
    • Nuclear Engineering and Technology
    • /
    • 제31권2호
    • /
    • pp.226-235
    • /
    • 1999
  • Applying digital network technology for advanced nuclear plant requires deterministic communication for tight safety requirements, timely and reliable data delivery for operation-critical and mission-critical characteristics of nuclear plant. Communication protocols, such as IEEE 802/4 Token Bus, IEEE 802/5 Token Ring, FDDI, and ARCnet, which have deterministic communication capability are partially applied to several nuclear power plants. Although digital communication technologies have many advantages, it is necessary to consider the noise immunity from electromagnetic interference (EMI), electrical interference, impulse noise, and heat noise before selecting specific digital network technology for nuclear plant. In this paper, we consider the token frame loss and data frame loss rate due to the link error event, frame size, and link data rate in different protocols, and evaluate the possibility of failure to meet the hard real-time requirement in nuclear plant.

  • PDF

Performance Evaluation of Position-based and Non-position-based Routing Protocols in a Vehicular Ad-Hoc Network (VANET에 있어서 위치기반과 비위치기반 라우팅프로토콜의 성능 평가)

  • Jo, Jun-Mo;Choi, Dae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제7권2호
    • /
    • pp.213-218
    • /
    • 2006
  • In this paper, we evaluate and compare performance between position-based and non-position-based routing protocols in a vehicular ad-hoc network. The protocols evaluated in this paper for many performance evaluation aspects are a position-based routing protocol, GPSR (Greedy Perimeter Stateless Routing), and the non-position-based such as AODV (Ad-hoc On-Demand Distance Vector) and DSR (Dynamic Source Routing) protocols. The three protocol characteristics such as Packet Delivery Ratio, Latency of first packet per connection, and Average number of hops depending on distance are compared and evaluated. As the result of simulation, the AODV performed better than the DSR. However, due to the high mobility characteristic of a vehicular ad-hoc network, GPSR, the position-based routing performs better than the non-position-based routing protocols such as AODV and DSR in a vehicular ad-hoc network environment.

  • PDF