• Title/Summary/Keyword: Node Mobility function

Search Result 43, Processing Time 0.037 seconds

A Path Fault Avoided RPAODV Routing in Ad Hoc Networks (Ad Hoc 네트워크의 경로손실 회피기반 RPAODV 라우팅)

  • Wu Mary;Kim Youngrak;Kim Chonggun
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.879-888
    • /
    • 2004
  • Ad Node transmits packets to a destination node using routing function of intermediate nodes on the path in Ad Hoc networks. When the link to a next hop node in a path is broken due to the next hop node's mobility, a new route search process is required for continuing packets transmission. The node which recognizes link fault starts a local route recovery or the source node starts a new route search in the on demand routing protocol AODV. In this case, the new route search or the local route search brings packet delays and bad QoSs by packet delay. We propose RPAODV that the node predicts a link fault selects a possible node in neighbor nodes as a new next hop node for the path. The proposed protocol can avoid path faults and improve QoS.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

An Efficient Authentication Mechanism for Fast Mobility Services in MIPv6 (MIPv6에서 빠른 이동성 서비스를 위한 효율적인 인증 방법)

  • Lee Seung-Yeon;Huh Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.1-11
    • /
    • 2006
  • If a mobile node out of home domain asks to provide mobility service, the mobile should be permitted by the home domain. This can be accomplished by the usage of AAA but the recent studies have shown its weakness to fail the ability of mobile node. This study suggests Fast Handoff model which will shorten permission time by AAA and allow the mobility service to be more efficient. Our suggestion with Assertion function is a new approach to assist authentication capability through mutual authentication of each V_AAA when the distance between HA and itself gets far or its delay time becomes longer. Our suggestion verifies its efficiency by cost analysis.

  • PDF

Location-based Routing(LBR) Algorithm to Improve Efficiency in the Wireless Sensor Network (무선 센서 네트워크에서 효율성을 향상시킨 위치기반 라우팅 알고리즘)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.31-39
    • /
    • 2007
  • Wireless sensor network can increase independence and flexibility of network because it consists of mobile node without the aid of fixed infra, but, by unrestricted for the participation and breakaway of node, it has the difficulty in routing which is a basic function of network operation. To solve those problems, a suggestion is the location-based routing algorithm using geological or logical location information. The suggested algorithm which is based on cluster for location information of sensor is applicable to wireless sensor network of discrete situation, which guarantees extension and mobility. By efficiency analysis and reactive routing algorithm of current DSR and AODV, packet transmission ratio, routing overheads, and average communication expense is compared as node increases.

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process

  • Preethi, G.A.;Chandrasekar, C.
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.616-629
    • /
    • 2015
  • A mobile terminal will expect a number of handoffs within its call duration. In the event of a mobile call, when a mobile node moves from one cell to another, it should connect to another access point within its range. In case there is a lack of support of its own network, it must changeover to another base station. In the event of moving on to another network, quality of service parameters need to be considered. In our study we have used the Markov decision process approach for a seamless handoff as it gives the optimum results for selecting a network when compared to other multiple attribute decision making processes. We have used the network cost function for selecting the network for handoff and the connection reward function, which is based on the values of the quality of service parameters. We have also examined the constant bit rate and transmission control protocol packet delivery ratio. We used the policy iteration algorithm for determining the optimal policy. Our enhanced handoff algorithm outperforms other previous multiple attribute decision making methods.

Localized Path Selection Algorithm for Energy Efficiency and Prolonging Lifetime in Ad-Hoc Networks (에드 혹 네트워크에서 에너지 효율성과 네트워크 수명 연장을 위한 지역적 경로 선택 알고리즘)

  • Lee, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.65-72
    • /
    • 2010
  • In ad-hoc network, the technique to efficiently consume the limited amounts of energy is an important issue since the wireless terminal node is operated on batteries as their energy resource. In order to extend the system lifetime, through a balanced energy consumption, we must delay the situation in which a particular terminal node's energy is depleted and results in system disconnection. Also, the link, which has low reliability due to the mobility of the node, should be avoided considering the key element when setting up the route. The proposed CMLR method in this paper enables to increase the efficiency of energy consumption with a new cost function considering the residue energy of node, error rate of link, and transmission energy consumption. This method is extending the network lifetime and increasing the energy efficiency by compromising the value between the minimization of the transmission energy consumption and maximization of the node's lifetime. Through the simulations the proposed CMLR algorithm was verified by showing better performance over the conventional methods in terms of network lifetime and path efficiency.

A Security method and Performance evaluation of preventing DoS attack against DAD in MANET (MANET 환경에서 중복 주소 탐지에 대한 DoS 공격을 방지하는 보안 기법과 성능 평가)

  • Lim, Jeong-Mi;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1099-1108
    • /
    • 2009
  • The study of IP address allocation in MANET can be categories into Stateful and Stateless. The one, special node monitors other nodes' IP address and allocates IF address. And the other, node generates IP address by itself. Nodes in MANET have mobility and restricted resource, so Stateless is more suitable than Stateful. But, in Stateless, node requires DAD process because of unique IP address allocation. And Dos attack can be happened in DAD precess. In this paper, we propose a security method on preventing DoS attack against DAD in MANET using one-way hash function. Since, Computation of one-way hash function is suitable for nodes' restricted resource character in MANET. And we evaluate performance using NS2 and compare with other security method which is CGA using signature.

  • PDF

On NeMRI-Based Multicasting for Network Mobility (네트워크 이동성을 고려한 NeMRI 기반의 멀티캐스트 라우팅 프로토콜)

  • Kim, Moon-Seong;Park, Jeong-Hoon;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.35-42
    • /
    • 2008
  • Mobile IP is a solution to support mobile nodes, however, it does not handle NEtwork MObility (NEMO). The NEMO Basic Support (NBS) protocol ensures session continuity for all the nodes in the mobile network. Since the protocol is based on Mobile IP, it inherits the same fundamental problem such as tunnel convergence, when supporting the multicast for NEMO. In this paper, we propose the multicast route optimization scheme for NEMO environment. We assume that the Mobile Router (MR) has a multicast function and the Nested Mobile Router Information (NeMRI) table. The NeMRI is used to record o list of the CoAs of all the MRs located below it. And it covers whether MRs desire multicast services. Any Route Optimization (RO) scheme can be employed here for pinball routing. Therefore, we achieve optimal routes for multicasting based on the given architecture. We also propose cost analytic models to evaluate the performance of our scheme. We observe significantly better multicast cost in NEMO compared with other techniques such as Bi-directional Tunneling, Remote Subscription, and Mobile Multicast based on the NBS protocol.

  • PDF

Mobility Analysis Metric for Ad Hoc Network Using Pairwise Clustering (이진 Clustering을 이용한 Ad Hoc 망의 이동성 해석 측도)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.193-199
    • /
    • 2010
  • In this paper, we propose a new metric to measure the dynamic connection states of Ad Hoc network. The new metric measures the total path break up time $\sum_{i}T_i$, where $T_i$ is the time period during which maximum cluster distance exceeds the radio range. $T_i$ can be calculated from the maximum cluster distance function of time, which can be computed from the node position samples of mobility model. The proposed metric can be used as a total system metric as well as an individual connection metric.

Robotic lower pelvic port placement for optimal upper paraaortic lymph node dissection

  • Paek, Jiheum;Kang, Elizabeth;Lim, Peter C.
    • Journal of Gynecologic Oncology
    • /
    • v.29 no.6
    • /
    • pp.87.1-87.4
    • /
    • 2018
  • Objective: Upper paraaortic lymph node dissection (UPALD) to the infrarenal level is one of the most challenging robotic procedures. Because robotic system has the limitation in robotic arm mobility. This surgical video introduces a novel robotic approach, lower pelvic port placement (LP3), to perform optimally and simultaneously both UPALD and pelvic procedures in gynecologic cancer patients using da Vinci Xi system. Methods: The patient presented with high-grade endometrial cancer. She underwent robotic surgical staging operation. For the setup of the LP3, a line was drown between both anterior superior iliac spines. At 3 cm below this line, another line was drown and four robotic ports were placed on this line. Results: After paraaortic lymph node dissection (PALD) was completed, the boom of robotic system was rotated $180^{\circ}$ to retarget for the pelvic lateral displacement. Robotic ports were placed and docked again. The operation was completed robotically without any complication. Conclusion: The LP3 was feasible for performing simultaneously optimal PALD as well as procedures in pelvic cavity in gynecologic cancer patients. The advantage of LP3 technique is the robotic port placement that affords for multi-quadrant surgery, abdominal and pelvic dissection. The LP3 is facilitated by utilizing advanced technology of Xi system, including the patient clearance function, the rotating boom, and 'port hopping' that allows using every ports for a camera. The LP3 will enable surgeons to extend the surgical indication of robotic surgical system in the gynecologic oncologic field.