• Title/Summary/Keyword: Ns-2

Search Result 1,725, Processing Time 0.03 seconds

SECURITY FRAMEWORK FOR VANET: SURVEY AND EVALUATION

  • Felemban, Emad;Albogamind, Salem M.;Naseer, Atif;Sinky, Hassan H.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.55-64
    • /
    • 2021
  • In the last few years, the massive development in wireless networks, high internet speeds and improvement in car manufacturing has shifted research focus to Vehicular Ad-HOC Networks (VANETs). Consequently, many related frameworks are explored, and it is found that security is the primary issue for VANETs. Despite that, a small number of research studies have taken into consideration the identification of performance standards and parameters. In this paper, VANET security frameworks are explored, studied and analysed which resulted in the identification of a list of performance evaluation parameters. These parameters are defined and categorized based on the nature of parameter (security or general context). These parameters are identified to be used by future researchers to evaluate their proposed VANET security frameworks. The implementation paradigms of security frameworks are also identified, which revealed that almost all research studies used simulation for implementation and testing. The simulators used in the simulation processes are also analysed. The results of this study showed that most of the surveyed studies used NS-2 simulator with a percentage of 54.4%. The type of scenario (urban, highway, rural) is also evaluated and it is found that 50% studies used highway urban scenario in simulation.

Terahertz Nondestructive Time-of-flight Imaging with a Large Depth Range

  • Kim, Hwan Sik;Kim, Jangsun;Ahn, Yeong Hwan
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.619-626
    • /
    • 2022
  • In this study, we develop a three-dimensional (3D) terahertz time-of-flight (THz-TOF) imaging technique with a large depth range, based on asynchronous optical sampling (ASOPS) methods. THz-TOF imaging with the ASOPS technique enables rapid scanning with a time-delay span of 10 ns. This means that a depth range of 1.5 m is possible in principle, whereas in practice it is limited by the focus depth determined by the optical geometry, such as the focal length of the scan lens. We characterize the spatial resolution of objects at different vertical positions with a focal length of 5 cm. The lateral resolution varies from 0.8-1.8 mm within the vertical range of 50 mm. We obtain THz-TOF images for samples with multiple reflection layers; the horizontal and vertical locations of the objects are successfully determined from the 2D cross-sectional images, or from reconstructed 3D images. For instance, we can identify metallic objects embedded in insulating enclosures having a vertical depth range greater than 30 mm. For feasible practical use, we employ the proposed technique to locate a metallic object within a thick chocolate bar, which is not accessible via conventional transmission geometry.

Entropy Generation Minimization in MHD Boundary Layer Flow over a Slendering Stretching Sheet in the Presence of Frictional and Joule Heating

  • Afridi, Muhammad Idrees;Qasim, Muhammad;Khan, Ilyas
    • Journal of the Korean Physical Society
    • /
    • v.73 no.9
    • /
    • pp.1303-1309
    • /
    • 2018
  • In the present paper, we study the entropy analysis of boundary layer flow over a slender stretching sheet under the action of a non uniform magnetic field that is acting perpendicular to the flow direction. The effects of viscous dissipation and Joule heating are included in the energy equation. Using similarity transformation technique the momentum and thermal boundary layer equations to a system of nonlinear differential equations. Numerical solutions are obtained using the shooting and fourth-order Runge-Kutta method. The expressions for the entropy generation number and Bejan number are also obtained using a suggested similarity transformation. The main objective of this article is to investigate the effects of different governing parameters such as the magnetic parameter ($M^2$), Prandtl number (Pr), Eckert number (Ec), velocity index parameter (m), wall thickness parameter (${\alpha}$), temperature difference parameter (${\Omega}$), entropy generation number (Ns) and Bejan number (Be). All these effects are portrayed graphically and discussed in detail. The analysis reveals that entropy generation reduces with decreasing wall thickness parameter and increasing temperature difference between the stretching sheet and the fluid outside the boundary layer. The viscous and magnetic irreversibilities are dominant in the vicinity of the stretching surface.

Correlation Distance Based Greedy Perimeter Stateless Routing Algorithm for Wireless Sensor Networks

  • Mayasala, Parthasaradhi;Krishna, S Murali
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.139-148
    • /
    • 2022
  • Research into wireless sensor networks (WSNs) is a trendy issue with a wide range of applications. With hundreds to thousands of nodes, most wireless sensor networks interact with each other through radio waves. Limited computational power, storage, battery, and transmission bandwidth are some of the obstacles in designing WSNs. Clustering and routing procedures have been proposed to address these concerns. The wireless sensor network's most complex and vital duty is routing. With the Greedy Perimeter Stateless Routing method (GPSR), an efficient and responsive routing protocol is built. In packet forwarding, the nodes' locations are taken into account while making choices. In order to send a message, the GPSR always takes the shortest route between the source and destination nodes. Weighted directed graphs may be constructed utilising four distinct distance metrics, such as Euclidean, city block, cosine, and correlation distances, in this study. NS-2 has been used for a thorough simulation. Additionally, the GPSR's performance with various distance metrics is evaluated and verified. When compared to alternative distance measures, the proposed GPSR with correlation distance performs better in terms of packet delivery ratio, throughput, routing overhead and average stability time of the cluster head.

Dynamic Traffic Light Control Scheme Based on VANET to Support Smooth Traffic Flow at Intersections (교차로에서 원활한 교통 흐름 지원을 위한 VANET 기반 동적인 교통 신호등 제어 기법)

  • Cha, Si-Ho;Lee, Jongeon;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.23-30
    • /
    • 2022
  • Recently, traffic congestion and environmental pollution have occurred due to population concentration and vehicle increase in large cities. Various studies are being conducted to solve these problems. Most of the traffic congestion in cities is caused by traffic signals at intersections. This paper proposes a dynamic traffic light control (DTLC) scheme to support safe vehicle operation and smooth traffic flow using real-time traffic information based on VANET. DTLC receives instantaneous speed and directional information of each vehicle through road side units (RSUs) to obtain the density and average speed of vehicles for each direction. RSUs deliver this information to traffic light controllers (TLCs), which utilize it to dynamically control traffic lights at intersections. To demonstrate the validity of DTLC, simulations were performed on average driving speed and average waiting time using the ns-2 simulator. Simulation results show that DTLC can provide smooth traffic flow by increasing average driving speed at dense intersections and reducing average waiting time.

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Dynamic timer Mechanism for Advanced TCP-DAD at High-speed Network (고속 네트워크에서 동적인 타이머 조절 기법을 통한 향상된 TCP-DAD)

  • Kang, Dong-Min;Park, Min-Woo;Park, Sun-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1348-1351
    • /
    • 2009
  • 패킷 재배치(packet reodering)는 전송한 패킷의 순서가 처음과 다르게 뒤섞여 수신지에 도착하는 현상을 의미한다. 패킷 재배치는 불필요한 재전송이나 불필요한 혼잡 제어를 수행하여 TCP의 성능을 저하시킨다. 패킷 재배치에 의한 TCP 성능 저하를 막기 위해 다양한 접근 방법이 소개되었다. TCP-DAD는 기존 TCP에서 3으로 고정된 중복 응답 임계값을 동적으로 조절하여, 잘못된 혼잡 제어를 예방하고 있다. 일반적으로 전송한 패킷의 수가 많을 때, 패킷 재배치를 경험할 확률이 높으며, 패킷 재배치에 의해 잘못된 혼잡 제어가 일어날 가능성 많다. 고속 네트워크 환경에서는 혼잡 윈도우 크기 변화의 폭이 매우 크다는 점을 고려할 때, 중복 응답 임계값을 조절하는 TCP-DAD는 한계가 있다. 본 논문에서는 고속 네트워크 환경에서의 패킷 재배치 현상으로 인한 TCP 성능저하를 완화하기 위한 새로운 알고리즘 TCP-DT를 소개한다. 이는 중복 응답 수에 의존하지 않고 타이머를 통해 혼잡 제어를 수행하는 메커니즘 이다. 본 논문은 NS-2를 사용하여 고속 네트워크 환경에서의 시뮬레이션을 통해 제안한 TCP-DT의 성능 향상을 증명하였다.

Self-Adaptive Checking Location Mechanism Based Georouting Algorithm in Mobile Ad Hoc Networks (이동 에드혹 네트워크에서 셀프 채킹 방법을 이용한 위치 기반 라우팅 알고리즘)

  • Youn, Joo-Sang;Park, Sangheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1178-1181
    • /
    • 2009
  • Geographic forwarding algorithms을 사용하는 Georouting protocol에서는 route maintenance을 위해서 고정된 주기마다 beacon message을 이웃노드에 전송하는 fixed periodical beacon based route algorithm을 사용하여 mobile node 정보를 습득한다. Fixed periodical beacon scheme에서의 기존 연구 이슈는 이웃노드 정보의 신뢰성을 유지하기 위해서 다양한 mobility environment 환경에 맞도록 beacon 전송주기를 적절히 결정하는 연구가 진행되어 왔다. 이와 같은 연구에서는 long periodical interval 사용 시 이웃노드의 위치정보 error을 발생시킬 확률이 높으며 또한 short periodical interval 의 경우 네트워크 내에 high route overhead 을 유발시키는 단점을 가지고 있다. 따라서 고정된 주기 방법은 다양한 mobility environment에 잘 적용되지 못하며 또한 mobility environment 에서 발생하는 route maintenance 내에 이웃노드 정보에 대한 불확실성 문제가 빈번이 발생하여 경로 설정에 잘못된 정보를 제공하여 경로 신뢰성(path reliability)과 낮은 전송률 (transmission rate)을 야기한다. 본 논문에서는 이런 이웃노드 정보의 불확실성 문제를 극복하기 위해서 mobile node가 스스로 자신의 위치를 체크하여 routing table을 능동적으로 갱신하는 방법을 이용하여 이 문제를 극복할 수 있도록 하였다. 모의 실험은 ns2를 이용하여 실시하였으며 결과는 low/high mobility scenario에서는 기존 방법 보다 routing overhead 을 줄이면서 높은 전송률 (transmission rate)을 보인다.

Smooth Dupthresh Mechanism for Advanced TCP-DAD (중복 응답 임계값의 완만한 조절 기법을 통한 향상된 TCP-DAD)

  • Park, Min-Woo;Kim, Jong-Myoung;Han, Young-Ju;Kwon, Yoon-Joo;Lee, Gil-Jae;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.971-974
    • /
    • 2008
  • 오늘날 네트워크는 장비의 발달로 인해 패킷 재배치(packet reordering)가 빈번히 일어나고 있다. 패킷 재배치는 TCP의 성능을 저하시키는 문제점을 가지는데, 이러한 문제점을 해결하기 위해 TCPDAD 메커니즘이 제안되었다. TCP-DAD는 중복 응답 임계값을 동적으로 조절함으로써, TCP의 패킷 재배치 문제를 완화하는 메커니즘이다. 하지만 TCP-DAD는 중복 응답 임계값을 조절하는 메커니즘에 문제가 있어 패킷 손실이 일어날 경우, 패킷 손실에 대한 복구가 늦어지고 심지어 재전송 타이머가 불필요하게 종료되어 TCP의 성능저하를 야기하기도 한다. 본 논문에서는 이러한 TCP-DAD의 문제점을 해결하기 위해 새로운 중복 응답 임계값 조절 기법으로 Smooth-dupthresh를 제안한다. NS-2를 이용한 시뮬레이션을 통해 Smooth-dupthresh 기법을 적용한 TCP-DAD가 기존의 TCP-DAD 보다 평균적으로 약 8% 향상된 성능을 보임을 증명하였다.

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.