• Title/Summary/Keyword: Packet ID

Search Result 61, Processing Time 0.024 seconds

IDS Performance on MANET with Packet Aggregation Transmissions (패킷취합전송이 있는 MANET에서 IDS 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.695-701
    • /
    • 2014
  • Blackhole attacks having a unauthorized change of routing data will cause critical effects for transmission performance. The transmission performance will be improved to the a certain level by using or having IDS(Intrusion Detection System)/IPS(Intrusion Prevention System) as countermeasures to blackhole attacks. In this papar, the effects of IDS to ene-to-end performance of packet aggregation transmission are analyzed on MANET(Mobile Ad-hoc Network) with IDS under blackhole attacks. MANET simulator based on NS-2 is used to analyze performance parameters as MOS, connection ratio, delay and packet loss rate as standard performance parameters, an another performance factor which is suggested in this paper. VoIP(Voice over Internet Protocol) traffics, one of voice services, is used for performance analysis. A suggestion for IDS implementation on MANET with packet aggregations under blackhole is shown as one of results.

Basic MOFI Testbed Implementation for Host ID-based Communication (호스트 ID 기반 통신을 위한 기본 MOFI 테스트베드 구축)

  • Jung, Whoi-Jin;Min, Seok-Hong;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.17-27
    • /
    • 2011
  • In recent years, the interest and research for Future Internet are rapidly increasing. In domestic, MOFI (Mobile Oriented Future Internet) is proposed as one architecture of Future Internet. MOFI is a data transmission architecture which provides a mobility, name-based communication and routing scalability. In this paper we implement a basic MOFI testbed that supports HID-based communication, and verify the feasibility of HID-based communication through experimentation of general service such as PING and WWW service. We used "VirtualBox" as a virtual machine and implement a packet processing and a HCP header addition and translation function using "Click Modular Router".

Implementation of Communication to Flexibly Configure the Number of Railway Cars (철도차량 수를 유연하게 구성할 수 있는 통신시스템 구현)

  • Yeon, Jun Sang;Yang, Oh
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.4
    • /
    • pp.61-66
    • /
    • 2016
  • This paper presents the implementation for a network structure of railway cars using a point to point communication. Most of network's representative specifications for a train are the FIP (Field Bus), MVB (Multifunction Vehicle Bus), CAN and WTB (Wire Train Bus) which is used by ALSOM, SIEMENS and BOMBADIER as major in this field. These networks in a physical layer use a multi-drop method, connected from $1^{st}$ car to $n^{th}$ car of a train through a cable without any extra services such as an electric part, amplifier. However waveforms which is passed through a long cable in the multi-drop are distorted by a capacitance or resistance of the cable or environments. Also since using a cable connected directly from $1^{st}$ car to $n^{th}$ car, if over two trains make double head, it isn't easy to distinguish ID for each railway cars. So by using the point to point network per each car, it is able to reduce a distortion. Also since reducing distortion, this communication speed can be been higher and transmit and receive any packets more stably. Using proposed token in a packet, this can make ID per each railway car automatically. Finally experimental results show the good performance and effectiveness of the proposed method.

THERA: Two-level Hierarchical Hybrid Road-Aware Routing for Vehicular Networks

  • Abbas, Muhammad Tahir;SONG, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3369-3385
    • /
    • 2019
  • There are various research challenges in vehicular ad hoc networks (VANETs) that need to be focused until an extensive deployment of it becomes conceivable. Design and development of a scalable routing algorithm for VANETs is one of the critical issue due to frequent path disruptions caused by the vehicle's mobility. This study aims to provide a novel road-aware routing protocol for vehicular networks named as Two-level hierarchical Hybrid Road-Aware (THERA) routing for vehicular ad hoc networks. The proposed protocol is designed explicitly for inter-vehicle communication. In THERA, roads are distributed into non-overlapping road segments to reduce the routing overhead. Unlike other protocols, discovery process does not flood the network with packet broadcasts. Instead, THERA uses the concept of Gateway Vehicles (GV) for the discovery process. In addition, a route between source and destination is flexible to changing topology, as THERA only requires road segment ID and destination ID for the communication. Furthermore, Road-Aware routing reduces the traffic congestion, bypasses the single point of failure, and facilitates the network management. Finally yet importantly, this paper also proposes a probabilistical model to estimate a path duration for each road segment using the highway mobility model. The flexibility of the proposed protocol is evaluated by performing extensive simulations in NS3. We have used SUMO simulator to generate real time vehicular traffic on the roads of Gangnam, South Korea. Comparative analysis of the results confirm that routing overhead for maintaining the network topology is smaller than few previously proposed routing algorithms.

DDoS Attack Path Retracing Using Router IP Address (라우터 IP주소를 이용한 DDoS 공격경로 역추적)

  • 원승영;구경옥;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.223-226
    • /
    • 2003
  • The best way in order to protect the system resource front Distributed Denial of Service(DDoS) attack is cut off the source of DDoS attack with path retracing the packet which transferred by attacker. Packet marking method can not use ICMP cause by using IP identifier field as marking field. And in case of increasing the number of router, retracing method using router ID has the size of marking field's increasing problem. In this paper, we propose that retracing method can be available the ICMP using marking field for option field in IP header and the size of making Held do not change even though the number of router is increased using the mark information which value obtained through XOR operation on IP address.

  • PDF

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

A Study on the Modified PRMA-TDD Method for Media Access in Wireless LANs (무선 LAN에서 매체처리를 위한 변형된 PRMA-TDD 방식에 관한 연구)

  • 서정곤;홍성식;류황빈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.7
    • /
    • pp.1244-1255
    • /
    • 1994
  • The wireless-LAN(Local Area Network), which is emerged as a solution to cable problem and increasing requirement for communication network, has a several problem when it transmit information MAN protocol by used wired-LAN`s MAC protocol. Media Access protocol in Wireless-LAN has great effect on system performance and much studies are processing now. The PRMA(Packet Reservation Multiple Aeecss) of reservation method has a disadvantage that the system performance was degraded become of delay time in the reservation step as a resulting of collision. In this paper, using the TDD(Time Division Duplex) method amd modified PRMA method wireless-LAN modelled to overcome disadvantage, that id delay time due to collision in reservation step. The performance evaluation fo the model was done using M/M/1//M process model and this was simulation using SLAM.

  • PDF

Detection of Internal Illegal Query Using Packet Analysis (패킷 분석을 이용한 내부인 불법 질의 탐지)

  • Jang Gyong-Ohk;Koo Hyang-Ohk;Oh Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.259-265
    • /
    • 2005
  • The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.

  • PDF

Enhancement of Real-Time Transmission Performance of PGA data (PGA 데이터의 실시간 전송능력 향상)

  • Lim, In-Seub;Choi, In-Young;Jung, Soon-Key
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.37-44
    • /
    • 2009
  • In this paper, we propose an efficient method which improves the performance of transmission of PGA which is essential data for real-time earthquake monitoring system. Currently, above 120 earthquake stations were installed nationwide and additional installation is expected because the social interesting of earthquake hazard is rising. Real-time earthquake monitoring system checks earthquake occurrence by using PGA were calculated from acceleration data of each seismic station. An efficient method of PGA data transmission is key factor of real-time monitoring. The key idea of proposed method is to deal with each seismic station using an unique ID, to assign one bit to indicate whether a packet include a station's data or not. Proposed method can contain more station data and decrease the data loss compared to current method. To verify proposed method, we investigate the turnaround time and ratio of data loss using above 91000 packets. As results of experiment. the proposed method is proven that the method need more time about 50% but reduce the data loss about 87% as compared to previous method.

MIP-RA was used to transform the packet in HMIPv6 and MIH environment Efficient Handover (MIP-RA이 사용된 HMIPv6와 MIH 환경에서의 패킷 변형을 통한 효율적인 핸드오버 지원)

  • Lee, Kil-Hun;Park, Guk-Hwan;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.251-254
    • /
    • 2011
  • 본 논문에서는 예약주소를 사용한 HMIPv6로 각 통신 노드에 따른 그룹 군집화와 MIH 패킷의 Service Specific TLVs의 변형을 통해 기존의 핸드오버에서 좀 더 가볍고 빠른 Searching과 효율적인 인증을 이룰 수 있도록 하였다. 군집(Aggregate) 세션 단위로 자원예약을 하는 경우 종단간 SID(Session ID)와는 별도로 군집 SID를 사용하는데 MIH의 Service Specific TLVs를 통해 터널링을 이루고 변형된 Service Specific 공간을 통한 효율적인 핸드오버를 지원한다.

  • PDF