• Title/Summary/Keyword: Probability of Connectivity

Search Result 54, Processing Time 0.024 seconds

eRPL : An Enhanced RPL Based Light-Weight Routing Protocol in a IoT Capable Infra-Less Wireless Networks (사물 인터넷 기반 기기 간 통신 무선 환경에서 향상된 RPL 기반 경량화 라우팅 프로토콜)

  • Oh, Hayoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.357-364
    • /
    • 2014
  • The first mission for the IoT based hyper-connectivity communication is developing a device-to-device communication technique in infra-less low-power and lossy networks. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.

Protocol-Aware Radio Frequency Jamming inWi-Fi and Commercial Wireless Networks

  • Hussain, Abid;Saqib, Nazar Abbas;Qamar, Usman;Zia, Muhammad;Mahmood, Hassan
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.397-406
    • /
    • 2014
  • Radio frequency (RF) jamming is a denial of service attack targeted at wireless networks. In resource-hungry scenarios with constant traffic demand, jamming can create connectivity problems and seriously affect communication. Therefore, the vulnerabilities of wireless networks must be studied. In this study, we investigate a particular type of RF jamming that exploits the semantics of physical (PHY) and medium access control (MAC) layer protocols. This can be extended to any wireless communication network whose protocol characteristics and operating frequencies are known to the attacker. We propose two efficient jamming techniques: A low-data-rate random jamming and a shot-noise based protocol-aware RF jamming. Both techniques use shot-noise pulses to disrupt ongoing transmission ensuring they are energy efficient, and they significantly reduce the detection probability of the jammer. Further, we derived the tight upper bound on the duration and the number of shot-noise pulses for Wi-Fi, GSM, and WiMax networks. The proposed model takes consider the channel access mechanism employed at the MAC layer, data transmission rate, PHY/MAC layer modulation and channel coding schemes. Moreover, we analyze the effect of different packet sizes on the proposed jamming methodologies. The proposed jamming attack models have been experimentally evaluated for 802.11b networks on an actual testbed environment by transmitting data packets of varying sizes. The achieved results clearly demonstrate a considerable increase in the overall jamming efficiency of the proposed protocol-aware jammer in terms of packet delivery ratio, energy expenditure and detection probabilities over contemporary jamming methods provided in the literature.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

Prediction method of node movement using Markov Chain in DTN (DTN에서 Markov Chain을 이용한 노드의 이동 예측 기법)

  • Jeon, Il-kyu;Lee, Kang-whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.1013-1019
    • /
    • 2016
  • This paper describes a novel Context-awareness Markov Chain Prediction (CMCP) algorithm based on movement prediction using Markov chain in Delay Tolerant Network (DTN). The existing prediction models require additional information such as a node's schedule and delivery predictability. However, network reliability is lowered when additional information is unknown. To solve this problem, we propose a CMCP model based on node behaviour movement that can predict the mobility without requiring additional information such as a node's schedule or connectivity between nodes in periodic interval node behavior. The main contribution of this paper is the definition of approximate speed and direction for prediction scheme. The prediction of node movement forwarding path is made by manipulating the transition probability matrix based on Markov chain models including buffer availability and given interval time. We present simulation results indicating that such a scheme can be beneficial effects that increased the delivery ratio and decreased the transmission delay time of predicting movement path of the node in DTN.

Link Quality Enhancement with Beamforming Using Kalman-based Motion Tracking for Maritime Communication

  • Kyeongjea Lee;Joo-Hyun Jo;Sungyoon Cho;Kiwon Kwon;Dong Ku Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1659-1674
    • /
    • 2024
  • Conventional maritime communication struggles to provide high data rate services for Internet of Things (IoT) devices due to the variability of maritime environments, making it challenging to ensure consistent connectivity for onboard sensors and devices. To resolve this, we perform mathematical modeling of the maritime channel and compare it with real measurement data. Through the modeled channel, we verify the received beam gain at buoys on the ocean surface. Additionally, leveraging the modeled wave motions, we estimate future angles of the buoy to use the Extended Kalman Filter (EKF) for design beamforming strategies that adapt to the evolving maritime environment over time. We further validate the effectiveness of these strategies by assessing the results from an outage probability perspective. focuses on improving maritime communication by developing a dynamic model of the maritime channel and implementing a Kalman filter-based buoy motion tracking system. This system is designed to enable precise beamforming, a technique used to direct communication signals more accurately. By improving beamforming, the aim is to enhance the quality of communication links, even in challenging maritime conditions like rough seas and varying sea states. In our simulations that consider realistic wave motions, you've observed significant improvements in link quality due to the enhanced beamforming technique. These improvements are particularly notable in environments with high sea states, where communication challenges are typically more pronounced. The progress made in this area is not just a technical achievement; it has broad implications for the future of maritime communication technologies. This paper promises to revolutionize the way we approach communication in maritime environments, paving the way for more reliable and efficient information exchange on the seas.

Implementation and TCP Performance Measurement of RED scheduler using NetFPGA platform (NetFPGA 플랫폼 기반 RED스케줄러 구현 및 TCP 성능평가)

  • Oh, Min-Kyung;Min, Seok-Hong;Kim, Byung-Chul;Lee, Jae-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.3
    • /
    • pp.27-36
    • /
    • 2012
  • With the increase of various user's requirements, lots of interesting applications on the Internet have been emerging recently. However, Internet has many limitations for providing upcoming new services because it was only designed to provide basic connectivity between research networks and simplified forwarding functions at the first time. Internet has many problems in the aspects of routing scalability, mobility, security and QoS, so lots of researches are being actively performed in many countries to solve these problems. In this paper, we implement RED(Random Early Detection) scheduler using NetFPGA platform and local testbed to provide active queue management. Using the implemented RED scheduler, packets are dropped according to the specified drop probability, so Global Synchronization coming from simultaneous TCP segment losses in a congestion condition can be prevented. With the comparison to the Drop-Tail scheme in the basic router, we show TCP performance can be enhanced in the congestion situation using the NetFPGA-based RED scheduler.

A Study on Efficient Design of Surveillance RADAR Interface Control Unit in Naval Combat System

  • Dong-Kwan Kim;Dong-Han Jung;Won-Seok Jang;Young-San Kim;Hyo-Jo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.125-134
    • /
    • 2023
  • In this paper, we propose an efficient surveillance RADAR(RAdio Detection And Ranging) interface control unit(ICU) design in the naval combat system. The proposed design applied a standardized architecture for modules that can be shared in ship combat system software. An error detection function for each link was implemented to increase the recognition speed of disconnection. Messages that used to be sent periodically for human-computer interaction(HCI) are now only transmitted when there is a change in the datagram. This can reduce the processing load of the console. The proposed design supplements the radar with the waterfall scope and time-limited splash recognition in relation to the hit check and zeroing of the shot when the radar processing ability is low due to the adoption of a low-cost commercial radar in the ship. Therefore, it is easy for the operator to determine whether the shot is hit or not, the probability of wrong recognition can be reduced, and the radar's resources can be obtained more effectively.

Performance Evaluation of Low Rate Wireless Home Network Embedded DSSS System (저속 무선 홈 네트워크 임베디드 DSSS 시스템의 성능 평가)

  • Roh, Jae-Sung
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.103-108
    • /
    • 2006
  • Short-range wireless communication and networking technologies are becoming increasingly important in enabling useful mobile applications. for example, ZigBee technology is expected to provide low cost and low power connectivity for equipment that needs battery life as long as several months to several years. In addition, ZigBee can be implemented in mesh networks larger than is possible with Bluetooth. The main features of this ZigBee standard are network flexibility, low cost, very low power consumption, and low data rate in an adhoc self-organizing network among fixed, portable and moving devices. Home network/Home automation is one of the key market areas for Zigbee, with an example of a simple network This paper investigates the effect of short range wireless channel on the performance of Zigbee system and DSSS-BPSK signal transmission in AWGN, interference and Rician fading environments. And we investigate performance degradation due to interference and fading effects in short range wireless channel. In particular, the impacts of the fading and interference level on the bit error probability is shown in BER performance figures.

  • PDF

GA-based Two Phase Method for a Highly Reliable Network Design (높은 신뢰도의 네트워크 설계를 위한 GA 기반 두 단계 방법)

  • Jo, Jung-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1149-1160
    • /
    • 2005
  • Generally, the network topology design problem, which is difficult to solve with the classical method because it has exponentially increasing complexity with the augmented network size, is characterized as a kind of NP-hard combinatorial optimization problem. The problem of this research is to design the highly reliable network topology considering the connection cost and all-terminal network reliability, which can be defined as the probability that every pair of nodes can communicate with each other. In order to solve the highly reliable network topology design problem minimizing the construction cost subject to network reliability, we proposes an efficient two phase approach to design reliable network topology, i.e., the first phase employs, a genetic algorithm (GA) which uses $Pr\ddot{u}fer$ number for encoding method and backtracking Algorithm for network reliability calculation, to find the spanning tree; the second phase is a greedy method which searches the optimal network topology based on the spanning ree obtained in the first phase, with considering 2-connectivity. finally, we show some experiments to demonstrate the effectiveness and efficiency of our two phase approach.

A Modification for Fast Handover in Hierarchical Mobile IPv6 (계층적 Mobile IPv6에서 고속 핸드오버(Fast Handover) 개선에 관한 연구)

  • Hanh, Nguyen Van;Ro, Soong-Hwan;Hong, Ik-Pyo;Ryu, Jung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.509-516
    • /
    • 2008
  • The Fast Handover in Hierarchical Mobile IPv6(F-HMIPv6) scheme provides a seamless handover in mobile IP networks effectively. However, there is a problem that the mobile node can lose its connectivity to the previous access router because of a sudden degradation of the link quality during fast handover procedure. Additionally, in many cases, the mobile node does not have enough time to exchange messages during the fast handover procedure, especially in case of movement with high speed during handover. In this paper, we propose a modification to F-HMIPv6 that significantly reduces the time to exchange messages during fast handover procedure and thereby increases the probability which the F-HMIPv6 can perform the fast handover in predictive mode.