• Title/Summary/Keyword: Protocols

Search Result 4,011, Processing Time 0.032 seconds

A Study on Improving Performance of the Network Transport by Interworking Different Protocols (다종 프로토콜 네트워크에서의 연동성 제공을 통한 전달 성능 향상에 관한 연구)

  • Lee, Kyou-Ho;Song, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.60-66
    • /
    • 2009
  • A service network in the future ubiquitous environment can consist of a variety of elements, which include different protocols of the network transport. Interwoking different transport protocols can alleviate such problems occurred in accessing network as poverty of facilities, faults, and contention in a path of particular protocol communication. This paper schemes to improve performance of the network constituted of different protocols for the network transport. Interposing an interwork element, like SDR (Software Defined Radio), in the network can raise availability of transport paths, and then improve transport performance of the overall network Simulation analysis justifies such a scheme and this paper presents simulation results.

Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks

  • Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.610-614
    • /
    • 2011
  • Nowadays Mobile Ad Hoc Networks (MANETs) are a very popular and emerging technology in the world. MANETs helps mobile nodes to communicate with each other anywhere without using infrastructure. For this purpose we need good routing protocols to establish the network between nodes because mobile nodes can change their topology very fast. Mobile node movements are very important features of the routing protocol. They can have a direct effect on the network performance. In this paper, we are going to discuss random walk and random waypoint mobility models and their effects on routing parameters. Previously, mobility models were used to evaluate network performance under the different routing protocols. Therefore, the network performance will be strongly modeled by the nature of the mobility pattern. The routing protocols must rearrange the changes of accurate routes within the order. Thus, the overheads of traffic routing updates are significantly high. For specific network protocols or applications, these mobility patterns have different impacts.

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

Review of Clinical Acupuncture Research Protocols on Cancer in the USA (미국의 암 관련 침 임상 연구 프로토콜 분석)

  • Dobs, Adrian S;Lee, Sang-Hoon
    • The Journal of Korean Medicine
    • /
    • v.28 no.3 s.71
    • /
    • pp.116-125
    • /
    • 2007
  • Objective : To overview the protocols of clinical acupuncture research on cancer in the USA. Methods : Using 'acupuncture' and 'cancer' as keyword search terms in Clinical Trials. gov, 28 clinical studies were found. Three studies by non-American institutions were excluded and 25 studies were analyzed. Analytic parameters were cancer condition, primary outcome, research institution, study design, and acupuncture intervention. Results : Breast cancer was the most frequent single condition in the searched protocols. Pain and quality of life were the primary outcomes in many studies. Memorial Sloan-Kettering Cancer Centerin New York has performed the largest number of acupuncture cancer studies. The majority of studies were randomized controlled trials with active controls or placebo/sham controls. Total enrollment varied between the range of 10 and 700 subjects and ages of these subjects were at least above 18 years old (except one protocol). Most protocols had strict exclusion criteria for acupuncture needling such as bleeding disorders, infection, heart disorder, and central nervous system disorder. Conclusions : Clinical acupuncture studies for cancer patients have focused on pain, quality of life, and side effects induced by anti-cancer therapies. Re-evaluation and cautions for strict exclusion criteria in foreign countries are required to perform multi-national acupuncture trials.

  • PDF

Simulation for sensor network packet routing protocols based on distributed-event (분산이벤트 기반 센서네트워크 패킷 라우팅 프로토콜 시뮬레이션)

  • Chung, Kyung-Yul;Lim, Byung-Ju;Lee, Hoo-Rock;Rhyu, Keel-Soo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.418-424
    • /
    • 2013
  • Both simulation and physical implementation are valuable tasks in sensor network routing protocols. In this paper, we propose an efficient underground utilities monitoring method within several constraints using wireless sensor network. First, in order to physically implement protocol of network which is applied, the distributed event-based simulation, which applies an existing nesC codes of sensor network routing protocols, is implemented and analyzed. Also, we have performed the simulation and analyzed the execution results for application model of routing protocols for monitoring underground utilities in the VIPTOS(Visual Ptolemy and TinyOS) environments which combine TOSSIM and Ptolemy II based on distributed event.

Implementation of OSI Application Protocols in Library Networks (도서관 네트워크에서의 OSI프로토콜 응용에 관한 연구)

  • 정영미
    • Journal of the Korean Society for information Management
    • /
    • v.14 no.1
    • /
    • pp.47-76
    • /
    • 1997
  • This study explores the importance of OSI standards in library environment and specifically of Z39.50/SR information retrival protocols and ILL protocol. Libraries and other information systems need to implement these ap lication protocols in order to facilitate the sharing of library information resources through information networks. The foreign systems which have implemented the standard protocols are reviewed in this paper, and it is suggested that search results of OPACs and other bibliographic databases be directly used for electronic document request for fast document delivery, first by implementing Z39.50 OPACs and standard interlibrary loan systems and next by integrating the two systems in Korean electronic libraries.

  • PDF

Efficient Key Agreement Protocols using Proxy Server (Proxy 서버를 이용하는 효율적인 키 분배 프로토콜)

  • Yang Hyung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.29-36
    • /
    • 2005
  • A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is in rapid progress. Several efficient and secure key agreement protocols have been proposed so far since Diffie-Hellman proposed a public key agreement system in 1976. But, since Diffie-Hellman based key agreement protocols need a lot of computation to establish the session key, they are not suitable for wireless Internet environment. In this paper, we propose the efficient key agreement protocol using Proxy server. The Proposed Protocol gives the security equivalent to that the Diffie-Hellman based Protocol and the computation work of mobile user can be decreased using proxy server.

Analysis of Energy Consumption and Sleeping Protocols in PHY-MAC for UWB Networks

  • Khan, M.A.;Parvez, A.Al;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1028-1036
    • /
    • 2006
  • Energy conservation is an important issue in wireless networks, especially for self-organized, low power, low data-rate impulse-radio ultra-wideband (IR-UWB) networks, where every node is a battery-driven device. To conserve energy, it is necessary to turn node into sleep state when no data exist. This paper addresses the energy consumption analysis of Direct-Sequence (DS) versus Time-Hopping (TH) multiple accesses and two kinds of sleeping protocols (slotted and unslotted) in PHY-MAC for Un networks. We introduce an analytical model for energy consumption or a node in both TH and DS multiple accesses and evaluate the energy consumption comparison between them and also the performance of the proposed sleeping protocols. Simulation results show that the energy consumption per packet of DS case is less than TH case and for slotted sleeping is less than that of unslotted one for bursty load case, but with respect to the load access delay unslotted one consumes less energy, that maximize node lifetime.

EL-SEP: Improved L-SEP by adding Single-hop layer

  • LEE, WooSuk;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.50-56
    • /
    • 2017
  • Wireless sensor nodes have limited energy, so it is important to optimize energy consumption to preserve network lifetime. Various protocols have been proposed for this purpose. LEACH protocol and SEP are the representative protocols. These protocols become less effective as the Sensor Field becomes wider. To improve this, MR-SEP and L-SEP were proposed. These protocols increase the energy efficiency by dividing the Sensor Field into layers and reducing the transmission distance. However, when dividing a layer, there are cases where it is divided inefficiently, and a node within a certain range from a Base Station has a better transmission efficiency than a direct transmission method using a cluster method. In this paper, we propose a Single-hop layer for L-SEP to improve inefficient layer division and near node transmission efficiency. When the larger the Sensor Field, the better the performance of the proposed method by up to 87%. The larger the sensor field, the more efficient the proposed method is over the conventional method. That is, the proposed method is suitable for the wide Sensor Field.

An Improved One Round Authenticated Group Key Agreement (개선된 원 라운드 인증 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.3-10
    • /
    • 2013
  • Several identity-based and authenticated key agreement protocols have been proposed. It remains at issue to design secure identity based and authenticated key agreement protocols. In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system. The proposed protocol modified Shi et al.'s protocol and He et al.'s protocol. The public and private keys and the signature process of our protocol are simpler than them of their protocols. Our protocol is secure and more efficient than their protocols in communication and computation costs.