• Title/Summary/Keyword: Routing protocols

Search Result 608, Processing Time 0.03 seconds

Entropy-based Correlation Clustering for Wireless Sensor Networks in Multi-Correlated Regional Environments

  • Nga, Nguyen Thi Thanh;Khanh, Nguyen Kim;Hong, Son Ngo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.85-93
    • /
    • 2016
  • The existence of correlation characteristics brings significant potential advantages to the development of efficient routing protocols in wireless sensor networks. This research proposes a new simple method of clustering sensor nodes into correlation groups in multiple-correlation areas. At first, the evaluation of joint entropy for multiple-sensed data is considered. Based on the evaluation, the definition of correlation region, based on entropy theory, is proposed. Following that, a correlation clustering scheme with less computation is developed. The results are validated with a real data set.

A Study on Ad hoc Routing Protocols for RFID Warehouse Systems (RFID 물류창고 시스템을 위한 애드 혹 라우팅 프로토콜에 관한 연구)

  • Woo, Su-Chang;Lee, Shin-Hyoung;Yoo, Hyuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1191-1194
    • /
    • 2005
  • RFID 기술은 직접 접촉하거나 가시대역 상에 스캐닝을 할 필요가 없는 장점 때문에 다양한 분야에 활용되고 있으며, 특히 유통 물류분야에 부각을 나타내고 있다. 본 논문에서는 대표적인 애드 혹 라우팅 프로토콜인 DSR, AODV, CBRP, DSDV 의 특성을 간략히 살펴 본 후, RFID 를 기반으로 하는 물류창고 시스템의 특성을 반영하여, 앞서 언급한 라우팅 프로토콜들을 서로 비교하고, 장단점을 찾아본다.

  • PDF

Performance Analysis of Routing Protocols for Ad-Hoc Network (Ad-Hoc Network 환경을 위한 라우팅 프로토콜의 성능 비교)

  • So, Su-Hwan;Kim, Sung-Ho;Lee, Jae-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1389-1392
    • /
    • 2005
  • Ad-Hoc Network 기술은 차세대 네트워크로 부각되고 있으며 IETF (Internet Engineering Task Force) MANET (Mobile Ad-Hoc Network) 워킹그룹에서 표준화 작업이 이루어지고 있다. Ad-Hoc Network 에서 라우팅은 중요한 요소이다. 다양한 서비스를 제공하기 위해서는 잘 정의된 라우팅 기법이 필요하다. 본 논문에서는 기존에 연구되고 있는 Ad-Hoc 라우팅 프로토콜 중 (AODV, PAODV, TORA, DSR, DSDV) 프로토콜들을 NS 시뮬레이터를 이용하여 동작과 성능을 비교 분석하여, Ad-Hoc 라우팅 프로토콜 중 가장 적합한 라우팅 프로토콜을 제시한다.

  • PDF

Large-Scale Integrated Network System Simulation with DEVS-Suite

  • Zengin, Ahmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.452-474
    • /
    • 2010
  • Formidable growth of Internet technologies has revealed challenging issues about its scale and performance evaluation. Modeling and simulation play a central role in the evaluation of the behavior and performance of the large-scale network systems. Large numbers of nodes affect simulation performance, simulation execution time and scalability in a weighty manner. Most of the existing simulators have numerous problems such as size, lack of system theoretic approach and complexity of modeled network. In this work, a scalable discrete-event modeling approach is described for studying networks' scalability and performance traits. Key fundamental attributes of Internet and its protocols are incorporated into a set of simulation models developed using the Discrete Event System Specification (DEVS) approach. Large-scale network models are simulated and evaluated to show the benefits of the developed network models and approaches.

Efficient Cluster Radius and Transmission Ranges in Corona-based Wireless Sensor Networks

  • Lai, Wei Kuang;Fan, Chung-Shuo;Shieh, Chin-Shiuh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1237-1255
    • /
    • 2014
  • In wireless sensor networks (WSNs), hierarchical clustering is an efficient approach for lower energy consumption and extended network lifetime. In cluster-based multi-hop communications, a cluster head (CH) closer to the sink is loaded heavier than those CHs farther away from the sink. In order to balance the energy consumption among CHs, we development a novel cluster-based routing protocol for corona-structured wireless sensor networks. Based on the relaying traffic of each CH conveys, adequate radius for each corona can be determined through nearly balanced energy depletion analysis, which leads to balanced energy consumption among CHs. Simulation results demonstrate that our clustering approach effectively improves the network lifetime, residual energy and reduces the number of CH rotations in comparison with the MLCRA protocols.

Multiple Multicast Tree Allocation Algorithm in Multicast Network

  • Lee Chae Y.;Cho Hee K.
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.120-127
    • /
    • 2002
  • The multicasting is defined as the distribution of the same information stream from one to many nodes concurrently. There has been an intensive research effort to design protocols and construct multicast routing graphs for a single multicast group. However. there have been few researches about the relation between multiple and concurrent multicast groups. In this paper, the multiple multicast tree allocation algorithm to avoid congestion is proposed. The multicast group with different bandwidth requirement is also considered. A two-phase algorithm is proposed. The first phase is for basic search and the second phase for further improvement. The performance of the proposed algorithm is experimented with computational results. Computational results show that the proposed algorithm outperforms an existing algorithm.

  • PDF

Supporting Mobile IP in Ad Hoc Networks with Wireless Backbone (무선 백본 기반 Ad Hoc 네트워크에서의 Mobile IP지원)

  • 신재욱;김응배;김상하
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.223-226
    • /
    • 2003
  • In this paper, we propose new agent discovery and route discovery schemes to support Mobile IP (MIP) in Ad Hoc networks with wireless backbone. The wireless backbone consisting of stationary wireless routers and Internet gateways (IGs) is a kind of wireless access network of IP-based core network. The proposed scheme utilizes favorable features of wireless backbone such as stable links and no energy constraints. In the agent discovery scheme, backbone-limited periodic Agent Advertisement (AA) and proxy-AA messages are used, which reduce network-wide broadcasting overhead caused by AA and Agent Solicitation messages and decentralize MIP processing overhead in IGs. In order to reduce delay time and control message overhead during route discovery far the destination outside Ad Hoc network, we propose a cache-based scheme which can be easily added to the conventional on-demand routing protocols. The proposed schemes can reduce control overhead during agent discovery and route discovery, and efficiently support MIP in Ad Hoc network with wireless backbone.

  • PDF

Analysis of Internet Multicast Routing protocols (인터넷 멀티캐스트 라우팅 프로토콜 분석)

  • Koh, S.J.;Park, J.S.;Kim, G.S.;Kim, Y.J.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.5 s.59
    • /
    • pp.99-110
    • /
    • 1999
  • 본 논문은 지금까지 제안되어 온 인터넷 멀티캐스트 라우팅 프로토콜에 대하여 살펴본다. 지금까지 제안되어 온 방식들은 크게 SBT(Source Based Tree) 및 CBT(Center Based Tree) 방식으로 분류할 수 있다. SBT 방식은 하나의 송신자에서 각 수신자에 이르는 최단 경로 트리를 구하여, 데이터 전송지연 시간 측면에서 효율적인 반면에, 불필요한 제어 메시지의 수가 많이 발생하여 확장성(scalability) 문제를 갖는다. 반면에 CBT 방식은 여러 송신자가 멀티캐스트 트리를 공유하는 공유형(shared) 트리 구성 방식이며, 송신자와 수신자 모두 센터(center) 노드에 이르는 최단 경로를 통해 데이터를 주고 받는다. 이 방식은 SBT 방식에 비해 확장성 측면에서 효율적인 반면에 전송지연 시간이 길다. 향후의 관련 연구에서는 확장성과 전송지연 및 네트워크 자원의 효율적인 이용을 고려한 멀티캐스트 라우팅 기법이 개발되어야 할 것이다.

Provably Secure Aggregate Signcryption Scheme

  • Ren, Xun-Yi;Qi, Zheng-Hua;Geng, Yang
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.421-428
    • /
    • 2012
  • An aggregate signature scheme is a digital signature scheme that allows aggregation of n distinct signatures by n distinct users on n distinct messages. In this paper, we present an aggregate signcryption scheme (ASC) that is useful for reducing the size of certification chains (by aggregating all signatures in the chain) and for reducing message size in secure routing protocols. The new ASC scheme combines identity-based encryption and the aggregation of signatures in a practical way that can simultaneously satisfy the security requirements for confidentiality and authentication. We formally prove the security of the new scheme in a random oracle model with respect to security properties IND-CCA2, AUTH-CMA2, and EUF-CMA.

Topology Graph Generation Based on Link Lifetime in OLSR (링크 유효시간에 따른 OLSR 토폴로지 그래프 생성 방법)

  • Kim, Beom-Su;Roh, BongSoo;Kim, Ki-Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.4
    • /
    • pp.219-226
    • /
    • 2019
  • One of the most widely studied protocols for tactical ad-hoc networks is Optimized Link State Routing Protocol (OLSR). As for OLSR research, most research work focus on reducing control traffic overhead and choosing relay point. In addition, because OLSR is mostly dependent on link detection and propagation, dynamic Hello timer become research challenges. However, different timer interval causes imbalance of link validity time by affecting link lifetime. To solve this problem, we propose a weighted topology graph model for constructing a robust network topology based on the link validity time. In order to calculate the link validity time, we use control message timer, which is set for each node. The simulation results show that the proposed mechanism is able to achieve high end-to-end reliability and low end-to-end delay in small networks.