• Title/Summary/Keyword: Wireless Ad Hoc Network

Search Result 709, Processing Time 0.026 seconds

Remote Vital Signal Monitoring System Based on Wireless Sensor Network Using Ad-Hoc Routing

  • Walia Gaurav;Lee Young-Dong;Chung Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.67-70
    • /
    • 2006
  • A distributed healthcare monitoring system prototype for clinical and trauma patients was developed, using wireless sensor network node. The proposed system aimed to measure various vital physiological health parameters like ECG and body temperature of patients and elderly persons, and transfer his/her health status wirelessly in Ad-hoc network to remote base station which was connected to doctor's PDA/PC or to a hospital's main Server using wireless sensor node. The system also aims to save the cost of healthcare facility for patients and the operating power of the system because sensor network is deployed widely and the distance from sensor to base station was shorter than in general centralized system. The wireless data communication will follow IEEE 802.15.4 frequency communication with ad-hoc routing thus enabling every motes attached to patients, to form a wireless data network to send data to base-station, providing mobility and convenience to the users in home environment.

Providing Guaranteed Delay in Multimedia Ad Hoc Wireless Networks (멀티미디어 Ad Hoc 무선망에서의 지연시간 보장방안)

  • Yang, Hyun-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1177-1186
    • /
    • 2003
  • The multimedia ad hoc wireless network is quite an attractive issue since it offers a flexible solution to enable delivery of multimedia services to mobile end users without fixed backbone networks. However, with the unique design challenges of ad hoc wireless networks, it is a non-trivial issue to provide bounded delay guarantee, with fair share of resources. In this paper, we implemented the delay guaranteed fair queueing (DGFQ) scheme distributively. Through the results of performance evaluation, we can conclude that DGFQ also performs well to control bounded delay in multimedia ad hoc wireless networks.

Cluster-head Decision Method for Cognitive Radio Based on Wireless Ad-hoc Network (인지 무선 기반 애드 혹 네트워크에서의 클러스터 헤드 선정기법)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.91-96
    • /
    • 2012
  • Ad-hoc networks can be used various environment, which it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In CR based wireless ad-hoc networks, cluster-head decides the existence of primary user using sensing information of primary user from each ad-hoc device. However, it is still defective research to decide cluster head among the a lot of ad-hoc devices. So, in this paper, we show the decision method of cluster head in CR based wireless and detection probabilities of primary user based on decision method of cluster head.

An Efficient Key Management Scheme in Tactical Ad-Hoc Network (전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법)

  • Kim, Eun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

Mutual Authentication between the mobile node in Ad-hoc Network (Ad-hoc 망에서 이동 노드 간 상호 인증)

  • Choi, Woo-Jin;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1087-1092
    • /
    • 2015
  • It was diversified demand for a wireless network to the rapid growth of the Internet, the time and space that are not in the new level of Internet technology, limits the Ad-hoc networks are needed. Ad-hoc networks do not communicate with the central station, each of the mobile nodes included in the network communicate with each other by the relay role. In recent years, the Ad-hoc wireless networks in a variety of routing protocols and network security, research is actively underway for the authentication method, but the security of wireless Internet and Ad-hoc networks, certification is incomplete situation. This paper considers the authentication and key agreement technique applicability of the USIM card using the DSR routing protocol of the Java Card and Ad-hoc networks, we propose a secure authentication mechanism between the mobile node.

Performance Evaluation of On-Demand Routing Protocol using Look-ahead Selective Flooding in Ad-hoc Network (Ad-hoc 네트워크에서 Look-ahead Selective Flooding을 이용한 On-Demand 라우팅 프로토콜 성능 개선)

  • Yo-chan Ahn
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.2
    • /
    • pp.61-71
    • /
    • 2003
  • Ad-hoc networks are characterized by multi-hop wireless links, frequently changing network topology and the need for efficient dynamic routing protocols. In an Ad-hoc network, each host assumes the role of a router and relays packets toward final destinations Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network routing is different from that of wired network routing. tn this paper 1 point out the more important cost factor than the number of links in the Ad-hoc network. A class routing protocols called on-demand protocols has recently found attention because of their low routing overhead since it performs a blind flooding to look for a path. In this paper, 1 propose the method which reduces overhead by using the information of neighboring nodes and doing a selective flooding. Simulation results demonstrate better reduction of routing overheads with this scheme.

  • PDF

An Dynamic Congestion Window Tuning Algorithm for TCP Performance Improvement in Wireless Ad-hoc Network (무선 Ad-hoc 네트워크에서 TCP 성능 향상을 위한 동적 혼잡윈도우 조정 알고리즘)

  • Kim, Kwan-Woong;Bae, Sung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1384-1390
    • /
    • 2008
  • The TCP protocol is originally designed for wired network, however it performs very poor in wireless network due to different nature of wireless network from wired networks. In terms of TCP performance improvement in wireless Ad-hoc network, many researches show that small congestion window size of TCP connection can improve TCP performance. We propose a new TCP algorithm to improve TCP performance in wireless Ad-hoc network. The basic idea of our approach is that TCP receiver estimates the optimum window size and then sets congestion window limit of TCP sender to an optimum value by using the advertised window field in TCP ACK packet. From extensive computer simulation, the proposed algorithm shows superior performance than traditional TCP protocols in terms of packet delivery ratio and packet loss.

Study of the Wireless Ad-hoc Networks with Robust Route Maintenance Scheme

  • Hong, Geun-Bin;Yun, Ji-Hun;Kim, Kwan-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.46-49
    • /
    • 2010
  • This paper has proposedfor wireless Ad-hoc networks with robust route maintenance schemes. The device feature Bluetooth and/or IEEE 802.11 network interfaces and communicate in a decentralized manner. The nodes have the responsibility of self-organizing so that the network is robust to the variations in network topology due to node mobility as well as the fluctuations of the signal quality in the wireless environment.

  • PDF

A Secure Intrusion Detection System for Mobile Ad Hoc Network (모바일 Ad Hoc 네트워크를 위한 안전한 침입 탐지 시스템)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo;Lee, Seong-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.87-94
    • /
    • 2009
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies are dynamic, lack centralization and are vulnerable to attacks. Detection of malicious nodes in an open ad-hoc network in which participating nodes do not have previous security association has to face number of challenges which is described in this paper. This paper is about determining the malicious nodes under critical conditions in the mobile ad-hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

Energy-Aware Routing Protocol for Mobile Ad Hoc Network (노드의 여유 에너지 기반 이동 Ad Hoc 네트워크의 라우팅 프로토콜)

  • Kwon, Soo-Kun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1108-1118
    • /
    • 2005
  • A mobile Ad Hoc network is a dynamic mobile wireless network that can be formed without the need for any pre-existing wired or wireless infrastructure. A mobile ad hoc node has limited battery capacity. Hence, Ad Hoc routing protocol ought to be energy conservative. Previous energy aware routing has limit in fairness among nodes and network wide power consumption. In this research, we propose a new routing protocol called Clustering Based Energy-Aware Routing(CBEAR) which can improve the problems. Simulation results show that the routing protocol improves fairness and network wide power consumption as well as life time of nodes.

  • PDF