• Title/Summary/Keyword: agent node

Search Result 223, Processing Time 0.027 seconds

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Design and Implementation of Mobile Agent Model Supporting the Optimal Path Search through Traffic Sense (트래픽 감지를 통한 최적 경로 탐색 이동 에이전트 모델 설계 및 구현)

  • Kim Kwang-jong;Ko Hyun;Kim Youngja;Lee Yon-sik
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1421-1435
    • /
    • 2004
  • When various work was given from user, the existing mobile agent model migrated from node to node and process the work at the point that much traffics according to passive routing schedule are happened, until it makes service the work result, time cost of round work process for the distributed nodes are increased. Therefore, the existing agent systems need migration method to solve the problems of agent size increment or a lack of interoperability among agent systems. To solve these problems in this thesis, we design and implement an CORBA-based Mobile Agent Model(CMAM) for the efficient work process into the distributed nodes, when the mobile agents are migrated among the nodes, using an optimal path search by sensing of network traffic.

  • PDF

Optimal Path Searching for Efficient Migration of Mobile Agent (이동 에이전트의 효율적 이주를 위한 최적 경로 탐색)

  • Kim, Kwang-Jong;Ko, Hyun;Kim, Young-Ja;Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.117-124
    • /
    • 2006
  • In this paper, we propose the optimal migration path searching method including path adjustment and reassignment techniques for an efficient migration of mobile agent which has an autonomous ability for some task processing. In traditional agent system, if the various and large quantify of task processing were required from the users, it could be derive excessive network traffic and overload due to increasing the size of agent. And also, if an agent migrates from node to node according to routing schedules specified by the user at which the most of network traffic occurs, it could not actively cope with particular situations such as communication loss and node obstacles and required much cost for node traversal Therefore. this paper presents the migration method of agent which can try to adjust and reassign path to the destination automatically through the optimal path search using by network traffic perception in stead of the passive routing schedule by the user. An optimal migration path searching and adjustment methods ensure the migration reliability on distributed nodes and reduce the traversal task processing time of mobile agent by avoiding network traffic paths and node obstacles.

  • PDF

An Efficient Route Optimization Algorithm using Intermediate Agents in Mobile IP Networks (중간 에이전트를 이용한 Mobile IP 망에서의 효율적인 경로 최적화 알고리즘)

  • 박은영;이재훈;최병구
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.677-684
    • /
    • 2003
  • IETF's Mobile IP protocol allows Mobile Node(MN) to keep connection to Correspondent Node(CN) no matter what the MN changes its point of attachment to the Internet. However, the protocol incurs triangle routing problem, because all packets for the MN are routed through its Home Agent(HA). Route optimization mechanism is proposed by IETF in order to resolve triangle routing problem, but it requires that any node in the Internet should also implement route optimization mechanism. In this paper, we propose a new route optimization algorithm. With the algorithm, routers between HA and CN are considered as Intermediate Agent(IA), and packets transmitted by CN are not forwarded to HA but intercepted by IA and tunneled to MN directly.

FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6Network

  • Baek, Jin-Suk;Fisher, Paul S.;Kwak, Ming-Yung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.1
    • /
    • pp.5-21
    • /
    • 2008
  • In order to securely transmit multicast data packets in a mobile environment where frequent join/leave events are a characteristic of the environment, there is a need for a new secure and efficient group key management solution. We propose a secure group key generation/distribution solution providing scalability and reliability. Using this solution, when a mobile node, which is in a multicast session, enters a new domain, the agent of the domain joins the multicast session and coordinates its data packets with the mobile node. The agent encrypts and transmits subsequent data packets to the mobile node, using a local one-time pad key. This key is generated with FI sequences, enabling the mobile node to regenerate the same data packet, based on the information sent by the agent. Our performance analysis demonstrates that the proposed solution can significantly reduce the number of key generations and distributions, when it is applied to the hierarchical mobile IPv6 network.

Design and Implementation of Mobile IP Protocol using DHCP (DHCP를 사용한 Mobile IP 프로토콜의 설계 및 구현)

  • Kwon Young-Mi;Lee Geuk
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.187-196
    • /
    • 2002
  • When mobile node moves into the different IP address area, the mobile node can be set the proper environment parameters automatically by DHCP. If we extend the DHCP option field to support the roles of home agent and foreign agent in mobile IP protocol, mobile node can perform the foreign address registration process of mobile IP protocol when DHCP IP environment is achieved automatically, too. DHCP is supplied in the PC with a series of Windows NT. This paper proposes and implements the functional blocks of extended DHCP nodes and this enables the DHCP node have a role of mobile IP agents without another protocol functional blocks.

  • PDF

A Mobile IP Handover Scheme Based on Routing Costs (라우팅 비용을 고려한 Mobile IP 핸드오버 방안)

  • Park, Hee-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.178-185
    • /
    • 2008
  • This paper proposes a new handover scheme to minimize handover delay and signaling costs, using the fact that a new packet forwarding path could be same or similar to the old one in Mobile IPv4. In the proposed scheme a foreign agent estimates the correlation between the new and old routing paths by using routing costs after receiving a registration request message from a mobile node. If the new packet forwarding path could be same or similar to the old one, the mobile node can receive packets from its old foreign agent without registering its new location with its home agent or correspondent node. The performance analysis shows that the proposed scheme can efficiently reduce handover delay and signaling costs.

  • PDF

Service Connectivity-Interworking by Signaling Brokerage Agent (신호 대행자 기능에 의한 서비스 연결성 연동)

  • 장종수
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.207-210
    • /
    • 1998
  • Providing the connectivity interworking between the lightweight signaling function using in VOD set-top box and the broadband signaling function In the access node system, it can diminish the cost-burden of user about set-top box and we shall use efficiently the network resources. Therefore, In this paper, we shall design the signaling brokerage agent function for the connectivityinterworking in access node system and discuss the result applied its function to the real-time VOD service.

  • PDF

A Reliable Mobile IP Handoff Mechanism using Cache Agent (캐쉬 에이전트를 이용한 신뢰성 있는 Mobile IP 핸드오프 기법)

  • 김래영;송주석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.166-168
    • /
    • 2002
  • 본 논문에서는 Mobile IP에서 핸드오프 중에 발생하는 패킷손실을 제거하기 위한 신뢰성 있는 핸드오프 기법을 제안하였다. 기존에 제시된 핸드오프 기법은 핸드오프 중에 발생하는 패킷손실을 줄여주지만 여러가지 문제점을 가지고 있었다. 본 논문에서는 캐쉬 에이전트(Cache Agent)가 대응 노드(Correspondent Node)를 대신하여 바인딩 캐쉬를 관리하며 대응 노드가 이동 노드(Mobile Node)에게 전송한 패킷을 버퍼링함으로써 핸드오프 중에 발생하는 패킷손실을 제거한다.

  • PDF

Design and Verification of Seamless Handoff Protocol over Mobile IPv4 (Mobile IPv4에서의 Seamless 핸드오프 프로토콜 설계 및 검증)

  • 박병준;송병권;정태의
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.58-60
    • /
    • 2003
  • Mobile IP는 현재의 인터넷에서 노드가 링크를 변화시킬 때 통신이 지속 될 수 있도록 이동성(Mobility)을 제공하기 위한 방안이다. Mobile IP는 MN(Mobile Node)이 HA(Home Agent) 와 FA(Foreign Agent)사이에서 링크를 변화시킬 때 CN(Correspondent Node)과 지속적인 통신을 할 수 있도록 한다. 그러나 FA에서 FA로 MN이 노드의 위치를 바꿀 때에는 핸드오프(Handoff)가 발생하여 패킷이 손실 될 수도 있다. 본 논문은 MN이 FA에서 다른 FA로 이동할 때 발생하는 패킷 손실과 순서변경에 대한 경우를 살펴 이를 해결하기 위한 Seamless 핸드오프 프로토콜을 기술하고 이를 검증한다.

  • PDF