• Title/Summary/Keyword: message forwarding

Search Result 78, Processing Time 0.024 seconds

Digital Signature Model of Sensor Network Using Hash Chain (해쉬체인을 이용한 센서네트워크의 디지털서명 모델)

  • Kim, Young-Soo;Cho, Seon-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2459-2464
    • /
    • 2009
  • In sensor network there are no nodes or servers that are exclusively responsible for packet forwarding and routing. Instead, sensor nodes participating in network communications perform these activities. Thus, they are vulnerable to the alteration and forgery of message in the process of packet forwarding and routing. To solve this problem, a security to ensure authentication and integrity of routing and forwarding messages should be required. To do this, we propose the hash chain-based digital signature model where it takes less time to compute in generating and verifying the digital signature model, unlike he public key-based digital signature model, and verify if this model is proper by comparing computation times between tow models.

Performance Improvements of Handover in Mobile-IP Protocol for Mobile Computing (이동 컴퓨팅을 위한 Mobile-IP 프로토콜에서의 핸드오버 성능개선)

  • 박성수;송영재;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.832-844
    • /
    • 1999
  • In this paper, we analyzed mobile-IP protocol of IETF, and propose new method to improve performance in handover environments. In proposed method, cache agent manages mobility binding information for mobile host. Thus, effective support of mobility is possible. Also, when handover occurs, mobile host recognizes change of foreign agent, and transmits registration message to new foreign agent. However, during registration time, data packet loss is occurs in old foreign agent. Thus, we prevent data loss by using data packet buffering and forwarding in old foreign agent.According to simulation results for data packet transmission performance in the case of handover occurring, proposed method has better performance than previous method in the view of transmission delay and throughput. Especially, if handover occurs very often, data buffering and forwarding method in foreign agent could guarantee better performance.

  • PDF

Stable Load Control in Multipath Packet Forwarding (다중경로 패킷 전달환경에서의 안정적인 부하제어 기법)

  • Park, Il-Kyu;Kim, Jong-Sung;Lee, Youn-Seok;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.174-180
    • /
    • 2002
  • With the invention of MPLS and the Improvement in traffic engineering, multipath packet forwarding and dynamic load control has become a reality. A dynamic load control, while it can improve network efficiency by controlling loads between paths according to the network state, can lead to unstable and oscillating state because of the staleness of the state information. In this paper, we propose a efficient load control scheme which remains stable. The proposed scheme introduces prediction to reduce the staleness of state message and to prevent oscillation.

A Traffic Hazard Prediction Algorithm for Vehicle Safety Communications on a highway (고속도로에서 차량 안전 통신을 위한 교통사고 위험 예측 알고리즘)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.319-324
    • /
    • 2012
  • Vehicle safety communications is one among the important technologies in order to protect a car accident. For this, many protocols forwarding a safe message have studied to protect a chain-reaction collision when a car accident occurs. most of these protocols assume that the time of generating a safe message is the same as an accident's. If a node predicts some traffic hazard and forwards a safe message, a driver can response some action quickly. So, In this paper, we proposes a traffic hazard prediction algorithm using the communication technique. As a result, we show that the frame reception success rate of using our algorithm to the previous protocol improved about 4~5%.

Self-Adaptive Location Checking Mechanism in Mobile Ad-hoc Networks (모바일 애드혹 네트워크에서 자가 적응형 위치 검증 기법)

  • Youn, Joo-Sang;Kim, Young-Hyun;Pack, Sang-Heon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.281-290
    • /
    • 2010
  • In geographic forwarding algorithms, traditional route maintenance requires mobile nodes periodically exchange beacon messages with their neighbors. In beacon message based forwarding scheme, a longer interval reduces the number of beacons needed, but may result in significant location errors. Conversely, a shorter interval guarantees more accurate location information, but induces control overheads.Therefore, the fixed or dynamic interval scheme based forwarding schemes cannot adapt well to different mobility environments. Also, existing schemes result in the uncertainty of neighbor node's position in the forwarding table of mobile node. Therefore, this paper presents a self-adaptive location checking mechanism based proactive geo-routing algorithm for beacon-based geographic routing. Simulation results show that the proposed routing algorithm not only significantly increases the relay transmission rate but also guarantees the high end-to-end packet delivery in low and high mobility environments.

Design and Implementation of a Request and Response Process on Help-Requesting Mobile Application (모바일 도움요청 어플리케이션에서의 요청 및 상호 대응 프로세스 설계)

  • An, Sung-Eun;Lim, Soon-Bum;Kim, Min-Jeong;You, Soo-Yeon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.320-326
    • /
    • 2015
  • With the growing concern over frequent occurrences of criminal events, help-requesting mobile applications have drawn attention. However, existing applications solely focus on providing help-requesting services. Therefore, in this paper, we design and implement a help request and response process which allows users to request help by sending messages and locating their friends, acquaintances and even near-by application users, and to allow help be reached by forwarding messages. This application is composed of three parts: help-requesting, help-responding, and checking-status. This application is developed on the Android platform where we exchange users' longitude and latitude through web server communication. We conducted test to verify the effectiveness of the forwarding function, and it has been confirmed that 93.33% of subjects used the forwarding function to help users at risk.

The directional partial dominant pruning algorithm for efficient message forwarding in an wireless ad-hoc network (무선 애드 혹 네트워크에서 효과적인 메시지 전달을 위한 Directional Partial Dominant Pruning 알고리즘)

  • Han, In-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.16-22
    • /
    • 2009
  • The most efficient method to reduce duplicated messages is a partial dominant pruning for receiving and forwarding messages by in-fly format on the mobile ad hoc network. In this paper, we propose directional partial dominant pruning method by expanding partial dominant pruning for reducing not only number of forwarding nodes but number of antenna elements on the ad hoc network with directional antennas. by simulation, we prove superiority that average number of forwarding nodes for each antenna element and the ratio of duplicated messages for each nodes rather than existing partial dominant pruning method though the number of antenna elements are increasing rather than in case of using omni antennas.

Hierarchical Message Forwarding Scheme for Efficient Data Distribution in P2P Messaging System (P2P 출판-구독 메시징 시스템에서 효율적인 정보 전파를 위한 계층적 메시지 전송 기법)

  • Jung, Jin Sun;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.209-216
    • /
    • 2019
  • Publish-subscribe communication model is popular for various type of distributed applications because of its loosely coupled style connections. Among the various architecture style for publish-subscribe system, peer-to-peer architecture has been used for the mission critical application domain since it provides high scalability and real-timeness. On the other hand, to utilize the bandwidth of given networks, message filtering is frequently used to reduce the number of messages on the system. Even if P2P provides superior scalability, it is hard to apply filtering to the its messaging system because the filtering process should be done on the peer-side in P2P architecture that are usually done on the broker server in conventional pub/sub architecture. In this paper, we propose a hierarchical subscription management structure as well as message forwarding scheme for efficient data dissemination. Our proposed scheme reduces the number of received messages by filter-out un-wanted messages and offloading the message dissemination work to other subscribers to enhance the messaging throughput.

An Inter-Vehicle Emergency Message Propagation Method with Vehicle Equivalent Group (차량동위그룹을 이용한 차량 간 긴급 메시지 전파 방법)

  • Yu, Suk-Dea;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.340-347
    • /
    • 2007
  • Vehicle safety service can be effectively achieved with inter-vehicle communication technologies, in which moving vehicles transmit a safety related urgency information such as traffic accidents, sudden stops, obstacle appearance etc. They usually utilize a broadcast of message propagation method because the communicating vehicles are not known each other. The pure broadcasting scheme does not satisfy the requirements of vehicle safety communication service due to the transmission delay with frequent message collisions. To resolve this problem, this paper presents a group based propagation method for the multi-hop transmission, in order to deliver an urgency message to the reasonable size of vehicle troop. A group header is elected in considering of the position information of vehicles and radio transmission range. And a vehicle equivalent group is formed with the header. With benefits of the group based transmission, it is possible to minimize the unnecessary transmission and the possibility of message collisions. Simulation results show that the message propagation performance is so stable regardless of vehicle's congestion degree.

Message Delivery Techniques using Group Intimacy Information among Nodes in Opportunistic Networks (기회주의적 네트워크에서 노드의 그룹 친밀성 정보를 이용한 메시지 전달 기법)

  • Kim, Seohyang;Oh, Hayoung;Kim, Chongkwon
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.929-938
    • /
    • 2015
  • In opportunistic networks, each message is delivered to the destination by repeating, storing, carrying, and forwarding the message. Recently, with the vitalization of social networks, a large number of existing articles have shown performance improvement when delivering the message and considering its social relational networks. However, these works only deliver messages when they find nodes, assuming that every node cooperates with each other unconditionally. Moreover, they only consider the number of short-term contacts and local social relations, but have not considered each node's average relation with the destination node. In this paper, we propose novel message sending techniques for opportunistic networks using nodes' social network characteristics. In this scheme, each message is delivered to the destination node with fewer copies by delivering it mostly through nodes that have high intimacy with the destination node. We are showing that our proposed scheme presents a 20% performance increase compared to existing schemes.