• Title/Summary/Keyword: mobile ad hoc network

Search Result 807, Processing Time 0.027 seconds

Load Balancing Method in Mobile Ad-Hoc Network (Mobile Ad Hoc 네트워크에서 로드분산기법)

  • Song, Chan-Ho;Yoo, Hyuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1441-1444
    • /
    • 2005
  • AODV와 같은 요구 기반 라우팅 방식은 트래픽이 발생되는 시점에서 경로를 탐색하는 방법으로서 최적 메시지 전송 경로가 유효하다면 트래픽의 증가와 과도한 에너지 소비를 고려하지 않고 계속적인 동일 전송 경로의 사용으로 인해 특정 노드에 대하여 에너지 소모가 심화될 뿐만 아니라 전송지연이 발생된다. 본 논문에서는 과중한 트래픽 상태를 분산 시켜 전체 네트워크의 균형적인 에너지 소비를 위하여 AODV 프로토콜에 로드 분산 기법의 적용을 제안한다.

  • PDF

Name-Based Autoconfiguration for Mobile Ad hoc Networks

  • Kim, Nam-Hoon;Kang, Sae-Hoon;Lee, Young-Hee;Lee, Ben
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.243-246
    • /
    • 2006
  • In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name-based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol.

  • PDF

An Entropy-based Stability Algorithm for Regulating the Movement of MANET Nodes

  • Kim, Sang-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.999-1012
    • /
    • 2011
  • This paper proposes an algorithm that enables mobile nodes to implement self-regulated movements in mobile ad-hoc networks (MANETs). It is important for mobile nodes to maintain a certain level of network-based stability by harmonizing these nodes' movements autonomously due to their limited transmission range and dynamic topology. Entropy methods based on relative position are suggested, as a means for mobile nodes to regulate their local movements. Simulations show that an early warning mechanism is suitable to maintain movement-based stability. Isolation can be reduced by 99%, with an increased network cost of 12% higher power consumption, using the proposed algorithm.

On the Study of Key Management in Mobile Ad Hoc Networks (이동 임시무선망에서의 키 관리 기법에 관한 연구)

  • Kim Si-Gwan;Shin Yoon-Shik;Lim Eun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.4
    • /
    • pp.90-98
    • /
    • 2004
  • This paper covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers, and stable communication links and in the form of an organizational or administrative infrastructure. Another difficulty lies in the highly dynamic nature of ad hoc networks since new nodes can join and leave the network at any time. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and efficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key management systems cannot be used. These issues are covered and we also present a new efficient key management solutions. Finally we show that the proposed method is more efficient than the previous works through simulations.

  • PDF

Route-optimized Handoff in Mobile CORBA Environment (Mobile CORBA 환경에서 게이트웨이간의 경로최적화 핸드오프)

  • Shin, Hye-Ryung;Lee, Hyung-Woo;Kim, Ju-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.224-232
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been proposed. However, when these protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoe networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable rouse that is impervious to route failures by topological changes by mobile hosts. For reliable route selection, the concept of virtual zone (stable lone and caution zone) is proposed. The lone is located in a mobile node's transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C (MIL-STD-188-220C 기반 전술 무선 이동 Ad-Hoc 망에서 1-hop내 데이터 트래픽 감소 방법)

  • You, Ji-Sang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.15-24
    • /
    • 2008
  • The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.

Implementation of Policy Based Network Management System with COPS-PR for MANET (MANET에서 COPS-PR을 이용한 정책 기반 망 관리 시스템의 구현)

  • Huh, Jee-Wan;Lee, Sung-Hwa;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.1-6
    • /
    • 2009
  • MANET(Mobile Ad-hoc NETwork), a network characterized that its moving nodes freely constructs Network topology, has other different characteristics. Because Policy based Network Management in MANET guarantees QoS between nodes, it is essential in applied areas like VANET which targets safety and convenience. In this paper, we use COPS-PR which is appropriate Policy Exchange Protocol for MANET, and implement DiffServ-based QoS in the real networks and experiment its capability.

  • PDF

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).