• Title/Summary/Keyword: mobile ad hoc network

Search Result 807, Processing Time 0.029 seconds

CACHE:Context-aware Clustering Hierarchy and Energy efficient for MANET (CACHE:상황인식 기반의 계층적 클러스터링 알고리즘에 관한 연구)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.571-573
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) needs efficient node management because the wireless network has energy constraints. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. Previously proposed a hybrid routing CACH prolong the network lifetime and decrease latency. However the algorithm has a problem when node density is increase. In this paper, we propose a new method that the CACHE(Context-aware Clustering Hierarchy and Energy efficient) algorithm. The proposed analysis could not only help in defining the optimum depth of hierarchy architecture CACH utilize, but also improve the problem about node density.

  • PDF

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

A Mechanism for Improving Network Scalability of Location-based Overlay Multicast in Mobile Ad hoc Networks (위치기반 오버레이 애드 혹 멀티캐스트에서의 네트워크 확장성 개선 방안)

  • kim Bongsoo;Jung Kwansoo;Cho Hochoong;Choi Younghwan;Kim Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.319-321
    • /
    • 2005
  • 이동 애드 혹 네트워크은 빈번한 위상 변화가 일어난다. 이에 대처하기 위해 비상태 멀티캐스팅이나 위상 변화에 강한 특성을 지니는 오버레이 멀티캐스트 프로토콜들이 제안되고 있다. 하지만 이들의 대부분은 소규모 그룹에 대한 멀티캐스트만을 지원한다. 그러나 이동 애드 혹 네트워크의 대표적인 응용들은 대규모 그룹 통신을 사용하므로 확장성 문제는 해결되어야 한다. 따라서 본 논문에서는 이를 개선하기 위해 단일 홉 클러스터링과 프록시 노드 사용을 제안한다. 단일 홉 클러스터링은 구조적인 관리가 필요한 노드 수를 줄일 수 있으며 프록시 노드는 단일 홉 클러스터링으로 줄어든 노드들에게 계층화된 포워딩을 제공한다.

  • PDF

Load Balancing Scheme in the MANET with Multiple Internet Gateways (다중 인터넷 게이트웨이를 갖는 MANET에서의 부하균등화 기법)

  • Kim Youngmin;Yu Hyun;Ahn Sanghyun;Lim Yujin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.304-306
    • /
    • 2005
  • 이동 애드혹 네트워크(Mobile Ad Hoc Network: MANET)는 유선 인프라 없이 구축된 무선 네트워크로 멀티 홉 통신을 수행할 수 있다. 인터넷 노드와 통신하고자 하는 MANET 노드에게 인터넷 연결을 가능하게 하는 방법이 요구되며 인터넷 연결은 인터넷과 MANET을 중계하는 인터넷 게이트웨이를 통해 지원된다. 게이트웨이들 간의 부하를 잘 분배한다면 네트워크 성능 향상을 얻을 수 있으므로, MANET 내에 여러 개의 인터넷 게이트웨이가 존재할 경우 이들 간의 부하균등화는 중요한 이슈이다. 본 연구에서는 부하균등화 기법을 제어 메시지의 플러딩 방법과 인터넷 게이트웨이를 선택하는 주체에 따라 4가지로 분류하며, 부하균등화 문제를 해결하기 위한 새로운 메트릭(metric)을 제안한다. 시뮬레이션을 통하여 홉 수와 라우팅 엔트리의 수를 메트릭으로 이용하는 새로운 기법의 성능이 기존 기법에 비하여 향상되었음을 보인다.

  • PDF

Implementation of IPv6 Bluetooth Access Point (IPv6를 지원하는 블루투스 엑세스 포인트 구현)

  • Choi, Hyun-Seok;Moon, Choon-Kyoung;Kim, Pyung-Soo;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.435-437
    • /
    • 2004
  • In this paper, we aim to design and implement supporting IPv6 Bluetooth Access point(AP) in Linux. Bluetooth is a cable replacement technology designed for short range ad-hoc connections, which most likely change the way we handle and access information in the near future. In Personal Area Network(PAN) mobile devices need many IP address space, then we need next generation Internet Protocol(IPv6). We designed Bluetooth Access Point with Bluetooth stack and MAC bridge function in Linux. The implementation tested on Linux system based on Bluetooth Access Point with other Bluetooth devices.

  • PDF

Effective Power Saving Algorithm under Dynamic Source Routing (동적 소스 라우팅에서의 효율적인 파워 세이빙 알고리즘)

  • 정다운;노원종;한규호;임경수;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.745-747
    • /
    • 2004
  • 배터리 파워는 모바일 애드 혹 네트워크(Mobile Ad hoc Network)에서 중요한 리소스이다. 기존의 라우팅 알고리즘에서는 노드의 파워를 on-off 시키는 방법으로 파워를 관리해왔다. 본 논문에서는 DSR (dynamic source routing)에서 route discovery, route maintenance를 할 때 각 노드의 배터리 파워 레벨을 고려하여 파워 레벨이 낮은 노드들은 RREP packet을 보내지 않음으로써 소스에서 데스티네이션까지의 경로를 오래 유지시킬 수 있고, 또한 파워 레벨이 높은 하나의 노드에 트래픽이 집중되지 않도록 하기 위해 큐(queue)에 담겨있는 트랜스미션패킷과 리시브 패킷의 수까지 고려하여 경로를 설정한다. 이 알고리즘을 이용함으로써 각 노드의 파워를 효율적으로 관리함은 물론, 전체 네트워크의 load 균형을 맞춤으로 네트워크의 수명을 길게 할 수 있다.

  • PDF

A SURVEY ON INTRUSION DETECTION SYSTEMS IN COMPUTER NETWORKS

  • Zarringhalami, Zohreh;Rafsanjani, Marjan Kuchaki
    • Journal of applied mathematics & informatics
    • /
    • v.30 no.5_6
    • /
    • pp.847-864
    • /
    • 2012
  • In recent years, using computer networks (wired and wireless networks) has been widespread in many applications. As computer networks become increasingly complex, the accompanied potential threats also grow to be more sophisticated and as such security has become one of the major concerns in them. Prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. Intrusion Detection Systems (IDSs) have become a key component in ensuring systems and networks security. An IDS monitors network activities in order to detect malicious actions performed by intruders and then initiate the appropriate countermeasures. In this paper, we present a survey and taxonomy of intrusion detection systems and then evaluate and compare them.

Max-Win based Routing(MWR) Protocol for Maritime Communication Networks with Multiple Wireless Media (다중무선매체 해상통신망을 위한 최대승수기반 경로배정 프로토콜)

  • Son, Joo-Young;Mun, Seong-Mi
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1159-1164
    • /
    • 2010
  • The current maritime data communications mainly depend on radio and satellite which have restrictions on data rate and cost. That leads to needs of novel relatively-high-speed data communication systems at sea just like on land. This paper proposes a routing protocol (MWR) for newly designed model of ship-to-ship communication networks at sea. The MWR protocol finds out an optimal route by selecting an optimal network for each specific application from overlapped networks of available wireless media at sea.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.