• Title/Summary/Keyword: mobile cluster

Search Result 308, Processing Time 0.216 seconds

Mobile Sink Data Gathering through Clustering (클러스터링을 통한 모바일 싱크 데이터 수집)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.79-85
    • /
    • 2009
  • A sink node and its neighbor nodes spend more energy than other nodes since a stationary sink node collects data from wireless sensor networks(WSNs). For larger WSNs, the unbalanced energy of nodes causes the operation of WSNs to stop rapidly. This paper proposes a data gathering method by adapting the mobile sink to prolong the life time of large WSNs. After partitioning a network into several clusters, a mobile sink visits each cluster and collects data from it. An efficient algorithm is proposed to improve the energy efficiency by delivering the message from the mobile sink to the cluster head as well as to reduce the data gathering delay, which is the disadvantage of the mobile sink. Also, The algorithm is analyzed for the energy consumption and the data gathering delay. The validity of the ananlysis result is confirmed by the simulation.

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

Secure Private Key Revocation Scheme in Anonymous Cluster -Based MANETs

  • Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.499-505
    • /
    • 2015
  • Security supports are a significant factor in the design of mobile ad hoc networks. In the dynamic topology where the node changes frequently, private key generation and revocation for newly joining and leaving nodes must be considered. In addition, the identities of individual nodes must be protected as well in mobile networks to avoid personal privacy concerns. This paper proposes ID-based private key revocation scheme and non-interactive key agreement scheme in anonymous MANETs. The proposed scheme provides the user privacy using pseudonyms and private key generation and revocation schemes with consideration of dynamic user changes. Therefore, our schemes can be applied in dynamic and privacy-preserving MANETs which are helpful to share multimedia data.

A Study of Path Management to Efficient Traceback Technique for MANET (MANET에서 효율적 역추적을 위한 경로관리에 관한 연구)

  • Yang, Hwan Seok;Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.31-37
    • /
    • 2011
  • Recently, MANET(Mobile Ad-hoc Network) is developing increasingly in the wireless network. MANET has weakness because phases change frequently and MANET doesn't have middle management system. Every node which consists of MANET has to perform data forwarding, but traceback is not reliable if these nodes do malicious action owing to attack. It also is not easy to find location of attacker when it is attacked as moving of nodes. In this paper, we propose a hierarchical-based traceback method that reduce waste of memory and can manage path information efficiently. In order to manage trace path information and reduce using resource in the cluster head after network is formed to cluster, method which recomposes the path efficiently is proposed. Proposed method in this paper can reduce path trace failure rate remarkably due to moving of nodes. It can also reduce the cost for traceback and time it takes to collect information.

Cooperative Content Caching and Distribution in Dense Networks

  • Kabir, Asif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5323-5343
    • /
    • 2018
  • Mobile applications and social networks tend to enhance the need for high-quality content access. To address the rapid growing demand for data services in mobile networks, it is necessary to develop efficient content caching and distribution techniques, aiming at significantly reduction of redundant content transmission and thus improve content delivery efficiency. In this article, we develop optimal cooperative content cache and distribution policy, where a geographical cluster model is designed for content retrieval across the collaborative small cell base stations (SBSs) and replacement of cache framework. Furthermore, we divide the SBS storage space into two equal parts: the first is local, the other is global content cache. We propose an algorithm to minimize the content caching delay, transmission cost and backhaul bottleneck at the edge of networks. Simulation results indicates that the proposed neighbor SBSs cooperative caching scheme brings a substantial improvement regarding content availability and cache storage capacity at the edge of networks in comparison with the current conventional cache placement approaches.

A study on mobile internet users′ lifestyle and service preference (모바일 인터넷 사용자의 유형 및 서비스 선호도 연구)

  • 고은주;이수진
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.3
    • /
    • pp.195-209
    • /
    • 2004
  • The purpose of this study was 1) to examine the usage of mobile internet by cell phone or palm pilot, etc., 2) to analyze mobile users' lifestyles, 3) to examine preferred fashion services according to users' lifestyles and 4) to investigate service satisfaction and preference with the mobile internet. 193 university students in Seoul were randomly selected as subject. The data was analyzed using descriptive statistics (i.e., percentage, frequency), factor analysis, cluster analysis and ANOVA. The results of the study were as follows: first, most mobile users spent 10 min a day for using the mobile internet (i.e., short message service) mainly in transportation vehicles. Secondly, five factors in the mobile users' lifestyle were named as: 'surfer', 'absorber', 'expert', 'accepter' and 'enthusiast'. Thirdly, two factors in the preferences of fashion service on mobile internet were 'customized information service' and 'ordinary information service'. Fourthly, according to the internet lifestyle, mobile users were classified into three groups: 'mania group', 'follower group', and 'veteran group'. The mania group was the highest group in mobile service satisfaction and service preference. Marketing implications are discussed for the successful mobile business in clothing and textile industry.

Secure Routing Protocol in Cluster-Based Ad Hoc Networks (클러스터 기반 애드혹 네트워크 환경에서의 보안 라우팅 프로토콜)

  • Min, Sung-Geun;Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1256-1262
    • /
    • 2012
  • Mobile ad hoc networks (MANETs) are infrastructure-less, autonomous, and stand-alone wireless networks with dynamic topologies. Recently, cluster-based ad hoc networks which enhance the security and efficiency of ad hoc networks are being actively researched. And routing protocols for cluster-based ad hoc networks are also studied. However, there are few studies about secure routing protocols in cluster-based ad hoc networks. In this paper, we propose secure routing protocol for cluster-based ad hoc networks. We use Diffie-Hellman key agreement, HMAC, and digital signature to support integrity of routing messages, and finally can perform secure routing.

A Cluster Maintenance Scheme to Reduce the Control Overhead in Mobile Ad hoc Networks (Ad hoc 네트워크에서 제어메시지 부하를 감소시키는 클러스터 유지 방법)

  • 왕기철;방상원;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.62-69
    • /
    • 2004
  • The cluster structure reduces the number of retransmission messages, when a broadcast to all hosts in ad hoc network is needed. A cluster maintenance scheme is employed to preserve this advantage from time to time. However, most of the cluster maintenance schemes require additional control messages for cluster reformation as well as control messages for acquiring neighbor information. This mitigates the advantages of employing cluster structure in ad hoc network. In this paper, a cluster maintenance scheme which forces only clusterheads to broadcast control messages during hello time is proposed. When the cluster reformation is needed, the proposed scheme employs a strategy to reduce the control messages to a minimum. In these processes, the proposed scheme doesn't violate the definition of 2-cluster and produces the clusters in fully distributed method. The simulation results prove that our scheme is better than LCC(1).

Extending the Read Range of UHF Mobile RFID Readers: Arbitration Methods Based on Interference Estimation

  • Ahn, Si-Young;Park, Jun-Seok;Seong, Yeong Rak;Oh, Ha-Ryoung
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.2025-2035
    • /
    • 2014
  • The read range of UHF mobile readers can be extended by a booster for mobile RFID readers (BoMR). But in an environment where multiple BoMRs are installed, the read success rate may be decreased due to signal interference. This paper proposes three arbitration methods based on interference estimation with the purpose of enhancing the read success rate. A central arbitration server manages global information in centralized arbitration method (CAM) without broadcast/multicast communication facility. In fully distributed arbitration method (FDAM), all the arbitration messages are broadcasted from a BoMR to every BoMR, and each BoMR decides with broadcasted global information. Events in FDAM are serialized naturally with broadcasted messages. Cluster Distributed Arbitration Method (CDAM) forms clusters with multicasted BoMRs and a selected BoMR acts as an arbiter in the cluster. Such effects as lengthened read range, improved the read success rates of readers can be obtained by the proposed methods without any hardware modification. In order to evaluate the arbitration methods, the RFID system is modeled by using the DEVS formalism and simulated by using the DEVSim++.

A Study on Caching Management Technique in Mobile Ad-hoc Network (Mobile Ad-hoc Network에서 캐싱 관리 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.91-96
    • /
    • 2012
  • MANET is developed technique fairly among many field of wireless network. Nodes which consist of MANET transmit data using multi-hop wireless connection. Caching scheme is technique which can improve data access capacity and availability of nodes. Previous studies were achieved about dynamic routing protocol to improve multi-hop connection of moving nodes. But management and maintenance of effective cache information because of movement of nodes is not easy. In this study, we proposed cluster-based caching scheme to manage connection by decreasing overhead and moving of nodes as moving node discovers cache of wish information. And HLP was used to maintain effective cache table in each cluster head. Efficiency of proposed technique in this study was confirmed by experiment.