• Title/Summary/Keyword: multi-hop broadcast

Search Result 58, Processing Time 0.027 seconds

An Inter-Vehicle Emergency Message Propagation Method with Vehicle Equivalent Group (차량동위그룹을 이용한 차량 간 긴급 메시지 전파 방법)

  • Yu, Suk-Dea;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.340-347
    • /
    • 2007
  • Vehicle safety service can be effectively achieved with inter-vehicle communication technologies, in which moving vehicles transmit a safety related urgency information such as traffic accidents, sudden stops, obstacle appearance etc. They usually utilize a broadcast of message propagation method because the communicating vehicles are not known each other. The pure broadcasting scheme does not satisfy the requirements of vehicle safety communication service due to the transmission delay with frequent message collisions. To resolve this problem, this paper presents a group based propagation method for the multi-hop transmission, in order to deliver an urgency message to the reasonable size of vehicle troop. A group header is elected in considering of the position information of vehicles and radio transmission range. And a vehicle equivalent group is formed with the header. With benefits of the group based transmission, it is possible to minimize the unnecessary transmission and the possibility of message collisions. Simulation results show that the message propagation performance is so stable regardless of vehicle's congestion degree.

Study of Operating μTESLA in Multi-hop Unattended WSN (멀티 홉 UWSN 환경에서의 μTESLA 운영에 관한 고찰)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.459-470
    • /
    • 2013
  • ${\mu}TESLA$ is well known as the most representative energy-efficient broadcast authentication method. Until now, there are many researches that figure out the problems or limitation of ${\mu}TESLA$ and mitigate or solve them, but most researches have been verified in the environment far from the real world. We consider the necessity of verifying what the real efficiency of ${\mu}TESLA$ is. In this paper, we assume that sensors that continuously repeat hibernation and activity perform communication under the UWSN(Unattended WSN), which BS does not stay in the network. In this environment, we newly inspect the performance of ${\mu}TESLA$ by performing various simulations.

ROI-based Video Transmission using Cooperative Diversity over Wireless Ad-hoc Networks (무선 Ad-hoc 네트워크에서 협력 다이버시티를 이용한 관심영역 중심의 비디오 전송)

  • Jang, Uk;Lee, Sang-Hoon;Bae, Kyung-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.13 no.6
    • /
    • pp.951-961
    • /
    • 2008
  • Cooperative diversity is a cooperative technique which exploits user diversity by decoding the combined signal of the relayed signal and the direct signal in wireless multi-hop networks. Using the cooperation, the performance of the network system can be improved because cooperative diversity which is very strong against the fading channels can be achieved. In this paper, we propose the technique that provides the enhanced visual quality of the reconstructed video using the cooperative diversity with the FMO which is the error resilience tool of H.264/AVC standardization over wireless networks. The eye-tracker can detect the gaze point of user and transmit the gaze information to the nodes. After receiving the gaze information of user, each node performs ROI encoding according to the received gaze information. After encoding, video sources are divided into ROI and Non-ROI. Through the simulation results, the better visual quality of the reconstructed video is achieved when ROI and Non-ROI are transmitted through different channels.

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.

An Adaptive Relay Node Selection Scheme for Alert Message Propagation in Inter-vehicle Communication (차량간 통신에서 긴급 메시지 전파를 위한 적응적 릴레이 노드 선정기법)

  • Kim, Tae-Hwan;Kim, Hie-Cheol;Hong, Won-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.571-582
    • /
    • 2007
  • Vehicular ad-hoc networks is temporarily established through inter-vehicle communication without any additional infrastructure aids. It requires a immediate message propagation because it mainly deals with critical traffic information such as traffic accidents. The distance-based broadcast scheme is one of the representative broadcast schemes for vehicular ad-hoc network. In this scheme, a node to disseminate messages is selected based on a distance from a source node. However, a message propagation delay will be increased if the relay nodes are not placed at the border of transmission range of the source node. In particular, when the node density is low, the message propagation delay is getting longer. In this paper, we propose a time-window reservation based relay node selection scheme. A node receiving the alert message from the source node has its time-window and randomly selects its waiting time within the given time-window range. A proportional time period of the given time-window is reserved in order to reduce the message propagation delay. The experimental results show that the proposed scheme has shorter message propagation delay than the distance-based broadcast scheme irrespective of node density in VANET. In particular, when the node density is low, the proposed scheme shows about 26% shorter delay and about 46% better performance in terms of compound metric, which is a function of propagation latency and network traffic.

Hierarchical Mesh Network Design & Implementation (계층적 메쉬 네트워크의 설계 및 구현)

  • Kim, Yong-Hyuck;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.26-36
    • /
    • 2009
  • ad-hoc network is self-constructed by mobile hosts without any infrastructure. And the hosts collaborate with each other for routing packet by means of multi-hop communication. But it is too hard to deploy ad hoc network at the large area because of the salability problem caused by low network throughput. network throughput decrease is due to contention on the air among the neighbor host and single interface limitation, and broadcast flooding through overall network. In this paper, to solve the ad hoc scalability problem, we propose mesh network based scalable hierarchical ad hoc architecture, and also propose the adaptation methods for inter-working with the host not including ad hoc functions and the legacy infra-network.

A Relay Node Selection Method of Vehicle Safety Messages for Protecting Traffic Accidents (교통사고 예방을 위한 차량안전메시지 중계노드 선택방법)

  • Yu Suk-Dea;Lee Moon-Kun;Cho Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.60-68
    • /
    • 2006
  • Using the wireless communication among unacquainted vehicles, an intelligent vehicle safety system can be constructed to exchange vehicle safety-related information, such as urgency stop, traffic accident and road obstacles. In the majority of vehicle safety applications, vehicle safety messages are propagated in the form of broadcast. However, this approach causes some effectiveness and performance problems with massive radio collision, multi-hop propagation. This paper presents a priority based relay node selection method for propagating vehicle safety messages of traffic accident protection system. With this method, vehicle safety messages are relayed by a node that locates in proper distance out of the nodes that are included in the radio transmission range. By decreasing the number of duplicated messages, the packet overhead is lessened while the communication performance is raised. The proposed method was proven to be better than other schemes through network simulations.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.