• 제목/요약/키워드: nodes

검색결과 8,419건 처리시간 0.037초

Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

IEEE 802.15.4 기반의 무선 센서네트워크에서 숨은노드 충돌 방지와 성능향상 기법 (Mitigating Hidden Nodes Collision and Performance Enhancement in IEEE 802.15.4 Wireless Sensor Networks)

  • 안광훈;김태준
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권7호
    • /
    • pp.235-238
    • /
    • 2015
  • IEEE 802.15.4는 무선 센서노드들 사이의 연결을 가능하게 하는 대표적인 표준이다. 그러나 이 IEEE 802.15.4를 기반으로 하는 무선 센서네트워크는 기본적으로 숨은노드 충돌에 매우 취약하다는 약점을 갖고 있는데 이는 무선 센서네트워크 자체가 제한된 통신 반경과 짧은 배터리 수명을 갖고 있기 때문이다. 본 논문에서는 IEEE 802.15.4 기반의 무선 센서네트워크에서 노드들의 클러스터링을 통한 숨은노드 충돌 회피 및 성능향상 기법을 제안하다. 이 방법에서 사용되는 클러스트링은 각각의 무선 센서노드들이 갖고 있는 채널 품질 정보를 바탕으로 수행된다. 그리고 클러스터에 어느 정도의 무선자원을 할당해야 하는 문제도 다룬다.

A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks

  • Jiang Ning;Hua Kien A.;Liu, Danzhou
    • Journal of Communications and Networks
    • /
    • 제9권1호
    • /
    • pp.56-66
    • /
    • 2007
  • Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.

협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구 (A Study on Routing Performance Improvement through Cooperation Authentication Technique)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구 (A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제14권1호
    • /
    • pp.35-43
    • /
    • 2018
  • MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.

돈군의 Salmonella 모니터링을 위한 림프절 추출액 사용에 대한 평가 (Evaluation of the extract from lymph nodes for Salmonella monitoring in pig herds)

  • 정병열;추지훈;김지훈;정재윤
    • 대한수의학회지
    • /
    • 제46권2호
    • /
    • pp.119-125
    • /
    • 2006
  • The objective of this study was to investigate the use of extract from mesenteric lymph nodes as an alternative to serum for ELISA to detect Salmonella antibodies in slaughter pigs. Among 324 slaughter pigs, 65 (20.1 %) were positive in the serum ELISA and 76 (23.5%) were positive in the ELISA with extract from lymph nodes. A total of 24 (7.4%) Salmonella representing 6 serotypes were isolated from mesenteric lymph nodes and 35 (10.8%) Salmonella belonging to 2 serotypes were also recovered from cecal contents of slaughter pig samples, respectively. The most prevalent serogroup was B (55.9% of isolates) and serotype was Typhimurium (52.5% of isolates). In the comparison of the results of between the serum ELISA and Salmonella isolation, kappa value was 0.28 with mesenteric lymph nodes and 0.37 with cecal contents, respectively. However, the extract ELISA had sensitivity of 98.5%, specificity of 95.4% and kappa value of 0.88 as compared with the serum ELISA. Because high degree of concordance between the serum ELISA and the extract ELISA was observed (P=0.24), extract from lymph nodes could be used as an alternative to serum for the detection of Salmonella antibodies in the ELISA.

Lactosaminated N-Succinyl-chitosan: Preparation and Biodistribution into the Intestine, Bone, Lymph Nodes and Male Genital Organs after I.v. Administration

  • Kato, Yoshinori;Onishi, Hiraku;Machida, Yoshiharu
    • Macromolecular Research
    • /
    • 제11권5호
    • /
    • pp.382-386
    • /
    • 2003
  • Reductive amination of N-succinyl-chitosan (1) and lactose using sodium cyanoborohydride in 1/15 M phosphate buffer (pH 6.0) for 6 d was suitable for the preparation of lactosaminated N-succinyl-chitosan (2). At 8, 24 and 48 h after i.v. administration of fluorescently labeled 1 (1') or 2 (2'), Peyer's patch, mesenteric lymph nodes, testes, prostate, preputial grand, intestine (small intestine plus cecum), femoral muscle, backbone and peritoneum were taken. Peyer's patch and mesenteric lymph nodes were put together as lymph nodes. Over 10% of dose/g tissue was distributed to the prostate and lymph nodes at 48 h post-administration in both l' and 2'.2' was easily distributed into not only the liver but also prostate, intestine, preputial gland and lymph nodes. Although galactose receptors are known to exist not only on the liver parenchymal cells but also on prostate and testes, the selective distribution of 2' into the prostate and the testes were not observed clearly. This study suggested that 1 and 2 should have possibilities for both the prevention and cure of lymph node metastasis as drug carriers.

에너지 효율 개선을 위한 IEEE 802.15.4 기반의 Cross Layer Protocol (A Cross Layer Protocol based on IEEE 802.15.4 for Improving Energy Efficiency)

  • 정필성;김화성;오영환
    • 한국통신학회논문지
    • /
    • 제36권7A호
    • /
    • pp.669-677
    • /
    • 2011
  • IEEE 802.15.4 표준에서 슈퍼프레임 구조는 활성화 구간과 비활성화 구간을 사용하여 낮은 전력 소모를 제공하도록 한다. 하지만 슈퍼프레임의 활성화 구간 동안 통신하는 노드들은 코디네이터와의 거리와는 상관없이 동일한 전송 반경을 샤용하여 데이터를 전송하기 때문에 불필요한 에너지를 낭비하게 된다. 본 논문에서 코디네이터는 통신 영역을 4개의 영역으로 나누고 각 영역에 포함되어 있는 노드는 코디네이터가 전송한 비콘 메시지를 확인하여 송신전력을 설정함으로써 데이터 전송에서 발생하는 전력 소모를 최소화한다. 또한, Cross Layer 프로토콜을 통하여 PAN(personal Area Network) 영역을 구성하도록 하여 메시지 전송 충돌(collision) 현상을 최소화하였다.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

모바일 에드-혹 센서 네트워크를 위한 에너지 효율적 라우팅 기법 개발 (Development of Energy Efficiency Routing Technique for Mobile Ad-hoc Sensor Network)

  • 이양민;이광용;이재기
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2009년도 추계학술발표대회
    • /
    • pp.547-548
    • /
    • 2009
  • The development of USN(Ubiquitous Sensor Network) technology is creating numerous application areas. Although a network configuration with fixed sensors was the norm in the past, the coexistence of mobile and fixed sensor nodes is a new trend. Fixed sensor networks focused on the energy efficiency of nodes, but the latest studies consider guaranteeing the mobility of nodes and maintaining their connectivity, while remaining energy efficient at the same time. This paper proposes a routing protocol for a mobile ad-hoc sensor network that improves the mobility, connectivity and energy efficiency of nodes while allowing for the management and maintenance of a large number of nodes even in a complex communication environment where mobile and fixed nodes coexist. An algorithm for multi-hop multi-paths, a technique for topology reconfiguration by node movement prediction and vibration sensors, path setting for a large number of nodes, and efficient data transfer technology have been introduced to implement the modified LEAHC-AOMDV protocol. Furthermore, the excellence of this protocol was verified through a comparative experiment with the conventional LEACH protocol.