• Title/Summary/Keyword: pathID

Search Result 46, Processing Time 0.037 seconds

THERA: Two-level Hierarchical Hybrid Road-Aware Routing for Vehicular Networks

  • Abbas, Muhammad Tahir;SONG, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3369-3385
    • /
    • 2019
  • There are various research challenges in vehicular ad hoc networks (VANETs) that need to be focused until an extensive deployment of it becomes conceivable. Design and development of a scalable routing algorithm for VANETs is one of the critical issue due to frequent path disruptions caused by the vehicle's mobility. This study aims to provide a novel road-aware routing protocol for vehicular networks named as Two-level hierarchical Hybrid Road-Aware (THERA) routing for vehicular ad hoc networks. The proposed protocol is designed explicitly for inter-vehicle communication. In THERA, roads are distributed into non-overlapping road segments to reduce the routing overhead. Unlike other protocols, discovery process does not flood the network with packet broadcasts. Instead, THERA uses the concept of Gateway Vehicles (GV) for the discovery process. In addition, a route between source and destination is flexible to changing topology, as THERA only requires road segment ID and destination ID for the communication. Furthermore, Road-Aware routing reduces the traffic congestion, bypasses the single point of failure, and facilitates the network management. Finally yet importantly, this paper also proposes a probabilistical model to estimate a path duration for each road segment using the highway mobility model. The flexibility of the proposed protocol is evaluated by performing extensive simulations in NS3. We have used SUMO simulator to generate real time vehicular traffic on the roads of Gangnam, South Korea. Comparative analysis of the results confirm that routing overhead for maintaining the network topology is smaller than few previously proposed routing algorithms.

An Accuracy Assessment Scheme through Entropy Analysis in BLE-based Indoor Positioning Systems (BLE 기반 실내 측위 시스템에서 엔트로피 분석을 통한 정확도 평가 기법)

  • Pi, Kyung-Joon;Min, Hong;Han, Kyoungho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.117-123
    • /
    • 2022
  • Unlike the satellite-based outdoor positioning system, the indoor positioning system utilizes various wireless technologies such as BLE, Wi-Fi, and UWB. BLE-based beacon technology can measure the user's location by periodically broadcasting predefined device ID and location information and using RSSI from the receiving device. Existing BLE-based indoor positioning system studies have many studies comparing the error between the user's actual location and the estimated location at a single point. In this paper, we propose a technique to evaluate the positioning accuracy according to the movement path or area by applying the entropy analysis model. In addition, simulation results show that calculated entropy results for different paths can be compared to assess which path is more accurate.

Hacking Path Retracing Algorithm using Packet Marking (패킷 마킹을 이용한 해킹경로 역추적 알고리즘)

  • 원승영;한승완;서동일;김선영;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.21-30
    • /
    • 2003
  • Retracing schemes using packet marking are currently being studied to protect network resources by isolating DDoS attack. One promising solution is the probabilistic packet marking (PPM). However, PPM can't use ICMP by encoding a mark into the IP identification field. Likewise, it can't identify the original source through a hash function used to encode trace information and reduce the mark size. In addition, the retracing problem overlaps with the result from the XOR operation. An algorithm is therefore proposed to pursue the attacker's source efficiently. The source is marked in a packet using a router ID, with marking information abstracted.

  • PDF

Cluster-Based Multi-Path Routing for Multi-Hop Wireless Networks (무선 다중 홉 네트워크에서의 클러스터 기반 다중 경로 라우팅)

  • Zhang, Jie;Jeong, Choong-Kyo;Lee, Goo-Yeon;Kim, Hwa-Jong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.114-121
    • /
    • 2008
  • Multi-path routing has been studied widely in wired networks. Multi-path routing is known to increase end-to-end throughput and provide load balancing in wired networks. However, its advantage is not obvious in wireless multi-hop network because the traffic along the multiple paths may interfere with adjacent paths. In the paper, we introduce a new multi-path routing scheme, Cluster-Based Multi-Path Routing for multi-hop wireless networks. The main idea of the proposed routing scheme is to extend the hop-by-hop multi-path to a cluster-by-cluster multi-path. In cluster network, each cluster can work independently from other clusters and hence reduce interference. The purpose of the proposed scheme is to find a less interfering path for wireless multi-hop networks. We also showed the throughput improvement of the proposed scheme through simulations.

Virtual ID Issuance and Path Configuration Method for Traceable Anonymous Bulletin Board (추적 가능한 익명 게시판을 위한 가상 ID 발급과 경로 구성 기법)

  • Jang, Seung-Jae;Lee, Young-Gu;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.280-283
    • /
    • 2010
  • 현재 제한적 본인 확인제 실행으로 게시판에 글을 쓰거나 댓글을 달 때 최초 1회에 한하여 본인 인증을 받아야 하기 때문에 사용자는 해당 사이트에 회원가입을 하거나 그에 상응하는 개인정보를 제공해야한다. 이에 정부는 무분별한 주민번호 도용을 막기 위해 주민번호대체수단 의무화를 2007년에 실행하여 아이핀, 공인인증서를 통한 본인확인 대책을 내놓았으나 허술한 본인인증 절차로 인해 아이핀 역시 도용당하고 있는 실정이다. 본 논문에서는 가상 아이디 발급으로 적절한 익명성을 제공함과 동시에 경로 구성 기법을 통하여 악성 댓글 및 의견글 달기를 막기 위한 조건부 추적이 가능한 익명 게시판에 대해서 소개하도록 한다.

  • PDF

Feasibility study of low power active RFID system based on the ultrasonic frequency (초음파를 이용한 저전력 Active RFID시스템의 구현가능성에 관한 연구)

  • Yoon, Ki-Hun;Kwak, Chul-Hyun;Kim, Keon-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.430-432
    • /
    • 2007
  • This paper proposes the possibility of SonicID system which is the active RFID based on the ultrasonic spectrum instead of using radio frequency. For the feasibility study, various performance indexes are measured in terms of power consumption and signal path loss onto the frequencies of 40KHz, 433MHz, and 2.4GHz. In addition to the line of sight condition, realistic situations are considered for diverse deploying environments. The results of these analyses demonstrate that the SonicID holds the potential to meet the needs of future advanced RFID system in a scalable fashion.

  • PDF

Efficient Tool Path Generation of Compound Geometric Surface (복합기하곡면의 효율적인 공구경로 생성)

  • 한충규;이동주
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.04b
    • /
    • pp.429-433
    • /
    • 1995
  • Compound solid is maded for specially fixed object. A number of compound soild are devided as a unit germetric solid. The special case of rotation about an arbitrary axis makes according selection modelfor transformation. View plane and View region are estiblished for back face removal. After back-face removal eachedge is checked for point of intersection. The designing of of fset surface id maded and tool-path gernerted on the part surface. In tersection point is checked among the offset surfaces. The paper used an efficient algorithm for generating tool paths to apply a notion view volume. Through machining experiments with a 3-axis machining centre, the adequacy of the analysis was confirmed.

  • PDF

A Novel Carrier Leakage Suppression Scheme for UHF RFID Reader (UHF 대역 RFID 리더 반송파 누설 억압 연구)

  • Jung, Jae-Young;Park, Chan-Won;Yeom, Kyung-Whan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.489-499
    • /
    • 2011
  • RFID technologies, which allow collecting, storing, processing, and tracking information by wirelessly recognizing the inherent ID of object through an attached electronic tag, have a variety of application areas. This paper presents a novel carrier leakage suppression RF(CLS-RF) front-end for ultra-high-frequency RF identification reader. The proposed reader CLS-RF front-end structure generates the carrier leakage replica through the nonlinear path that contains limiter. The limiting function only preserves the frequency and phase information of the leakage signal and rejects the amplitude modulated tag signal in the envelope. The carrier leakage replica is then injected into the linear path that contains phase shifter. Therefore, the carrier leakage signal is effectively cancelled out, while not affecting the gain of the desired tag backscattering signal. We experimentally confirm that the prototype shows a significant improvement in the leakage to signal ratio by up to 36 dB in 910 MHz, which is consistent with our simulation results.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Heat Transfer Characteristics of R-407C During Condensing Inside Horizontal Smooth and Micro-Fin Tubes (수평 평활관 및 전열촉진관내 대체 냉매 R-407C의 응축 열전달 특성에 관한 연구)

  • Roh, Geonsang;Oh, Hookyu
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.2
    • /
    • pp.210-217
    • /
    • 1999
  • This paper reports the experimental results on heat transfer characteristics of R-22 and R-407C(HFC-32/125/134a 23/25/52 wt%) condensing inside horizontal smooth and finned tubes. The test condensers used In the study are double pipe heat exchangers of 7.5 mm ID, 9.5 mm OD smooth tube, and 60 finned micro-fin tube with 8.53 mm ID, 9.53 mm OD. Each of these tubes was 4 000 mm long tubes connected with an U-bend. These U type two-path test tubes are divided In 8 local test sections for the identification of the local condensing heat transfer characterisitcs and pressure drop, U-bend effects on condensing flows. Inlet quality is maintained 1.0, and refrigerant mass velocity is varied from 102.0 to $301.0kg/m^2{\cdot}s$. From the results, it was found that the pressure drop of the R-407C Increased, and heat transfer coefficient decreased compared to those of R-22. In comparison condensing heat transfer characteristics of micro-fm tube with those of smooth tube, increasing of condensing heat transfer coefficient was found outstanding compared to the increasing ratio of pressure drop. Furthermore, pressure drop In U-bend showed at most a 30 % compared to the total pressure drop in the test section.