• Title/Summary/Keyword: wireless adhoc network

Search Result 10, Processing Time 0.028 seconds

A Development of Protable Mesh Network Gateway for Disaster Relief (재난 구조 통신망 구축을 위한 휴대형 메쉬 네트워크 게이트웨이의 개발)

  • Ryu, Dae-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.99-105
    • /
    • 2011
  • Typically, quick and easily deployed communication for a clear disaster management is required in a disaster situation. But it is not easy because lack of backbone network and poor conditions of disaster site. it is possible to obtain a wide service coverage and low power with portable wireless mesh network technology. In this paper, we developed portable wireless mesh network gateway with a network processor and evaluate it's performance including throughput, latency delay, packet loss, etc. The experiments show our wireless mesh network gateway has basic performance and can be used in various environments like disaster site.

Cluster Routing for Service Lifetime of Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크의 서비스 수명을 위한 클러스터 라우팅)

  • Lee, Chongdeuk
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.279-284
    • /
    • 2013
  • This paper proposes a new cluster-based routing protocol for assuring the service lifetime of wireless multimedia sensor networks. The proposed protocol performs the intra-cluster routing and inter-cluster routing to reduce the energy consumption and service lifetime in the wireless sensor multimedia computing environment, and the proposed mechanism enhances the routing reliability, and it minimizes the packet loss, overhead, and energy consumption. The simulation results show that the proposed mechanism outperforms DSR and AODV.

Performance Evaluation of Low Rate Wireless Home Network Embedded DSSS System (저속 무선 홈 네트워크 임베디드 DSSS 시스템의 성능 평가)

  • Roh, Jae-Sung
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.103-108
    • /
    • 2006
  • Short-range wireless communication and networking technologies are becoming increasingly important in enabling useful mobile applications. for example, ZigBee technology is expected to provide low cost and low power connectivity for equipment that needs battery life as long as several months to several years. In addition, ZigBee can be implemented in mesh networks larger than is possible with Bluetooth. The main features of this ZigBee standard are network flexibility, low cost, very low power consumption, and low data rate in an adhoc self-organizing network among fixed, portable and moving devices. Home network/Home automation is one of the key market areas for Zigbee, with an example of a simple network This paper investigates the effect of short range wireless channel on the performance of Zigbee system and DSSS-BPSK signal transmission in AWGN, interference and Rician fading environments. And we investigate performance degradation due to interference and fading effects in short range wireless channel. In particular, the impacts of the fading and interference level on the bit error probability is shown in BER performance figures.

  • PDF

Study of Cluster Tree Routing Protocols (클러스터 트리 라우팅 프로토콜 연구)

  • Cho, Moo-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.8
    • /
    • pp.138-143
    • /
    • 2005
  • A hierarchical tree structure of clusters has advantages for the network design due to its scalability and simple routing protocol. In this paper, the cluster tree routing protocol is studied for the wireless sensor network. From the numerical analysis results, the data aggregation in the intermediate nodes reduces the number of communication message and saves the energy of sensor nodes, but it may result in increased data traffic latency. And also the selection of cluster head can increase the relaying hops very high.

A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks

  • Jiang Ning;Hua Kien A.;Liu, Danzhou
    • Journal of Communications and Networks
    • /
    • v.9 no.1
    • /
    • pp.56-66
    • /
    • 2007
  • Mobile ad-hoc networks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. In this paper, we propose a novel approach to address these problems. With the proposed technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. As a result, overall network performance is greatly enhanced. This approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.

Impact and Performance of Mobility Model in Adhoc Network (에드혹 네트워크에서의 모바일 모델의 효과)

  • Singh, Dhananjay;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.354-359
    • /
    • 2007
  • 모바일 모델은 특히 모바일 에드혹 네트워크의 라우팅에서 가장 중요한 역할을 한다. 에드혹 무선 네트워크에서 모바일 관리는 많은 과제에 직면해 있다. 이동성은 네트워크의 토폴로지를 바꾸기 위해 끊임없이 문제를 야기한다. 정확한 루트를 유지하기 위해서 라우팅 프로토콜은 그러한 변화들을 동적으로 새로이 조정해야만 한다. 따라서 데이터 트래픽 갱신은 중요한 요소이다. 다른 모바일 패턴들은 특수한 네트워크 프로토콜이나 어플리케이션 상에서 일반적인 다른 효과를 가진다. 결과적으로, 네트워크 수행능력은 이동성의 성질에 의해 강하게 좌우될 것이다. 과거의 이동성은 서로 다른 라우팅 프로토콜들 사이에서 네트워크 실행을 평가하는데 다소 가끔 사용되어 졌다. 이 논문에서는 일반적인 몇 개의 모바일 모델과 거의 보기 드문 모바일 모델을 가지고 다양한 네트워크와 라우팅 파라미터들에서의 그들의 충돌에 대해 기술되었다.

  • PDF

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Design and Implementation of Location Based Seamless Handover for IEEE 802.11s Wireless Mesh Networks (IEEE 802.11s 무선 메쉬 네트워크를 위한 위치 기반 핸드오버의 설계 및 구현)

  • Lee, Sung-Han;Yang, Seung-Chur;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2004-2010
    • /
    • 2009
  • The characteristic of the backbond for distribution service in WMNs(Wireless Mesh Networks) is that WMNs has multiple links connected to mesh points and dynamic routing protocol such as AODV to establish routing paths. When the terminal is communicating with the service through new AP, mobile nodes can resume communication by setting only the link between new AP and mobile node in the case of existing WLANs, but WMNs needs path establishment process in multihop networks. Our goal in this paper is to support the seamless communication service by eliminating path establishment delay in WMNs. We present the method that eliminates the handover latency by predicting the location of handover using GPS information and making the paths to their destination in advance. We implement mesh nodes using embedded board that contains proposed handover method and evaluate performance of handover latency. Our experiment shows that handover delay time is decreased from 2.47 to 0.05 seconds and data loss rate is decreased from 20~35% in the existing method to 0~10% level.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.