• Title/Summary/Keyword: 멀티홉 네트워크

Search Result 308, Processing Time 0.027 seconds

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

Performance Increment of Ad Hoc Networks using Neighbor Caching (이웃 캐싱을 이용한 애드혹 망의 성능향상)

  • 조준호;오승택;이준원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.7-9
    • /
    • 2003
  • 애드혹 네트워크 상의 노드들이 서로의 분산된 데이터를 주고 받는 어플리케이션은 멀티 홉 무선 통신의 오버헤드로 인하여 효율성이 떨어진다. 이것을 극복하기 위해서 본 논문은 이웃 캐싱기법을 제안하고, 이 방법이 노드들의 독립적인 캐싱 방법보다 효율적이라는 것을 보이고 있다. 이웃 캐싱은 쉬고 있는 이웃 노드의 저장 공간을 잠시 빌려 봄으로써 캐싱 공간을 확대하고 먼 거리에서 데이터를 가져오는 멀티 홉 무선 통신의 단점을 극복하는 방법이다. 이와 항껜 본 논문에서는 이웃 캐싱을 할 때 노드들 중에서 최적의 이웃 노드를 선별해 내는 우선순위에 근거한 예측기법을 제안하였다. 우선순위에 근거한 예측 기법을 통해 데이터가 가장 오랫동안 보관될 가능성이 높은 이웃 노드를 선별해내고 우선순위가 낮은 데이터를 이웃 캐싱 하지 않을 수 있어서 이웃 캐싱의 효율성을 높일 수 있다.

  • PDF

Implementation of Unmanned Monitoring/Tracking System based on Wireless Sensor Network (무선 센서 네트워크 기반 무인 감시/추적 시스템의 구현)

  • Ahn, Il-Yeup;Lee, Sang-Shin;Kim, Jae-Ho;Song, Min-Hwan;Won, Kwang-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1019-1022
    • /
    • 2005
  • 본 논문에서는 현재 활발한 연구개발이 이루어지고 있는 유비쿼터스 컴퓨팅, 센서 네트워크 기술을 적용한 무인 감시/추적 시스템을 제시한다. 본 논문의 무인 감시/추적 시스템은 센서네트워크 기술, 다중센서 융합에 의한 탐지 및 위치 인식기술, 무인 감시/추적 알고리즘으로 구성되어 있다. 센서네트워크는 센싱 데이터를 실시간으로 전송하기 위해 노드의 주소를 기반으로 하는 계층적 멀티홉 라우팅 기법을 제안하였다. 침입자와 추적자의 위치 인식은 자기센서 및 초음파센서를 가진 센서모듈들로부터 얻어진 센싱 정보를 융합하고, 이를 확률적으로 침입자 및 추적자의 위치를 결정하는 Particle Filter를 적용한 위치인식 알고리즘을 통해 이루어진다. 추적 알고리즘은 무인 자율 추적을 위해 이동벡터에 기반한 알고리즘이다.

  • PDF

Efficient Energy management through Relay-Transsmission and Cluster Division in Wireless Sensor Network (무선 센서네트워크에서 중계전송과 클러스터 분할법을 사용한 효율적인 에너지 관리)

  • Kim, Jae-Sueng;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.401-405
    • /
    • 2007
  • In sensor network, cluster based routing protocol about efficient energy usage method has researched variously. But existing cluster based routing protocol have problems. one of the problem is sensor nodes's imbalance energy consumption problem at cluster reconstruction. anther is non- connection problem between header node and spc node when they are far from each other, not properly connected. We propose cluster re-division and header node of multihop transmission method in this paper. The cluster re-division method is the method that re-divides existing routing protocol with the small-scale cluster and multihop transmission method is the method regarding the relay transmission between the header nodes. Through the simulation, the proposed routing mechanism shows more excellent than exiting routing protocol in balance energy consumption and energy efficiency.

  • PDF

Channel Polling scheduling method Based MAC protocol for Low Energy Consumption (저 전력 MAC 프로토콜 에서의 채널 폴링 스케쥴링 기법)

  • Kim, Dong Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.635-637
    • /
    • 2016
  • 센서 네트워크에서 각 센서 노드의 에너지 소모를 최소화하여 에너지 소모를 줄임으로써 망의 지속시간을 늘이는 것이 중요하다. 기존의 MAC(Medium Access Control) 프로토콜은 채널 폴링 기법을 이용하여 효율적인 에너지 관리에 대한 해결책을 제시 하였으나, 그러한 방식에 따른 각 노드의 Duty Cycle이 길어짐으로써 발생하는 에너지 소모에 대한 해결책은 제시하지 못하였다. 본 논문에서는 기존의 채널 폴링과 함께 스케쥴링 알고리즘을 적용하여 Duty Cycle의 주기를 줄임으로써 에너지 소모를 줄인다. 특히 이 방식을 이용하여 멀티홉과 과다한 트래픽에 대한 성능의 평가를 위해 실험을 통해 제안하는 프로토콜의 우수한 성능을 보인다.

  • PDF

A Model-based Rate Separation Algorithm Using Multiple Channels in Multi-Radio Ad Hoc Networks (멀티 라디오 애드혹 네트워크에서의 멀티 채널을 이용한 모델 기반 레이트 분할 알고리즘)

  • Kim, Sok-Hyong;Kim, Dong-Wook;Suh, Young-Joo;Kwon, Dong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1A
    • /
    • pp.73-81
    • /
    • 2011
  • IEEE 802.11 PHY and MAC layer provide multiple channels and data rates. To improve the performance of IEEE 802.11 multi-radio ad hoc networks, it is required to utilize available channels and data rates efficiently. However, in IEEE 802.11 multi-rate networks, the rate anomaly (RA) problem occurs that the network performance is severely degraded as low-rate links affect high-rate links. Hence, in this paper, we propose a model-based rate separation (MRS) algorithm that uses multiple channels to separate different data rate links so that the RA problem is mitigated. MRS algorithm utilizes an existing throughput model that estimates the throughput of IEEE 802.11 single-hop networks to separate low-rate links and high-rate links. Through simulations, we demonstrate that the MRS algorithm shows improved network performance compared with existing algorithms in multi-radio ad hoc networks.

A Robust Pair-wise Key Agreement Scheme based on Multi-hop Clustering Sensor Network Environments (멀티홉 클러스터 센서 네트워크 환경 기반에서 견고한 키 교환)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.251-260
    • /
    • 2011
  • In this paper, we proposed a scheme that it safely exchanges encrypted keys without Trust Third Party (TTP) and Pre-distributing keys in multi-hop clustering sensor networks. Existing research assume that it exists a TTP or already it was pre-distributed a encrypted key between nodes. However, existing methods are not sufficient for USN environment without infrastructure. Some existing studies using a random number Diffie-Hellman algorithm to solve the problem. but the method was vulnerable to Replay and Man-in-the-middle attack from the malicious nodes. Therefore, authentication problem between nodes is solved by adding a ��TESLA. In this paper, we propose a modified Diffie-Hellman algorithm that it is safe, lightweight, and robust pair-wise agreement algorithm by adding One Time Password (OTP) with timestamp. Lastly, authentication, confidentiality, integrity, non-impersonation, backward secrecy, and forward secrecy to verify that it is safe.

Performance Analysis of Position Based Routing Protocol for UAV Networks (UAV 네트워크 환경에 적합한 위치기반 라우팅 프로토콜의 성능 분석)

  • Park, Young-Soo;Jung, Jae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.188-195
    • /
    • 2012
  • Many systems are developing for the realization of NCW(Network Centric Warfare). UAV(Unmanned Aerial Vehicle) Network is attracting attention in a lot of military applications. In general, UAVs have the potential to create an ad-hoc network and greatly reduce the hops from source to destination. However, UAV networks exhibit unique properties such as high mobility, high data rate, and real time service. The routing protocols are required to design the multi-hop routing protocols that can dynamically adapt to the requirements of UAV network. In this paper we analyse Geographic Routing Protocol is based on geographical distance between source and destination for efficient and reliable transmission. Geographic Routing Protocol is evaluated in video service scenarios with TDMA model in our simulation. The simulation results show that the performance of Geographic Routing Protocol is better than the MANET Routing Protocol in terms of packet received ratio, end to end delay, and routing traffic sent.

The Design, Implementation, and Evaluation of a User-Level Mobile Ad Hoc Network Routing with COTS Devices (사용자 계층 모바일 애드혹 라우팅 네트워크 설계와 실제 환경에서의 성능 검증)

  • Kim, Joon-Gyum;Gong, Taesik;Lee, Sung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.845-851
    • /
    • 2019
  • We design, implement, and evaluate a user-level ad hoc network routing protocol on the COTS (commercial off-the-shelf) mobile devices. In situations such as disaster recovery, emergency communication between mobile devices is necessary. For wide deployability and usability of such a system, we design and implement the networking protocols on the user level instead of modifying the kernel of mobile devices. In order to support reliable data transfer in high mobility scenarios, we selected to implement AODV (Ad Hoc On-Demand Distance Vector) as the routing protocol and TCP as the transport layer protocol. With our implementation of ad hoc networking stack on COTS smartphones, we conducted experiments in various networking environments. Our experimental results show that ad hoc networking is possible in up to 12 hops in a line topology and 5 concurrent devices in a star topology.