• Title/Summary/Keyword: 무선 애드혹 네트워크

Search Result 303, Processing Time 0.022 seconds

A Study on the Network Throughput of Bluetooth Packet Communication System for Short Distance Wireless Connectivity (근거리 무선 연결을 위한 블루투스 패킷 통신 시스템의 네트워크 처리율에 관한 연구)

  • Ye, Hwi-Jin;Kim, Moon;Kim, Seong-Chul;Roh, Jae-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.281-287
    • /
    • 2007
  • The Bluetooth technology represents an attractive approach to enable short distance wireless connectivity. The Bluetooth standard operates at the 2.4 GHz ISM band and offers the advantage of establishing ad hoc networks, called piconet and scatternet. The spread of Bluetooth implementation in consumer products opens up a new short range wireless networking applications. Bluetooth MAC avoids packet collision within a piconet by simple time multiplexing. But lack of synchronization among independent neighboring piconets introduces packet overlapping within a time slot. In this paper, the wireless network throughput of Bluetooth packet transmission system applying the pure-ALOHA and slotted-ALOHA MAC is investigated according to the impact of channel environment. From the obtained results, the throughput of the Bluetooth MAC protocol shown to offer good performance in wireless channel, and the results are useful for the implementation of Bluetooth networks.

  • PDF

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Routing Algorithm based on Link Stability for Ad Hoc Wireless Networks (애드 혹 무선 네트워크에서의 링크 안정성 기반 라우팅 알고리즘)

  • Lim Se-Young;Kim Hun;Yoo Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.652-659
    • /
    • 2006
  • The routing algorithm is one of the key research areas in ad hoc networks. The most of existing routing algorithms depends on current availability of wireless link when finding the feasible path. Dependence on current information may mislead to a fragile communication path. Some routing approaches that take statistical average on received signal power enhance the possibility to find the most stable path, but have limitation on considering only the average power level. In this paper, we propose routing algorithm based on link stability for ad hoc network. The proposed algorithm not only takes statistical average, but also traces the degree of variations in received signal power. The simulation result support that the proposed algorithm is more likely to find the most stable path under the severe communication environment.

Bio-Inspired Routing Protocol for Mobile Ad Hoc Networks (이동 애드혹 네트워크를 위한 생체모방 라우팅 프로토콜)

  • Choi, Hyun-Ho;Roh, Bongsoo;Choi, HyungSeok;Lee, Jung-Ryun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2205-2217
    • /
    • 2015
  • Bio-inspired routing protocol uses a principle of swarm intelligence, which finds the optimal path to the destination in a distributed and autonomous way in dynamic environments, so that it can maximize routing performances, reduce control overhead, and recover a path failure quickly according to the change of network topology. In this paper, we propose a bio-inspired routing protocol for mobile ad hoc networks. The proposed scheme uses a function of overhearing via wireless media in order to obtain the routing information without additional overhead. Through overhearing, the pheromone is diffused around the shortest path between the source and destination. Based on this diffused pheromone, a probabilistic path exploration is executed and the useful alternative routes between the source and destination are collected. Therefore, the proposed routing protocol can ensure the up-to-date routing information while reducing the control overhead. The simulation results show that the proposed scheme outperforms the typical AODV and AntHocNet protocols in terms of routing performances and significantly decreases the routing overhead against the AntHocNet.

A Study on Multi-Channel Multi-Interface MAC Protocols for Mesh Networks (Mesh Networks을 위한 다중채널 다중인터페이스 MAC 프로토콜에 관한 연구)

  • Kim, Young-Beom
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1465-1470
    • /
    • 2011
  • In this paper, we propose a new MAC protocol, namely DM-MMAC (Doze Mode Multi-Channel MAC) for ad hoe wireless networks which can utilize multiple channels effectively, thereby enhancing the network throughput considerably. Basically, the IEEE 802.11 specification allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a single channel with the fatal drawback, so called multi-channel hidden terminal problem in multi-channel environments. In this vein, several multi-channel MAC protocols have been proposed, but most of them demonstrate the performance problem that its throughput drastically decreases as the number of mobile hosts residing in a given network increases with small number of available channels. In this work, we tried to improve the performance of multi-channel MAC protocols in terms of network throughput as well as power saving effects by simplifying the channel assignment and channel capturing procedures and reducing the possibility of collisions between mobile hosts.

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

A Study on TCP using AODV in Mobile Ad-hoc Networks (이동 애드혹 네트워크에서 AODV를 적용한 TCP에 관한 연구)

  • Lee, Hye-Rim;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.233-238
    • /
    • 2008
  • Recently, network component become to follow wireless and mobile network from wired network proposed that many TCP algorithm optimized in variety environment. When TCP was created, however as it was design based on wired link, wireless link made more transmission error than wired link. Transmission errors are more frequent and may be incorrectly regarded as indications of network congestion. In this paper, it conduct how effect congestion control algorithm in Mobile ad-hoc network and compare traffic of TCP-Tahoe, TCP-Reno, TCP-New-Reno and TCP-Vegas in Mobile ad-hoc environment.

  • PDF

An Efficient Ad Hoc Routing Method for Tactical Networks using Integrated Metrics and Traffic Characteristics (전술 네트워크 환경의 트래픽 특성을 고려한 통합 매트릭 기반 애드혹 라우팅 기법)

  • Roh, Bong-Soo;Hoh, Mi-Jeong;Hwang, Ki-Min;Park, Gui-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1676-1684
    • /
    • 2010
  • Tactical network environments are characterized by unreliable connectivity, communication links which has limited bandwidth compared to commercial networks and distributed architecture where users have high mobility. The best route should be selected based on the required traffic characteristics which can be a wireless channel environments and a status of nodes which are moving. Those characteristics are self aware and should be a routing decision factor in order to guarantee a reliable data transfer. In this paper we define the requirements of services and traffic characteristics on tactical network environments and suggest the new routing method "AODV-IMTC" based on selective routing metric to enable efficient data transfer in wireless ad hoc networks.

A Routing Algorithm with Small Routing Traffic (작은 라우팅 구성 트래픽을 가지는 라우팅 알고리즘)

  • Choi, Ick-Sung;Kwark, Gwang-Hoon;Kim, Geun-Hyung
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.279-286
    • /
    • 2011
  • This paper proposes techniques for wireless sensor network routing algorithm with small routing traffics. It reduces routing traffic by gathering routing messages for fixed duration of time and the routing message for the configuration result is sent once. The routing traffic gathering technique has disadvantage of longer network configuration time. To overcome this, first one or first few routing messages are delivered immediately and later routing messages are gathered for fixed duration of time. The proposed scheme was modelled and implemented in Qualnet simulator using C language. Experimental results show that the proposed techniques are effective for reducing routing traffics.

Query Routing in Road-Based Mobile Ad-Hoc Networks (도로 기반 이동 애드 혹 망에서 질의 처리 방법)

  • Hwang So-Young;Kim Kyoung-Sook;Li Ki-Joune
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.259-266
    • /
    • 2005
  • Recently data centric routing or application dependent routing protocols are emerged in mobile ad hoc networks. In this paper, we propose a routing method for query processing in MANET(Mobile Ad hoc NETwork) environment, called road-based query routing, with consideration on real time traffic information of large number of vehicles. In particular, we focus on the method that process arrival time dependent shortest path query in MANET without a central server on the road networks. The main idea of our approach lies in a routing message that includes query predicates based on the road connectivity and on data gathering method in real time from vehicles on the road by ad-hoc network. We unify route discovery phase and data delivery(query processing) phase in our mechanism and reduce unnecessary flooding messages by pruning mobile nodes which are not on the same or neighboring road segments. In order to evaluate the performances of the proposed method, we established a model of road networks and mobile nodes which travel along the roads. The measurement factor is the number of nodes to whom route request is propagated according to each pruning strategy. Simulation result shows that road information is a dominant factor to reduce the number of messages.