• Title/Summary/Keyword: 분산 라우팅

Search Result 300, Processing Time 0.026 seconds

An Energy-Efficient Data Gathering Method in Wireless Sensor Networks Based on Mobile Sinks (모바일 싱크 기반 무선 센서 네트워크에서 에너지 효율적인 데이터 수집 기법)

  • Kim, Sang-Lae;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.205-207
    • /
    • 2012
  • 무선 센서 네트워크에서 에너지 효율적인 네트워크 구성을 위해 데이터를 수집하는 싱크 노드에 이동성을 적용시킨 모바일 싱크를 이용한 데이터 수집 기법이 활발하게 연구되고 있다. 하지만 최근 모바일 싱크를 적용한 데이터 수집 기법에서는 무선 센서 노드들의 에너지 소모를 분산시켜 네트워크의 수명은 증가시켰지만 고정적인 경로를 기반으로 하여 이벤트 데이터의 신속한 수집이 불가능하거나 이동성을 갖는 모바일 싱크로의 동적 라우팅 패스의 빈번한 설정으로 인해 최적화된 에너지 효율을 제공하지 못한다. 본 논문에서는 이와 같은 문제점을 해결하기 위해 모바일 싱크 기반의 무선 센서 네트워크 환경에서 에너지 효율성을 고려하여 이벤트 데이터를 우선 수집하는 데이터 수집 기법을 제안한다. 제안하는 기법은 특정 이벤트가 발생할 경우, 모바일 싱크의 이동성을 이용하여 특정 이벤트 데이터를 빠르게 수집하며 일반적인 모니터링 데이터의 압축과 전송 주기를 변경함으로써 전반적인 QoS를 향상시킨다. 성능평가 결과, 제안하는 기법은 기존 기법에 비해 이벤트 데이터에 대한 응답시간이 평균 57% 감소하였고, 네트워크의 수명이 평균 19% 증가하였다.

Localization using Centroid in Wireless Sensor Networks (무선 센서 네트워크에서 위치 측정을 위한 중점 기 법)

  • Kim Sook-Yeon;Kwon Oh-Heum
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.574-582
    • /
    • 2005
  • Localization in wireless sensor networks is essential to important network functions such as event detection, geographic routing, and information tracking. Localization is to determine the locations of nodes when node connectivities are given. In this paper, centroid approach known as a distributed algorithm is extended to a centralized algorithm. The centralized algorithm has the advantage of simplicity. but does not have the disadvantage that each unknown node should be in transmission ranges of three fixed nodes at least. The algorithm shows that localization can be formulated to a linear system of equations. We mathematically show that the linear system have a unique solution. The unique solution indicates the locations of unknown nodes are capable of being uniquely determined.

A Design of Device Management System for Factories using Wireless Sensor Network (무선 센서 망을 이용한 공장 내 장치 관리 시스템 설계)

  • Moon, Sung-Nam;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.233-240
    • /
    • 2012
  • Unlike traditional factory environment, in an industrial factory network applied wireless sensor network technologies, all procedures of discovery, identification and verification of devices should be performed in an automatic fashion. To address these challenges, we design a management system using the device registry server that we propose in this paper. In the phase of device discovery, the proposed system utilizes properties of routing protocol running in factories. Also, in the phase of identification and verification, the system uses unique and general information of a device stored within the device registration server. Such a way allows management system to reduce implementation complexity and to easily manage devices in a factory applied with a wireless network consisting of heterogeneous devices.

A Robust Route Maintenance Scheme Considering Node Mobility in Wireless Ad-hoc Networks (무선 Ad-hoc 네트워크에서 노드 이동성을 고려한 견고한 경로 관리 기법)

  • Kim, Kwan-Woong;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4A
    • /
    • pp.309-315
    • /
    • 2009
  • Wireless Ad-hoc networks are dynamic networks that consist of mobile nodes. Nodes in Ad-hoc networks are usually laptops, PDAs or mobile phones. These devices feature Bluetooth and/or IEEE 802.11 (WiFi) network interfaces and communicate in a decentralized manner. Due to characteristics of Ad-hoc networks, Mobility is a key feature of routing protocol design. In this paper, we present an enhanced routing maintenance scheme that cope with topology changes pre-actively. The key feature of the proposed scheme is to switch next-hop node to alternative neighbor node before link breakage for preventing route failure. From extensive experiments by using NS2, the performance of the proposed scheme has been improved by comparison to AODV protocol.

Design and Implementation of Linear Protection Switching for Fast Restoration in Carrier-class Ethernet Networks (캐리어 이더넷 망에서 빠른 절체를 위한 선형 프로텍션 스위칭 기능 설계 및 구현)

  • Ahn, Kye-Hyun;Kim, Kwang-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.883-891
    • /
    • 2009
  • This paper proposes Ethernet linear protection switching technology in order to provide the SONET/SDH-like resiliency over Metro Ethernet Networks. The proposed design is made of an architecture with a control processor board and several data processing boards, where the control processor board is independent of data processing board, providing a flexible solution for carrier Ethernet system. However, it leads an increasing message delay between inter-processors. In this paper, we implement and confirm a restoration of failed transport connections withing 50 millisecond in spite of increasing message delay between the control processing board and data processing board providing carrier-class network survivability.

A Simulation-based Analysis and Verification Method for Network Vulnerability (시뮬레이션 기반 네트워크 보안 취약점 분석 및 검증 방안)

  • Lee, Hyun-Jin;Kim, Kwang-hee;Lee, Haeng-Ho
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.659-666
    • /
    • 2019
  • MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.

A Study on Efficient DDoS Protection Techniques using Anycast and BGP ECMP (Anycast 구조와 BGP ECMP를 활용한 효율적인 DDoS 공격 방어 기법에 대한 연구)

  • Hong, Yun Seok;Han, Wooyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.125-128
    • /
    • 2022
  • As the number of online systems based on the internet gradually increases, cyber-scale attacks that interfere with the normal operation of web services are also on the rise. In particular, distributed denial-of-service attacks (DDoS) that interfere with normal web service operations are also increasing. Therefore, this paper presents an efficient DDoS attack defense technique utilizing Equal Cost Multi-Path (BGP ECMP) routing techniques in networks of Anycast type by operating PoP basis of major attack sources and describes how high-availability web services can be operated.

  • PDF

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol (Ad hoc 네트워크에서 GRID-Location Aided Routing 프로토콜을 이용한 분산 CA 구성)

  • Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.59-69
    • /
    • 2005
  • Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.

An Energy-Efficient Clustering Using Load-Balancing of Cluster Head in Wireless Sensor Network (센서 네트워크에서 클러스터 헤드의 load-balancing을 통한 에너지 효율적인 클러스터링)

  • Nam, Do-Hyun;Min, Hong-Ki
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.277-284
    • /
    • 2007
  • The routing algorithm many used in the wireless sensor network features the clustering method to reduce the amount of data transmission from the energy efficiency perspective. However, the clustering method results in high energy consumption at the cluster head node. Dynamic clustering is a method used to resolve such a problem by distributing energy consumption through the re-selection of the cluster head node. Still, dynamic clustering modifies the cluster structure every time the cluster head node is re-selected, which causes energy consumption. In other words, the dynamic clustering approaches examined in previous studies involve the repetitive processes of cluster head node selection. This consumes a high amount of energy during the set-up process of cluster generation. In order to resolve the energy consumption problem associated with the repetitive set-up, this paper proposes the Round-Robin Cluster Header (RRCH) method that fixes the cluster and selects the head node in a round-robin method The RRCH approach is an energy-efficient method that realizes consistent and balanced energy consumption in each node of a generated cluster to prevent repetitious set-up processes as in the LEACH method. The propriety of the proposed method is substantiated with a simulation experiment.

Residual Battery Capacity and Signal Strength Based Power-aware Routing Protocol in MANET (MANET에서 배터리 잔량과 신호세기를 동시에 고려한 Power-aware 라우팅 프로토콜)

  • Park Gun-Woo;Choi Jong-Oh;Kim Hyoung-Jin;Song Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.219-226
    • /
    • 2006
  • The shortest path is only maintained during short time because network topology changes very frequently and each mobile nodes communicate each other by depending on battery in MANET(Mobile Ad-hoc Network). So many researches that are to overcome a limitation or consider a power have executed actively by many researcher. But these protocols are considered only one side of link stability or power consumption so we can make high of stability but power consumption isn't efficient. And also we can reduce power consumption of network but the protocol can't make power consumption of balancing. For that reason we suggest RBSSPR(Residual Battery Capacity and Signal Strength Based Power-aware Routing Protocol in MANET). The RBSSPR considers residual capacity of battery and signal strength so it keeps not only a load balancing but also minimizing of power consumption. The RBSSPR is based on AODV(Ad-hoc On-demand Distance Vector Routing). We use ns-2 for simulation. This simulation result shows that RBSSPR can extense lifetime of network through distribution of traffic that is centralized into special node and reducing of power consumption.