• Title/Summary/Keyword: Ad Hoc 망

Search Result 416, Processing Time 0.027 seconds

Design and Evaluation of an Anomaly Detection Method based on Cross-Feature Analysis using Rough Sets for MANETs (모바일 애드 혹 망을 위한 러프 집합을 사용한 교차 특징 분석 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.27-35
    • /
    • 2008
  • With the proliferation of wireless devices, mobile ad-hoc networking (MANETS) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANETs. The proposed method performs cross-feature analysis on the basis of Rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that the performance of the proposed method is superior to the performance of Huang method that uses cross-feature based on the probability of feature attribute value. Accordingly, we know that the proposed method effectively detects anomalies.

  • PDF

Reducing Flooding Latency in Power Save Mode of IEEE 802.11-based Mobile Ad hoc Networks (IEEE 802.11 기반 이동 애드혹 망의 전력 절감 모드에서 플러딩 지연의 개선)

  • 윤현주;서명환;마중수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.532-543
    • /
    • 2004
  • Mobile Ad hoc NETworks (MANET) consist of mobile nodes which are usually powered by battery Approaches for minimizing power consumption have been proposed for all network layers and devices. IEEE 802.11 DCF (Distributed Coordination Function), a well-known medium access control protocol for MANETS, also defines a power save mode operation. The nodes in power save mode periodically repeat the awake state and the doze state in synchronized fashion. When all nodes are in the awake state, the exchange the announcements for the subsequent message transmission with neighbors. The nodes that send or receive the announcements stay awake for data transmission, and others go into the dole state. The previous works for enhancing the power save mode operation have focused on shortening the duration of the awake state. We observed that the longer sleeping period results in seriously long delivery latency and the consequent unnecessary power consumption as well, because the packets can move forward only one hop for a fixed interval. In this paper, we propose an improved protocol for the power save mode of IEEE 802.11 DCF, which allows the flooding packets to be forwarded several hops in a transmission period. Our approach does not reduce the duration of compulsory awake period, but maximizes its utilization. Each node propagates the announcements for next flooding to nodes of several hops away, thus the packets can travel multiple hops during one interval. Simulation results of comparison between our scheme and the standard show a reduction in flooding delay maximum 80%, and the unicasting latency with accompanying flooding flows near 50%, with slight increase of energy consumption.

Improvement of The AODV Routing Protocol for an Efficient Local Repair (효율적인 지역복구를 위한 AODV 라우팅 프로토콜의 개선)

  • 안수길;천수자;안상현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.487-489
    • /
    • 2003
  • 애드 혹 망은 유선 기반망 없이 무선 노드만으로 구성된 망을 말한다. 이러한 특징으로 인하여 빠른 망 구축을 가능하게 하지만, 망의 동적인 구조와 노드들의 이동성을 고려할 때 효율적인 데이터 전송을 위한 경로 유지는 중요한 문제로 대두된다. 본 논문에서는 애드 혹 라우팅 프로토콜 중의 하나인 AODV(Ad­hoc On­demand Distance Vector) 라우팅 프로토콜에서의 지역복구 (local repair) 시 경로설정 패킷의 플러딩 범위를 제한하는 범위 제한적(seeped) 플러딩을 이용한 효율적인 지역복구 기법을 제안한다. 이 방법의 경우 기존의 AODV 지역복구에 비해서 경로설정 오버헤드를 줄이고 데이터 전송률을 높일 수 있다.

  • PDF

An Efficient Multi-Hop Cluster Routing Protocol in Mobile Ad hoc Network (이동 임시 무선망에서의 효율적인 다중 홉 클러스터 라우팅 프로토콜)

  • 이현철;김시관
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.676-678
    • /
    • 2004
  • 이동 임시 무선망은 잦은 망 구성의 변화, 라우터의 수, 제한된 사용 자원 등 기존 유선 네트워크와는 다른 특성들을 가지게 된다. 따라서 기존의 유선 네트워크에서 사용하던 라우팅 프로토콜들을 이동 임시 무선망에 그대로 적용시킨다면 많은 문제점들이 발생하게 된다. 본 논문에서 제안하는 라우팅 프로토콜은 이동 임시 무선망의 특성을 고려하여, 네트워크 내의 이동 호스트를 멀티 홉을 갖는 클러스터로 묶고. 클러스터 헤드로 하여금 자신의 멤버 호스트들과 이웃 클러스터들의 헤드 정보를 유지하게 하여, 경로 설정에 대한 요구가 있을 때에 적은 지연 시간과 적은 패킷으로 목적지까지의 최단 경로를 설정할 수 있도록 한다. 또한 경로 설정과 데이터 전송 모두가 클러스터 헤드를 이용한다. 이러한 경우 모든 데이터와 경로설정 시 발생하는 패킷들이 클러스터 헤드로 집중되어 네트워크 부하가 발생하게 되는데 본 제안에서는 네트워크의 부하를 줄이기 위하여 후보 클러스터 헤드를 이용하는 방법을 제시한다.

  • PDF

A Password-based Group Key Agreement Protocol for Mobile Ad-Hoc Networks (이동 애드혹 망을 위한 패스워드 기반의 그룹키 동의 프로토콜)

  • 최연이;조인휘
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.310-312
    • /
    • 2004
  • 이동 애드혹 망은 기반구조가 없는, 즉, 고정된 라우터나 백본망 같은 기반구조가 없는 무선 이동 노드들로 구성된 망이다. 현재 이동 애드혹 망은 기반구조가 없어 보안이 가장 취약한 부분이다. 본 논문에서는 클러스터 구조 기반의 이동 애드혹 환경에서 안전하고 효율적인 방법으로 그룹의 세션키를 공유하는 패스워드 기반의 그룹키 동의 프로토콜을 제안한다. 그룹키 동의 프로토콜은 일련의 그룹을 형성하는 다수의 통신 참여자들이 공개된 통신망에서 안전하고 효율적인 방법으로 그룹의 세션키를 설정한다. 하지만 기존의 연구는 모두 상당한 양의 통신부하를 유발한다. 따라서 제안 프로토콜은 이동 애드혹 망에 적합한 대칭키 기반으로, 최적의 전송 메시지 복잡도와 2번의 통신 라운드를 요구하기 때문에 매우 효율적이다. 또한 그룹 구성원의 변경이 가능한 동적 특성과 전방향 안전성을 제공한다.

  • PDF

Performance Analysis of the IEEE 802.11 Broadcast Scheme in a Wireless Data Network (무선 데이터 망에서 IEEE 802.11 브로드캐스트 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.56-63
    • /
    • 2009
  • The IEEE 802.11 standard has been used for wireless data networks such as wireless LAN, ad-hoc network, and vehicular ad-hoc network. Thus, the performance analysis of the IEEE 802.11 specification has been one of the hottest issues for network optimization and resource management. Most of the analysis studies were performed in a data plane of the IEEE 802.11 unicast. However, IEEE 802.11 broadcast is widely used for topology management, path management, and data dissemination. Thus, it is important to understand the performance of the broadcast scheme for the design of efficient wireless data network. In this contort, we analyze the IEEE 802.11 broadcast scheme in terms of the broadcast frame reception probability according to the distance from a sending node. Unlike the other works, our analysis framework includes not only the system parameters of the IEEE 802.11 specification such as transmission range, data rate, minimum contention window but also the networking environments such as the number of nodes, network load, and the radio propagation environments. Therefore, our analysis framework is expected to be used for the development of protocols and algorithms in a dynamic wireless data network.

An LV-CAST algorithm for emergency message dissemination in vehicular networks (차량 망에서 긴급 메시지 전파를 위한 LV-CAST 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1297-1307
    • /
    • 2013
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or disseminate useful traffic information to othet vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collision at the link layer due to an excessive number of broadcast packets. To solve broadcast storm problem, we propose an RPB-MACn-based LV-CAST that is a vehicular broadcast algorithm for disseminating safety-related emergency message. The proposed LV-CAST identifies the last node within transmission range by computing the distance extending on 1 hop from the sending node of an emergency message to the next node of receiving node of the emergency message, and the last node only re-broadcasts the emergency message. The performance of LV-CAST is evaluated through simulation and compared with other message dissemination algorithms.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

Mobility Prediction Based Autonomous Data Link Connectivity Maintenance Using Unmanned Vehicles in a Tactical Mobile Ad-Hoc Network (전술 모바일 애드혹 네트워크에서 무인기를 이용하는 이동 예측 기반의 데이터 링크 연결 유지 알고리즘)

  • Le, Duc Van;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.34-45
    • /
    • 2013
  • Due to its self-configuring nature, the tactical mobile ad hoc network is used for communications between tactical units and the command and control center (CCC) in battlefields, where communication infrastructure is not available. However, when a tactical unit moves far away from the CCC or there are geographical constraints, the data link between two communicating nodes can be broken, which results in an invalid data route from the tactical units to CCC. In order to address this problem, in this paper we propose a hierarchical connectivity maintenance scheme, namely ADLCoM (Autonomous Data Link Connectivity Maintenance). In ADLCoM, each tactical unit has one or more GW (gateway), which checks the status of data links between tactical units. If there is a possibility of link breakage, GWs request ground or aerial unmanned vehicles to become a relay for the data link. The simulation results, based on tactical scenarios, show that the proposed scheme can significantly improve the network performance with respect to data delivery ratio.

A study on Dynamic Routing Protocol using Entropy-Doppler Topology (엔트로피-도플러 기법을 이용한 동적 라우팅 프로토콜에 관한 연구)

  • Chi, Sam-Hyun;Kim, Sun-Guk;Doo, Kyung-Min;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.461-465
    • /
    • 2007
  • MANET(Mobile Ad hoc Networks) is free-mobility formation of mobile nodes in the wireless networks. Generally, wireless networks has two main type of structures which Tree and Mesh. These general structure is difficult to do which connectivity, redundancy transmit and network continuant. In this paper, we would suggest a new ODDMRP(Ontology Doppler effect-based Dynamic Multicast Routing Protocol) technology for effective MANET which Ontology Doppler effect-based. ODDMRP consist of the parameters for node entropy when using Doppler effect which moving position of round node, moving time, and distribution chart in velocity also it express distance of destination node and property structure organization. It would be used to provide improvement to keep the optimal communication routing and also could be improve network stabilization, and continuation durability of connectivity.

  • PDF