• Title/Summary/Keyword: Analysis of MAC

Search Result 562, Processing Time 0.026 seconds

An analysis on the security of the 3GPP MAC algorithm (3GPP MAC 알고리즘 안전성 분석)

  • 홍도원;신상욱;강주성;이옥연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.59-65
    • /
    • 2001
  • 3GPP proposed a variant CBC-MAC based on the block cipher KASUMI to provide the data integrity over a radio access link. We have studied deeply the Knudsen and Mitchell\`s attack. In this paper we proposed a definite performing algorithm of the Knudsen and Mitchell\`s alack and compute the success probability and complexity of that algorithm. Moreover We also analyze a security of 3GPP-MAC comparing with the original CBC-MAC.

EP-MAC: Early Preamble MAC To Achieve Low Delay And Energy Consumption In Duty Cycle Based Asynchronous Wireless Sensor Networks

  • Oak, Jeong-Yeob;Choi, Young-June;Pak, Wooguil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2980-2991
    • /
    • 2012
  • Since wireless sensor networks are broadly used in various areas, there have been a number of protocols developed to satisfy specific constraints of each application. The most important and common requirements regardless of application types are to provide a long network lifetime and small end-to-end delay. In this paper, we propose Early Preamble MAC (EP-MAC) with improved energy conservation and low latency. It is based on CMAC but adopts a new preamble type called 'early preamble'. In EP-MAC, a transmitting node can find quickly when a next receiving node wakes up, so EP-MAC enables direct data forwarding in the next phase. From numerical analysis, we show that EP-MAC improves energy consumption and latency greatly compared to CMAC. We also implemented EP-MAC with NS-2, and through extensive simulation, we confirmed that EP-MAC outperforms CMAC.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

Power Consumption Analysis by Adjusting of Check Interval in Asynchronous Wireless Sensor Network (비동기 무선센서네트워크에서 체크인터벌 조절에 따른 전력소모 분석)

  • Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.91-96
    • /
    • 2019
  • There are so many low power MAC protocols for wireless sensor network. IEEE802.15.4 among them has disadvantage of a large power consumption for synchronization. To save power consumption it use the superframe operation alternating sleep mode and awake mode. But latency is longer result from superframe operation. Typical asynchronous B-MAC can have shorter latency according to check interval. But transmitter consumes more power because of long preamble. And receiver is suffering from overhearing. In this paper, we propose the adaptive check interval scheme of B-MAC for enhancing the power consumption and delay latency performance. Its power consumption is evaluated by comparing the proposed scheme with a typical IEEE802.15.4.

Performance Analysis of Contention based Directional MAC Protocol (지향성 안테나 기반 경쟁 MAC 프로토콜의 성능 분석)

  • Na, Woong-Soo;Cho, Sung-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.827-833
    • /
    • 2011
  • Directional MAC protocols have drawn great attentions recently in super high speed wireless local/personal area networks due to their higher antenna gain, better spatial reuse, longer transmission range, and lower interference. Despite of these merits, directional MAC protocols suffer from deafness problem. The deafness problem occurs if a node does not answer an RTS frame addressed to it. To overcome this problem, directional MAC protocols have aimed at avoiding the deafness problem using multiple control frames or advance notice techniques or distinguishing deafness from collision. In this paper, we analyze the performance of these schemes in deafness environments with some scenarios. Through performance analysis, we compare the performance of these schemes through evaluating actual network throughput.

Interference Analysis and Its Mitigation Policy Based on MAC Layer for Peaceful Co-Existence between Unlicensed Devices (비면허 기기 간 주파수 공동사용을 위한 MAC 계층 기반의 간섭 분석 및 간섭 완화 정책)

  • Jang, Byung-Jun;Choi, Sunwoong;Yoon, Hyungoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.841-848
    • /
    • 2013
  • In order for unlicensed devices to co-exist on the same frequency band, the frequency interference mitigation policy is necessary. Because the effects of frequency interference between unlicensed devices may vary depending on the analysis layer, exact interference analysis must be proceeded before making any related spectrum policy. In this paper, a frequency interference between WLAN and WPAN systems that operate at 2.4 GHz ISM band were analyzed in the physical layer and MAC layer, respectively. From the results, we confirmed that the interference analysis in MAC layer is closer to the measured results. Based on these investigations, we suggest a new co-existence criterion for unlicensed devices in MAC layer.

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL

  • Han Dong-Hwan;Park Chul-Geun
    • Journal of applied mathematics & informatics
    • /
    • v.22 no.1_2
    • /
    • pp.501-515
    • /
    • 2006
  • The IEEE 802.11 protocol is the most mature technology for WLANs(Wireless Local Area Networks). However, as the number of stations increases, the delay and throughput performance of IEEE 802.11 MAC(Medium Access Control) degrades severely. In this paper, we present the comprehensive performance analysis of IEEE 802.11 MAC protocol by investigating the MAC layer packet service time when arrival packet sizes have a general probability distribution. We obtain the discrete probability distribution of the MAC layer service time. By using this, we analyze the system throughput and the MAC layer packet service time of IEEE 802.11 MAC protocol in wireless LAN environment. We take some numerical examples for the system throughput and the mean packet service time for several special distributions of arrival packet sizes.

Design, Analysis and Evaluation of A New Energy Conserving MAC Protocol for Wireless Sensor Networks

  • Lim, Sangsoon;Kang, Young-Myoung;Jeong, Jiwoong;Kim, Chong-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3046-3060
    • /
    • 2012
  • Low power listening (LPL) MAC protocols based on duty-cycling mechanism have been studied extensively to achieve ultra low energy consumption in wireless sensor networks (WSNs). Especially, recent ACK-based LPL schemes such as X-MAC employ strobe preambles and an early ACK, and show fair performances in communications and energy efficiencies. However, the state-of-the-art ACK-based LPL scheme still suffers from collision problems due to the protocol incompleteness. These collision effects are not trivial and make WSNs unstable, aggravate energy consumptions. In this paper, we propose two novel schemes; (i) ${\tau}$-duration CCA to mitigate the collision problem in ACK-based LPL MAC protocols. (ii) Short Preamble Counter (SPC) to conserve more energy by reducing unnecessary overhearing. We demonstrate the performance improvement of our scheme via a mathematical analysis and real-time experiments. Both analysis and experimental results confirm that our proposed scheme saves energy by up to 36% compared to the naive ACK-based LPL MAC protocol thanks to ${\tau}$-duration CCA and SPC.

MAC Schemes for Best Effort Service in Wireless MAN: Design and Performance Analysis (무선 MAN에서 Best Effort 서비스를 위한 MAC 방식의 설계 및 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.128-140
    • /
    • 2006
  • In the IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple services. Among the service classes supported between the base station and subscriber stations in the wireless MAN, the best effort service class is ranked on the lowest position in priority and is assisted by a MAC scheme based on reservation ALOHA. The wireless MAN standard, however, does not reveal every detail of the MAC scheme but only describes the skeleton of the MAC scheme. Focusing on the amount of resource that a subscriber demands by a request and the amount of resource that the base grants to a request we thus present a number of resource demand rules and resource grant rules. Also, we construct a candidate MAC scheme by implanting a pair of resource demand and grant rules into the skeleton of the MAC scheme. Meanwhile a difficult situation for the best effort service is expected wherein only scarce resource is available after most of the resource is already preempted by other services. Perceiving such a situation, we evaluate the throughput and delay performance of each candidate MAC scheme. Especially we develop an analytical method to approximately calculate the throughput in the saturated environment. From the numerical results, we observe that the candidate MAC scheme which adopts the non-gated exhaustive demand rule paired with the full grant rule attains superior performance at the expense of the fairness.

SPMC-MAC : Slim Preamble Multi-Channel MAC Protocol with Transmission Power Control in Wireless Sensor Networks (무선 센서 네트워크에서 다중 채널과 전송세기 제어를 이용한 맥 프로토콜)

  • Yoon, Jang-Muk;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.876-884
    • /
    • 2008
  • In this paper, we propose an asynchronous MAC protocol to minimize energy usage and to maximize data throughput for a wireless sensor network in multi channel environments. Our proposed SPMC-MAC (Slim Preamble Multi-Channel Media Access Control) adopts the preamble sliming mechanism proposed in [6] that takes advantage of the knowledge about the wakeup time of the receiver node. The preamble contains the receiver's ID and a randomly selected channel ID for data communication, and it is transmitted over a dedicated common channel. The power control has the benefit of keeping an appropriate number of nodes with the communication range, resulting in reduced collision and interference. We compare our SPMC-MAC and X-MAC extensively in terms of energy consumption and throughput using mathematical analysis and simulation.