• Title/Summary/Keyword: Control packet

Search Result 1,137, Processing Time 0.025 seconds

A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique (ZCN과 N2N 인증 기법을 이용한 패킷 전송에 대한 신뢰성 향상에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2015
  • MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.

M_CSPF: A Scalable CSPF Routing Scheme with Multiple QoS Constraints for MPLS Traffic Engineering

  • Hong, Daniel W.;Hong, Choong-Seon;Lee, Gil-Haeng
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.733-746
    • /
    • 2005
  • In the context of multi-protocol label switching (MPLS) traffic engineering, this paper proposes a scalable constraintbased shortest path first (CSPF) routing algorithm with multiple QoS metrics. This algorithm, called the multiple constraint-based shortest path first (M_CSPF) algorithm, provides an optimal route for setting up a label switched path (LSP) that meets bandwidth and end-to-end delay constraints. In order to maximize the LSP accommodation probability, we propose a link weight computation algorithm to assign the link weight while taking into account the future traffic load and link interference and adopting the concept of a critical link from the minimum interference routing algorithm. In addition, we propose a bounded order assignment algorithm (BOAA) that assigns the appropriate order to the node and link, taking into account the delay constraint and hop count. In particular, BOAA is designed to achieve fast LSP route computation by pruning any portion of the network topology that exceeds the end-to-end delay constraint in the process of traversing the network topology. To clarify the M_CSPF and the existing CSPF routing algorithms, this paper evaluates them from the perspectives of network resource utilization efficiency, end-to-end quality, LSP rejection probability, and LSP route computation performance under various network topologies and conditions.

  • PDF

Streaming RFID: Robust Stream Transmission over Passive RFID

  • Hwang, Seok-Joong;Han, Young-Sun;Kim, Seon-Wook;Kim, Jong-Ok
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.382-392
    • /
    • 2011
  • This paper proposes the streaming radio frequency identification (RFID) protocol to support robust data streaming in a passive communication, which is extended from the ISO18000-6 Type C RFID standard. By observing and modeling the unique bit error behavior through detailed analysis in this paper, we found that performance is significantly limited by inaccurate and unstable link frequencies as well as low SNR which are inevitable for passive devices. Based on the analysis, we propose a simple and efficient protocol to adaptively insert extra error control sequences in a packet for tolerating tough link condition while maximizing the throughput and preserving the minimal implementation cost. To evaluate effectiveness of our proposal in real-time streaming applications, we experimented on real-time H.264 video streaming and prototyped the system on FPGA. To our best knowledge, our paper is the first work to take analytical approach for maximizing the throughput and demonstrate the possibility of the realtime multimedia streaming transmission in the passive RFID system.

Performance comparison of wireless MAC protocols for wireless LANs in the radio channel with rayleigh fading, shadowing and near-far effects (Rayleigh 페이딩, 차폐현상 및 Near-far현상을 고려한 무선 채널에서의 무선 LAN용 매체접근제어 프로토콜 성능비교)

  • 김재현;신형철;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.1843-1853
    • /
    • 1997
  • The channel throughput and packet delay of wireless media control (MAC) protocols with Rayleigh fading, log-normal shoadowing and near-far effects are analyzed. We consider CSMA/CA protocols as the wireless MAC protocols, since CSMA/CA protocols are based on the standard for wireless Local Area Networks (LANs) IEEE 802. 11. We have found that the performance of CSMA/CA in radion channel model is reduced above 50% than those of error free channel model in low traffic load. We also found that 4-Way Handshake CSMA/CA protocol is supterior to the other CSMA/CA protocols in high traffic load.

  • PDF

A QoS Provisioning Based on Load Balancing for Hand-over in OFDMA System (OFDMA 시스템에서 핸드오버를 위한 부하제어 기반의 QoS 제공 방안)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.59-68
    • /
    • 2013
  • Efficient resource management and hand-over schemes are necessary to maintain consistent QoS because it may be severely defected by some delay and information loss during hand-over in LTE-Advanced networks. This paper proposes a resource management scheme based on the load control to support consistent QoS for heterogeneous services during hand-over in OFDMA based systems. Various multimedia services with different requirements for resource are able to be serviced simultaneously because service continuity can be provided by our proposed scheme. Simulation results show that it provides better performances than the conventional one with the measure of hand-over failure rate and packet loss rate.

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.

Improved Sensor MAC Protocol for Wireless Sensor Network (무선 센서 네트워크를 위한 향상된 센서 MAC 프로토콜)

  • Lee, Ju-a;Kim, Jae-Hyun;Min, Seung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1138-1146
    • /
    • 2006
  • It is very important for the sensor network to save battery capacity. Switching active mode to sleep mode is used for S-MAC protocol and expiring timer before end of the active part is used for T-MAC in order to extend battery life span. We proposed IS-MAC (Improved Sensor MAC) which gives more energy efficiency than S-MAC and T-MAC To improve energy efficiency in sensor network, we used the threshold value in buffer to transmit data packet and proposed the method to reduce the number of control packets which cause extra battery consumption. Based on the analytical results, we found that the proposed IS-MAC protocol shows better performance than conventional MAC protocols.

RCDP: Raptor-Based Content Delivery Protocol for Unicast Communication in Wireless Networks for ITS

  • Baguena, Miguel;Toh, C.K.;Calafate, Carlos T.;Cano, Juan-Carlos;Manzoni, Pietro
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.198-206
    • /
    • 2013
  • Recent advances in forward error correction (FEC) coding techniques were focused on addressing the challenges of multicast and broadcast delivery. However, FEC approaches can also be used for unicast content delivery in order to solve transmission control protocol issues found in wireless networks. In this paper, we exploit the error resilient properties of Raptor codes by proposing Raptor-based content delivery protocol (RCDP) - a novel solution for reliable and bidirectional unicast communication in lossy links that can improve content delivery in situations where the wireless network is the bottleneck. RCDP has been designed, validated, optimized, and its performance has been analyzed in terms of throughput and resource efficiency. Experimental results show that RCDP is a highly efficient solution for environments characterized by high delays and packet losses making it very suitable for intelligent transport system oriented applications since it achieves significant performance improvements when compared to traditional transport layer protocols.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

Enhanced OLSR Routing Protocol Using Link-Break Prediction Mechanism for WSN

  • Jaggi, Sukhleen;Wasson, Er. Vikas
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.3
    • /
    • pp.259-267
    • /
    • 2016
  • In Wireless Sensor Network, various routing protocols were employed by our Research and Development community to improve the energy efficiency of a network as well as to control the traffic by considering the terms, i.e. Packet delivery rate, the average end-to-end delay, network routing load, average throughput, and total energy consumption. While maintaining network connectivity for a long-term duration, it's necessary that routing protocol must perform in an efficient way. As we discussed Optimized Link State Routing protocol between all of them, we find out that this protocol performs well in the large and dense networks, but with the decrease in network size then scalability of the network decreases. Whenever a link breakage is encountered, OLSR is not able to periodically update its routing table which may create a redundancy problem. To resolve this issue in the OLSR problem of redundancy and predict link breakage, an enhanced protocol, i.e. S-OLSR (More Scalable OLSR) protocol has been proposed. At the end, a comparison among different existing protocols, i.e. DSR, AODV, OLSR with the proposed protocol, i.e. S-OLSR is drawn by using the NS-2 simulator.