• Title/Summary/Keyword: Detour Path

Search Result 38, Processing Time 0.029 seconds

Efficient Detour routing path detection algorithm based on the hierarchical network structure analysis (계층적 네트웍 구조 분석 기반의 패킷우회 검출 알고리즘)

  • 김진천;이동근;이동현;최상복
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.65-69
    • /
    • 2001
  • Network Management become more and more important issue in the network environment in which many applications such as Mail, teleconferencing, WWW and database software are operated. It can be possible for The Bridge and flouter forwarding data to select next hop device which results in routing incorrect path from the viewpoint of network design. In this paper we address the problem of finding the detour routing path due to incorrect setting on routing devices. We propose the new algorithm for finding detour routing path based on hierarchical network structure analysis using information from SNMP MIB. To prove the correctness of the proposed algorithm we have done simulation with predefined data. Simulation results show that the algorithm finds detour path correctly

  • PDF

Energy-efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks (무선 센서 네트워크에서 라우팅 홀을 우회하기 위한 에너지 효율적 데이타 전달 프로토콜)

  • Ye, Tian;Yu, Fucai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.321-325
    • /
    • 2008
  • Void areas(holes) as an inevitable phenomenon exist in geographic routing of wireless sensor networks, because the unpredictable and harsh nature application environment or uneven energy consumption. Most of the existing schemes for the issue tend to construct a static detour path to bypass a hole. The static detour path may lead to uneven energy consumption of the nodes on the perimeter of the hole; thus it may enlarge the hole. At the same time, traffic would concentrate on the peripheral node of the hole; thus the nodes on the perimeter of the hole tend to be depleted quietly. In previous work, we have proposed a hole geometric model to reduce the energy consumption and packet collisions of the nodes on the hole boundary. This scheme, however, still has the static detour path problem. Therefore, we extend the previous work by constructing a dynamic detour path hole geometric model for wireless sensor networks in this paper. The location of hole detour anchors is dynamically shifted according to Gaussian function, just generating dynamic hole detour paths.

MIB-II based Algorithm for hierarchical network analysis and detection of detour routing paths (MIB-II 기반 계층적 네트워크 구조 분석 및 패킷우회 검출 알고리즘)

  • 김진천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1442-1448
    • /
    • 2003
  • Network Management become more and more important issue in the network environment in which many applications such as Mail, teleconferencing, WWW and database software are operated. It can be possible for The Bridge and Router forwarding data to select next hop device which results in routing incorrect path from the viewpoint of network design. In this paper we address the problem of finding the detour routing path due to incorrect setting on routing devices. We propose the new algorithm for finding detour muting path based on hierarchical network structure analysis using information from SNMP MIB. To prove the correctness of the unposed algorithm we have done simulation with predefined data. Simulation results show that the algorithm finds detour path correctly.

Protection and Restoration of GMPLS LSP using CR-LDP Detours (CR-LDP 우회를 통한 GMPLS LSP의 보호 및 복구)

  • 김진형;정재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1051-1059
    • /
    • 2003
  • The key feature of GMPLS is the provision of network resources and the automatic set-up of a path. And the mechanism of protection and restoration of a path is presented when network component fails. This paper suggests CR-LDP Static Detour Mechanism and Dynamic Detour Mechanism. CR-LDP Detours are a mechanism to set up detour paths automatically at every node to protect working path. Hence suggested mechanism performance is compared with existing mechanisms by computer simulation.

A Study on a New Algorithm for K Shortest Detour Path Problem in a Directed Network (유방향의 복수 최단 우회 경로 새로운 해법 연구)

  • Chang, Byung-Man
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.60-66
    • /
    • 2006
  • This paper presents a new algorithm for the K shortest path problem in a directed network. After a shortest path is produced with Dijkstra algorithm, detouring paths through inward arcs to every vertex of the shortest path are generated. A length of a detouring path is the sum of both the length of the inward arc and the difference between the shortest distance from the origin to the head vertex and that to the tail vertex. K-1 shorter paths are selected among the detouring paths and put into the set of K paths. Then detouring paths through inward arcs to every vertex of the second shortest path are generated. If there is a shorter path than the current Kth path in the set, this path is placed in the set and the Kth path is removed from the set, and the paths in the set is rearranged in the ascending order of lengths. This procedure of generating the detouring paths and rearranging the set is repeated for the K-1 st path of the set. This algorithm can be applied to a problem of generating the detouring paths in the navigation system for ITS and also for vehicle routing problems.

  • PDF

An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6 (IPv6 기반의 사물인터넷 환경에서 악성 노드의 패킷 유실 공격 탐지 및 우회 기법 분석)

  • Choi, Jaewoo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.655-659
    • /
    • 2016
  • In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.

Analysis of Influencing Factors of Traveler Detour Making Behavior for Providing Freeway VMS Information (고속도로 VMS 정보 제공 시 우회율 산출에 관한 연구)

  • Choi, Jai-Sung;Sung, Hyun-Jin;Kim, Sang-Youp;Park, Jun;Kang, Weon-Eui
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.3
    • /
    • pp.41-50
    • /
    • 2010
  • This paper presents an investigation result that is made to determine dominant influencing factors and their specific impacts on motorist detour makings for VMS placements on freeway. This was necessary to provide engineers with a tool for evaluating VMS cost-effectiveness and its feasibility. This research found that additional travel time delay is the most influential variable in determining motorist detour makings. Also, more than 70% freeway motorists recognize the adjacent national roads as their detour routes, and both AADT and the distance to the entering point of the detour path are found to be dominating factors. Motorist detour ratio model by VMS placement on freeway is developed based on the Stated Preference. In model validation, actual detour making behaviors observed by the Revealed Preference values verify the detour ratio on the Stated Preference. These research findings should be useful for cost-effective placements of VMS on freeway, and it is recommended that the results be tested by practicing engineers in the ITS sector.

Finding Rectilinear(L1), Link Metric, and Combined Shortest Paths with an Intelligent Search Method (지능형 최단 경로, 최소 꺾임 경로 및 혼합형 최단 경로 찾기)

  • Im, Jun-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.43-54
    • /
    • 1996
  • This paper presents new heuristic search algorithms for searching rectilinear r(L1), link metric, and combined shortest paths in the presence of orthogonal obstacles. The GMD(GuidedMinimum Detour) algorithm combines the best features of maze-running algorithms and line-search algorithms. The SGMD(Line-by-Line GuidedMinimum Detour)algorithm is a modiffication of the GMD algorithm that improves efficiency using line-by-line extensions. Our GMD and LGMD algorithms always find a rectilinear shortest path using the guided A search method without constructing a connection graph that contains a shortest path. The GMD and the LGMD algorithms can be implemented in O(m+eloge+NlogN) and O(eloge+NlogN) time, respectively, and O(e+N) space, where m is the total number of searched nodes, is the number of boundary sides of obstacles, and N is the total number of searched line segment. Based on the LGMD algorithm, we consider not only the problems of finding a link metric shortest path in terms of the number of bends, but also the combined L1 metric and Link Metric shortest path in terms of the length and the number of bands.

  • PDF

Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

  • Borisov, Nikita;Klonowski, Marek;Kutylowski, Miroslaw;Lauks-Dutka, Anna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.380-399
    • /
    • 2010
  • In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the entire path is revealed. The ACNS 2008 proposal addressed this by using a more complicated key management scheme. The revised protocol is immune to detour attacks. We show, however, that the ModOnion construction is highly malleable and this property can be exploited in order to redirect ModOnions. Our attacks require detailed probing and are less efficient than the detour attack, but they can nevertheless recover the full onion path while avoiding detection and investigation. Motivated by this, we present modifications to the ModOnion protocol that dramatically reduce the malleability of the encryption primitive. It addresses the class of attacks we present and it makes other attacks difficult to formulate.

A Localized Adaptive QoS Routing Scheme Using POMDP and Exploration Bonus Techniques (POMDP와 Exploration Bonus를 이용한 지역적이고 적응적인 QoS 라우팅 기법)

  • Han Jeong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.175-182
    • /
    • 2006
  • In this paper, we propose a Localized Adaptive QoS Routing Scheme using POMDP and Exploration Bonus Techniques. Also, this paper shows that CEA technique using expectation values can be simply POMDP problem, because performing dynamic programming to solve a POMDP is highly computationally expensive. And we use Exploration Bonus to search detour path better than current path. For this, we proposed the algorithm(SEMA) to search multiple path. Expecially, we evaluate performances of service success rate and average hop count with $\phi$ and k performance parameters, which is defined as exploration count and intervals. As result, we knew that the larger $\phi$, the better detour path search. And increasing n increased the amount of exploration.