• 제목/요약/키워드: Forwarding scheme

검색결과 214건 처리시간 0.027초

에너지 효율적 센서 데이터 수집을 위한 리포팅 허용 지연시간 적응형 센서 제어 기법 구현 및 성능평가 (Implementation and Performance Evaluation of Reporting Interval-adaptive Sensor Control Scheme for Energy Efficient Data Gathering)

  • 손태식;최효현
    • 정보처리학회논문지C
    • /
    • 제17C권6호
    • /
    • pp.459-464
    • /
    • 2010
  • 다양한 응용에 적용될 수 있는 특성을 가진 무선 센서 네트워크는 적용되는 응용에 따라 데이터 리포팅 허용 지연시간이 다양하다. 따라서, 각 응용별로 센서를 제어하는 설계 패러다임을 적용하여 에너지 효율을 최대화하고 네트워크의 생존기간을 최대화할 수 있어야 한다. 본 논문에서는 2단계 클러스터링 (Two Phase Clustering:TPC) 방식을 기반으로 하여 센서 데이터 수집시 에너지 효율을 극대화 하는 리포팅 허용 지연시간 적응형 센서 스케쥴링 방안을 구현하고 성능을 평가한다. 센서 Mote상에 직접 구현된 스케쥴링 기법은 제어 메시지나 시간에 민감한 센서 데이터들을 포워딩하는 직접 링크와 릴레이 링크의 두 가지 링크를 활용하며 실제 환경에서의 에너지 효율을 측정하여 센서들이 두 링크를 사용함으로서 갖는 에너지-절약 효과를 보인다.

공격차단 기법과 공격경감 기법 간 이론적 성능 분석 (Theoretical Performance Analysis between Attack Prevention Schemes and Attack Mitigation Schemes)

  • 고광선;엄영익
    • 대한전자공학회논문지TC
    • /
    • 제43권7호
    • /
    • pp.84-92
    • /
    • 2006
  • 서비스거부 공격 또는 분산서비스거부 공격과 같이 단시간 동안 대량의 비정상 트래픽이 발생하였을 경우, 이에 대응하기 위한 기법들에 대해 많은 연구가 진행되었다. 본 논문에서는 비정상 트래픽에 대응하기 위한 대표적인 기법들인 공격차단 기법과 공격경감 기법을 이론적으로 비교한 내용을 보이고자 한다. 공격차단 기법은 일반적으로 필터링 규칙을 기반으로 특정 네트워크로 유입된 네트워크 트래픽에 대해 통과 또는 차단을 실시하는 기법을 의미한다. 그리고 공격경감 기법은 트래픽 전송경로 상에 존재하는 라우터에서 각 라우터들이 가지고 있는 비정상 트래픽 정보를 기반으로 해당 트래픽에 대해 필터링 작업을 실시하거나, 목적지 네트워크의 게이트웨이 상에서 유입된 트래픽의 서비스품질을 제어하는 방법으로 비정상 트래픽에 대해 대응 작업을 실시하는 기법을 의미한다. 비교 기준으로는 공격탐지루틴이 동작한 후, 통과하는 정상 트래픽과 오탐지 트래픽 비율로 하며, 공격경감 기법에 사용할 수 있는 구체적인 트래픽 대역폭 비율을 추가로 보이도록 한다.

MPLS를 기반으로 한 Mobile IPv6의 이동성 지원 방법

  • 최은석;박홍성
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 A
    • /
    • pp.163-166
    • /
    • 2003
  • In recent years, there has been increased to access multimedia service through the Internet due to rise of the access speed. We suppose the co-existence of the various access networks in adjacent area in the future, such as wireless LAN, Bluetooth, and 3G Cellular So, the size of the cell will be smaller and the number of access point will be increased. In other words, the potable devices need the efficient mobility scheme due to move between cells frequently Currently, the several of the scheme, which is Cellular IP, HAWAII, Mobile IPv4 regional registration, and hierarchical Mobile IPv6, is suggested to support micro-mobility but Mobile IPv4 is standard scheme to support the mobility of the mobile node. MPLS, which forwards the packet through switching instead of routing using IP address, has begun to deploy in the internet backbone to increase the performance of mobility protocol. The integration of both MPLS and Mobile IP improves the scalability of the Mobile IP data forwarding process by leveraging on the features MPLS which are fast switching and high scalability. Moreover it abbreviates IP-in-IP tunneling between HA and FA. In this paper, we suggest efficient mobility scheme through integration of both MPLS and hierarchical Mobile IPv6.

  • PDF

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권3호
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

무선 Content-Centric Network에서 Data 확산 제한 방법 (Method to Limit The Spread of Data in Wireless Content-Centric Network)

  • 박찬민;김병서
    • 대한임베디드공학회논문지
    • /
    • 제11권1호
    • /
    • pp.9-14
    • /
    • 2016
  • Since Devices such labtop, tablet, smartphone have been developed, a lots of huge data that can be classified as content is flooded in the network. According to changing Internet usage, Content-Centric Network(CCN) what is new concept of Internet Architecture is appeared. Initially, CCN is studied on wired network. but recently, CCN is also studied on wireless network. Since a characteristic of wireless environment is different from a characteristic of wired environment, There are issues in wireless CCN. In this paper, we discuss improvement method of Data spread issue on wireless CCN. The proposed scheme of this paper use MAC Address of nodes when Interest and Data Packet are forwarded. As using the proposed scheme, we reduce the spread of Data and offer priority of forwarding to nodes of shortest path, reduce delay by modifying retransmission waiting time.

Mobile IPv6망에서 소스 이동성을 갖는 멀티캐스트 라우팅 및 비용모델 (Multicast Routing and Cost Model with Source Mobility in Mobile IPv6 Networks)

  • 박병섭
    • 한국콘텐츠학회논문지
    • /
    • 제4권4호
    • /
    • pp.197-203
    • /
    • 2004
  • 모바일 네트워크에서 멀티캐스팅 알고리즘을 구현시에는, 호스트 그룹핑이나 멀티캐스트 제공 트리를 효율적으로 관리하는 것이 주요한 이슈이다. 본 논문에서는 Mobile-IPv6 기반에서 멀티캐스트 문제 등을 고찰하며, MLD 프로토콜을 사용하여 수신자뿐만 아니라 소스도 이동성을 갖는 기법을 제안한다. 제안된 기법은 터널을 사용하여 그룹에 대한 멀티캐스팅을 중단하도록 HA에 요청하는 방식이며, 비용분석 모델을 통하여 그 효율성을 입증한다.

  • PDF

An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services in EPONs

  • Choi, Su-Il
    • Journal of the Optical Society of Korea
    • /
    • 제13권3호
    • /
    • pp.373-378
    • /
    • 2009
  • An Ethernet passive optical network (EPON) is a low-cost, high-speed solution to the bottleneck problem of a broadband access network. This paper analyzes the delay and the jitter performance of dynamic bandwidth allocation (DBA) schemes for differentiated services in EPONs. Especially, the average packet delay and the delay jitter of the expedited forwarding (EF) traffic class are compared, with consideration as to whether a cyclic or an interleaved polling scheme is superior. This performance evaluation reveals that the cyclic polling based DBA scheme provides constant and predictable average packet delay and improved jitter performance for the EF traffic class without the influence of load variations.

무선 Ad-hoc 망에서 라우팅 에너지 소비의 균형 기법 (Balancing of Routing Energy Consumption in Wireless Ad-hoc Networks)

  • 강용혁;엄영익
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2000년도 추계학술대회 논문집
    • /
    • pp.97-101
    • /
    • 2000
  • Energy consumption is considered as a principal ingredient in mobile wireless ad-hoc networks. In such a network, most of mobile nodes takes a role in forwarding messages received from neighbor nodes. Energy of these nodes is consumed in different rates depending on message traffic routes. This paper proposes a scheme to balance routing energy consumption by transferring routing function from node with small residual energy to node with enough residual energy. This scheme requires additional local message transfer, increasing the energy consumption of nodes to transfer routing function, and increasing total energy consumption of ad-hoc network. But balancing of energy consumption make the system lifetime the longer and increase the average node lifetime.

  • PDF

동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법 (A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System)

  • 이상진;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법 (An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic)

  • 선청일;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF