• Title/Summary/Keyword: Hierarchical wireless network system

Search Result 51, Processing Time 0.022 seconds

A Hybrid Key Management Scheme in Tactical Ad-hoc Network (전술 Ad-hoc 네트워크에서 하이브리드 키 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1413-1421
    • /
    • 2011
  • A next generation military communication system called Tactical Information Communication Network(TICN) is designed to advance into large capacity, high speed, and long distance wireless relay transmission. To support mobility in battlefield, the application of Ad-hoc networking technology to its wireless communication is being considered. In Ad-hoc network, the key management technique is very important to ensure the confidentiality, integrity, and authentication. In this paper, we propose a new hybrid key management scheme considering the hierarchical characteristics of the tactical ad-hoc such as TICN. For upper layer with sufficient energy and computation capability, we apply PKI based key management scheme. For lower layer with restricted resources, we propose a new key management scheme using the location-based authentication to ensure the energy efficiency.

Multi-criteria Vertical Handoff Decision Algorithm Using Hierarchy Modeling and Additive Weighting in an Integrated WLAN/WiMAX/UMTS Environment- A Case Study

  • Bhosale, Sahana;Daruwala, Rohin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.35-57
    • /
    • 2014
  • Multi-criteria decision making (MCDM) algorithms play an important role in ensuring quality of service in an integrated HetNets (Heterogeneous Networks). The primary objective of this paper is to develop a multi-criteria vertical handoff decision algorithm (VHDA) for best access network selection in an integrated Wireless Local Area Network (WLAN)/Universal Mobile Telecommunications System (UMTS)/Worldwide Interoperability for Microwave Access (WiMAX) system. The proposed design consists of two parts, the first part is the evaluation of an Analytic Hierarchy Process (AHP) to decide the relative weights of handoff decision criteria and the second part computes the final score of the weights to rank network alternatives using Simple Additive Weighting (SAW). SAW ranks the network alternatives in a faster and simpler manner than AHP. The AHP-SAW mathematical model has been designed, evaluated and simulated for streaming video type of traffic. For other traffic type, such as conversational, background and interactive, only simulation results have been discussed and presented in brief. Simulation results reveal that the hierarchical modelling and computing provides optimum solution for access network selection in an integrated environment as obtained results prove to be an acceptable solution to what could be expected in real life scenarios.

Performance Analysis of Mobility Support Protocols for IPv6 over Wireless LAN (IEEE 802.11 무선랜 환경에서의 이동성 지원 IPv6프로토콜의 성능분석)

  • Hwang Seung-Hee;Han Youn-Hee;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.391-403
    • /
    • 2005
  • Several nv6 mobility support protocols for mobile Internet services are proposed in IETP : Mobile Ipv6, Hierarchical Mobile Ipv6, and Fast Handovers over Mobile Ipv6. Recently, IEEE 802.11 network has also been widely deployed in public areas for mobile Internet services. In the near future, IPv6 mobility support over IEEE 802.11 network is expected to be a key function to actualize the All If-based mobile various services. For appropriate application of these protocols, the IPv6 mobility support protocols should be analyzed according to their characteristics in terms of signaling, handover latency, lost packets, and required buffer sire as well as the impact of lower layer such as IEEE 802.11 network. In this paper, we analyze the performance of the protocols over IEEE 802.11 network. We define a packet-level traffic model, a network system model, and a mobility model. From these models, we construct a framework for the performance analysis. We also make cost functions to formalize each protocol's performance. Lastly, we analyze the effect of varying parameters used to show diverse numerical results, and compare with each other. From the analysis results, it is concluded that each Protocol has contrary or contrastive advantages with other Protocols, so there is no protocol that holds a dominant position.

A operation scheme to the power consumption of base station in wireless networks (무선망에서 기지국의 전력소모에 대한 운영 방안)

  • Park, Sangjoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.285-289
    • /
    • 2020
  • The configuration of hierarchical wireless networks is provided to support diverse network environments. In the base station, two system state can be basically considered for the operation management so that the state transition may be occurred between active and sleep modes. Hence, to reduce energy consumption the system operation management of the low power should be considered to the base station system. In this paper we consider the analytical model of Discontinuous Reception (DRX) to investigate the system management. We provide the analysis scheme of base station system by the DRX model, and the low power factor would be investigated for the energy consumption. We also use the finite-state Markov system model that in a system state period the wireless resource request and the operation of service call arrival interval is considered to numerically analyze the performance of energy saving operations of base station.

Three Effective Top-Down Clustering Algorithms for Location Database Systems

  • Lee, Kwang-Jo;Yang, Sung-Bong
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.2
    • /
    • pp.173-187
    • /
    • 2010
  • Recent technological advances in mobile communication systems have made explosive growth in the number of mobile device users worldwide. One of the most important issues in designing a mobile computing system is location management of users. The hierarchical systems had been proposed to solve the scalability problem in location management. The scalability problem occurs when there are too many users for a mobile system to handle, as the system is likely to react slow or even get down due to late updates of the location databases. In this paper, we propose a top-down clustering algorithm for hierarchical location database systems in a wireless network. A hierarchical location database system employs a tree structure. The proposed algorithm uses a top-down approach and utilizes the number of visits to each cell made by the users along with the movement information between a pair of adjacent cells. We then present a modified algorithm by incorporating the exhaustive method when there remain a few levels of the tree to be processed. We also propose a capacity constraint top-down clustering algorithm for more realistic environments where a database has a capacity limit. By the capacity of a database we mean the maximum number of mobile device users in the cells that can be handled by the database. This algorithm reduces a number of databases used for the system and improves the update performance. The experimental results show that the proposed, top-down, modified top-down, and capacity constraint top-down clustering algorithms reduce the update cost by 17.0%, 18.0%, 24.1%, the update time by about 43.0%, 39.0%, 42.3%, respectively. The capacity constraint algorithm reduces the average number of databases used for the system by 23.9% over other algorithms.

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

A Study on Energy Efficient Self-Organized Clustering for Wireless Sensor Networks (무선 센서 네트워크의 자기 조직화된 클러스터의 에너지 최적화 구성에 관한 연구)

  • Lee, Kyu-Hong;Lee, Hee-Sang
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.3
    • /
    • pp.180-190
    • /
    • 2011
  • Efficient energy consumption is a critical factor for deployment and operation of wireless sensor networks (WSNs). To achieve energy efficiency there have been several hierarchical routing protocols that organize sensors into clusters where one sensor is a cluster-head to forward messages received from its cluster-member sensors to the base station of the WSN. In this paper, we propose a self-organized clustering method for cluster-head selection and cluster based routing for a WSN. To select cluster-heads and organize clustermembers for each cluster, every sensor uses only local information and simple decision mechanisms which are aimed at configuring a self-organized system. By these self-organized interactions among sensors and selforganized selection of cluster-heads, the suggested method can form clusters for a WSN and decide routing paths energy efficiently. We compare our clustering method with a clustering method that is a well known routing protocol for the WSNs. In our computational experiments, we show that the energy consumptions and the lifetimes of our method are better than those of the compared method. The experiments also shows that the suggested method demonstrate properly some self-organized properties such as robustness and adaptability against uncertainty for WSN's.

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.

Hierarchical Image Segmentation by Binary Split for Region-Based Image Coding (영역기반 영상부호화를 위한 이진 분열에 의한 계층적인 영상분할)

  • Park, Young-Sik;Song, Kun-Woen;Han, Kyu-Phil;Lee, Ho-Young;Nam, Jae-Yeal;Ha, Yeong-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.8
    • /
    • pp.68-76
    • /
    • 1998
  • In this paper, a new morphological image segmentation algorithm of hierarchical structure by binary split is proposed. It splits a region with the lowest quality into two regions using only two markers having the highest contrast. Therefore, it improves the quality of image with limited regions and reduces contour information which is not sensitive to human visual system, when compared with the conventional algorithm. It is appropriate to PSTN, LAN, and mobile networks, of which the available transmission bandwidth is very limited, because the number of regions can be controlled. And the proposed algorithm shows very simple structure because it doesn't need post processing to eliminate small regions and reduces much computation by using only structuring element of small size at simplification step of each hierarchical structure when compared with the conventional algorithm.

  • PDF

An Analytical Hierarchy Process Combined with Game Theory for Interface Selection in 5G Heterogeneous Networks

  • Chowdhury, Mostafa Zaman;Rahman, Md. Tashikur;Jang, Yeong Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1817-1836
    • /
    • 2020
  • Network convergence is considered as one of the key solutions to the problem of achieving future high-capacity and reliable communications. This approach overcomes the limitations of separate wireless technologies. Efficient interface selection is one of the most important issues in convergence networks. This paper solves the problem faced by users of selecting the most appropriate interface in the heterogeneous radio-access network (RAN) environment. Our proposed scheme combines a hierarchical evaluation of networks and game theory to solve the network-selection problem. Instead, of considering a fixed weight system while ranking the networks, the proposed scheme considers the service requirements, as well as static and dynamic network attributes. The best network is selected for a particular service request. To establish a hierarchy among the network-evaluation criteria for service requests, an analytical hierarchy process (AHP) is used. To determine the optimum network selection, the network hierarchy is combined with game theory. AHP attains the network hierarchy. The weights of different access networks for a service are calculated. It is performed by combining AHP scores considering user's experienced static network attributes and dynamic radio parameters. This paper provides a strategic game. In this game, the network scores of service requests for various RANs and the user's willingness to pay for these services are used to model a network-versus-user game. The Nash equilibria signify those access networks that are chosen by individual user and result maximum payoff. The examples for the interface selection illustrate the effectiveness of the proposed scheme.