• Title/Summary/Keyword: MAC protocols

검색결과 260건 처리시간 0.023초

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

An Energy-Efficient Clustering Protocol Based on The Cross-Layer Design in Wireless Sensor Networks (무선 센서 네트워크에서 크로스 레이어 기반의 에너지 효율적인 클러스터링 프로토콜)

  • Kim, Tae-Kon;Lee, Hyung-Keun
    • Journal of IKEEE
    • /
    • 제11권4호
    • /
    • pp.165-170
    • /
    • 2007
  • The main goal of research concerning clustering protocols is to minimize the energy consumption of each node and maximize the network lifetime of wireless sensor networks. However, most existing clustering protocols mainly focused on the design and formation of clusters, leaving the consideration of communication between the cluster head and the sink behind. In this paper, we propose efficient multi path routing algorithm by using MAC-NET Cross-layering. multi path needed only one tiny packet from sink to setup. In addition proposed algorithm can be used for any cluster-based hierarchical inter-clustering routing algorithm. The simulation results demonstrate that proposed algorithm extended the overall survival time of the network by reducing the load of cluster heads. The performance of proposed algorithm is less affected by the extension of sensing field than other inter-clustering operation.

  • PDF

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • 제15권1호
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

Slot-Time Optimization Scheme for Underwater Acoustic Sensor Networks (수중음향 센서네트워크를 위한 슬롯시간 최적화 기법)

  • Lee, Dongwon;Kim, Sunmyeng;Lee, Hae-Yeoun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제39C권4호
    • /
    • pp.351-361
    • /
    • 2014
  • Compared to a terrestrial communication, the high BER(Bit Error Ratio) and low channel bandwidth are the major factor of throughput degradation due to characteristics of underwater channel. Therefore, a MAC protocol must be designed to solve this problem in UWASNs(Underwater Acoustic Sensor Networks). MAC protocols for UWASNs can be classified into two major types according to the contention scheme(Contention-free scheme and Contention-based scheme). In large scale of sensor networks, a Contention-based scheme is commonly used due to time-synchronize problem of Contention-free scheme. In the contention-based scheme, Each node contends with neighbor nodes to access network channel by using Back-off algorithm. But a Slot-Time of Back-off algorithm has long delay times which are cause of decrease network throughput. In this paper, we propose a new scheme to solve this problem. The proposed scheme uses variable Slot-Time instead of fixed Slot-Time. Each node measures propagation delay from neighbors which are used by Slot-time. Therefore, Slot-Times of each node are optimized by considering node deployment. Consequently, the wasted-time for Back-off is reduced and network throughput is improved. A new mac protocol performance in throughput and delay is assessed through NS3 and compared with existing MAC protocol(MACA-U). Finally, it was proved that the MAC protocol using the proposed scheme has better performance than existing MAC protocol as a result of comparison.

A wireless MAC protocol for the integrated voice/data services (통합 음성/데이타 서비스를 위한 무선 MAC 프로토콜)

  • 임인택;허정석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제23권5호
    • /
    • pp.1173-1183
    • /
    • 1998
  • This paper proposes an SS-PRMA protocol for the integrated voice and data services in the packet radio networks. In this protocol, the uplink logical channels are provided by combining the time slots and the spreding codes. SS-PRMA protocol contains some features of existing protocols such as PRMA, slotted ALOHA, and CDMA. In the proposed protocol, the voice terminals use a reservation mechanism, and the dta terminals use a slotted ALOHA scheme. The analysis and the simulation results show that most of the performances for the voice traffic can be achieved by employing a few distinct spreading codes and the data traffic throughput is closely related to the number of spreading code channels. Also it shows that the data traffic performance can be significantly improved by applying an FEC scheme to the data link layer.

  • PDF

Improvement of Dynamic Slot allocation algorithm for wireless ATM networks (무선 ATM 망에서 실시간 가변성 서비스를 위한 동적 슬롯 할당 알고리즘의 개선)

  • Hyun-joo Kim
    • Journal of the Korea Computer Industry Society
    • /
    • 제2권2호
    • /
    • pp.165-180
    • /
    • 2001
  • This study is on the design and performance evaluation of a multi medium access control(MAC) protocol for multimedia access in the wireless ATM network. In general, MAC protocols for multimedia data transmission are classified into the fixed slot allocation algorithm that allocates base-station slots equally over terminals, and the dynamic slot allocation algorithm that with flexible penetration. The conventional slot allocation algorithms assign slots based on the average bandwidths required for various services types. Although the algorithms have a wide bandwidth for real-time-variant services, the slots are being wasted due the service types. To improve the slot waste problem, this thesis proposes a method that minimizes the waste by assigning variable slots based on the most appropriate bandwidth after a base-station analyzes the service type requested from terminals.

  • PDF

Prioritized Packet Reservation CDMA Protocolfor Integrated Voice and Data Services (CDMA 망에서의 음성 및 데이터 통합 서비스를 위한 우선권 기반의 패킷 예약 접속 프로토콜)

  • Kim, Yong-Jin;Kang, Chung-Gu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제37권1호
    • /
    • pp.32-43
    • /
    • 2000
  • In this paper, we investigate the existing medium access control (MAC) protocols to integrate the voice and data services in packet-based CDMA networks and furthermore, propose a new approach to circumvent the operational limits inherent in them. We propose the $P^2R$-CDMA (Prioritized Packet Reservation Code Division Multiple Access) protocol for the uplink in the synchronous multi-code CDMA system, which employs the centralized frame-based slot reservation along with the dynamic slot assignment in the base station using the QoS-oriented dynamic priority of individual terminal. The simulation results show that, as compared with the existing scheme based on the adaptive permission probability control (APC), the proposed approach can significantly improve the system capacity while guaranteeing the real-time requirement of voice service.

  • PDF

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권4호
    • /
    • pp.1223-1247
    • /
    • 2012
  • The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.

An Energy Efficient Data Delivery Scheme based on Cross-Layer Design in Wireless Sensor Networks (무선 센서네트워크에서 교차계층 설계 기반의 에너지 효율적인 데이터 전송 기법)

  • Shin, Jong-Whoi;Kim, Jae-Hyun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • 제13권4호
    • /
    • pp.177-184
    • /
    • 2008
  • The design goal of protocols in wireless sensor networks (WSN) is mainly energy efficiency because of their stringent resource and energy constraints. In this paper, we propose a simple cross-layered protocol for WSNs, so called EATD(Energy-Aware Tree based Delivery scheme). EATD is a tree-based energy aware data delivery algorithm by using a SYNC packet with link and node cost to maximize the network lifetime. Our simulation results show significant improvements compared with existing schemes in terms of energy efficiency and delay.

  • PDF

Analysis of Channel Access Delay in CR-MAC Protocol for Ad Hoc Cognitive Radio Wireless Sensor Networks without a Common Control Channel

  • Joshi, Gyanendra Prasad;Nam, Seung Yeob;Acharya, Srijana;Kim, Sung Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.911-923
    • /
    • 2014
  • Ad hoc cognitive radio wireless sensor networks allow secondary wireless sensor nodes to recognize spectrum opportunities and transmit data. Most existing protocols proposed for ad hoc cognitive radio wireless sensor networks require a dedicated common control channel. Allocating one channel just for control packet exchange is a waste of resources for channel-constrained networks. There are very few protocols that do not rely on a common control channel and that exchange channel-negotiation control packets during a pre-allocated time on the data channels. This, however, can require a substantial amount of time to access the channel when an incumbent is present on the channel, where the nodes are intended to negotiate for the data channel. This study examined channel access delay on cognitive radio wireless sensor networks that have no dedicated common control channel.