• Title/Summary/Keyword: MAC protocols

Search Result 260, Processing Time 0.021 seconds

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Reputation based Cooperative Routing Scheme for End-to-End Reliable Communications in Multi-hop Wireless Networks (다중 홉 무선 네트워크에서 종단 간 신뢰성 통신을 위한 평판 기반의 협력적 라우팅 기법)

  • Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1593-1608
    • /
    • 2009
  • If a certain relay node in multi-hop wireless networks might become a malicious node that does not cooperate with other nodes or a selfish node, network throughput will be dramatically decreased. Most of existing ad hoc routing protocols assuming that the nodes will fully cooperate with other nodes do not resolve the problem of network performance degradation due to malicious and selfish nodes. This paper presents the CARE (Cooperative Ad hoc routing protocol based REputation) scheme incorporating the reputation management that can achieve a multi-hop wireless network with high throughput performance. The proposed scheme provides the horizontal cross-layer approach which can identify misbehaving malicious, selfish nodes dropped out of the hop-by-hop based packet processing in the network and then set up an optimal packet routing path that will detour misbehaving nodes. And the vertical cross-layer approach contained in the CARE scheme attempts to improve the quality of routing paths by exploiting the quality of link information received from the MAC layer. Besides, it provides high TCP throughput by exploiting the reputation values of nodes acquired from the network layer into the transport layer. A case study on experiments and simulations shows that the CARE scheme incorporating vertical and horizontal cross-layer approaches yields better performance in terms of the low rate of packet loss, fast average packet delivery time, and high TCP throughput between end-to-end nodes.

  • PDF

Effects of Isoflurane/Remifentanil and Isoflurane/Fentanyl Anesthesia in Beagle Dogs (비글견에서 아이소플루란/레미펜타닐 및 아이소플루란/펜타닐 조합의 마취 효과)

  • Park, Jiyoung;Oh, Seung-June;Lee, Hae-Beom;Jeong, Seong Mok
    • Journal of Veterinary Clinics
    • /
    • v.32 no.2
    • /
    • pp.148-153
    • /
    • 2015
  • This study was performed to compare two opioid drugs with isoflurane and to determine the difference between isoflurane/remifentanil anesthesia and isoflurane/fentanyl anesthesia in terms of the anesthetic effects in beagle dogs. Isoflurane was maintained at 0.5 MAC, and the opioid drug was administered as a constant rate infusion. The anesthesia was maintained for 2 hours, and isoflurane and opioid drugs were discontinued 2 hours later. After discontinuing the anesthetics, the extremity movement time, eye global positioning time, gag reflex time, head up time, sternal recumbency time, standing time, walking time and complete recovery times were recorded for each dog. Both of the studied anesthetic protocols were suitable in beagle dogs because the anesthetic status was well maintained until the end of the procedure, and rapid recovery times were demonstrated in this experiment. And this study shows that the isoflurane/remifentanil group was more reliable than the isoflurane/fentanyl group because the recovery time CV was lower. Therefore, isoflurane/remifentanil combination anesthesia could be a better choice than isoflurane/fentanyl anesthesia if the patient is severely ill and stable recovery time is needed.

A Multi-Dimensional Node Pairing Scheme for NOMA in Underwater Acoustic Sensor Networks (수중 음향 센서 네트워크에서 비직교 다중 접속을 위한 다차원 노드 페어링 기법)

  • Cheon, Jinyong;Cho, Ho-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.1-10
    • /
    • 2021
  • The interest in underwater acoustic sensor networks (UWASNs), along with the rapid development of underwater industries, has increased. To operate UWASNs efficiently, it is important to adopt well-designed medium access control (MAC) protocols that prevent collisions and allow the sharing of resources between nodes efficiently. On the other hand, underwater channels suffer from a narrow bandwidth, long propagation delay, and low data rate, so existing terrestrial node pairing schemes for non orthogonal multiple access (NOMA) cannot be applied directly to underwater environments. Therefore, a multi-dimensional node pairing scheme is proposed to consider the unique underwater channel in UWASNs. Conventional NOMA schemes have considered the channel quality only in node pairing. Unlike previous schemes, the proposed scheme considers the channel gain and many other features, such as node fairness, traffic load, and the age of data packets to find the best node-pair. In addition, the sender employs a list of candidates for node-pairs rather than path loss to reduce the computational complexity. The simulation results showed that the proposed scheme outperforms the conventional scheme by considering the fairness factor with 23.8% increases in throughput, 28% decreases in latency, and 5.7% improvements in fairness at best.

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

Priority Collision Resolution Algorithm on HFC Networks (우선 순위를 고려한 HFC 망의 충돌 해소 알고리즘)

  • 김변곤;박준성;정경택;전병실
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1252-1260
    • /
    • 1999
  • The HFC network has a architecture of a star topology in fiber optic trunks, and tree and branch topology is used in the part of coaxial cable. It is well known that the HFC upstream channel is noisy. Ingress, common mode distortion and impulse noise exist in the upstream channel. In order to provide Quality of Service(QoS) to users with real-time data such as voice, video and interactive services, the evolving IEEE 802.14 standard for HFC networks must include an effective priority scheme. The scheme separates and resolves collisions between stations in a priority order. It is important to simulate protocols under a practical environment. The proposed algorithm in this paper is simulated with the assumption that the collision detector made certain mistake due to noises. Simulation results show that the proposed algorithm is more efficient than existing tree-based algorithm under practical environment.

  • PDF

CSMA/CA based Transmission Scheme for QoS Assurance and Energy Efficiency of WPAN Systems (CSMA/CA 경쟁방식 기반의 WPAN 시스템을 위한 QoS 보장 및 에너지 효율적 전송방식)

  • Joo, Yang-Ick;Lee, Yeon-Woo;Jung, Min-A;Jang, Bong-Seog;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.135-143
    • /
    • 2008
  • In this paper, we propose a QoS guaranteed and energy-efficient transmission scheme for Wireless Personal Area Networks (WPANs), which operate in conjunction with contention-based access protocols such as CSMA/CA. Energy consumption is one of the most important issues in WPAN systems, because WPAN devices are often required to operate under limited battery capacity. Furthermore, if the WPAN adopts a contention-based medium access protocol, the energy consumption problem becomes even more critical due to the collisions caused by independent channel access trials. Therefore, in this paper, we propose an algorithm that selects the optimum fragment size, modulation level, and transmission power, in order to minimize the energy consumption and guaranteethe QoS (Quality of Service) requirements, simultaneously. Our simulation results show that the proposed algorithm has better performance than the previous ones.

Exploiting Multi-Hop Relaying to Overcome Blockage in Directional mmWave Small Cells

  • Niu, Yong;Gao, Chuhan;Li, Yong;Su, Li;Jin, Depeng
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.364-374
    • /
    • 2016
  • With vast amounts of spectrum available in the millimeter wave (mmWave) band, small cells at mmWave frequencies densely deployed underlying the conventional homogeneous macrocell network have gained considerable interest from academia, industry, and standards bodies. Due to high propagation loss at higher frequencies, mmWave communications are inherently directional, and concurrent transmissions (spatial reuse) under low inter-link interference can be enabled to significantly improve network capacity. On the other hand, mmWave links are easily blocked by obstacles such as human body and furniture. In this paper, we develop a multi-hop relaying transmission (MHRT) scheme to steer blocked flows around obstacles by establishing multi-hop relay paths. In MHRT, a relay path selection algorithm is proposed to establish relay paths for blocked flows for better use of concurrent transmissions. After relay path selection, we use a multi-hop transmission scheduling algorithm to compute near-optimal schedules by fully exploiting the spatial reuse. Through extensive simulations under various traffic patterns and channel conditions, we demonstrate MHRT achieves superior performance in terms of network throughput and connection robustness compared with other existing protocols, especially under serious blockage conditions. The performance ofMHRT with different hop limitations is also simulated and analyzed for a better choice of the maximum hop number in practice.

An Energy Saving Protocol to Eliminate Overhearing Problem in Active RFID System (능동형 RFID 시스템에서 태그의 Overhearing을 제거하기 위한 에너지 절약 프로토콜)

  • Lee, Chae-Seok;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Reducing the energy that consumed by tag is a key requirement for the wider acceptance of the active RFID systems that use battery constrained tags. When the reader is not interrogating, the active RFID standard protocols try to reduce energy consumption of tags by using sleep mode. On sleep mode tags is active by receiving a specific signals from reader, until tag receive a sleep mode command from the reader, a tag waste energy for remaining in RX mode. Overhearing is a state of a tag in which it wastes energy for maintaining active RX state while there is no frame destined to it. According to our analysis, the amount of energy consumed by a tag due to overhearing is several time larger than that consumed by the effective communication. We propose RANO(Reservation Aloha for No Overhearing) that is designed to inform a tag of its effective communication intervals to eliminate overhearing problem in active RFID communication. The performance of the proposed protocol was evaluated through the real world by changing the number of tags and size of data. The result of an experiment, the proposed protocol performed saving about 22 times less than the standard protocol did.

An Adaptive Polling Algorithm for IEEE 802.15.6 MAC Protocols (IEEE 802.15.6 맥 프로토콜을 위한 적응형 폴링 알고리즘 연구)

  • Jeong, Hong-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.587-594
    • /
    • 2012
  • IEEE 802.15.6 standard technology is proposed for low-power wireless communication in, on and around body, where vital signs such as pulse, blood pressure, ECG, and EEG signals are transmitted as a type of data packet. Especially, these vital signs should be delivered in real time, so that the latency from slave node to hub node can be one of the pivotal performance requirements. However, in the case of IEEE 802.15.6 technology data retransmission caused by transmission failure can be done in the next superframe. In order to overcome this limitation, we propose an adaptive polling algorithm for IEEE 802.15.6 technology. The proposing algorithm makes the hub to look for an appropriate time period in order to make data retransmission within the superframe. Through the performance evaluation, the proposing algorithm achieves a 61% and a 73% latency reduction compared to those of IEEE 802.15.6 technology in the environment of 70% traffic offered load with 10ms and 100ms superframe period. In addition, the proposing algorithm prevents bursty traffic transmission condition caused by mixing retransmission traffic with the traffic reserved for transmission. Through the proposing adaptive polling algorithm, it will be possible to transmit time-sensitive vital signs without severe traffic delay.