• Title/Summary/Keyword: Mobile Ad-hoc Wireless Network

Search Result 320, Processing Time 0.028 seconds

AODV-Based Energy Efficient Routing Protocol in Wireless Mobile Ad Hoc Network (무선 모바일 애드 혹 네트워크에서 AODV기반 에너지 효율 라우팅 프로토콜)

  • Yoo, Dae-Hun;Choi, Woong-Chul;Rhee, Seung-Hyong;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.561-565
    • /
    • 2006
  • 무선 모바일 애드 혹 네트워크에서 에너지 효율을 위한 많은 라우팅 알고리즘이 연구되어 왔다. 이러한 제안된 다른 알고리즘들을 살펴보면, 에너지 효율 뿐 만 아니라 성능의 향상을 위한 노력도 기울여 왔다. 일반적으로 목적지 노드가 전송받은 RREQ의 메트릭을 통하여 에너지 효율적인 경로를 선택 하게 되는데, 이것은 결국 데이터 전송 지연이 발생하게 된다. 그리고 경로가 설정된 이후에 경로를 유지하는데 있어서, 노드의 이동이나 배터리의 소진으로 링크가 끊기게 되면 경로를 다시 찾는 과정에서 제어 패킷을 다시 플러딩 하기 때문에 여러 노드의 에너지 소비를 초래하게 된다. 본 논문에서는 이러한 문제들을 해결하기 위해 기존의 AODV(On-Demand Distance Vector Routing) 프로토콜을 기반으로 다음과 같은 방법을 제안한다. 먼저 RREQ를 받은 노드가 남은 배터리의 양을 고려하여 전송의 여부를 결정하는 방법을 제안하고, 경로를 유지하는데 있어서 전송의 세기를 통해 노드의 이동성을 인지하고 링크가 끊기기 전에 다른 노드로 경로를 대체함으로써 경로 재설정을 통한 에너지 소비를 줄이는 방안을 제안한다.

  • PDF

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

An Adaptive Flooding Scheme using N-hop Look-ahead in MANET (MANET에서 N-hop 사전조사를 이용한 적응적인 플러딩 기법)

  • Jong, Jong-Hyeok;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.32-39
    • /
    • 2006
  • MANET is a dynamically reconfigurable wireless network with no fixed infrastructure (base station, or AP). In order to provide the data service in MANET, we need an efficient routing protocol to deliver the data to the wanted destination at a mobile node. A method of routing protocols called reactive routing protocol has recently got attention because of their low routing overhead. But a method of flooding broadcasts the packet to all of its neighbors. For this reason, each of the node has high routing overhead to route and keep path discovery. Accordingly in this paper, I propose an adaptive flooding scheme using N-hop look-ahead in MANET, md an optimal N value of doing flooding the packet to limited area. Because of being basically ignorant about topological changes, each of the node did not spontaneously cope with path alteration. But an efficient flooding scheme applying N-hop look-ahead is more resilient to topology changes than traditional algorithms. And also with this efficient flooding scheme, the simulation results demonstrate excellent reduction of routing overhead.

  • PDF

An Address Autoconfiguration Mechanism for Connected MANET with Multiple Gateways having a Same Network Prefix (동일한 네트워크 프리픽스를 갖는 다중 게이트웨이 기반의 connected MANET에서 주소 자동 설정 방법)

  • Lee, Jae-Hwoon;Lee, Beom-Jae;Jung, Woo-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.405-412
    • /
    • 2009
  • Mobile ad hoc networks (MANETs) allow mobile nodes to communicate among themselves via wireless multiple hops without the help of the wired infrastructure. In the MANET, it is required not only a route setup mechanism that makes nodes not within each other's transmission range communicate but also mechanism in order for a node to auto-configure a unique address. In this paper, we propose an address auto-configuration mechanism when MANET is connected to the Internet via several Internet Gateways and all gateways advertise the same network prefix. By using the proposed mechanism, once a node configures an Internet topologically correct and globally unique IP address, then the node can utilize the configured address even though the node moves within the MANET. Through the simulations, we analyze the performance of our proposed mechanism and, from the simulation results, we show that out proposed mechanism outperforms the existing mechanism.

Media Access Control Protocol Considering MANET of Underwater Environment (수중 환경의 MANET을 고려한 매체 접근 제어 프로토콜)

  • Shin, Seung-Won;Yun, Nam-Yeol;Lee, Jin-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.97-107
    • /
    • 2013
  • Underwater wireless communication systems can be useful for underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, vessel sinking exploration, and so on. However, unlike terrestrial wireless communication, underwater wireless communication should consider factors such as long propagation delay, limited transmission capacity, high bit-error rate due to potential loss in power, ambient noise, man-made noise, multi-path, etc., because of the inherent characteristics of water. Thus, in this paper, we propose a suitable media access control(MAC) protocol that applies a combination of the ALOHA MAC protocol and the CSMA/CA MAC protocol to underwater environment. We further propose a mathematical analysis model to evaluate performance. We also verify performance improvement in the proposed scheme in comparison with existing MAC protocols.

Learning based relay selection for reliable content distribution in smart class application

  • Kim, Taehong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2894-2909
    • /
    • 2015
  • As the number of mobile devices such as smart phones and tablets explodes, the need for new services or applications is also rapidly increasing. Smart class application is one of the emerging applications, in which most of contents are distributed to all members of a class simultaneously. It is highly required to select relay nodes to cover shadow area of radio as well as extend coverage, but existing algorithms in a smart class environment suffer from high control packet overhead and delay for exchanging topology information among all pairs of nodes to select relay nodes. In addition, the relay selection procedure should be repeated in order to adapt to the dynamic topology changes caused by link status changes or device's movement. This paper proposes the learning based relay selection algorithm to overcome aforementioned problems. The key idea is that every node keeps track of its relay quality in a fully distributed manner, where RQI (Relay Quality Indicator) is newly defined to measure both the ability of receiving packets from content source and the ability of successfully relaying them to successors. The RQI of each node is updated whenever it receives or relays broadcast packet, and the node having the higher RQI is selected as a relay node in a distributed and run-time manner. Thus, the proposed algorithm not only removes the overhead for obtaining prior knowledge to select relay nodes, but also provides the adaptability to the dynamic topology changes. The network simulation and experimental results prove that the proposed algorithm provides efficient and reliable content distribution to all members in a smart class as well adaptability against network dynamics.

A Heterogeneous-carrier Selectable Routing Scheme Based on Normalized Location and Transmission Characteristics (MCS-NLTC) for Multi-carrier MANETs at Sea (다중매체로 이루어진 해상 자율망에서 이종 매체 선택이 가능하고 정규화된 위치와 전송특성에 의한 라우팅)

  • Son, Joo-Young
    • Journal of Navigation and Port Research
    • /
    • v.38 no.4
    • /
    • pp.343-348
    • /
    • 2014
  • A routing scheme called MCS-NLTC using a self-configuration marine network model and the diversity and heterogeneity of broadband wireless access technologies is newly proposed. The MCS-NLTC algorithm selects optimal nodes and carriers for every hop in optimal routes based on not conventional hop counts but normalized distances to destination ships (location information of destination ships). Normalized transmission characteristics of applications and carriers are considered to get optimal routes as well. The location information enhances convergence speed to get destinations, which makes the route search time faster. Evaluated performances are compared with those of the schemes based on max-win (OMH-MW), and normalized transmission characteristics (MCS-NTC).

A Design of Effective Architecture for Constructing Services Systems (서비스 시스템 구축을 위한 효율적 아키텍처 설계)

  • La, Hyun-Jung;Kim, Sung-Ahn;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.137-148
    • /
    • 2008
  • Services system which has been emerging as a new way of application development utilizes services as fundamental units for developing a system. Services system can offer services within web environment as well as the ubiquitous environment where mobile devices are connected to wired or wireless network. In order to provide the functionality that meets users' requirements, the most appropriate service should be selected among candidate services by taking requests and context information into account. Therefore, it is important that the service system should provide services to users by dynamically adapting to users' requirements and context information. Since different users request same functionality with different context information, one service can be differently offered to users so that variability can happen to the service systems. Most researches on context-aware systems have a tendency to solve dynamic adaptation by using more or less ad hoc manner In this paper, we consider various types of services which are performed according to context information as variability and propose adaptable architecture by applying concepts of product line architecture in order to deal with variabilities systematically.

A Study on the Election of Cluster Alternative node for Energy-Efficient in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 클러스터의 대체노드 선출 방법에 관한 연구)

  • Oh, Young-Jun;Lee, Knag-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.233-241
    • /
    • 2013
  • One fundamental issue in ad hoc networks is the alternative node election problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we proposed EEAP(Energy-Efficient Alternative Paths). This is a method of selecting an alternative node for path routing management. When some node disconnection on the path routing, using pre-selected backup node provides immediately recover the path recovery. When selecting an alternative node of Step-Parents head node on the path management, the node's energy level and distance information are cared in context-awareness. This is not only increased the system's capacity cost effectively, but also reduce transmission power entire nodes consume energy. As a result, each node could efficiently management and improves the life time for mobile host and extends system coverage.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.