• Title/Summary/Keyword: Mobile node

Search Result 1,313, Processing Time 0.026 seconds

SNMP-based Management for Mobile Network Devices (SNMP 기반의 이동형 네트워크 장비 관리 기법)

  • Kwak, Deuk-Whee;Lee, Hyun-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.557-566
    • /
    • 2008
  • Some types of network nodes such as mobile network node, mobile access point, and ad-hoc network node can be relocated frequently and, by the nature of its usage, are deployed over broad area. In this environment, the network topology is changed constantly since even the manager node as well as the managed nodes can leave or join the management network frequently. The many of existing network management technologies are mostly for small sized and homogeneous networks with static topologies and not proper for the mobile network devices. In this paper, employing peer-to-peer (P2P), the secure group communication techniques, and simple network management protocol (SNMP), we propose a highly secure and available management technique that can be used to manage the mobile network nodes through insecure management network such as the Internet. The proposed technique is implemented to show that it is practically usable.

Mobile Sink Based Energy Efficient Path Setup Method for Wireless Sensor Networks (무선 센서 네트워크 환경에서 모바일 싱크를 이용한 에너지 효율적 경로 설정 방법)

  • Yang, Seung-Hyun;Lee, Soong-Yeol;Rho, Hai-Hwan;Son, Won-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1068-1077
    • /
    • 2014
  • In this paper, we propose a novel method for path setup that optimizes energy consumptions for wireless sensor network. Existing studies usually generate paths according to Random way point approach so that it requires unnecessary energy consumptions for estimating location of the mobile sink node and transmission paths of packets. To address this problem, we propose a method that creates paths for mobile sink node using the Hilbert curve. Moreover, our method adjusts the path of the mobile sink node according to the density of sensor nodes to minimize data transmission delay. In our experiments, the proposed method outperforms existing work such as TTDD and CBPER by up to 50 times in terms of energy efficiency.

A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks (이기종 FMIPv6 기반의 이동 망에서 이동 노드 주도형 핸드오버 인증 기법)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.103-114
    • /
    • 2007
  • The existing handover authentication schemes have authentication delay and overhead of the authentication server since they have been separately studied handover authentication at the link layer and the network layer. This paper proposes a handover authentication scheme initiated by Mobile Node on FMIPv6 based mobile access networks. The main idea of the paper is to generate a session key at the mobile node side, and transfer it to the next Access Router through the authentication server. Also, the scheme has a hierarchical key management at access router. There are two advantages of the scheme. First, the generated session key can be utilized for protecting the binding update messages and also for access authentication. Second, hierarchical key management at the access router reduced the handover delay time. The security aspects on the against PFS, PBS, and DoS attack of proposed scheme are discussed.

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

A Study on Route Optimization Scheme using Correspondent Information for in the PMIPv6 considering Inter-MAG (Inter-MAG이 고려된 PMIPv6 환경에서 전달자 정보를 이용한 경로 최적화 기법에 관한 연구)

  • Choi, Young Hyun;Park, Min Woo;Eom, Jung Ho;Chung, Tai M
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.59-68
    • /
    • 2010
  • In the paper, we proposed the Using Correspondent Information for Route Optimization on PMIPv6 over Inter-MAG. Proxy Mobile IPv6 has the problem that a mobile node sends data packets through inefficient routing paths when communicating other mobile node. Route optimization schemes are proposed to solve the triangle routing problem that creates the shortest routing path by leaving the inefficient routing paths. We proposed Correspondent Information Route Optimization scheme to reduce signaling cost as compared with other route optimization scheme. We can reduce signaling cost of route optimization through the Correspondent Information message on basic PMIPv6 and hand-off environment.

Local Map-based Exploration Strategy for Mobile Robots (지역 지도 기반의 이동 로봇 탐사 기법)

  • Ryu, Hyejeong;Chung, Wan Kyun
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.4
    • /
    • pp.256-265
    • /
    • 2013
  • A local map-based exploration algorithm for mobile robots is presented. Segmented frontiers and their relative transformations constitute a tree structure. By the proposed efficient frontier segmentation and a local map management method, a robot can reduce the unknown area and update the local grid map which is assigned to each frontier node. Although this local map-based exploration method uses only local maps and their adjacent node information, mapping completion and efficiency can be greatly improved by merging and updating the frontier nodes. Also, we suggest appropriate graph search exploration methods for corridor and hall environments. The simulation demonstrates that the entire environment can be represented by well-distributed frontier nodes.

DCAR: Dynamic Congestion Aware Routing Protocol in Mobile Ad Hoc Networks

  • Kim, Young-Duk;Lee, Sang-Heon;Lee, Dong-Ha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.1
    • /
    • pp.8-13
    • /
    • 2006
  • In mobile ad hoc networks, most of on demand routing protocols such as DSR and AODV do not deal with traffic load during the route discovery procedure. To achieve load balancing in networks, many protocols have been proposed. However, existing load balancing schemes do not consider the remaining available buffer size of the interface queue, which still results in buffer overflows by congestion in a certain node which has the least available buffer size in the route. To solve this problem, we propose a load balancing protocol called Dynamic Congestion Aware Routing Protocol (DCAR) which monitors the remaining buffer length of all nodes in routes and excludes a certain congested node during the route discovery procedure. We also propose two buffer threshold values to select an optimal route selection metric between the traffic load and the minimum hop count. Through simulation study, we compare DCAR with other on demand routing protocols and show that the proposed protocol is more efficient when a network is heavily loaded.

  • PDF

The Study of Hierarchical Intrusion Detection Based on Rules for MANET (MANET에서 규칙을 기반으로 한 계층형 침입 탐지에 관한 연구)

  • Jung, Hye Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.153-160
    • /
    • 2010
  • MANET composed mobile nodes without central concentration control like base station communicate through multi-hop route among nodes. Accordingly, it is hard to maintain stability of network because topology of network change at any time owing to movement of mobile nodes. MANET has security problems because of node mobility and needs intrusion detection system that can detect attack of malicious nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system based on rules in order to more accurate intrusion detection. Cluster head perform role of monitor node to raise monitor efficiency of packet. In order to evaluate performance of proposed method, we used jamming attack, selective forwarding attack, repetition attack.

Implementation of Node Transition Probability based Routing Algorithm for MANET and Performance Analysis using Different Mobility Models

  • Radha, Sankararajan;Shanmugavel, Sethu
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.202-214
    • /
    • 2003
  • The central challenge in the design of ad-hoc networks is the development of dynamic routing protocol that efficiently finds route between mobile nodes. Several routing protocols such as DSR, AODV and DSDV have been proposed in the literature to facilitate communication in such dynamically changing network topology. In this paper, a Node Transition Probability (NTP) based routing algorithm, which determines stable routes using the received power from all other neighboring nodes is proposed. NTP based routing algorithm is designed and implemented using Global Mobile Simulator (GloMoSim), a scalable network simulator. The performance of this routing algorithm is studied for various mobility models and throughput, control overhead, average end-to-end delay, and percentage of packet dropped are compared with the existing routing protocols. This algorithm shows acceptable performance under all mobility conditions. The results show that this algorithm maximizes the bandwidth utilization during heavy traffic with lesser overhead.

A Cooperative Transmission Strategy using Entropy-based Relay Selection in Mobile Ad-hoc Wireless Sensor Networks with Rayleigh Fading Environments

  • An, Beong-Ku;Duy, Tran Trung;Kong, Hyung-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.147-162
    • /
    • 2009
  • In this paper, we propose a Cooperative Transmission Strategy using Entropy-based Relay Selection in Mobile Ad-hoc Wireless Sensor Networks(MAWSN) with Rayleigh Fading Environments. The main features and contributions of the proposed cooperative transmission strategy are as follows. First, entropy-based relay selection is used to improve data transmission reliability from a source node to a destination node. Second, we present a theoretical analysis model for the proposed cooperative transmission strategy with the outage probability of the end-to-end performance. The performance of our protocol is evaluated using analysis and simulation.