• Title/Summary/Keyword: Node Discovery

Search Result 137, Processing Time 0.026 seconds

Gateway Discovery Algorithm Based on Multiple QoS Path Parameters Between Mobile Node and Gateway Node

  • Bouk, Safdar Hussain;Sasase, Iwao;Ahmed, Syed Hassan;Javaid, Nadeem
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.434-442
    • /
    • 2012
  • Several gateway selection schemes have been proposed that select gateway nodes based on a single Quality of Service (QoS) path parameter, for instance path availability period, link capacity or end-to-end delay, etc. or on multiple non-QoS parameters, for instance the combination of gateway node speed, residual energy, and number of hops, for Mobile Ad hoc NETworks (MANETs). Each scheme just focuses on the ment of improve only a single network performance, i.e., network throughput, packet delivery ratio, end-to-end delay, or packet drop ratio. However, none of these schemes improves the overall network performance because they focus on a single QoS path parameter or on set of non-QoS parameters. To improve the overall network performance, it is necessary to select a gateway with stable path, a path with themaximum residual load capacity and the minimum latency. In this paper, we propose a gateway selection scheme that considers multiple QoS path parameters such as path availability period, available capacity and latency, to select a potential gateway node. We improve the path availability computation accuracy, we introduce a feedback system to updated path dynamics to the traffic source node and we propose an efficient method to propagate QoS parameters in our scheme. Computer simulations show that our gateway selection scheme improves throughput and packet delivery ratio with less per node energy consumption. It also improves the end-to-end delay compared to single QoS path parameter gateway selection schemes. In addition, we simulate the proposed scheme by considering weighting factors to gateway selection parameters and results show that the weighting factors improve the throughput and end-to-end delay compared to the conventional schemes.

A Study on the Zone-Key based Secure Routing Scheme in MANET (MANET에서 영역-키 기반 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok;Kim, Young Sun
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.33-39
    • /
    • 2020
  • In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.

Distance Based Dynamic Probabilistic Broadcasting in Ad Hoc Wireless Networks

  • Kim Jae-Soo;Kim Jeong-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1613-1622
    • /
    • 2005
  • Broadcasting is fundamental and effective data dissemination mechanism for route discovery, address resolution, and many other network services in mobile ad hoc networks. Although many approaches for broadcasting have been proposed to minimize the number of retransmissions, none of them guarantee the best-suited bounds of retransmissions. Appropriate use of probabilistic method can lower the chance of contention and collision among neighboring nodes, so that it reduces the number of rebroadcasts. In this paper, we propose a probabilistic approach that dynamically adjusts the rebroadcasting probability according to the distance between the sender and the receiver. While the rebroadcast probabilities of a mobile node close to sender will be set lower, the rebroadcast probabilities of a mobile node far away from sender wi1l be set to higher, The rebroadcast probability of a node wi1l be set according to the distance from sender. We evaluate the performance of proposed approach by comparing it with flooding as well as a fixed probabilistic broadcast approach. Simulation results showed that the performance of proposed scheme outperforms by about $70\%$ than flooding scheme and outperforms by about $20\%$ than fixed probabilistic scheme.

  • PDF

Delay and Energy-Aware Routing Algorithm For Energy-Constrained Wireless Networks (무선 Ad-hoc 네트워크환경에서 전송지연과 에너지소비를 고려한 라우팅 알고리즘)

  • Casaquite, Reizel;Hwang, Won-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1799-1805
    • /
    • 2007
  • Wireless Ad-hoc networks may contain nodes of various types of which many can have limited power capabilities. A failure of a node due to energy exhaustion may impact the performance of the whole network hence, energy must be conserved. In this paper, we propose a Delay and Energy-Aware Routing (DEAR) algorithm a multiple metric path cost routing algorithm which considers not only the energy consumed by the node during transmission and reception but as well as the residual energy of the node and the delay incurred during route discovery. Based on our results, DEAR algorithm performs well and maximizes network lifetime by routing flows to nodes with sufficient energy such that the energy consumption is balanced among nodes in proportion to their energy reserves.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

A Locality based Resource Management Scheme for Hierarchical P2P Overlay Network in Ubiquitous Computing (계층적 P2P에서의 근거리 기반 효율적 자원관리 기법)

  • Hong, Chung-Pyo;Kim, Cheong-Ghil;Kim, Shin-Dug
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.89-95
    • /
    • 2013
  • Many peer-to-peer (p2p) systems have been studied in distributed, ubiquitous computing environments. Distributed hash table (DHT)-based p2p systems can improve load-balancing even though locality utilization and user mobility are not guaranteed. We propose a mobile locality-based hierarchical p2p overlay network (MLH-Net) to address locality problems without any other services. MLH-Net utilizes mobility features in a mobile environment. MLH-Net is constructed as two layers, an upper layer formed with super-nodes and a lower layer formed with normal-nodes. The simulation results demonstrate that MLH-Net can decrease discovery routing hops by 13% compared with JXTA and 69% compared with Chord. It can decrease the discovery routing distance by 17% compared with JXTA and 83% compared with Chord depending on the environment.

Neighbor Node Discovery and Load Balancing Schemes for Energy-Efficient Clustering in Wireless Sensor Networks (주변 노드 발견을 통한 무선 센서 네트워크에서의 에너지 효율적인 클러스터링 및 전력 균형 분산 기법)

  • Choi, Ji-Young;Kang, Chung-Gu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1147-1158
    • /
    • 2006
  • Clustering algorithm is an essential element to implement a hierarchical routing protocol, especially for a large-scale wireless sensor network. In this paper, we propose a new type of energy-efficient clustering algorithm, which maximizes the physical distance between cluster head and gateway by a neighbor node discovery mechanism. Furthermore, a slave/master patching scheme is introduced as a useful means of further improving the energy-efficiency. It has been shown that the number of cluster heads can be reduced by as many as 21% as compared with the existing clustering algorithms.

Resource Allocation and Power Control for Device-to-Device Communication in LTE-Advanced Based on User Area Information (LTE-Advanced에서 단말간 직접 통신을 위한 영역 정보 기반 자원할당 및 전력 제어 기법)

  • Li, Xiang;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.32-42
    • /
    • 2015
  • In this paper, we considered the scenario that one cellular link and muti-D2D links share the same frequency resource which can improve the spectrum efficiency during uplink communication in LTE (Long Term Evolution)-Advanced network. In order to reduce the interference caused to the D2D users, we set DME (Discovery and Management Entity) which can send the area information to eNB(evolved Node B). We proposed a resource allocation scheme by using these assistant devices to reduce the interference that CUE (Cellular User Equipment) causes to DUE Rx (D2D UE Receiver). Basing on the area information, in order to mitigate the interference among the D2D pairs which share the same frequency resource, a power control scheme has been proposed. The simulation results prove that by using the DMEs, the proposed schemes improve the stability of D2D communication and bring the highest performance of the communication system when comparing to the other different schemes.

An Efficient Route Discovery using Adaptive Expanding Ring Search in AODV-based MANETs (AODV 기반의 MANET에서 적응적인 확장 링 검색을 이용한 효율적인 경로 탐색)

  • Han, Seung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.425-430
    • /
    • 2007
  • Without the aid of stationary infrastructure, maintaining routing information for all nodes is inefficient in the Mobile Ad hoc Networks(MANET). It is more efficient when every time routing information is necessary that the source node broadcasts a query message to neighbour nodes. The source node using Ad hoc On-Demand distance Vector(AODV), which is one of the routing protocols of MANET, uses the Expanding Ring Search(ERS) algorithm which finds a destination node efficiently. In order to reduce the congestion of the network, ERS algorithm does not broadcast Route REQuest(RREQ) messages in the whole network. When the timer expires, if source node does not receive Route REPly(RREP) messages from the destination node, it gradually increases TTL value and broadcasts RREQ messages. Existing AODV cost a great deal to find a destination node because it uses a fixed NODE_TRAVERSAL_TIME value. Without the message which is added in existing AODV protocols, this paper measures delay time among the neighbours' nodes by making use of HELLO messages. We propose Adaptive ERS(AERS) algorithm that makes NET_TRAVERSAL_TIME optimum which apply to the measured delay time to NODE_TRAVERSAL_TIME. AERS suppresses the unnecessary messages, making NET_TRAVERSAL_TIME optimum in this paper. So we will be able to improve a network performance. We prove the effectiveness of the proposed method through simulation.

Dendritic Cell-Mediated Mechanisms Triggered by LT-IIa-B5, a Mucosal Adjuvant Derived from a Type II Heat-Labile Enterotoxin of Escherichia coli

  • Lee, Chang Hoon;Hajishengallis, George;Connell, Terry D.
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.4
    • /
    • pp.709-717
    • /
    • 2017
  • Mucosal tissues are the initial site through which most pathogens invade. As such, vaccines and adjuvants that modulate mucosal immune functions have emerged as important agents for disease prevention. Herein, we investigated the immunomodulatory mechanisms of the B subunit of Escherichia coli heat-labile enterotoxin type IIa ($LT-IIa-B_5$), a potent non-toxic mucosal adjuvant. Alternations in gene expression in response to $LT-IIa-B_5$ were identified using a genome-wide transcriptional microarray that focused on dendritic cells (DC), a type of cell that broadly orchestrates adaptive and innate immune responses. We found that $LT-IIa-B_5$ enhanced the homing capacity of DC into the lymph nodes and selectively regulated transcription of pro-inflammatory cytokines, chemokines, and cytokine receptors. These data are consistent with a model in which directional activation and differentiation of immune cells by $LT-IIa-B_5$ serve as a critical mechanism whereby this potent adjuvant amplifies mucosal immunity to co-administered antigens.