• Title/Summary/Keyword: Packet Combining

Search Result 67, Processing Time 0.033 seconds

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

MIMO ARQ Systems Using Alamouti Coding with Optimal Retransmission Order for Maritime Communications System (해상 통신을 위한 Alamouti 방식의 다중안테나 기반 최적 재전송 순서 기법)

  • Kim, Dong Ho;Li, Weiduo;Lee, Jung-Hoon;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.394-401
    • /
    • 2013
  • Recently there have been much interest in the performance improvement of maritime communication system. In the maritime communication system, the wireless channel is likely to be time-invariant and the retransmission scheme is not proper because it does not provide time diversity. For the improvement of reliability, we consider MIMO ARQ scheme using Alamouti-type signal which can provide space and time diversity. In this paper, we also propose the criterion of optimal retransmission order and provide its performance of error probability and packet throughput. The proposed MIMO ARQ scheme with optimal retransmission order has performance gain over random ordered MIMO ARQ and conventional Chase combining method. Therefore we expect that it can be adapted to the next generation maritime communication system.

Automatic Vowel Sequence Reproduction for a Talking Robot Based on PARCOR Coefficient Template Matching

  • Vo, Nhu Thanh;Sawada, Hideyuki
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.3
    • /
    • pp.215-221
    • /
    • 2016
  • This paper describes an automatic vowel sequence reproduction system for a talking robot built to reproduce the human voice based on the working behavior of the human articulatory system. A sound analysis system is developed to record a sentence spoken by a human (mainly vowel sequences in the Japanese language) and to then analyze that sentence to give the correct command packet so the talking robot can repeat it. An algorithm based on a short-time energy method is developed to separate and count sound phonemes. A matching template using partial correlation coefficients (PARCOR) is applied to detect a voice in the talking robot's database similar to the spoken voice. Combining the sound separation and counting the result with the detection of vowels in human speech, the talking robot can reproduce a vowel sequence similar to the one spoken by the human. Two tests to verify the working behavior of the robot are performed. The results of the tests indicate that the robot can repeat a sequence of vowels spoken by a human with an average success rate of more than 60%.

A wireless MAC protocol for the integrated voice/data services (통합 음성/데이타 서비스를 위한 무선 MAC 프로토콜)

  • 임인택;허정석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1173-1183
    • /
    • 1998
  • This paper proposes an SS-PRMA protocol for the integrated voice and data services in the packet radio networks. In this protocol, the uplink logical channels are provided by combining the time slots and the spreding codes. SS-PRMA protocol contains some features of existing protocols such as PRMA, slotted ALOHA, and CDMA. In the proposed protocol, the voice terminals use a reservation mechanism, and the dta terminals use a slotted ALOHA scheme. The analysis and the simulation results show that most of the performances for the voice traffic can be achieved by employing a few distinct spreading codes and the data traffic throughput is closely related to the number of spreading code channels. Also it shows that the data traffic performance can be significantly improved by applying an FEC scheme to the data link layer.

  • PDF

An Enhanced LPI Control Mechanism in Energy Efficient Ethernet (에너지 효율적인 이더넷에서 개선된 LPI 제어 메커니즘)

  • Lee, Sung-Keun;Jang, Yong-Jae;Yoo, Nam-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.983-989
    • /
    • 2012
  • IEEE 802.3az LPI mechanism allows an Ethernet link to reduce power consumption by entering a low-power sleeping mode and letting some components being powered off when there is no data to be transmitted through the link. However, if small amount of packets are being sent periodically, such a mechanism can not obtain energy efficiency due to a high overhead caused by excessive mode transitions. In this paper, we propose an enhanced LPI mechanism which can perform state transition adaptively based on the traffic characteristics on transport layer and network status. This simulation result shows that proposed mechanism improves energy efficiency than LPI mechanism with respect to energy consumption rate for various traffic loads.

Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support (비용효과적인 이동성 관리 지원을 위한 새로운 인터네트워킹 아키텍쳐의 성능분석)

  • Song, MyoungSeok;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.181-190
    • /
    • 2013
  • PMIPv6(Proxy Mobile IPv6) is a network-based IP mobility management protocol, which can control the mobility without depending on the type of access system or the capability of mobile node. Combining it with SIP mobility, it can establish the route optimization effectively and ensure the terminal mobility and the session mobility. There are many literatures on PMIPv6-SIP in mobility management, but efficient performance analysis and mathematical modeling has not been standardized. For this, a new PMIPv6-SIP architecture is proposed to compare with Pure-SIP in terms of the handover delay and packet loss.

Distributed QoS Monitoring and Edge-to-Edge QoS Aggregation to Manage End-to-End Traffic Flows in Differentiated Services Networks

  • Kim, Jae-Young;James Won-Ki Hong
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.324-333
    • /
    • 2001
  • The Differentiated Services (Diffserv) framework has been proposed by the IETF as a simple service structure that can provide different Quality of Service (QoS) to different classes of packets in IP networks. IP packets are classified into one of a limited number of service classes, and are marked in the packet header for easy classification and differentiated treatments when transferred within a Diffserv domain. The Diffserv framework defines simple and efficient QoS differentiation mechanisms for the Internet. However, the original Diffserv concept does not provide a complete QoS management framework. Since traffic flows in IP networks are unidirectional from one network point to the other and routing paths and traffic demand get dynamically altered, it is important to monitor end-to-end traffic status, as well as traffic status in a single node. This paper suggests a distributed QoS monitoring method that collects the statistical data of each service class in every Diffserv router and calculates edge-to-edge QoS of the aggregated IP flows by combining routing topology and traffic status. A format modeling of edge-to-edge Diffserv flows and algorithms for aggregating edge-to-edge QoS is presented. Also an SNMP-based QoS management prototype system for Diffserv networks is presented, which validates our QoS management framework and demonstrates useful service management functionality.

  • PDF

A Study on the Frame Relay Dial-up Service for Remote Access to Enterprise Networks (기업망 원격접속을 위한 프레임 릴레이 다이얼-업 서비스 구현에 관한 연구)

  • Kim, Yonng-Chul;Joo, Gi-Ho
    • The Journal of Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.139-146
    • /
    • 1998
  • Frame relay is a high speed wide area network technology that is used to connect various networks. Combining the advantages of packet switching and circuit switching, frame relay offers high throughput and reliability that is perfect for a variety of today's business applications. In this study, we briefly characterize frame relay technology, survey standardization activities and investigate domestic frame relay market. We developed an experimental system for the dial-up service to access remotely an enterprise network using frame relay network, and tested the performance and cost effect of the experimental system.

  • PDF

A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique (ZCN과 N2N 인증 기법을 이용한 패킷 전송에 대한 신뢰성 향상에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2015
  • MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.

Behavior Based Signature Extraction Method for Internet Application Traffic Identification (인터넷 응용 트래픽 분석을 위한 행위기반 시그니쳐 추출 방법)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.368-376
    • /
    • 2013
  • The importance of application traffic identification is emphasized for the efficient network management with recent rapid development of internet. In this paper, we present the application traffic identification method using the behavior based signature to improve the previous limitations. The behavior based signature is made by combining the existing various traffic features, and uses the Inter-Flow unit that is combination of the first request packet of each flow. All signatures have 100% precision when measured the accuracy of 5 applications using at home and abroad to prove the feasibility of the proposed signature.