• Title/Summary/Keyword: Wireless Ad hoc Network

Search Result 713, Processing Time 0.03 seconds

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j (IEEE 802.16j기반의 모바일 멀티 홉 릴레이에서의 혼합형 인증 기법에 대한 연구)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.127-136
    • /
    • 2007
  • It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.

A Study on Zone-based Intrusion Detection in Wireless Network Environments (무선 네트워크 환경에서 영역기반 침입탐지 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.19-24
    • /
    • 2019
  • It is impossible to apply the routing protocol in the wired environment because MANET consists of only mobile nodes. Therefore, routing protocols considered these characteristics are required. In particular, if malicious nodes are not excluded in the routing phase, network performance will be greatly reduced. In this paper, we propose intrusion detection technique based on region to improve routing performance. In the proposed technique, the whole network is divided into certain areas, and then attack detection within the area using area management node is performed. It is a proposed method that can detect attack nodes in the path through cooperation with each other by using completion message received from member nodes. It also applied a method that all nodes participating in the network can share the attack node information by storing the detected attack node and sharing. The performance evaluation of the proposed technique was compared with the existing security routing techniques through the experiments and the superior performance of the proposed technique was confirmed.

A Range-based Relay Node Selecting Algorithm for Vehicular Ad-hoc Network (차량 애드혹 네트워크를 위한 영역 기반 릴레이 노드 선택 알고리즘)

  • Kim Tae-Hwan;Kim Hie-Cheol;Hong Won-Kee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.88-98
    • /
    • 2006
  • VANET has several different characteristics from MANET such as high mobility of nodes and frequent change of node density and network topology. Due to these characteristics, the network topology based protocol, often used in MANET, can not be applied to VANET. In this paper, we propose an emergency warning message broadcast protocol using range based relay node selecting algorithm which determines the minimal waiting time spent by a given node before rebroadcasting the received warning message. Because the time is randomly calculated based on the distance between sender node and receiver node, a node chosen as a relay node is assured to have a minimal waiting time, even though it is not located at the border of radio transmission range. The proposed emergency warning message broadcast protocol has low network traffic because it does not need to exchange control messages for message broadcasting. In addition, it can reduce End-to-End delay under circumstances of low node density and short transmission range in VANET.

Optimal Cell Selection Scheme for Load Balancing in Heterogeneous Radio Access Networks (이종 무선 접속망에서의 과부하 분산을 위한 최적의 셀 선정 기법)

  • Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1102-1112
    • /
    • 2012
  • We propose a cell selection and resource allocation scheme that assigns users to nearby accessible cells in heterogeneous wireless networks consisting of macrocell, femtocells, and Wi-Fi access points, under overload situation. Given the current power level of all accessible cells nearby users, the proposed scheme finds all possible cell assignment mappings of which user should connect to which cell to maximize the number of users that the network can accommodate at the same time. We formulate the cell selection problem with heterogeneous cells into an optimization problem of binary integer programming, and compute the optimal solution. We evaluate the proposed algorithm in terms of network access failure compared to a local ad-hoc based cell selection scheme used in practical systems using network level simulations. We demonstrate that our cell selection algorithm dramatically reduces network access failure in overload situation by fully leveraging network resources evenly across heterogeneous networks. We also validate the practical feasibility in terms of computational complexity of our binary integer program by measuring the computation time with respect to the number of users.

Media Access Control Protocol Considering MANET of Underwater Environment (수중 환경의 MANET을 고려한 매체 접근 제어 프로토콜)

  • Shin, Seung-Won;Yun, Nam-Yeol;Lee, Jin-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.97-107
    • /
    • 2013
  • Underwater wireless communication systems can be useful for underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, vessel sinking exploration, and so on. However, unlike terrestrial wireless communication, underwater wireless communication should consider factors such as long propagation delay, limited transmission capacity, high bit-error rate due to potential loss in power, ambient noise, man-made noise, multi-path, etc., because of the inherent characteristics of water. Thus, in this paper, we propose a suitable media access control(MAC) protocol that applies a combination of the ALOHA MAC protocol and the CSMA/CA MAC protocol to underwater environment. We further propose a mathematical analysis model to evaluate performance. We also verify performance improvement in the proposed scheme in comparison with existing MAC protocols.

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

Design of Sensor-based Healthy Diet App for Smartphones (스마트 폰을 위한 센서기반 건강 다이어트 어플의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.141-147
    • /
    • 2014
  • With the rapid development of major functions in a smartphone, many applications interacting with a smartphone are introduced and mobile applications converged with various related technologies are announced and rapidly disseminated recently. In this paper, we propose the design of a smart mobile application operated with devices like sensors in order to utilize various functions of the smartphone effectively. The mobile application proposed in this paper uses the bluetooth module of the smartphone, composes the wireless ad hoc network with various sensors around us, and collects bionic context information of the user in real time. The smart application designed and implemented in this paper is the sensor based healthy diet application that can fulfill healthy diet program by reflecting the user's sensed bionic context data in real time.

Implementation and Conformance Test of DYMO Protocol for Ad-Hoc Networks (애드혹 네트워크를 위한 DYMO 프로토콜 구현 및 적합성 검증)

  • Park, Il-Kyun;Kwak, Jung-Nam;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.71-78
    • /
    • 2006
  • MANET routing protocols must support not only wireless networking without any relaying on network infrastructure, but also dynamic management of routing information caused by node mobility. Hence, they are one of important routing protocols for USN. Recently DYMO is regarded as a promising routing protocol for UMT because it is simple and easy to extend as well as it requires less networking load than others. In this paper, we design and implement DYMO routing protocol into various operation systems. Also, we develop a DYMO conformance test tool to evaluate our implementations.

A Study on Control Scheme for Media Access in Wireless Sensor Network (무선 센서 네트워크를 위한 미디어 엑세스 처리에 관한 연구)

  • Yun, Jung-Mee;Kim, Dae-Hwan;Park, Jin-Hee;Kim, Yong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.705-708
    • /
    • 2003
  • 본 논문에서는 무선 센서 네트워크의 특성을 고려한 미디어제어 프로토콜의 설계에 있어서의 고려사항 및 설계기법에 대해서 제안하고 있다. 무선 센서 네트워크는 제한된 에너지를 가지는 배터리를 에너지원으로 사용하는 센싱 디바이스들로 구성되어 있으며, 이러한 디바이스들로 구성된 네트워크는 하나 혹은 그 이상의 공통의 작업을 수행하는데 그 목적이 있다. 일반적으로 무선 센서네트워크는 ad hoc 헝태의 구조를 가지며, 각각의 노드들은 장시간동안 비활성화 상태에 머무르게 되며, 센싱을 하기 위한 특정 이벤트가 발생하였을 때만 활성 상태로 전이하게 된다. 이와 같은 센서 네트워크의 특성은 IEEE802.11 과 같은 기존의 무선 미디어 제어 프로토콜과는 차별성을 띄게 된다. 센서 네트워크는 노드별 미디어 접근 공정성이나 시간지연보다는 에너지절약과 위상자동설정에 더 중점을 두고 있기 때문에 이에 적합한 미디어 제어 기술이 필요한 것이다. 본 고에서는 에너지 소모를 최소화하고 위상 자동 설정을 지원하기 위한 3 가지의 기법들에 대해서 제안하고자 한다. 첫째로 이벤트 발생 여부에 따른 노드의 신호감지 및 Sleep 상태 전이 및 이웃 노드들과의 가상동기화기법을 이용한 에너지 절약 기법에 대해서 제안하고, 충돌회피 기법에 대해서 살펴보도록 하겠다.

  • PDF