• Title/Summary/Keyword: Wormhole

Search Result 54, Processing Time 0.019 seconds

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

Hierarchical buffering scheme for supporting effective routing scheme in bidirectional MIN (Bidirectional MIN에서 효율적인 라우팅을 지원하기 위한 계층적 버퍼링 기법)

  • 장창수;김성천
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.10
    • /
    • pp.12-19
    • /
    • 1996
  • Many recent supercomputers employ a kind of switch-based multistage interconnection network architectrues (MINs) for constructing scalabel parallel compters. This paper proposed a new routing method, hybrid wormhole and virtual-cut through routing (HWCR) for the prevention of rapid performance degradation comming from a conflict in links usage at hot traffic situation. This HWCR through (VCT) for the fast removing temporal stagger, result in seamless flow of packet stream. When the blocked link is removed, wormhole routing is resumed. The HWCR method adopted a hierachical buffer scheme for improving the network performance and reducing the cost in BMINs. We could get optimum buffer size and communicatin latency through the computer simulation based on proposed HWCR, and the results were compared to those using wormhole and VCT.

  • PDF

A New Deadlock Detection Mechanism in Wormhole Networks (웜홀 네트웍을 위한 새로운 교착상태 발견 기법)

  • Lee, Su-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.280-289
    • /
    • 2003
  • Deadlock recovery-based routing algorithms in wormhole networks have gained attraction due to low hardware complexity and high routing adaptability Progressive deadlock recovery techniques require a few dedicated resources to transmit deadlocked packets rather than killing them. Selection of deadlocked packets is primarily based on time-out value which should be carefully determined considering various traffic patterns or packet length. By its nature, current techniques using time-out accompany unignorable number of false deadlock detections especially in a heavy-loaded network or with long packet size. Moreover, when a deadlock occurs, more than one packet may be marked as deadlocked, which saturate the resources allocated for recovery. This paper proposes more accurate deadlock detection scheme which does not make use of time-out to declare deadlock. The proposed scheme reduces the probability to detect false deadlocks considerably. Furthermore, a single message is selected as deadlocked for each cycle of blocked messages, thereby eliminating recovery overheads.

All-port Broadcasting Algorithms on Wormhole Routed Star Graph Networks (웜홀 라우팅을 지원하는 스타그래프 네트워크에서 전 포트 브로드캐스팅 알고리즘)

  • Kim, Cha-Young;Lee, Sang-Kyu;Lee, Ju-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.2
    • /
    • pp.65-74
    • /
    • 2002
  • Recently star networks are considered as attractive alternatives to the widely used hypercube for interconnection networks in parallel processing systems by many researchers. One of the fundamental communication problems on star graph networks is broadcasing In this paper we consider the broadcasting problems in star graph networks using wormhole routing. In wormhole routed system minimizing link contention is more critical for the system performance than the distance between two communicating nodes. We use Hamiltonian paths in star graph to set up link-disjoint communication paths We present a broadcast algorithm in n-dimensional star graph of N(=n!) nodes such that the total completion time is no larger than $([long_n n!]+1)$ steps where $([long_n n!]+1)$ is the lower bound This result is significant improvement over the previous n-1 step broadcasting algorithm.

Pipelined Broadcast with Enhanced Wormhole Routers (개선된 윔홀 라우터를 이용한 파이프라인 브로드캐스트)

  • Jeon, Min-Soo;Kim, Dong-Seung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.1
    • /
    • pp.10-15
    • /
    • 2002
  • This paper proposes the Pipelined Broadcast that broadcasts a message of size m in O(m+n-1) time in an n-dimensional hypercube. It is based on the replication tree, which is derived from the reachable sets. It greatly improves the performance compared to Ho-Kao s algorithm with the time of O(m[n/log(n+1)]). The communication in the broadcast uses all-port wormhole router with message replication capability. This paper includes the algorithm together with performance comparisons to previous schemes in practical implementation.

A Study on The Efficient Multicast Algorithm of Wormhole Routing Method in Multistage Networks (다단계 네트워크에서 웜홀 라우팅 방식의 효율적인 멀티캐스트 알고리즘 연구)

  • 김소은;김창수;최계현
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.2
    • /
    • pp.184-194
    • /
    • 1999
  • We present a new algorithm to minimize channel contention while sending multiple messages from multiple source to overlapped destination set on Multistage Interconnection Network (MIN) which supports wormhole routed turnaround routing. The multicast tree of the U-MIN(Unicast MIN) algorithm is useful in performing messages from one source to multiple destination but gives rise to a serious channel connection in performing multiple multicast because it has been designed for only single multicast. For multiple multicast communication on MIN, we address how to implement multiple multicast services efficiently. And a SPU-MIN(Source Partitioned Unicast MIN) algorithm is proposed and shown to be superior than the U-MIN algorithm for multiple multicast. The turnaround routing algorithm based on wormhole routing technique is employed as a message sending method.

  • PDF

Efficient Multiple Multicast Algorithms in Wormhole - Routed Networks (웜홀 라우팅 망에서의 효율적인 다중 멀티캐스트 알고리즘)

  • Kim, Si-Gwan;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.4
    • /
    • pp.373-382
    • /
    • 2000
  • The most important metric in wormhole-routed networks is the start-up latency. In this paper, we present new multicast algorithms that reduce node contention so that multiple multicast messages can be implemented with reduced latency. By exploiting available channels evenly as much as possible, these new algorithms show better performance than the existing multicast algorithms for wormhole 2D systems when multiple multicasts are involved. All algorithms presented are proven to be deadlock-free. A simulation study has been conducted that compares the performance of these multicast algorithms under various situations in a 2D mesh. We show that the overall performance of ours are up to 20% better than the previous studies. We observe that reducing the number of the generated multidestination messages closely related to shorter message latency. These proposed algorithms can be easily extended to 3D mesh systems.

  • PDF

Wormhole Detection Method using Node Location in Mobile Ad hoc Networks (애드 혹(Ad Hoc) 네트워크에서의 위치정보 기반의 웜홀(Wormhole) 탐지 기법)

  • Lee, Kyu-Ho;Lee, Gun-Hee;Kim, Dong-Kyoo;Seo, Jung-Taek;Sohn, Ki-Wook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.681-685
    • /
    • 2006
  • 이동 애드 혹(Ad Hoc)네트워크는 노드의 참여와 이탈이 자유롭고 토폴로지의 변화가 잦기 때문에 일반 고정 유선네트워크에 비해 보안적으로 훨씬 더 많은 잠재적인 위험을 지니고 있다. 그 중 주변 노드들의 신뢰도에 대한 보장이 이루어지지 않기 때문에 멀티 홉 방식의 라우팅을 할 경우, 악의적인 중간 노드에 의해 정상적인 통신과 서비스를 방해하는 라우팅 과정에서의 공격이 일어날 수 있다. 특히 협력노드를 이용한 웜홀 공격은 단일노드에 의한 공격보다 탐지가 어렵고 그 피해도 더욱 크다. 이러한 웜홀 공격에 대응하기 위하여 본 논문에서는 네트워크에 참여한 노드들의 위치정보를 이용한 CA(central authority)에서의 경로 분석을 통해 웜홀을 탐지하는 기법을 제안하였다.

  • PDF

Wormhole Detection using Multipath in sensor network (센서네트워크 환경에서 다중 경로를 이용한 웜홀 검출)

  • Kim, In-Tae;Han, Seung-Jin;Lee, Jung-Hyun
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.77-81
    • /
    • 2007
  • 센서 네트워크 라우팅에 대한 공격은 무선이라는 네트워크 환경 때문에 애드혹과 유사하게 이루어 지고 있다. 하지만 이를 대처하는 보안 매커니즘은 노드가 보다 제한된 자원을 가지므로 그대로 적용할 수 없어 새로운 연구가 필요하게 되었다. 본 논문에서는 웜홀 이라는 라우팅 공격에 대하여 다중 경로를 이용하여 공격을 회피하고 검출하는 방법에 대하여 제안한다. 다중 경로 환경에서 주경로와 대체 경로간 홉당 지연시간을 비교하여 웜홀 경로를 회피, 검출하고 검출 오차를 줄이기 위하여 블랙리스트를 방법을 사용한다. Ns-2 시뮬레이션 환경에서 제안한 방법을 이용한 웜홀 검출 메커니즘을 시뮬레이션하고 웜홀과 정상 노드의 검출율을 비교하여 성능을 측정하였다.

  • PDF

An Adaptive Wormhole Routhing using Virtual Channels in K-ary n-cubes (K-ary n-cubes에서 가상채널을 사용한 적응적 웜홀 라우팅)

  • Lee, Sung-Mok;Kim, Chagn-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2732-2744
    • /
    • 1997
  • This paper is based on multicasting model in k-ary n-cubes, and Proposes an adaptive wormhole routing algorithm which allows faults and channel contention. The proposed algorithm only requires $2{\times}n$ virtual channels per physical channel which is proportional to the dimension n in order to allow (n-1) faults in a k-ary n-cube. This method uses smaller number of virtual channels than the previously Proposed adaptive routing algorithms [5, 18]. Through a chaos simulator, we have measured message delay considering fault-tolerant as well as message traffic to our adaptive routing algorithm.

  • PDF