• Title/Summary/Keyword: aodv

Search Result 311, Processing Time 0.026 seconds

An Improved Message Broadcast Scheme over Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 메시지 방송 기법)

  • Kim, Kwan-Woong;Kim, Byun-Gon;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.588-594
    • /
    • 2010
  • In a multi-hop wireless sensor network, broadcasting is an elementary operation to support command message sending, route discovery and other application tasks. Broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which is referred to as the broadcast storm problem. Many broadcasting schemes have been proposed to give better performance than simple flooding in wireless sensor network. How to decide whether re-broadcast or not also poses a dilemma between reach ability and efficiency under different host densities. In this paper, we present popular broadcasting schemes, which can reduce re-broadcast packets and improve SRB(Saved ReBroadcast). Simulation results show different levels of improvement over the simple flooding scheme.

A Study on the VoIP Intrusion prevention over MANET (MANET 기반 VoIP의 침해방지에 관한 연구)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.543-545
    • /
    • 2011
  • The concern which is abundant in MANET VoIP for comprising the mobility guarantee and mobile network is received without the infrastructure system between the mobile terminal node. However, because the access of system and border is easy, the issue which is big in the security problem becomes more than the wired network system with this convenience by the foreign network attacker differently. In this paper, we would like to the fundamental web network, NAT and concluding the security problem technology in which Firewall can inquire on MANET VoIP and whether it is appropriate or not which can solve this is proposed.

  • PDF

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

A Reactive Routing Scheme based on the Prediction of Link State for Communication between UAV Squadrons in a Large-Scale FANET (대규모 FANET에서 UAV 편대간 통신을 위한 링크 상태 예측에 기반한 반응적 라우팅 기법)

  • Hwang, Heedoo;Kwon, Oh Jun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.4
    • /
    • pp.593-605
    • /
    • 2017
  • In applications which are covered wide range, it is possible that one or more number of Unmanned Aerial Vehicle(UAV) squadrons are used to perform a mission. In this case, it is most important to communicate seamlessly between the UAV squadrons. In this paper, we applied the modified OLSR(OSLR-Pds) which can prediction for state of the link for the communication in UAV squadron, and applied the modified AOMDV which can build multi-path for the communication between UAV Squadrons. The mobility of nodes are modeled using Gauss-Markov algorithm, and relative speed between nodes were calculated by derive equation of movement, and thereby we can predict link state for in a squadron and between squadrons. An experiment for comparing AODV, AOMDV and the proposed routing protocol was conducted by three factors such as packet delivery ratio, end to end delay, and routing overhead. In experiment result, we make sure that the proposed protocol performance are superior in these three factors. However, if the density of the nodes constituting FANET are too low, and if the moving speed of node is very slow, there is no difference to others protocols.

Performance Analysis of Routing Protocols depending on the Types of Topology in MANET (토폴로지 유형에 따른 MANET 라우팅 프로토콜의 성능 분석)

  • Kim Myung-Gwan;Hwang Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.934-942
    • /
    • 2005
  • MANET(Mobile Ad hoc NETwork) routing protocols have merits and demerits under the specific situations. Because it is not clear which protocol is the best under all situations, a suitable routing protocol should be selected depending on the traffic and moving characteristics of nodes. The aim of this paper is to select an appropriate routing protocol to be used by the Korea Coal Corporation. So we designed working scenarios such as coal mining and tunnel supporting that reflected mobile characteristics of nodes. We constructed coal mining and tunnel supporting topology, and analyzed the performance of MANET routing protocols. This result can be used as a basis to select a MANET routing protocol in underground tunnel environment and other mine of the Korea Coal Corporation.

Partial Multipath Routing Scheme to avoid interpath interference in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크에서 경로간 간섭회피를 위한 부분 다중경로 라우팅 기법)

  • Lee, Kang-Gun;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1917-1924
    • /
    • 2015
  • Efficient routing algorithm is required to transmit data from source to destination by multi-hop transmission in wireless sensor networks. In the multi-hop transmission, multipath routing can be one of the solutions to cope with the traffic congestion and unstable link condition. In this paper, we propose partial multipath routing which does not establish a secondary full routing path but a partial multipath to complement some poor links, and it can enable stable data transmission and reduce the number of nodes in routing path and the required total power compared with conventional multipath routing.

Research on the Performance of Protocols and the Evaluation Metric for VIDEO Transmissions in an Ad Hoc Network

  • Chen, Ruey-Shin;Chao, Louis R.;Chen, Ching-Piao;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.10 no.1
    • /
    • pp.115-126
    • /
    • 2009
  • Video transmission effectiveness in the Ad Hoc network is becoming important recently, if different routing protocols are applied. Some researchers conclude that the reactive protocols are better for file transfer protocol (FTP) and constant bit rate (CBR) or hypertext transfer protocol (HTTP) transmission in an Ad Hoc wireless network but the performance report of video transmission is not much. This study adopts Qualnet (Network Simulator) as a simulation tool for environmental designing and performance testing, and employs an experimental design with eight groups. Our experiment shows that: (1) The performance of AODV (reactive) protocol is better than DSDV, ZRP and DSR when the transmission load has only one video stream; (2) Proactive (DSDV) and Hybrid protocols (ZRP) are better for a smaller Ad Hoc network when it transmits a video stream with some applications (VoIP, FTP and CBR). We conclude that packet loss rate is sensitive to the quality of video transmission and it has negative relationship with Peak Signal-to-Noise Ratio (PSNR) value. In addition, our experiment also shows that PSNR is a simple Metric for the performance evaluation of video transmission.

Recurrent Ant Colony Optimization for Optimal Path Convergence in Mobile Ad Hoc Networks

  • Karmel, A;Jayakumar, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3496-3514
    • /
    • 2015
  • One of the challenging tasks in Mobile Ad hoc Network is to discover precise optimal routing solution due to the infrastructure-less dynamic behavior of wireless mobile nodes. Ant Colony Optimization, a swarm Intelligence technique, inspired by the foraging behaviour of ants in colonies was used in the past research works to compute the optimal path. In this paper, we propose a Recurrent Ant Colony Optimization (RECACO) that executes the actual Ant Colony Optimization iteratively based on recurrent value in order to obtain an optimal path convergence. Each iteration involves three steps: Pheromone tracking, Pheromone renewal and Node selection based on the residual energy in the mobile nodes. The novelty of our approach is the inclusion of new pheromone updating strategy in both online step-by-step pheromone renewal mode and online delayed pheromone renewal mode with the use of newly proposed metric named ELD (Energy Load Delay) based on energy, Load balancing and end-to-end delay metrics to measure the performance. RECACO is implemented using network simulator NS2.34. The implementation results show that the proposed algorithm outperforms the existing algorithms like AODV, ACO, LBE-ARAMA in terms of Energy, Delay, Packet Delivery Ratio and Network life time.

An Energy Efficient Cross-Layer Routing Protocol in Mobile Ad Hoc Network (이동 애드혹 네트워크에서 에너지 효율을 고려한 크로스 레이어 라우팅 프로토콜)

  • Hoon, Yu-Ki;Yoo, Dae-Hun;Choi, Woong-Chul;Rhee, Seung-Hyong;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.520-524
    • /
    • 2007
  • 제한된 전지를 사용하는 노드들로 이루어진 이동 애드혹 네트워크 환경에서 멀티 홉 간의 에너지 효율적인 경로 설정은 매우 중요한 이슈이다. 이러한 문제를 해결하기 위해서 본 논문에서는 이동 애드혹 네트워크 환경에서 자주 사용되는 라우팅 프로토콜 중 하나인 AODV(Ad-hoc On-demand Distance Vector) 라우팅 프로토콜을 기반으로, 네트워크 계층과 MAC계층의 자원을 크로스 레이어 기법을 활용하여 에너지 효율적인 크로스 레이어 라우팅 프로토콜을 제안한다. 네트워크 계층에서의 이웃노드에 관한 상태 정보를 크로스 레이어 기법을 활용하여 MAC 계층의 back-off time을 적절히 조절함으로써 프레임의 충돌을 줄이고, 패킷의 경로를 설정하는데 있어서 신뢰성과 효율성을 부여하기 위한 방법으로 MAC계층의 자원을 활용하여 얻은 Collision-Level을 사용한다. 또한 Collision Level은 패킷 경로 선택에 사용되는 지연시간을 적응성 있게 줄이는 자원으로 사용된다.

  • PDF