• Title/Summary/Keyword: mobile nodes

Search Result 1,161, Processing Time 0.031 seconds

An Efficient Scheme to Create Data Delivery Tree for Community Group Communication (커뮤니티 그룹 통신을 위한 효율적인 데이터 전달 트리 구성 방안)

  • Oh, Je-Jun;Kang, Nam-Hi;Kim, Yong-Hyuk;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.55-63
    • /
    • 2007
  • Multicast is an efficient transport mechanism for community communications and MANET is recently regarded as a promising solution for support ubiquitous computing as an underlying network technology. However, it is hard to deploy multicast mechanism into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome the limitations. Especially, overlay multicasting schemes present several advantages over network based multicasting schemes. Yet, the overlay multicasting schemes still introduce redundant data transmissions that waste network bandwidth and battery of relay nodes. As a result the performance of the network is degraded. To reduce the redundancy, we propose an efficient way to construct an overlay structure as a multicast data delivery tree that utilizes a branch node which belongs to the tree. By using network simulation, we show that the proposed scheme presents higher packet delivery ratio and lower transmission cost than previously proposed schemes.

AKA-PLA: Enhanced AKA Based on Physical Layer Authentication

  • Yang, Jing;Ji, Xinsheng;Huang, Kaizhi;Yi, Ming;Chen, Yajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3747-3765
    • /
    • 2017
  • Existing authentication mechanisms in cellular mobile communication networks are realized in the upper layer by employing cryptographic techniques. Authentication data are broadcasted over the air in plaintext, enabling attackers to completely eavesdrop on the authentication and get some information about the shared secret key between legitimate nodes. Therefore, reusing the same secret key to authenticate several times results in the secret key's information leakage and high attacking rate. In this paper, we consider the most representative authentication mechanism, Authentication and Key Agreement (AKA), in cellular communication networks and propose an enhanced AKA scheme based on Physical Layer Authentication (AKA-PLA). Authentication responses generated by AKA are no longer transmitted in plaintext but masked by wireless channel characteristics, which are not available to adversaries, to generate physical layer authentication responses by a fault-tolerant hash method. The authenticator sets the threshold according to the authentication requirement and channel condition, further verifies the identity of the requester based on the matching result of the physical layer authentication responses. The performance analyses show that the proposed scheme can achieve lower false alarm rate and missing rate, which are a pair of contradictions, than traditional AKA. Besides, it is well compatible with AKA.

Performance Comparison of Relay Selection Methods for Incremental Cooperative Relaying Systems with Spatially Random Relay (랜덤한 릴레이를 갖는 추가 기회전송 협동 릴레이 시스템의 릴레이 선택법에 따른 성능비교)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.65-71
    • /
    • 2016
  • Cooperative relaying systems have been studied actively to improve the system performance effectively in wireless fading channels. Most of the cooperative relay studies are assumed fixed relay, recently the performance analysis of the cooperative relaying systems with spatially random relays considering the practical mobile environment are introduced. However the comparative studies for relay selection methods of incremental cooperative relay systems, the performance of which is influenced by the selection methods, have not been studied. Therefore we derive the performance of the system which has MRC(Maximal-ratio combining) with Max SNR(signal-to-noise ratio) selection or Max-min SNR selection, respectively. And the outage performances of the system with Max or Max-min selection method are compared for different transmit power allocation to the source and to the relays. The analytical results serve as useful tools for relay selection and power allocation to transmit nodes for opportunistic incremental relaying systems.

Throughput Analysis of Network Coding in IEEE 802.11 Wireless LAN (IEEE 802.11 무선 랜에서의 네크워크 코딩 성능 분석)

  • Jang, Bo-Kyung;Song, Young-Ah;Kim, Jeong-Geun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.8
    • /
    • pp.797-804
    • /
    • 2011
  • Network coding has recently emerged as an effective solution for multicast and broadcast communications in wireless ad hoc networks. In this paper, we propose a throughput performance model for IEEE 802.11 wireless networks with network coding. Specifically, we consider IEEE 802.11 DCF protocol and linear topology in which traffic sources are located at both ends and intermediate nodes act as relays performing network coding. The proposed analytic model has the form of nonlinear equations in terms of throughput of each node. The solution of the nonliear equations thus correspond to the end-to-end throughput. Extensive simulation experiments have been performed to validate accuracy of the proposed model. Numerical results show that the results of the proposed analytic model agree fairly well with the corresponding simulation results.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

Performance Comparison of Brain Wave Transmission Network Protocol using Multi-Robot Communication Network of Medical Center (의료센터의 다중로봇통신망을 이용한 뇌파전송망 프로토콜의 성능비교)

  • Jo, Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.40-47
    • /
    • 2013
  • To verify the condition of patients moving in the medical center like hospital needs to be consider the various wireless communication network protocols and network components. Wireless communication protocols such as the 802.11a, 802.11g, and direct sequence has their specific characteristics, and the various components such as the number of mobile nodes or the distance of transmission range could affects the performance of the network. Especially, the network topologies are considered the characteristic of the brain wave(EEG) since the condition of patient is detected from it. Therefore, in this paper, various wireless communication networks are designed and simulated with Opnet simulator, then evaluated the performance to verify the wireless network that transmits the patient's EEG data efficiently. Overall, the 802.11g had the best performance for the wireless network environment that transmits the EEG data. However, there were minor difference on the performance result depends on the components of the topologies.

Design of Simulation Environment for Intelligent Disaster Prevention System and Implementation of Management Application (지능형 방재 시스템 시뮬레이션 환경 및 관리 어플리케이션 구현)

  • Cho, Young-Ho;Kang, Heau-Jo;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.602-608
    • /
    • 2011
  • In this paper, we implemented an android mobile management application of intelligent prevention of disaster system which can manage the current status monitoring and whether operating or not by using Ubiquitous Sensor Network based self wireless communication system of scattered emergency light, fire extinguishers and sprinkler inside the high complex building. This system is composed with fire facilities attached sensor nodes, management server for collection of information and control, and smart phone application that transmits and receives information with management server. As a result of the test, the embodied android-based smart phone application to be performed anywhere could confirm status and monitoring information of fire facilities which are communicated with the management server.

Proposal of layer 2 event for seamless handover (심리스 핸드오버를 위한 L2 이벤트 제안)

  • Jang, Jong-Min;Kim, Dong-Il;Lee, Yu-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.585-588
    • /
    • 2007
  • With several enhanced access technologies, users have many changes to select their preference access network. There are great differences between access technologies, users' need to handover from one access network to another is getting bigger. As users' need grows there are several works to archive fast handover between heterogeneous and homogeneous access networks. However traditional handover mechanisms work only on L2 or L3 have several limits that prevent fast and heterogeneous handover. To overcome those limits, IEEE 802.21 WG and IRTF MOBOPTS RG are working for developing handover mechanisms that uses L2 information on theupper layers like L3. This paper introduces two new L2 information and properties can be used to archive fast handover of mobile nodes.

  • PDF

Home Management System Using Smartphone and Sensor Networks (스마트폰과 센서 네트워크를 이용한 홈 관리 시스템)

  • Han, Joosik;Jung, Yeonsoo;Son, Youngho;Hwang, Soyoung;Joo, Jaeheum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.405-406
    • /
    • 2012
  • A sensor network is composed of a large number of sensor nodes which have sensing, computation and wireless communication capabilities. The sensor node sends such collected data, usually via radio transmitter, to a command center (sink) either directly or through a data concentration center (a gateway). These sensor networks can be used for various application areas such as health, military, home network, managing inventory, monitoring disaster areas and so on. Moreover, owing to the rapid growth of mobile technology, high-performance smartphones are widespread and in increasing cases are utilized as a terminal device. In this paper, we propose a home management system using smartphone and sensor networks.

  • PDF