• Title/Summary/Keyword: routing scheme

Search Result 820, Processing Time 0.026 seconds

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.

A study on the Ad-hoc Network Application of Zone Routing Protocol (Zone Routing Protocol의 Ad-hoc네트워크 적용에 관한 연구)

  • Lee Young Roh;Kim Yong-Deuk
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.119-122
    • /
    • 2004
  • This mobile oriented Ad-hoc network yet steps on development level, related issues and standardization are progressing. This paper presented ad-hoc network's overview and overall property, followed by routing scheme that must be setup for communication between each nodes. Among several routing scheme proposed for standardization, ZRP that is foaled by this paper, is hybrid type algorithm, and only includes advantages of others This paper presented running process and implementation method, result that is made from network simulation, shows analysis of each parameter values's change. Each parameters changed with many differences according to Zone radius and communication node's location from simualtion that was performed changing a number of nodes and a velocity of nodes.

  • PDF

Limited Flooding Scheme in Mobile Sensor Networks

  • Lee, Ick-Soo;Lee, Eung-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.10
    • /
    • pp.1225-1230
    • /
    • 2015
  • Mobile Sensor Networks (MSN) is composed of a distributed collection of mobile sensor nodes, each of which has sensing, computation, communication and locomotion capabilities. Since the routing path can be broken when some nodes on the path move to other position, MSN may have a high rate of communication failure. So, MSN has to provide a means for low-cost and low-power routing to support mobility of sensor nodes. In this paper, a limited flooding scheme for routing in MSN is proposed to allow efficient energy utilization without requiring any complicated tasks for path maintenance.

CLSR: Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks

  • Ahn, Hyochun;Kim, Jaebeom;Ko, Young-Bae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.50-67
    • /
    • 2015
  • The Cognitive Radio (CR) paradigm in tactical ad hoc networks is an important element of future military communications for network-centric warfare. This paper presents a novel Cognitive Link State Routing protocol for CR-based tactical ad hoc networks. The proposed scheme provides prompt and reliable routes for Primary User (PU) activity through procedures that incorporate two main functions: PU-aware power adaptation and channel switching. For the PU-aware power adaptation, closer multipoint relay nodes are selected to prevent network partition and ensure successful PU communication. The PU-aware channel switching is proactively conducted using control messages to switch to a new available channel based on a common channel list. Our simulation study based on the ns-3 simulator demonstrates that the proposed routing scheme delivers significantly improved performance in terms of average end-to-end delay, jitter, and packet delivery ratio.

Balancing of Routing Energy Consumption in Wireless Ad-hoc Networks (무선 Ad-hoc 망에서 라우팅 에너지 소비의 균형 기법)

  • 강용혁;엄영익
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.11a
    • /
    • pp.97-101
    • /
    • 2000
  • Energy consumption is considered as a principal ingredient in mobile wireless ad-hoc networks. In such a network, most of mobile nodes takes a role in forwarding messages received from neighbor nodes. Energy of these nodes is consumed in different rates depending on message traffic routes. This paper proposes a scheme to balance routing energy consumption by transferring routing function from node with small residual energy to node with enough residual energy. This scheme requires additional local message transfer, increasing the energy consumption of nodes to transfer routing function, and increasing total energy consumption of ad-hoc network. But balancing of energy consumption make the system lifetime the longer and increase the average node lifetime.

  • PDF

A Note on a Secure Routing Method for ad-hoc Networks (ad-hoc 네트워크에서의 안전한 라우팅 기법에 관한 연구)

  • Hwnag, Jung-Yeon;Kim, Kyung-Sin;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.53-56
    • /
    • 2009
  • Kim et al. recently proposed an identity-based aggregate signature scheme to construct a secure routing protocol in ad-hoc networks. In this note, we unfortunately show that the identity-based aggregate signature scheme is universally forgeable, that is, anyone can forge the signature of any messages of its choice. This subsequently means that their secure routing protocol is not secure.

  • PDF

IAR-GT: An Incentive Aware Routing based on Game Theory for Selfish Opportunistic Networks

  • Li, Li;Zhong, Xiaoxiong;Jiang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.152-171
    • /
    • 2019
  • In opportunistic networks, nodes may appear some selfishness while transmitting the message, however, most of the existing research works consider the individual selfishness or social selfishness respectively, and these two types of selfishness may coexist in opportunistic networks. In this paper, we propose an Incentive Aware Routing based on Game Theory for selfish OPPNETs, named IAR-GT, which uses Rubinstein-Stahl bargaining game model to incentivize selfish nodes cooperation in data forwarding. IAR-GT scheme not only considers the resources of nodes, but also uses a new method to calculate the social ties between them. Trace-driven simulations show that our incentive aware routing scheme achieves better performances than comparing schemes under two types of selfishness coexistence environments.

Load Balanced QoS Routing for Precomputation of QoS Routes (QoS 경로의 선계산을 적용한 부하분산 QoS 라우팅)

  • 홍종준
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.1
    • /
    • pp.121-127
    • /
    • 2003
  • In this paper, we propose a load balancing QoS routing on a targe scale network. We use the scheme in which it calculates the cost of resources with a precomputation and then selects a path among multiple paths based on the calculated cost for each resources. We also use the QoS routing scheme for the transit and the intra-traffic on a large scale domain-based network. For a domain in networks, this routing scheme precomputes K multiple paths between all pairs made up with each ingress and egress border routers along with the consideration of a load balancing, and then picks up paths having the high probability on the Path selection. This routing scheme can be applied for the transit traffic and the intra traffic and combines the Inter-domain and intra-domain routings seamlessly and put a high priority on the transit traffic Thus, these schemes make Possible both the global use of network resources and the load balancing.

  • PDF

A Fault Tolerant ATM Switch using a Fully Adaptive Self-routing Algorithm -- The Cyclic Banyan Network (완전 적응 자기 경로제어 알고리즘을 사용하는 고장 감내 ATM 스위치 - 사이클릭 베니안 네트웍)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1631-1642
    • /
    • 1999
  • In this paper, we propose a new fault tolerant ATM Switch and a new adaptive self-routing scheme used to make the switch to be fault tolerant. It can provide more multiple paths than the related previous switches between an input/output pair of a switch by adding extra links between switching elements in the same stage and extending the self-routing scheme of the Banyan network. Our routing scheme is as simple as that of the banyan network, which is based on the topological relationships among the switching elements (SE’s) that render a packet to the same destination with the regular self-routing. These topological properties of the Banyan network are discovered in this paper. We present an algebraic proof to show the correctness of this scheme, and an analytic reliability analysis to provide quantitative comparisons with other switches, which shows that the new switch is more cost effective than the Banyan network and other augmented MIN’s in terms of the reliability.

  • PDF

An Energy Effective Protocol for Clustering Ad Hoc Network

  • Lee, Kang-Whan;Chen, Yun
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.117-121
    • /
    • 2008
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Therefore, the energy consumption is important in the routing design, otherwise cluster schemes are efficient in energy conserving. For the above reasons, an Energy conserving Context aware Clustering algorithm (ECC) is proposed to establish the network clustering structure, and a routing algorithm is introduced to choose the Optimal Energy Routing Protocol (OERP) path in this paper. Because in ad hoc network, the topology, nodes residual energy and energy consuming rate are dynamic changing. The network system should react continuously and rapidly to the changing conditions, and make corresponding action according different conditions. So we use the context aware computing to actualize the cluster head node, the routing path choosing. In this paper, we consider a novel routing protocol using the cluster schemes to find the optimal energy routing path based on a special topology structure of Resilient Ontology Multicasting Routing Protocol (RODMRP). The RODMRP is one of the hierarchical ad hoc network structure which combines the advantage of the tree based and the mesh based network. This scheme divides the nodes in different level found on the node energy condition, and the clustering is established based on the levels. This protocol considered the residual energy of the nodes and the total consuming energy ratio on the routing path to get the energy efficiently routing. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission. Also, by using the context aware computing, according to the condition and the rules defined, the sensor nodes could adjust their behaviors correspondingly to improve the network routing.