• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.034 seconds

Design of Link Cost Metric for IEEE 802.11-based Mesh Routing (IEEE 802.11 MAC 특성을 고려한 무선 메쉬 네트워크용 링크 품질 인자 개발)

  • Lee, Ok-Hwan;Kim, Seong-Kwan;Choi, Sung-Hyun;Lee, Sung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.456-469
    • /
    • 2009
  • We develop a new wireless link quality metric, ECOT(Estimated Channel Occupancy Time) that enables a high throughput route setup in wireless mesh networks. The key feature of ECOT is to be applicable to diverse mesh network environments where IEEE 802.11 MAC (Medium Access Control) variants are used. We take into account the exact operational features of 802.11 MAC protocols, such as 802.11 DCF(Distributed Coordination Function), 802.11e EDCA(Enhanced Distributed Channel Access) with BACK (Block Acknowledgement), and 802.11n A-MPDU(Aggregate MAC Protocol Data Unit), and derive the integrated link metric based on which a high throughput end-to-end path is established. Through extensive simulation in random-topology settings, we evaluate the performance of proposed link metric and present that ECOT shows 8.5 to 354.4% throughput gain over existing link metrics.

광대역 위성 액세스 망 분석 및 규격 제안

  • 오흥룡;김문기;류종호;김락현;염흥열
    • Review of KIISC
    • /
    • v.13 no.6
    • /
    • pp.92-100
    • /
    • 2003
  • 본 논문에서는 국내 광대역 위성 액세스 망(BSAN: Broadband Satellite Access Network)에 적용 가능한 보안 기능을 위한 가이드 라인을 살펴보고, RCST(Return Channel Satellite Terminal)와 NCC(Network Control Centre)간에 인증 및 키 관리 기능을 위하여 요구되는 주요 핵심 보안 메커니즘에 대하여 기술한다. 더불어 국내 광대역 위성 액세스 망의 ETSI(European Telecommunications Standards Institute) 표준을 분석한다. 특히 위성 망에서 이용되는 세 가지 키교환 메커니즘 MKE(Main Key Exchange), QKE(Quick Key Exchange), EKE(Explicit Key Exchange)에 대해 분석하였으며, 국내 보안 알고리즘과 키교환을 위한 향상된 보안 알고리즘을 적용한 규격을 제안하였다.

Study on the wormhole detection and prevention algorithm for MANET (MANET에서 wormhole 공격의 탐지 및 방지를 위한 알고리즘에 대한 연구)

  • Kim, Jae-Honh;Kim, Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.494-497
    • /
    • 2008
  • In Mobile ad hoc networks (MANET), nodes could transmit packets for each other to communicate beyond their transmission range without centralized control. Unlike infrastructure-based wireless networks, due to the unique characteristics of MANETs such as open network architecture, stringent resource constraints and highly dynamic network topology, networks are vulnerable to wormhole attacks launched through colluding nodes. In this paper, we develop an wormhole detection and prevention algorithm for MANET.

  • PDF

Performance Evaluation of Layered Mobility Management Schemes for Wireless Mobile Internet (무선 이동 인터넷에서 계층 이동성 관리기법의 성능평가)

  • Lee, Yong-Jin;Ryu, Gab-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.1
    • /
    • pp.129-136
    • /
    • 2011
  • The aim of this study is to present the handover procedures and the performance comparisons of layered mobility management schemes for wireless mobile Internet. To investigate efficient mobility management schemes providing seamless information services in a mobile environment, this paper provided the detailed discussions of existing network layered mobility management scheme, including Mobile IPv4, Mobile IPv6, and new transport layer mobility management scheme, stream control transmission protocol (SCTP) based mobility architecture (SMA). Network simulator-2 (ns-2) was used to compare the performance between Mobile IPv6 and SMA in the wireless mobile Internet environment. Simulation results show that for typical network configuration and parameters, SMA has a lower handover latency, lower packet loss rate, and higher throughput than Mobile IPv6.

  • PDF

Inter-working Architecture for Seamless Handover and QoS in Heterogeneous Wireless Networks (무선 이종 네트워크에서 향상된 핸드오버 및 QoS 보장을 위한 연구)

  • Kim, Moon;Moon, Tae-Wook;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.24-30
    • /
    • 2007
  • The integration of WLAN and beyond 3G mobile networks offers the possibility of achieving anytime and anywhere Internet access. Moreover the requests for seamless multimedia services and the Quality of Service (QoS) support have been one of key issues in wireless networks. Therefore the researches relative to seamless multimedia service and QoS over heterogeneous wireless networks have been progressing rapidly. In this paper, we propose inter-working architecture for supporting seamless multimedia service and QoS over WLAN and WiBro networks. Based on the proposed inter-working architecture, we also provide both the seamless handover architecture such an inter-network vertical handover and the QoS-aware wireless Medium Access Control (MAC) scheme. In addition, we evaluate and compare the performance by Network Simulator-2 (NS-2) simulations.

  • PDF

A Sub-${\mu}$W 22-kHz CMOS Oscillator for Ultra Low Power Radio (극저전력 무선통신을 위한 Sub-${\mu}$W 22-kHz CMOS 발진기)

  • Na, Young-Ho;Kim, Jong-Sik;Kim, Hyun;Shin, Hyun-Chol
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.12
    • /
    • pp.68-74
    • /
    • 2010
  • A sub-${\mu}$W CMOS Wien-Bridge oscillator for ultra low power (ULP) radio applications is presented. The Wien-Bridge oscillator is based on an non-inverting opamp amplifier with a closed-loop gain $1+R_2/R_1$ as a means of providing necessary loop gain. An additional RC network provides appropriate phase shift for satisfying the Barkhausen oscillation condition at the given frequency of 1/($2{\pi}RC$). In this design, we propose a novel loop gain control method based on a variable capacitor network instead of a rather conventional variable resistor network. Implemented in $0.18{\mu}m$ CMOS, the oscillator consumes only 560 nA at the oscillation frequency of 22 kHz.

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

Reducing Transmit Power and Extending Network Lifetime via User Cooperation in the Next Generation Wireless Multihop Networks

  • Catovic, Amer;Tekinay, Sirin;Otsu, Toru
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.351-362
    • /
    • 2002
  • In this paper, we introduce a new approach to the minimum energy routing (MER) for next generation (NG) multihop wireless networks. We remove the widely used assumption of deterministic, distance-based channel model is removed, and analyze the potentials of MER within the context of the realistic channel model, accounting for shadowing and fading. Rather than adopting the conventional unrealistic assumption of perfect power control in a distributed multihop environment, we propose to exploit inherent spatial diversity of mobile terminals (MT) in NG multihop networks and to combat fading using transmit diversity. We propose the cooperation among MTs, whereby couples of MTs cooperate with each other in order to transmit the signal using two MTs as two transmit antennas. We provide the analytical framework for the performance analysis of this scheme in terms of the feasibility and achievable transmit power reduction. Our simulation result indicate that significant gains can be achieved in terms of the reduction of total transmit power and extension of network lifetime. These gains are in the range of 20-100% for the total transmit power, and 25-90% for the network lifetime, depending on the desired error probability. We show that our analytical results provide excellent match with our simulation results. The messaging load generated by our scheme is moderate, and can be further optimized. Our approach opens the way to a new family of channel-aware routing schemes for multihopNG wireless networks in fading channels. It is particularly suitable for delivering multicast/ geocast services in these networks.

MA(Mesh Adaptive)-CBRP Algorithm for Wireless Mesh Network (Wireless Mesh Network를 위한 MA(Mesh Adaptive)-CBRP 알고리즘의 제안)

  • Kim, Sung-Joon;Cho, Gyu-Seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1607-1617
    • /
    • 2010
  • In this paper we propose MA-CBRP, mesh adaptive algorithm for wireless mesh networks. MA-CBRP is a hybrid algorithm based on ad-hoc CBRP protocol. In MA-CBRP, the mesh router periodically sends the ANN message as like Hello-message in CBRP. ANN message allows to all clients periodically store a route towards the mesh-router and renewal information in their routing cache. While CBRP periodically reply Hello-message, MA-CBRP does not reply to achieve less overhead. After receiving ANN message, mesh client send JOIN message to mesh router when the route towards mesh router changed. at the same time Register the entry to mesh router, it can achieve to reduce overhead of control the route and shorten the time to find route. consequently, MA-CBRP shows 7% reduced overhead and shortened time to find route than CBRP with regardless of clients number.

Location-based Clustering for Skewed-topology Wireless Sensor Networks (편향된 토플로지를 가진 무선센서네트워크를 위한 위치기반 클러스터링)

  • Choi, Hae-Won;Ryu, Myung-Chun;Kim, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.171-179
    • /
    • 2016
  • The energy consumption problem in wireless sensor networks is investigated. The problem is to expend as little energy as possible receiving and transmitting data, because of constrained battery. In this paper, in order to extend the lifetime of the network, we proposed a location-based clustering algorithm for wireless sensor network with skewed-topology. The proposed algorithm is to deploy multiple child nodes at the sink to avoid bottleneck near the sink and to save energy. Proposed algorithm can reduce control traffic overhead by creating a dynamic cluster. We have evaluated the performance of our clustering algorithm through an analysis and a simulation. We compare our algorithm's performance to the best known centralized algorithm, and demonstrate that it achieves a good performance in terms of the life time.