• Title/Summary/Keyword: MANET

Search Result 600, Processing Time 0.035 seconds

Experiment and Analysis of Session-key Authentication Mechanism based on MANET (MANET 기반 세션키 인증기법의 실험 및 분석)

  • Lee, Cheol-Seung;Jung, Sung-Ok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1355-1360
    • /
    • 2015
  • Recently MANET application is diversified studies on the MANET routing security and the reliable authentication mechanism is actively in progress. Stand-alone network structure of a MANET is an important field of ubiquitous computing environment of interest, Authentication techniques are already provided safety when applied to MANET reliability and efficiency in a secure authentication mechanism using the session key. However, most of the MANET environment, the model has been based on the assumption that the safety is guaranteed, When applied to an actual network situation, we can not rule out a variety of threats. This study is the testing and analysis to add the malicious node extracted at random to demonstrate the safety and efficacy of the session key certification techniques of the MANET environment.

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

IPv6 Global Address Configuration Algorithm for Internet Interconnection in MANET (MANET기반 Internet 연결에서 IPv6 Global Address 할당 방법)

  • Hwang, Soon-Woo;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.68-74
    • /
    • 2006
  • The MANET(Mobile Ad Hoc Network) is an independent network that is oranized by only Mobile Hosts. MANET guarantees the mobility of the node and does not need a backbone network or a base station. Recently, there is a strong demand to connect MANET to the Internet. For the interconnection between MANET and Internet, Mobile hosts of MANET must have global IP address. The well known scheme of the address configuration for MANET is SAA(Stateless Address Autoconfiguration). SAA configurated IP address by node itself. The advantage of SAA is not requiring any server for address configuration. However the SAA has problems of unstable and inefficient interconnection on the AD Hoc Network. To solve this problem we propose a method that assigns an IPv6 Global address to the node through the Internet Gateway. The format of assigned IPv6 address is also defined. The simulation result demonstrates that the proposed method can support the host for fast getting of global IPv6 Address and Mobile IPv6 efficiently.

A MANET Routing Protocol using Address Autoconfiguration in Zone-based MANETs (존 기반 MANET에서의 주소 자동 설정 기술을 이용한 라우팅 프로토콜)

  • Park, Ik-Kyun;Kang, Nam-Hi;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.897-904
    • /
    • 2006
  • In large-scale MANETs, the performance of MANET routing protocols is degraded significantly. To avoid this, zone-based hierarchical architecture is proposed. In this architecture, single large-scale MANET is divided into multiple small-scale MANETs. In this paper, we propose autoconfiguration-coupled MANET routing protocol to reduce routing overhead of mim user nodes. If MANET routing protocol utilizes the autoconfigured information of each user node, its overhead or procedure can be reduced. Proposed method shows the degradation of routing overhead of user nodes via simulation.

Implementation of Policy Based Network Management System with COPS-PR for MANET (MANET에서 COPS-PR을 이용한 정책 기반 망 관리 시스템의 구현)

  • Huh, Jee-Wan;Lee, Sung-Hwa;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.1-6
    • /
    • 2009
  • MANET(Mobile Ad-hoc NETwork), a network characterized that its moving nodes freely constructs Network topology, has other different characteristics. Because Policy based Network Management in MANET guarantees QoS between nodes, it is essential in applied areas like VANET which targets safety and convenience. In this paper, we use COPS-PR which is appropriate Policy Exchange Protocol for MANET, and implement DiffServ-based QoS in the real networks and experiment its capability.

  • PDF

Performance of VoIP based on Speed of Mobile Node over MANETs (MANET에서 모바일 노드 이동 속도에 따른 VoIP 성능)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.750-752
    • /
    • 2010
  • MANET has some interest as a wireless mobile network supporting node mobility and having no additional infrastructure. Speed of mobile node on MANET is various from just slow speed of human's walk to vehicle's moving speed. In this study, VoIP performance of MANET is evaluated in the view of speed of mobile node. VoIP performance is studied on walking speed, vehicle speed and higher speed on MANET. PDR(Packet Delivery Ratio), MOS(Mean Opinion Score) are used as performance parameters.

  • PDF

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

A Policy-Based Active Framework for the Management of QoS in MANET (MANET에서의 QoS 관리를 위한 정책 기반 액티브 프레임워크)

  • Kim, Kyu-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.119-125
    • /
    • 2007
  • On account of limited resources and diverse topology change. it is difficult to manage MANET and guarantee QoS. In current MANET, QoS grantee is exceedingly significant. However, today's MANET are being concentrately worked on MAC protocols and routing protocols. Thus we proposed a framework for effective management of MANET and supporting QoS using policy based network management paradigm and active network technology. Since this framework employs the policy-based management approach in active network environment, it provides an abstract and autonomous management method to network managers.

  • PDF

The Effects of Backhole Attack on Lattice Structure MANET (격자구조 MANET에서 블랙홀 공격의 영향)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.578-581
    • /
    • 2014
  • Blackhole attack, a kinds of attacks to routing function, can cause critical effects to network transmission function, Especially, on MANET(Mobile Ad-hoc Network) which it is not easy to prepare functions to respond malicious intrusion, transmission functions of entire networks could be degraded. In this paper, effects of blackhole attack to network transmission performance is analyzed on lattice structured MANET. Specially, performance is measured for various location of blackhole attack on lattice MANET, and compared with the performance of random structured MANET. This paper is done with computer simulation, VoIP(Voice over Internet Protocol) traffic is used in simulation. The results of this paper can be used for data to deal with blackhole attack.

  • PDF

Transmission Performance of Application Traffic on Underwater MANETs (수중 MANET에서 응용 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.557-560
    • /
    • 2013
  • MANTET(Mobile Ad-Hoc Networks), which is configured and operated by each terminals with no support of communication infra-structures, is recently expanded its application fields from terrestrial communications to underwater environments with technical advances of Wi/Fi and minimized portable terminals. Underwater sensor network, undersea environment explorations and probes, information transmission for underwater area, etc., is typical application fields of underwater MANET. Especially, Performance measurement and analysis on this application fields is one of important research area and base of design, implementation and operation for underwater MANET. However, the research results are focued on various transmission parameters on network level, and its objects of analysis are also performance of network level. In this paper, transmission performances for application levels are measured and analyzed for user levels on underwater MANET. In this study, voice traffic is assumed as object application traffic, computer simulation which is based on NS-2 having additional implemented functions for underwater communications is used. on some defined scale of MANET, transmission performances according to varying traffic environments are measured and analyzed, operation conditions on underwater MANET is suggested with the analysis.

  • PDF