• Title/Summary/Keyword: MANET

Search Result 600, Processing Time 0.028 seconds

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET (MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템)

  • Han, Insung;Jeong, Hongsik;Park, Moosung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.51-63
    • /
    • 2013
  • Recently with base apply MANET with the application for the service discovery and delivery which are various techniques are being proposed the result of such MANET base research techniques from actual inside. This dissertation proposes T-Chord(Trustworthy-based Chord) Ring system for MANET to guarantees from such requirements. T-Chord Ring system in order to manage Efficiently the services which the mobile nodes provide is the service discovery system which uses P2P overlay network Technique in mobile environment. The system which is proposed MANET communications in order to accomplish a service discovery operation with physical network class and logical network class will be able to minimize problems from about MANET service discoveries, and uses the dispersive hash table technique for a service discovery and effectiveness of service discovery improves and will be able to guarantee the expandability of network size. The mobile nodes(mobile device) have a mobility from MANET and operate with service request node, service provide node and service transmit node. The mobile nodes will be able to elect cluster header using Trustworthy that was evaluated service request, provision and delivery in each other. The system which is proposed a service discovery and a delivery efficiently will compose the cluster head which will grow of P2P overlay networks and will be able to accomplish. The system which proposes from dissertation is composed of Trustworthy evaluations of MANET mobile nodes, service information collection which is dispersed and P2P overlay networks that composed of Chord algorithm modules which provide O(Log N) efficiencies. The system comparison evaluation analyzes an efficiency from the expandability side of effectiveness and the network of service discovery technique and the service discovery message over head, service discovery and delivery of former times and service discovery and delivery is excellent gives proof from MANET.

Overlay Multicast using Geographic Information in MANET (MANET에서의 지리 정보를 이용한 오버레이 멀티캐스트)

  • Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.359-364
    • /
    • 2007
  • Current researches on the overlay multicast mechanism in the mobile ad hoc network (MANET) maintain the network topology information of the dynamically changing MANET, which may cause severe overhead. In this paper, we propose a new overlay multicast mechanism, the region-based overlay multicast in MANET(ROME), using the geometric locations of group members. In ROME, the physical topology is divided into small regions and the scope of location updates of group members is limited to a single region. ROME provides scalability by using the coordinate of the center point of a destination region as the destination of a data packet instead of the list of member addresses of that region. Our simulation results show that ROME gives better performance in terms of the packet overhead than other schemes.

Transmission Performance of MANET under Grayhole Attack (Grayhole 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.639-642
    • /
    • 2015
  • As attack to routing function on MANET(Mobile Ad-Hoc Network), hole attack make cause some critical effects. MANET is easily influenced with hole attack and can be critically effected on transmission performance, because it is configured with terminal device as temporary network and dose not have effective means for malicious attack. In this paper, effects of grayhole attack to network performance on MANTE is analyzed with computer simulation. Voice traffic is used in simulation, effects of grayhole attack is compaerd with blackhole attack. The method and result of this paper can be used for data to study grayhoke attack.

  • PDF

The MANET based Distributed Control Communications for Remote Controlled drones (원거리 드론 제어를 위한 MANET기반의 분산제어 통신)

  • Jeong, Seong Soon;Kwon, Ki Mun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.5
    • /
    • pp.168-173
    • /
    • 2016
  • The latest drone market is evolving rapidly. The commercial drone market developed rapid growth. Up to now, one controller had controlled the only one drone. So Remote control and information collection of the remote drone was impossible. Therefore we suggests drone intercommunication distributed network based on the MANET. Subsequently classified according to the characteristics of the drone intercommunication distributed network(speed, distance, applications) and chose a MANET routing protocol in accordance with the classification result.

Proactive Internet Gateway Discovery Mechanisms for Load-Balancing in MANET (MANET에서의 부하 균등화를 위한 Proactive 인터넷 게이트웨이 발견 기법들)

  • Kim, Young-Min;Ahn, Sang-Hyun;Yu, Hyun;Lee, Jae-Hwoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.59-63
    • /
    • 2006
  • 이동 애드 혹 네트워크(Mobile Ad Hoc Network; MANET)는 인프라 없이 빠른 구성이 가능한 네트워크이다. 하지만, 긴급 상황과 같은 특수한 경우가 아닌 일상생활에서 사용 가능한 네트워크로 발전하기 위해서는 MANET과 인터넷의 연결이 꼭 필요하다. 인터넷 노드와 MANET 노드 간의 통신을 가능하게 만드는 것은 인터넷과 MANET을 중계하는 인터넷 게이트웨이를 통해서 이다. 고장 감내(fault tolerance)를 지원하고 대역폭을 늘리기 위해 다중 인터넷 게이트웨이들을 MANET에 배치하여 사용할 수 있다. 다중 게이트웨이들 간의 부하를 잘 분배한다면 네트워크 성능 향상을 얻을 수 있으므로, MANET 내에 여러 개의 인터넷 게이트웨이가 존재할 경우 이들 간의 부하 균등화는 중요한 이슈이다. 본 연구에서는 노드들의 이동이 빈번하고 인터넷 게이트웨이들이 고정되어 있는 MANET 환경에서의 부하 균등화 인터넷 게이트웨이 발견 기법들을 제안한다. 기존에 제안된 부하 균등화 기법들로 Shortest Path (SP), Minimum Load Index(MLI), Running Variance Metric (RVM) 기법들을 소개하고 각 기법들에 대한 시뮬레이션 결과를 제공한다. 시뮬레이션을 통해 이들 기법을 분석하여 문제점을 찾아내고 이를 수정 및 보완하여 새로운 기법들을 제안하며, 새로운 기법들의 성능이 기존 기법들에 비하여 향상되었음을 보인다.

  • PDF

Transmission Performance of Voice Traffic on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 음성 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1411-1416
    • /
    • 2015
  • Grayhole attack, one of attack to MANET routing function, is very severe in point of view of causing results which disturbs normal transmission function of network with uneasy finding of attacks. In this paper, effects of grayhole attack to application service on MANET is analyzed. Based on this analysis, some conditions is suggested for anti-intrusion to operate an application service on MANET under grayhole attack. This study is done with computer simulation based on NS-2 be added grayhole attack function which is implemented in this paper.

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

BU-Chord Mechanism for Reliable P2P File Sharing over MANET (모바일 에드 혹 네트워크 상의 신뢰성 있는 P2P 파일 공유를 위한 BU-Chord 메커니즘)

  • Jeong Hong-Jong;Song Jeom-Ki;Kim Dong-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.333-343
    • /
    • 2006
  • MANET and P2P applications have a common nature that they don't have any fixed infrastructures that might maintain network topologies. With such common characteristics, a P2P application can be a killer application over MANET. Due to absence of reliable node which serves indexing services in MANET, fully distributed P2P applications are more suitable for MANET. By using DHT like Chord, we can save network bandwidth and avoid a point of failure of a directory server. However, since MANET allows nodes to depart from network freely, P2P file sharing applications using Chord lookup protocol should address how to recover the keys stored at the departed node. In this paper, we propose BU-Chord in order to detect and recover the departure of nodes by creating and storing backup file information in distributed manner. Our BU-Chord shows off better performance than existing Chord especially in case of high departure rate of nodes.

Performance of VoIP Traffics over MANETs under DDoS Intrusions (DDoS 침해가 있는 MANET에서 VoIP 트래픽의 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.493-498
    • /
    • 2011
  • In this paper, Transmission performance over MANET(Mobile Ad-hoc Networks) under DDoS Intrusions is evaluated. Intrusion counterplan requirement, which have to be used for MANET under DDoS intrusions, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. MOS, network delay, packet loss rate and call connection rate is measured with this simulation. Finally, requirement of intrusion continuing time shorter then 10 seconds is suggested for VoIP service over MANETs under DDoS intrusions.