• Title/Summary/Keyword: 가네트

Search Result 762, Processing Time 0.027 seconds

Mtigating the IGMP Flooding Attacks for the IPTV Access Network (IPTV 접속망에서의 IGMP 플러딩 공격 효과 감소 기법)

  • Kim, Sung-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.998-1002
    • /
    • 2009
  • In IPTV multicast architecture, the IGMP(Internet Group Management Protocol) is used for access networks. This protocol supports the functionality of join or leave for a specific multicast channel group. But, malicious attackers can disturb legitimate users being served appropriately. By using spoofed IGMP messages, attackers can hi-jack the premium channel, wasting bandwidth and exhausting the IGMP router's resources. To prevent the message spoofing, we can introduce the packet-level authentication methods. But, it causes the additional processing overhead to an IGMP processing router, so that the router is more susceptible to the flooding attacks. In this paper, we propose the two-level authentication scheme in order to mitigate the IGMP flooding attack.

Game Theoretic Cache Allocation Scheme in Wireless Networks (게임이론 기반 무선 통신에서의 캐시 할당 기법)

  • Le, Tra Huong Thi;Kim, Do Hyeon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.854-859
    • /
    • 2017
  • Caching popular videos in the storage of base stations is an efficient method to reduce the transmission latency. This paper proposes an incentive proactive cache mechanism in the wireless network to motivate the content providers (CPs) to participate in the caching procedure. The system consists of one/many Infrastructure Provider (InP) and many CPs. The InP aims to define the price it charges the CPs to maximize its revenue while the CPs compete to determine the number of files they cache at the InP's base stations (BSs). We conceive this system within the framework of Stackelberg game where InP is considered as the leader and CPs are the followers. By using backward induction, we show closed form of the amount of cache space that each CP renting on each base station and then solve the optimization problem to calculate the price that InP leases each CP. This is different from the existing works in that we consider the non-uniform pricing scheme. The numerical results show that InP's profit in the proposed scheme is higher than in the uniform pricing.

QuTFTP: Quick UDP Trivial File Transfer Protocol (QuTFTP: UDP 기반의 빠른 파일전송)

  • Kim, Byoung-Kug
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.5
    • /
    • pp.438-443
    • /
    • 2020
  • To transfer files between nodes on network based on Ethernet, file transfer protocol (FTP) on TCP/IP and trivial file transfer protocol (TFTP) on UDP/IP are mostly used. Due to the lack of resources (processor, memory and so on) in the embedded system where we generally use for simple works with small firmware like ones; many of the systems implement only UDP/IP for their network stacks. Thus, TFTP is greatly to be preferred. For examples, environmental sensor devices for sensor networks, Boot Loader for general embedded device and preboot execution environment (PXE) boot for PC provide the TFTP. The logic of TFTP is simple for file transmission but, there is Stop-And-Wait problem during the process which occurs long blocking time. In this paper, we propose an algorithm which called QuTFTP(Quick UDP Trivial File Transfer Protocol) to reduce the length of the blocking time and to be compatible with the legacy TFTP.

IEEE 802.16 WMAN MAC Protocol for the Coexistence with WLAN in Shared Bands (공유대역에서 무선 LAN과의 공존을 위한 IEEE 802.16 WMAN의 MAC 프로토콜)

  • Han, Ho-Seong;Rhee, Seung-Hyong;Park, Su-Won;Han, Ki-Young;Kang, Hyon-Goo;Yoon, Soon-Young
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.142-149
    • /
    • 2010
  • In this paper, we propose to modify the IEEE 802.16 MAC protocol in order to allow the coexistence of IEEE 802.11 and IEEE 802.16 wireless networks in shared bands. Our suggested protocol enables 802.16 WMAN to control WLAN devices for the coexistence. That is, in the downlink subframes(BS to SS), SS(Subscriber Station) prohibits WLAN to transmit by using CTS(Clear to Send) in order to protect it's burst. In the uplink subframes(SS to BS), on the other hand, BS(Base Station) sends CTS to block WLAN's communications. Our proposals enables the coexistence between WLAN and WMAN, and simulation results show that our protocols enhance the throughput of the entire system.

A Minimun-diameter Spanning Tree with Bounded Degrees (제한된 분지수를 가지는 최소지름 신장트리)

  • 안희갑;신찬수
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.78-85
    • /
    • 2004
  • Given a set S of n points in the plane, a minimum-diameter spanning tree(MDST) for the set might have a degree up to n-1. This might cause the degradation of the network performance because the node with high degree should handle much more requests than others relatively. Thus it is important to construct a spanning tree network with small degree and diameter. This paper presents an algorithm to construct a spanning tree for S satisfying the following four conditions: (1) the degree is controled as an input, (2) the tree diameter is no more than constant times the diameter of MDST, (3) the tree is monotone (even if arbitrary point is fixed as a root of the tree) in the sense that the Euclidean distance from the root to any node on the path to any leaf node is not decreasing, and (4) there are no crossings between edges of the tree. The monotone property will play a role as an aesthetic criterion in visualizing the tree in the plane.

Study of Operating μTESLA in Multi-hop Unattended WSN (멀티 홉 UWSN 환경에서의 μTESLA 운영에 관한 고찰)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.459-470
    • /
    • 2013
  • ${\mu}TESLA$ is well known as the most representative energy-efficient broadcast authentication method. Until now, there are many researches that figure out the problems or limitation of ${\mu}TESLA$ and mitigate or solve them, but most researches have been verified in the environment far from the real world. We consider the necessity of verifying what the real efficiency of ${\mu}TESLA$ is. In this paper, we assume that sensors that continuously repeat hibernation and activity perform communication under the UWSN(Unattended WSN), which BS does not stay in the network. In this environment, we newly inspect the performance of ${\mu}TESLA$ by performing various simulations.

A study on Dynamic Routing Protocol using Entropy-Doppler Topology (엔트로피-도플러 기법을 이용한 동적 라우팅 프로토콜에 관한 연구)

  • Chi, Sam-Hyun;Kim, Sun-Guk;Doo, Kyung-Min;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.461-465
    • /
    • 2007
  • MANET(Mobile Ad hoc Networks) is free-mobility formation of mobile nodes in the wireless networks. Generally, wireless networks has two main type of structures which Tree and Mesh. These general structure is difficult to do which connectivity, redundancy transmit and network continuant. In this paper, we would suggest a new ODDMRP(Ontology Doppler effect-based Dynamic Multicast Routing Protocol) technology for effective MANET which Ontology Doppler effect-based. ODDMRP consist of the parameters for node entropy when using Doppler effect which moving position of round node, moving time, and distribution chart in velocity also it express distance of destination node and property structure organization. It would be used to provide improvement to keep the optimal communication routing and also could be improve network stabilization, and continuation durability of connectivity.

  • PDF

A Hand-off Technique for Cellular Networks Using Game Theory (셀룰라 네트워크에서 게임 이론을 이용한 핸드오프 기법)

  • Hong, Jin-Dae;Lee, Sin-Kyu;Kim, Hyun-Tae;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2399-2404
    • /
    • 2009
  • In cellular network systems one of the most significant quality metrics to measure quality of performance is the average number of call drops in a system. It ensures that the active calls in the system are successfully completed without being dropped in the mid communication for ultimate customer satisfaction. Hand-off mechanism increases cellular system reliability by seamless continuation of active calls by transferring active calls from one base station to another. In this paper, we study and propose a simple hand-off mechanism using game theory. We conclude that using the simple QoS utility function proposed in this paper, our optimal deterministic hand-off strategy is to transfer the active calls to the base station with greater signal-to-interference ratio (SIR) and greater number of available channels.

Design and Implementation of SMS Application System with Wireless Internet Environment (무선인터넷환경과 연계한 SMS애플리케이션 시스템의 설계 및 구현)

  • Yang Hae-Sool;Hong Jung-Hun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1507-1516
    • /
    • 2004
  • Recently, the most remarkable word is 'ubiuuitous' in field of information and communication. Ubiquitous has a meaning 'exist everywhere' that means our daily life is connect as network. It means we can get the information which in need whenever and wherever with safety. We predict this word will be symbolical keyword which lead an information-oriented society including the internet a quite long it. It's already per-meate to us the Ubiquitous. It's taken by CCTV when we visit bank. It's made to us can know the fastest way the GPS system to be connected by an artificial satcllite on mobile, and many people use mobile and PDA for investment in stocks. Among them, it has begun to spread many mobile services to us. In this paper, it's the aim a creation of value added through an efficient mobile services to use wireless internet different with previous way, cutting down on expenses and business modeling.

A Study on the Channel Handover Method for Super Wi-Fi Service Continuity in TV White Spaces (Super Wi-Fi 환경에서 서비스 연속성을 위한 끊김없는 채널이동 방안 연구)

  • Kim, Myeongyu;Jeon, Youchan;Park, Sangwon;Park, Jinwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1050-1057
    • /
    • 2012
  • Super Wi-Fi is a newly emerging wireless Internet technology, which constitutes Wi-Fi networks using TV white space. A key technical challenge in the Super Wi-Fi applications is how to provide a seamless Internet service even when a Super WiFi user should give up the channel in use to the active incumbent user which is activated in the same service area, preventing from the service continuity in Super Wi-Fi. In this paper, we propose a channel handover method to support service continuity of Super Wi-Fi, in which an AP selects a new operational channel and provides the channel information for MSs. Therefore, the AP and the MSs can carry out seamless handover for Super Wi-Fi service. A performance evaluation shows that the proposed scheme is superior to the conventional Wi-Fi in channel mobility delay.