• Title/Summary/Keyword: 결함 관리 기법

Search Result 2,856, Processing Time 0.028 seconds

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

Surface Crack Evaluation Method in Concrete Structures (콘크리트 구조물의 표면 균열 평가 기법)

  • Lee, Bang-Yeon;Yi, Seong-Tae;Kim, Jin-Keun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.27 no.2
    • /
    • pp.173-182
    • /
    • 2007
  • Cracks in concrete structures should be measured to periodically assess potential problems in durability and serviceability. Conventional crack measurement systems depend on visual inspections and manual measurements of the crack features such as width, length, and direction using microscope and crack gage. However, conventional methods take long time as well as manpower, and lack quantitative objectivity resulted by inspectors. In this study, an evaluation technique for concrete surface cracks is developed using image processing and artificial neural network. Developed technique consists of three major parts: (1) crack detection (2) crack analysis and (3) pattern recognition. To examine validity of the technique developed in this study, crack analyzing tests were performed on the images obtained from various types of concrete surface cracks. The test results revealed that the system is highly effective in automatically analyzing concrete surface cracks in terms of features and patterns of cracks.

Grouping Method based on Adaptive Load Balancing for the Intelligent Resource Management of a Cloud System (클라우드 시스템의 지능적인 자원관리를 위한 적응형 부하균형 기반 그룹화 기법)

  • Mateo, Romeo Mark A.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.37-47
    • /
    • 2011
  • Current researches in the Cloud focus on the appropriate interactions of cloud components in a large-scale system implementation. However, the current designs do not include intelligent methods like grouping the similar service providers based on their properties and integrating adaptive schemes for load distribution which can promote effective sharing of resource. This paper proposes an efficient virtualization of services by grouping the cloud providers to improve the service provisioning. The grouping of cloud service providers based on a cluster analysis collects the similar and related services in one group. The adaptive load balancing supports the service provisioning of the cloud system where it manages the load distribution within the group using an adaptive scheme. The proposed virtualization mechanism (GRALB) showed good results in minimizing message overhead and throughput performance compared to other methods.

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

A Study on the Risk Evaluation using Acoustic Emission in Rock Slope (암반 비탈면에서 AE 기법을 이용한 위험도 평가 연구)

  • Byun, Yoseph;Kim, Sukchun;Seong, Joohyun;Chun, Byungsik;Jung, Hyuksang
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.11
    • /
    • pp.5-12
    • /
    • 2014
  • A slope may fail after construction owing to external factors such as localized rainfall, earthquake, and weathering. Therefore, the grasp of failure probability for slope failures is necessary to maintain their stability. In particular, it is very difficult to detect the symptoms of rock slope failure in advance by using traditional methods, such as displacement due to the brittleness of rocks. However, Acoustic Emission (AE) techniques can predict slope failures earlier than the traditional methods. This study grasped failure probability of slope by applying AE techniques to a rock slope with a history of collapse. When applying AE techniques to a slope that has a high probability of failure, the grasp of failure probability of the specific location became possible.

Performance Analysis of Packet Sampling Mechanisms for DDoS Attack Detection (DDoS 공격 탐지를 위한 패킷 샘플링 기법들의 성능 분석)

  • Kang Kil-Soo;Lee Joon-Hee;Choi Kyung-Hee;Jung Gi-Hyun;Shim Jae-Hong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.711-718
    • /
    • 2004
  • Packet sampling is the techniques to collect a part of the packets through network and analyze the characteristicsof the traffic for managing the network and keeping security. This paper presents a study on the sampling techniques applied to DDoS traffic and on the characteristics of the sampled traffic to detect DDoS attack efficiently and improve traffic analysis capacity. Three famous sampling techniques are evaluated with different sampling rates on various DDoS traffics. To analyze traffic characteristics, one of the DDoS attack detection method. Traffic Rate Analysis (TRA) is used. Simulation results verify that using sampling techniques preserve the traffic characteristics of DDoS and do not significantly reduce the detection accuracy.

A Study on Precise Positioning with Doppler Measurements for Ground Transportation System (도플러 측정치를 이용한 육상교통 환경에 적합한 정밀 측위 기법 연구)

  • Lee, Byung-Hyun;Jee, Gyu-In
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.632-639
    • /
    • 2010
  • Ground Transportation is one of the most required field that users need positioning information Especially, more precise position can make smart traffic management possible and bring convenience to users. By advanced wireless network, cars can receive the GPS information of reference station in any tim e and any where. Thus land vehicles are possible to process precise positioning. In general, for precise positioning code and phase measurements are used. But receivers provide not only code and phase measurements but also doppler measurements and Doppler is direct measurement of velocity. In this paper, because velocity is very important information required in Ground Transportation, precise positioning for Ground Transportation is studied. For precise positioning RTK(Real-Time Kinematic) was used and double differenced doppler measurements were added, As a Result, positioning error by multipath and cycle slip was soften. However there still remained Positioning error. Thus smoothing technique using doppler measurement in position domain is used for softening positioning error.

An MPR-based broadcast scheme using 3 channels for WSNs (무선 센서 네트워크에서 3개의 채널을 이용한 MPR 기반의 브로드캐스트 기법)

  • Lee, Ji-Hye;Lee, Ki-Seok;Kim, Chee-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10B
    • /
    • pp.1043-1049
    • /
    • 2009
  • Broadcast of sink node is used for network management, data collection by query and synchronization in wireless sensor networks. Simple flooding scheme induces the broadcast storm problem. The MPR based broadcast schemes reduce redundant retransmission of broadcast packets. MPR is a set of one hop neighbor nodes which have to relay broadcast message to cover all two hop neighbors. Though MPR can reduce redundant retransmission remarkably, it still suffers from energy waste problem caused by collision and duplicate packets reception. This paper proposes a new MPR based sink broadcast scheme using 3-channel. The proposed scheme reduces energy consumption by avoiding duplicate packet reception, while increases reliability by reducing collision probability remarkably. The results of analysis and simulation show that the proposed scheme is more efficient in energy consumption compared to the MPR based scheme. The result also shows that the proposed scheme reduces delivery latency by evading a contention with other relay nodes and improves reliability of broadcast message delivery by reducing collision probability.

Collaboration Model Design to Improve Malicious Node Detection Rate in MANET (MANET에서 악의적 노드 탐지율 향상을 위한 협업모델 설계)

  • Shin, Eon-Seok;Jeon, Seo-In;Park, Gun-Woo;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.35-45
    • /
    • 2013
  • MANET has a weak point because it allows access from not only legal nodes but also illegal nodes. Most of the MANET researches had been focused on attack on routing path or packet forwarding. Nevertheless, there are insuffcient studies on a comprehensive approach to detect various attacks on malicious nodes at packet forwarding processes. In this paper, we propose a technique, named DTecBC (detection technique of malicious node behaviors based on collaboration), which can handle more effciently various types of malicious node attacks on MANET environment. The DTecBC is designed to detect malicious nodes by communication between neighboring nodes, and manage malicious nodes using a maintain table. OPNET tool was used to compare with Watchdog, CONFIDANT, SRRPPnT for verifying effectiveness of our approach. As a result, DTecBC detects various behaviors of malicious nodes more effectively than other techniques.

Leakage Detection of Water Distribution System using Adaptive Kalman Filter (적응 칼만필터를 이용한 상수관망의 누수감시 기법)

  • Kim, Seong-Won;Choi, Doo Yong;Bae, Cheol-Ho;Kim, Juhwan
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.10
    • /
    • pp.969-976
    • /
    • 2013
  • Leakage in water distribution system causes social and economic losses by direct water loss into the ground, and additional energy demand for water supply. This research suggests a leak detection model of using adaptive Kalman filtering on real-time data of pipe flow. The proposed model takes into account hourly and daily variations of water demand. In addition, the model's prediction accuracy is improved by automatically calibrating the covariance of noise through innovation sequence. The adaptive Kalman filtering shows more accurate result than the existing Kalman method for virtual sine flow data. Then, the model is applied to data from two real district metered area in JE city. It is expected that the proposed model can be an effective tool for operating water supply system through detecting burst leakage and abnormal water usage.