• Title/Summary/Keyword: 네트워크 구간

Search Result 505, Processing Time 0.027 seconds

A Secure Tunnel Broker for the IPv6 based Wireless Ad-hoc Network (IPv6 기반 이동 Ad-hoc 네트워크를 위한 안전한 터널 브로커)

  • Yang Jong-Won;Kim Won-Joo;Seo Chang-Ho;Kim Seok-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.41-49
    • /
    • 2006
  • Wireless AD-hoc network can construct a network itself without any arbitrator. Therefore, it is difficult to make preparation for disguised assault from an illegal node, and because lots of packets from disguised assault spread over whole network, it influences the network usability and livability. This thesis proposed a safe IPv6 tunnel broker (TB) based on TSP (Tunnel Setup Protocol) to improve safety of the wireless Ad-hoc network, and to solve security problem of a tunnel broker that makes a linkage IPv4 and IPv6. To communicate between client and the tunnel broker, proposed method does not base on HTTP, but S-HTTP (Secure-HTTP) and it uses encryption/decryption to send and receive XML document. Finally, this method encrypts (decrypts) important information by applying IPSec between client and TS (Tunnel Server).

Performance Evaluation of an Adaptive Collision Avoidance Algorithm for IEEE 802.15.4 (IEEE 802.15.4에서 적응적 충돌 회피 알고리즘의 성능분석)

  • Noh, Ki-Chul;Lee, Seung-Yeon;Shin, Youn-Soon;Ahn, Jong-Suk;Lee, Kang-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3A
    • /
    • pp.267-277
    • /
    • 2011
  • Like other wireless network protocols, IEEE 802.15.4 adopts CA (Collision Avoidance)algorithm to avoid the early collision of a new packet by randomizing its first transmission time rather than its immediate delivery. The traditional CA scheme of IEEE 802.15.4, however, selects the random access time from the predetermined range without considering the degree of current congestion. It probably causes either a long delay to settle in the suitable range for the current network load or frequent clashes especially during the long lasting heavy traffic period. This paper proposes an ACA(Adaptive Collision Avoidance) algorithm adapting the initial backoff range to the undergoing collision variations. It also introduces a mathematical model to predict the performance of ACA algorithm added to IEEE 802.15.4. With only small deviations from corresponding simulations, our analytical model shows that ACA technique can improve the throughput of IEEE 802.15.4 by up-to 41% maximally in addition to shortening the packet delays.

Energy Saving Algorithm of the Home Gateway considering Service Usage Patterns (서비스 사용 패턴을 고려한 홈 게이트웨이의 전력 절감 알고리즘)

  • Kong, In-Yeup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1792-1798
    • /
    • 2010
  • Home Gateway is always on for continuous services of home networks. Ubiquitous home networks are extended. so power consumption of home gateways increases by geometric progression. Our algorithm is for home gateway to sleep, listen or wakeup according to network traffic adaptively, as well as to keep always-on service. To do this, it traces the accumulated average of previous sleep periods. In addition to this basic algorithm, we make the profiles for user's living pattern per the day to reflect network usages in detail and adaptively. As the simulation results by comparing with overall accumulated average and per-day accumulated average, in case of the overall accumulated average, the difference the estimation and real value is distributed from 0.43% to 4%. In contrast of this, in case of the per-day accumulated average is distributed from 0.06% to 2%. From this results, we know the profiling of per-day usage pattern can help reduce the difference of the real sleep period and the estimated sleep period.

Real-time security Monitroing assessment model for cybersecurity vulnera bilities in network separation situations (망분리 네트워크 상황에서 사이버보안 취약점 실시간 보안관제 평가모델)

  • Lee, DongHwi;Kim, Hong-Ki
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.45-53
    • /
    • 2021
  • When the security monitoring system is performed in a separation network, there is little normal anomaly detection in internal networks or high-risk sections. Therefore, after the establishment of the security network, a model is needed to evaluate state-of-the-art cyber threat anomalies for internal network in separation network to complete the optimized security structure. In this study, We evaluate it by generating datasets of cyber vulnerabilities and malicious code arising from general and separation networks, It prepare for the latest cyber vulnerabilities in internal network cyber attacks to analyze threats, and established a cyber security test evaluation system that fits the characteristics. The study designed an evaluation model that can be applied to actual separation network institutions, and constructed a test data set for each situation and applied a real-time security assessment model.

Output Power Prediction of Combined Cycle Power Plant using Logic-based Tree Structured Fuzzy Neural Networks (로직에 기반 한 트리 구조의 퍼지 뉴럴 네트워크를 이용한 복합 화력 발전소의 출력 예측)

  • Han, Chang-Wook;Lee, Don-Kyu
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.529-533
    • /
    • 2019
  • Combined cycle power plants are often used to produce power. These days prediction of power plant output based on operating parameters is a major concern. This paper presents an approach to using computational intelligence technique to predict the output power of combined cycle power plant. Computational intelligence techniques have been developed and applied to many real world problems. In this paper, tree architectures of fuzzy neural networks are considered to predict the output power. Tree architectures of fuzzy neural networks have an advantage of reducing the number of rules by selecting fuzzy neurons as nodes and relevant inputs as leaves optimally. For the optimization of the networks, two-step optimization method is used. Genetic algorithms optimize the binary structure of the networks by selecting the nodes and leaves as binary, and followed by random signal-based learning further refines the optimized binary connections in the unit interval. To verify the effectiveness of the proposed method, combined cycle power plant dataset obtained from the UCI Machine Learning Repository Database is considered.

Application for Disaster Prediction of Reservoir Dam Wireless Sensor Network System based on Field Trial Construction (현장 시험시공을 통한 저수지 댐의 재해예측 무선센서 네트워크 시스템 적용성 평가)

  • Yoo, Chanho;Kim, Seungwook;Baek, Seungcheol;Na, Gihyuk;You, Kwangho
    • Journal of the Korean GEO-environmental Society
    • /
    • v.20 no.1
    • /
    • pp.19-25
    • /
    • 2019
  • In this present study, to evaluate the applicability of the monitoring system of the entire reservoir dam facility using the wireless sensor network system and a section representative of the domestic reservoir dam was selected as the test bed site and to operated a system that can evaluate the condition of the facility at the real time with monitoring. In order to set up a wireless sensor network system, the system assessment of present state was carried out for confirmation the risk factors and the limit values of the risk factors in limit state were calculated. The type and position of the sensor to be measured in the field were determined by setting the measurement items suitable for the hazardous area and the risk factor. In this paper, we evaluated the feasibility of the system by monitoring and constructing a wireless sensor network system in a field for a fill dam that can represent a domestic reservoir dam. Applicability evaluation was verified by comparing directly with the measurement of partial concentration method which is the measurement management technology of the dam.

Development of Integrated Traffic Control of Dynamic Merge and Lane Change at Freeway Work Zones in a Connected and Automated Vehicle Environment (자율협력주행차 환경의 고속도로 공사구간 동적합류 및 차로변경 통합제어전략 개발)

  • Kim, Yongju;Ka, Dongju;Kim, Sunho;Lee, Chungwon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.3
    • /
    • pp.38-51
    • /
    • 2020
  • A bottleneck and congestion occur when a freeway is closed due to maintenance and construction activities on the freeway. Although various traffic managements have been developed to improve the traffic efficiency at freeway work zones, such as merge control, there is a limit to those controls with human drivers. On the other hand, the wireless communication of connected and automated vehicles (CAVs) enables the operation of advanced traffic management. This study developed a traffic control strategy that integrates Dynamic Merge Control (DMC) and Lane Change Control (LCC) in a CAV environment. DMC operates as an either early or late merge based on the occupancy rate of upstream of the work zone. The LCC algorithm determines the number of vehicles that need to change their lane to balance the traffic volume on open lanes. The simulation results showed that integrated control improves the cumulative vehicle count, average speed upstream, and average network travel time.

A Novel Method of Basic Probability Assignment Calculation with Signal Variation Rate (구간변화율을 고려한 기본확률배정함수 결정)

  • Suh, Dong-Hyok;Park, Chan-Bong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.465-470
    • /
    • 2013
  • Dempster-Shafer Evidence Theory is available for multi-sensor data fusion. Basic Probability Assignment is essential for multi-sensor data fusion using Dempster-Shafer Theory. In this paper, we proposed a novel method of BPA calculation with signal assessment. We took notice of the signal that reported from the sensor mote at the time slot. We assessed the variation rate of the reported signal from the terminal. The trend of variation implies significant component of the context. We calculated the variation rate of signal for reveal the relation of the variation and the context. We could reach context inference with BPA that calculated with the variation rate of signal.

Speaker Recognition using LPC cepstrum Coefficients and Neural Network (LPC 켑스트럼 계수와 신경회로망을 사용한 화자인식)

  • Choi, Jae-Seung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2521-2526
    • /
    • 2011
  • This paper proposes a speaker recognition algorithm using a perceptron neural network and LPC (Linear Predictive Coding) cepstrum coefficients. The proposed algorithm first detects the voiced sections at each frame. Then, the LPC cepstrum coefficients which have speaker characteristics are obtained by the linear predictive analysis for the detected voiced sections. To classify the obtained LPC cepstrum coefficients, a neural network is trained using the LPC cepstrum coefficients. In this experiment, the performance of the proposed algorithm was evaluated using the speech recognition rates based on the LPC cepstrum coefficients and the neural network.

Authenticated Route Optimization (ATRO) Protocol for Network Mobility Support (네트워크 이동성 지원을 위한 인증된 경로 최적화(ATRO) 프로토콜)

  • Koo, Jung-Sook;Kim, Jin-Geun;Bak, Jong-Hyeok;Koo, Jung-Doo;Lee, Gi-Sung
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.05a
    • /
    • pp.203-207
    • /
    • 2007
  • NEMO 기본 지원 (NEMO-BS, NEMO Basic Support) 프로토콜에서 MNN(Mobile Network Node)가 CN(Correspondent Node) 과 통신을 하기 위해서는 항상 MR(Mobile Router)과 HA(Home Agent) 사이의 양방향 터널을 이용해야 한다. 그러나 NEMO-BS 방식은 노드 간 데이터 전송 지연과 부분 구간에 대한 공격 가능성이 존재한다. 따라서 본 논문에서는 NEMO를 위한 인증된 경로 최적화(ATRO) 프로토콜을 제안한다. MR은 홈 링크로부터 멀어졌다고 판단되면 MNN으로부터 위임 권한을 얻기 위해 권한 위임 프로토콜을 수행한다. 그런 후에 MR과 CN은 공개키 암호 방식을 이용하여 자신의 의탁주소(CoA, Care-of Address)를 MNN의 홈 주소(HoA, Home-of Address)와 매핑하기 위한 등록 과정을 수행한다. 이때 각 노드의 주소 소유권 증명을 위해 암호학적으로 생성한 주소(CGA, Cryptographically Generated Address)를 이용한다. 성능분석에서는 구간별 안전성과 종단간 패킷 전송 지연 시간을 통해 프로토콜을 분석한다.

  • PDF