• Title/Summary/Keyword: 노드 내 통신

Search Result 445, Processing Time 0.027 seconds

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Research Institutes Network Analysis on the Established Research Equipment : Ministry of Knowledge Economy R&D Business Project (연구장비 구축 연구기관 네트워크 분석 : 지식경제부 R&D 사업 대상)

  • Ham, Myoung-In;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.307-317
    • /
    • 2013
  • This study aims to investigate the research equipment establishing relationship by looking at research equipment information transfer that follows the network's structural and positional characteristics and the research institute's responsibilities to increase the possibility of research equipment usage by using the SNA(Social Network Analysis) method. Consequently, with the given structural characteristics of research institute, it can be concluded that because of its low density, it appears to be difficult to transfer research equipment information within the network. Government-funded research institutes that can effectively deliver research equipment information within the network system through comparison positional characteristics are ETRI, KITECH, KRICT, Sungkyungwan University, and Kyungbook National University. In addition, a virtualization node not only invigorates the network system but also acts as an intermediary factor to effectively deliver research equipment information. As results, there can be three conceivable alternatives to increase the possibility of research equipment usage. Those includes: 1. policy to encourage relationship building among research institutes 2. utilizing suitable institutes for effective delivery of research equipment information and lastly, 3. establishing a virtual intermediary institute for information sharing and utilization of isolated institutes' research equipments.

Reliable Extension Scheme using Multiple Paths in Wireless Ad-hoc Networks (무선 애드-혹 네트워크의 다중 경로를 이용한 신뢰적인 확장 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.218-225
    • /
    • 2007
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless mobile ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an extension scheme of a wireless mobile ad-hoc network based on limited multiple paths source routing protocol. This scheme reduces the overhead of route re-establishment and re-registration by maintaining link/node non-disjoint multiple paths between mobile hosts in a wireless mobile ad-hoc network or a mobile host in a wireless mobile ad-hoc network and a base station supporting fixed network services. By maintaining multiple paths, our scheme provides short end-to-end delay and is reliable extension scheme of a wireless mobile ad-hoc network to a fixed network. In this paper, our simulations show that our scheme outperforms existing schemes with regards to throughput and end-to-end delay. Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.

A Study of System Architecture for Intelligent Responsive Space (지능형 반응 공간 기술 개발을 위한 시스템 아키텍처)

  • Yeom, Ki-Won;Lee, Joong-Ho;Lee, Seung-Soo;Eom, Ju-Il;Park, Joon-Koo;Kim, Rae-Hyeon;Jo, Hyeon-Cheol;Kim, Geon-Hui;Gwon, Mi-Su;Yu, Ho-Yeon;Son, Yeong-Tae;Pyo, Jeong-Guk;Kim, Tea-Su;Park, Myeon-Ung;Park, Se-Hyeong;Ha, Seong-Do;Park, Ji-Hyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02c
    • /
    • pp.854-858
    • /
    • 2006
  • 디지털화의 가속, 고속 통신 인프라의 확대 등으로 전자, 정보 통신 기기들이 단일 네트워크로 연결되어 영상 및 음향 정보를 서로 공유할 수 있으며, 생활 공간 내에서 실생활의 질 향상을 위한 지능적 정보 서비스와 자연스럽고 편한 내추럴 인터페이스 기술에 의한 지능형 반응 정보 서비스 공간 기술이 중요한 이슈로 등장하고 있다. 본 연구에서는 지능형 반응 공간의 물리적 객체로서 학교, 연구 기관 및 회사 등의 회의실을 선정한다. 그리고, 이를 대상으로 회의 참여자들이 자연스럽고 편리하게 의견 교환, 관련 자료 및 정보 처리를 할 수 있는 시스템 구축을 위한 아키텍처에 대하여 논의한다. 본 연구에서 제안하는 시스템 아키텍처는 회의와 관련된 문서나 회의 내용 등의 정보를 실감 가시화 노드로 추상화되고 메타 정보화함으로써 전체 회의 내용의 파악과 회의 정보에 대한 체계적이고 논리적인 관리를 가능하게 한다. 또한 여러 사람의 공동 작업을 필요로 하는 정보 또는 문서에 대한 동시 편집 기능과 자연스러운 동작에 의한 데이터 조작을 지원하는 실감 워크벤치 및 워크스크린 기술, 정보 핸들링의 다양성과 조작의 편리성을 위한 실감 아이콘에 의하여 자연스럽고 편리한 회의를 가능하게 한다. 그리고, 이러한 요소 기술들이 에이전트에 의해 회의 프로세스 및 요소 기술들의 시스템적 통합을 가능하게 한다.

  • PDF

Design and Implementation of a High-Performance Index Manager in a Main Memory DBMS (주기억장치 DBMS를 위한 고성능 인덱스 관리자의 설계 및 구현)

  • Kim, Sang-Wook;Lee, Kyung-Tae;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.605-619
    • /
    • 2003
  • The main memory DBMS(MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. In this paper, we discuss the index manager of the Tachyon, a next-generation MMDBMS. Recently, the gap between the CPU processing and main memory access times is becoming much wider due to rapid advance of CPU technology. By devising data structures and algorithms that utilize the behavior of the cache in CPU, we are able to enhance the overall performance of MMDBMSs considerably. In this paper, we address the practical implementation issues and our solutions for them obtained in developing the cache-conscious index manager of the Tachyon. The main issues touched are (1) consideration of the cache behavior, (2) compact representation of the index entry and the index node, (3) support of variable-length keys, (4) support of multiple-attribute keys, (5) support of duplicated keys, (6) definition of the system catalog for indexes, (7) definition of external APIs, (8) concurrency control, and (9) backup and recovery. We also show the effectiveness of our approach through extensive experiments.

Ubiquitous sensor network based plant factory LED lighting system development (유비쿼터스 센서 네트워크 기반의 식물공장 LED 조명 시스템 개발)

  • Yang, Heekwon;Shin, Minseock;Lee, Chankil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.845-848
    • /
    • 2013
  • Due to intense climate changes and extreme weather conditions a noticeable decrease has been observed in the growth of certain plants. The indoor plant factories would have certain benefits including increase in crop yield, reduction in distribution cost, and maintains the healthy freshness level of the agricultural product. Recently, an artificial light source with optimum wavelength is spot lighted to fulfill the need of light for the indoor plant factories. The energy efficient light emitting diodes (LED) provide the essential light energy for the proper growth of indoor cultivated plants. This work focuses to utilize ubiquitous sensors network(USN) in providing suitable environment for the proper growth of agricultural product inside the indoor plant factory. The proposed system makes use of sensors and actuators, communicating each other through WPAN, ZigBee network. The proposed system obscured the traditional indoor plant factories with easy installation and wireless connectivity of the sensors and actuators along with eliminating the web of wires reducing the initial installation and maintenance cost.

  • PDF

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

A System Recovery using Hyper-Ledger Fabric BlockChain (하이퍼레저 패브릭 블록체인을 활용한 시스템 복구 기법)

  • Bae, Su-Hwan;Cho, Sun-Ok;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Currently, numerous companies and institutes provide services using the Internet, and establish and operate Information Systems to manage them efficiently and reliably. The Information System implies the possibility of losing the ability to provide normal services due to a disaster or disability. It is preparing for this by utilizing a disaster recovery system. However, existing disaster recovery systems cannot perform normal recovery if files for system recovery are corrupted. In this paper, we proposed a system that can verify the integrity of the system recovery file and proceed with recovery by utilizing hyper-ledger fabric blockchain. The PBFT consensus algorithm is used to generate the blocks and is performed by the leader node of the blockchain network. In the event of failure, verify the integrity of the recovery file by comparing the hash value of the recovery file with the hash value in the blockchain and proceed with recovery. For the evaluation of proposed techniques, a comparative analysis was conducted based on four items: existing system recovery techniques and data consistency, able to data retention, recovery file integrity, and using the proposed technique, the amount of traffic generated was analyzed to determine whether it was actually applicable.

Analysis of Signaling Load of Mobile IPv6 and Hierarchical Mobile IPv6 (Mobile IPv6와 Hierarchical Mobile IPv6의 시그널링 부하 분석)

  • Kong Ki-Sik;Song MoonBae;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.515-524
    • /
    • 2005
  • As the number of the mobile nodes (MNs) increases in the networks, the signaling traffic generated by mobility management for MNs will increase explosively, and such a phenomenon will probably affect overall network performance. In this paper, we propose a novel analytical approach using a continuous-time Markov chain model and hierarchical network model for the analysis on the signaling load of representative IPv6 mobility support Protocols such as Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). According to these analytical modeling, this paper derives the various signaling costs, which are generated by an MN during its average domain residence time when MIPv6 and HMIPv6 are deployed under the same network architecture, respectively. In addition, based on these derived costs, we investigate the effects of various mobility/traffic-related parameters on the signaling costs generated by an MN under MIPv6 and HMIPv6. The analytical results show that as the average moving speed of an MN gets higher and the binding lifetime is set . to the larger value, and as its average packet arrival rate gets lower, the total signaling cost generated during its average domain residence time under HMIPv6 will get relatively lower than that under MIPv6, and that under the reverse conditions, the total signaling cost under MIPv6 will get relatively lower than that under HMIPv6.

Performance Analysis of Interworking Model for a Broadband Access Network with VB5.2 Interface (광대역 액세스 망의 VB5.2 인터페이스를 위한 연동 모델의 성능분석)

  • Kim, Choon-Hee;Cha, Young-Wook;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.237-246
    • /
    • 2000
  • A broadband access network in B-ISDN subscriber network, plays a role of concentration or multiplexing of various subscribers into a service node. For call and connection control functions, DSS2 and B-ISUP signalling protocols are standardized for each of a subscriber side and a network node. B-BCC and B-ANCC protocol were proposed for VB5.2 interface. This interface allows dynamic control of ATM connections at the broadband access network. To establish an end-to-end ATM connection, interworking functions between VB5.2 interface's connection control protocol and the signalling protocol, are performed at the service node. A sequential interworking model and a parallel interworking model were proposed for these interworking functions. The sequential interworking model recommended by ITU-T causes an overall connection setup delay by introducing the access network, because this model proceeds the signalling protocol of network node after the response of VB5.2 interface protocol. On the other hand, the parallel interworking model proceeds the signalling protocol and the VB5.2 interface protocol simultaneously. The simultaneity of the parallel interworking model minimizes the overall connection setup delay. In this paper, we analyze and simulate above two interworking models with B-BCC or B-ANCC protocol in terms of a connection setup delay and completion ratio.

  • PDF