• Title/Summary/Keyword: 랜덤 워크

Search Result 197, Processing Time 0.021 seconds

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

Network Coding-Based Information Sharing Strategy for Reducing Energy Consumption in IoT Environments (사물인터넷 환경에서 에너지 소모량을 줄이기 위한 네트워크 부호화 기반 정보 공유 방식)

  • Kim, Jung-Hyun;Park, Dabin;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.433-440
    • /
    • 2016
  • This paper proposes a method of minimizing total energy consumption of IoT environment when communication devices in the network share the information directly. The proposed method reduces total number of transmission for the information sharing by using an effective network coding-based technique which dynamically selects a node and a data packet for each transmission. Simulation results show that the proposed method has better performance than an existing network coding-based method selecting transmission node in fixed order, a network coding-based method selecting transmission node in random order, and a uncoded method selecting transmission node in random order.

Implementation of Publickey-based Key Distribution in Wireless Sensor Network (공개암호키를 사용한 센서네트워크에서의 키 분배 구현)

  • Oh, Kyung-Hee;Kim, Tae-Sung;Kim, Ho-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.95-98
    • /
    • 2008
  • 센서네트워크는 넓은 지역에 무선 인프라로 묶여 설치된 센서들을 사용하여 상황 인지로 감지된 데이터를 응용서비스 서버와 연동하는 기술이다. 이는 환경 감시, 대상 추적, 환자 모니터링, 군사적 목적 등 매우 다양한 분야에 사용될 수 있다. 센서네트워크 역시 기존 네트워크에서 필요로 하는 보안 기능을 요구한다. 그러나 센서네트워크에 사용되는 노드들이 사용할 수 있는 자원에 제약이 있어, 기존의 암호기술을 그대로 적용하는데 어려움이 있다. 이러한 센서네트워크에서의 키 분배 문제를 해결하기 위하여 인증센터를 사용하는 기법, 랜덤 키 사전 분배 기법, q-합성수 랜덤 키 사전 분배 기법, Blom 스킴, 위치 기반 키 사전 분배 기법 등이 제안되어 있다. 한편, 공개키 연산의 많은 부하로 인하여 공개키 기법을 센서네트워크에 적용하기에 적합하지 않으리라 여겨져 왔으나, 최근의 연구결과들에 의하면 PKI처럼 복잡한 시스템을 구현하는 것은 부적합할지라도 공개키를 이용한 키 분배 기법을 센서네트워크에 적용하는 것이 실효성이 있다는 것을 보여준다. 본 논문에서는 TinyOS 플랫폼에서 공개키를 이용하여 센서 노드 간 상호 인증 및 세션키를 생성하여 암호 데이터 통신을 수행하는 센서네트워크 플랫폼을 구현한 결과를 제시한다.

  • PDF

A Time Slot Assignment Algorithm Based on Transmission Interval in Time Division Multiple Access Communication System (시분할 다중접속 통신시스템에서 전송주기를 고려한 시간슬롯 할당 알고리즘)

  • Lee, Ju-Hyung;Cho, Joon-Young;Park, Kyung-Mi;Lee, Seung-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.181-188
    • /
    • 2012
  • In this paper, the time slot assignment algorithm, which is based on various transmission interval in TDMA DAMA communication system, has been proposed. The performance of the proposed algorithm and the random assignment algorithm is compared through computer simulations. The simulation results show that the new algorithm can enhance the efficiency of time slot usage much more than the random assignment algorithm. Especially, the lower the congestion of the network is, the higher the efficiency of time slot usage for short transmission interval is.

Performance Evaluation of the HomePNA 3.0 Asynchronous MAC Mode with Collision Management Protocol (HomePNA 3.0 비동기 MAC 모드의 Collision Management Protocol 성능 분석)

  • 김희천;정민영;이태진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.727-734
    • /
    • 2004
  • Collision Management Protocol (CMP) efficiently resolves collisions when data frames are transmitted in networks consisting of HomPNA 3.0 asynchronous MAC mode device with random access. Unlike Distributed Fair Priority Queueing (DFPQ) algorithm in HomePNA 2.0 or Binary Exponential Backoff (BEB) algorithm in IEEE 802.11, order of retransmission is decided according to Collision Signaling Sequence (CSS) values allocated to each device. Thus, CMP can minimize the number of mean collisions because order of retransmission is decided in a deterministic way. In this paper. we evaluate the saturation performance of CMP in HomePNA 3.0 using an analytic method.

A Head Selection Algorithm with Energy Threshold in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 임계값을 활용한 헤드 선정)

  • Kwon, Soon-II;Roh, II-Soon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.111-116
    • /
    • 2009
  • LEACH is a important hierarchical protocol in wireless sensor network. In LEACH, the head is randomly selected for balanced energy consume. In LEACH-C, the node that has more energy than the average value is selected for the network life cycle. However, the round continues, the improved protocol is needed because the energy and network are changed. In this paper, LEACH, LEACH-C is not considered the energy consumed in the round because of wasted energy and reduce the time for presenting a new round time was set. And proposed the new algorithm using the energy threshold for the cluster head selection and the round time. In simulation, we show the improved performance compared to existing protocols.

  • PDF

Routing Protocol Technique based on Cluster in Wireless Sensor Networks (센서 네트워크에서의 클러스터 기반 라우팅 프로토콜 기법)

  • Nam, Choon-Sung;Kim, Seung-Hong;Park, Soo-Min;Kim, Kyung-Min;Shin, Yong-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.742-745
    • /
    • 2006
  • 센서 네트워크를 구성하는 각 노드는 크기가 작고, 배터리 용량도 제한되어 있기 때문에 오랜 시간 노드가 활동하기 위해서는 노드의 에너지 소모를 줄이는 것이 중요하다. 센서 노드들의 에너지 소비 감소를 위해서 센서 네트워크에서는 에너지 효율적인 라우팅을 통해 에너지를 소비를 줄이는 방법이 연구되었다. 그 중에서 클러스터링 기법은 센서 노드가 클러스터를 형성하고, 그 주체가 되는 클러스터 헤드와 통신함으로써 전체적인 센서 노드의 에너지 소비를 줄이고, 센서 노드의 에너지 소모를 분산하는 기법이다. 그러나 클러스터 생성 후 클러스터 내에서 센서 노드들이 직접 클러스터 헤드와 통신한다거나, 플러딩을 하는 방식으로 통신했을 때, 각각의 센서 노드들은 에너지 소비를 낭비한다. 이때 중요시 생각해야 할 것은 클러스터를 형성한 후, 클러스터 내에서 라우팅을 어떻게 하느냐가 클러스터 내에 있는 센서 노드들의 에너지 소비 분배를 효율적으로 할 수 있게 하는 가이다. 이에 본 논문은 초기 랜덤하게 뿌려진 센서 노들이 클러스터 헤드를 선정한 후, 클러스터 헤드로부터 클러스터를 형성하면서 생기는 정보를 바탕으로 클러스터 헤드로의 효율적인 라우팅 프로토콜을 하는 방법을 제안한다.

  • PDF

A Distributed Peer Selection Method for Supporting Scalable Peer-to-Peer Services (확장성 있는 Peer-to-Peer 서비스 제공을 위한 분산적 피어 선택 기법)

  • Park, Jaesung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.471-474
    • /
    • 2013
  • In this paper, we propose a distributed parent peer selection method to construct an efficient peer-to-peer(P2P) network topology by considering the capacity of a peer and the hop distance from a data source to the peer. To achieve this goal, we propose a method to combine the two performance metrics to calculate the probability that a peer becomes a parent peer. Using the probability, we propose a method to select a parent peer stochastically by making use of the state information of the neighboring peers that each peer maintains. Through simulation studies, we show that the proposed method drives high capacity peers to support more children peers and makes the diameter of the P2P network shorter than the other methods.

Speed-limit Sign Recognition Using Convolutional Neural Network Based on Random Forest (랜덤 포레스트 분류기 기반의 컨벌루션 뉴럴 네트워크를 이용한 속도제한 표지판 인식)

  • Lee, EunJu;Nam, Jae-Yeal;Ko, ByoungChul
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.938-949
    • /
    • 2015
  • In this paper, we propose a robust speed-limit sign recognition system which is durable to any sign changes caused by exterior damage or color contrast due to light direction. For recognition of speed-limit sign, we apply CNN which is showing an outstanding performance in pattern recognition field. However, original CNN uses multiple hidden layers to extract features and uses fully-connected method with MLP(Multi-layer perceptron) on the result. Therefore, the major demerit of conventional CNN is to require a long time for training and testing. In this paper, we apply randomly-connected classifier instead of fully-connected classifier by combining random forest with output of 2 layers of CNN. We prove that the recognition results of CNN with random forest show best performance than recognition results of CNN with SVM (Support Vector Machine) or MLP classifier when we use eight speed-limit signs of GTSRB (German Traffic Sign Recognition Benchmark).

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.