• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.034 seconds

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

A Model of SLA(Service Level Agreement) Standard Metrics for IP networks (IP 망에서의 SLA(Service Level Agreement) 표준 지표 모델)

  • Yoo, Yong-Duck;Oh, Myoung-Hwan;Choi, Hoon;Lee, Gil-Hang
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1241-1244
    • /
    • 2002
  • 인터넷은 전세계를 연결하는 컴퓨터 망으로서 최근 기하급수적으로 그 수요가 증가하고 있다. 현재 전세계적으로 다양한 정보통신 서비스 창출과 향상된 성능을 가진 장치들의 개발 등으로 인해 과거 어느 때보다도 정보통신서비스 시장이 확대되고 있으며, 이에 따라 각 정보통신서비스 제공업자들도 기존의 가입자의 양적 확장에 치중하던 경향에서 탈피하여 보다 저렴한 고속/고품질 서비스 제공을 통하여 가입자들을 확보하기 위한 경쟁을 펼치고 있다. 정보통신서비스 제공업자들이 정보통신서비스 시장에서 다른 경쟁업체에 비하여 우위를 차지하고 보다 높은 수익창출을 위한 중요한 관건은 바로 정보통신서비스 이용자들에게 제공되는 통신 서비스의 품질 보장이다. 이를 위해서는 현재 사업자들이 사용자들에게 제공하는 통신서비스 품질 보장은 기존의 단순한 서비스 품질 보장 차원의 수준을 넘어 고객에게 서비스에 대한 신뢰성, 투명성 및 객관성을 입증할 수 있어야 한다. 이에 관한 입증 방법을 체계화한 것이 서비스 수준 규약(Service Level Agreement : SLA)이다 본 논문에서는 서비스 수준 규약의 개념과 SLA 표준화 동향을 소개하고, 현재 가장 보편적인 망인 IP 망에서의 표준화 동향 분석을 바탕으로 얻어진 SLA 표준 지표 모델에 대해서 제시한다.

  • PDF

Improvement of Traffic Information Contents of Portal Site focused on User's Satisfaction (이용자 만족도 중심의 인터넷포탈 교통정보 콘텐츠 개선방안)

  • Park, Bum-Jin;Eo, Hyo-Kyoung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.9
    • /
    • pp.500-511
    • /
    • 2012
  • Recently, use frequency for traffic information which provides shortest paths and traffic condition is increasing. Specially, in the survey, it is shown that users prefer internet portal sites which can be used the most easily among traffic information media. But, there are not many verification systems for traffic information contents of internet portal sites which collect and provide information than traffic information contents which are provided by public service. The purpose of this study is to investigate real accuracy and accuracy felt by users about information provided by portal sites. Therefore, in this research we verified accuracy of information by portal site with real field data and investigate real usage about contents and experienced accuracy by users through survey. Also, users' expectation and satisfaction were surveyed and the contents to be improved were selected by using IPA technique. By the result of accuracy verification by field data using portable DSRC(Dedicated Short Range Communication) devices, it is shown that average error was 14~32% and sometimes very high rate. Also, it is shown that 28.3 % of total respondents prefers the information by portal sites and 50 % of total respondents felt that contents of traffic information by portal sites are not accurate. Real-time traffic condition was selected as the most inaccurate one among all contents of traffic information and it was analyzed that intensive efforts for improving information about real-time traffic condition are needed.

A Design of Web Server Architecture Environment for Reliability Enhancement and Secure Web Services (신뢰성 향상과 안전한 웹 서비스를 위한 웹 서버 아키텍처 환경의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.343-350
    • /
    • 2010
  • In the existing design of web server architecture, data encryption technique is used to keep the reliability, stability, and safety of web service. But the use of data encryption technique wastes the work of cpu while decreasing throughput of web server and increasing average response time so that it shows negative effect on the capacity of web application server. Also, the latest web applications require security and safety for the safe internet communication. Therefore, this paper suggests the improved web server which uses thread pool and Non-blocking I/O adding new web service modules to the existing web server for the safe web service, provides reliability and safety to show the safe web service capacity. And we compare and evaluate the safety and capacity through experiment on the existing traditional Tomcat based web server and the proposed system to evaluate the safety and capacity of the proposed web server system.

Efficient Resource Allocation for Energy Saving with Reinforcement Learning in Industrial IoT Network

  • Dongyeong Seo;Kwansoo Jung;Sangdae Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.169-177
    • /
    • 2024
  • Industrial Wireless Sensor Network (IWSN) is a key feature of Industrial IoT that enables industrial automation through process monitoring and control by connecting industrial equipment such as sensors, robots, and machines wirelessly, and must support the strict requirements of modern industrial environments such as real-time, reliability, and energy efficiency. To achieve these goals, IWSN uses reliable communication methods such as multipath routing, fixed redundant resource allocation, and non-contention-based scheduling. However, the issue of wasting redundant resources that are not utilized for communication degrades not only the efficiency of limited radio resources but also the energy efficiency. In this paper, we propose a scheme that utilizes reinforcement learning in communication scheduling to periodically identify unused wireless resources and reallocate them to save energy consumption of the entire industrial network. The experimental performance evaluation shows that the proposed approach achieves about 30% improvement of resource efficiency in scheduling compared to the existing method while supporting high reliability. In addition, the energy efficiency and latency are improbed by more than 21% and 38%, respectively, by reducing unnecessary communication.

A Study on the Intelligence Information System's Research Identity Using the Keywords Profiling and Co-word Analysis (주제어 프로파일링 및 동시출현분석을 통한 지능정보시스템 연구의 정체성에 관한 연구)

  • Yoon, Seong Jeong;Kim, Min Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.139-155
    • /
    • 2016
  • The purpose of this study is to find the research identity of the Korea Intelligent Information Systems Society through the profiling methods and co-word analysis in the most recent three-year('2014~'2016) study to collect keyword. In order to understand the research identity for intelligence information system, we need that the relative position of the study will be to compare identity by collecting keyword and research methodology of The korea Society of Management Information Systems and Korea Association of Information Systems, as well as Korea Intelligent Information Systems Society for the similar. Also, Korea Intelligent Information Systems Society is focusing on the four research areas such as artificial intelligence/data mining, Intelligent Internet, knowledge management and optimization techniques. So, we analyze research trends with a representative journals for the focusing on the four research areas. A journal of the data-related will be investigated with the keyword and research methodology in Korean Society for Big Data Service and the Korean Journal of Big Data. Through this research, we will find to research trends with research keyword in recent years and compare against the study methodology and analysis tools. Finally, it is possible to know the position and orientation of the current research trends in Korea Intelligent Information Systems Society. As a result, this study revealed a study area that Korea Intelligent Information Systems Society only be pursued through a unique reveal its legitimacy and identity. So, this research can suggest future research areas to intelligent information systems specifically. Furthermore, we will predict convergence possibility of the similar research areas and Korea Intelligent Information Systems Society in overall ecosystem perspectives.

A Method of QoS Performance Improvement based on TCP Protocol for Streaming Service (스트리밍 서비스를 위한 TCP 프로토콜의 QoS 성능 향상 기법)

  • Kim Sang-Hyong;Cho Jae-Sang;Yoo Won-Kyong;Yoo Kwan-Jong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.655-657
    • /
    • 2005
  • 지속적인 네트워크 환경의 개선과 기술의 비약적인 발전으로 인해 인터넷을 이용한 여러 가지 서비스가 등장하게 되었고, AOD, VOD 등과 같은 멀티미디어 데이터를 제공하는 스트리밍 서비스가 두각을 보이기 시작했다. 본 논문에서는 네트워크 상황에 따라 QoS를 향상시키기 위한 MPEG 비디오 스트림의 혼합 스케일링 방식을 이용한 신뢰성을 보장할 수 있는 TCP 전송 방식을 제안하여, 스케일러블 전송이 가능하면서 고화질의 영상을 서비스할 수 있도록 한다.

  • PDF

A Scalable Control Tree Management and Error Control Scheme for ECTP-5 (ECTP-5를 위한 제어 트리 및 에러제어 기법 설계)

  • Lee Seungik;Lee Haejun;Ko Yangwoo;Lee Dongman
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.160-162
    • /
    • 2005
  • 인터넷의 발전에 따라 다자간 그룹 통신 환경이 주목을 받게 되었고 이를 위해 다대다 멀티캐스트를 이용한 통신 기법들이 제안되었다. 이들 중 ECTP-5는 다대다 멀티캐스트의 신뢰성 보장을 위해 단일 공유 제어 트리와 주기적 제어 메시지를 통한 복구 요청 및 재전송 데이터의 멀티캐스트 등을 통해 에러 복구를 지원한다. 그러나 창가자의 수가 늘어남에 따라 트리 유지 비용 및 에러 복구 비용에 따른 확장성의 문제가 발생한다. 이를 해결하기 위해 본 논문에서는 2-계층 논리 트리를 이용한 제어 트리 관리 기법과 유니캐스트 기반의 제어메시지를 활용하는 에러 복구 기법을 제안한다.

  • PDF

Generation of Character Emotion Based on User Interaction (사용자 상호작용 기반 캐릭터 emotion 생성)

  • 최은영;박혜정;박영택
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.113-115
    • /
    • 1999
  • 인터넷에서 제공하는 각종 서비스 및 다양한 소프트웨어들은 점차 사용자를 고려하여 개발되고 있는 추세이나 아직은 미약하다. 사용자를 고려한다는 것은 사용자가 소프트웨어를 사용하거나 서비스를 받으면서 공감을 느끼도록 하여 사용 효과를 높이고, 생활의 일부분이 되어 가고 있는 컴퓨터 시스템을 사람과 친하게 만들려는 것이다. 이를 위해서는 사용자와의 상호작용이 중요시된다. 본 연구에서는 사람과 비슷한 가상의 캐릭터를 이용하며, 이 캐릭터가 사용자와 상호 작용을 통하여 emotion을 갖게 하는데 중점을 두었다. 즉, 캐릭터가 가질 수 있는 emotion structure를 정의하고 사용자와의 상호작용을 바탕으로 캐릭터의 emotion을 생성한다. 이를 위한 시스템은 사용자가 에이전트에게 task를 요청하여 서비스를 받을 때까지 일어날 수 있는 여러 상호작용에 대하여 캐릭터의 emotion을 생성하여 사용자에게 simulation하게 된다. 이러한 감정의 교류를 통하여 사용자는 캐릭터에게 친근감을 갖게 되며 캐릭터의 emotion에 대하여 공감할 수 있고 응용프로그램의 신뢰성을 높이는 효과를 가져온다.

  • PDF