• Title/Summary/Keyword: 패킷분석

Search Result 1,698, Processing Time 0.027 seconds

An Energy-Aware Multi-tree Video Multicast Scheme in Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 잔여 에너지를 고려한 다중 트리 비디오 멀티캐스트 기법)

  • Park, Jae-Young;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1336-1348
    • /
    • 2009
  • In this paper, we propose an energy-aware multi-tree video multicast scheme for wireless ad hoc networks. Some network nodes may have energy enough to receive and forward the whole video content whereas some may not. Even though the video quality may vary depending on the remaining energy, our scheme enables the low-energy nodes to join the video multicast session. The video stream is split into a set of multiple and independent descriptions by MDC (Multiple description coding) scheme. Each description corresponds to a substream and number of substreams determine the video quality. The member nodes determine how many substreams it would receive depending on the remaining energy and expected amount of packets per substream. So does the intermediate tree nodes. That builds a tree per substream and multiple trees per session. The data source disseminates each substream through corresponding tree. The video quality of the member nodes varies according to number of participating trees. We evaluate the performance of our scheme by simulation. Our scheme showed better peak signal to noise ratio and extended the lifetime of the network nodes compared with MAODV, which builds a single tree, and MT-MAODV, which builds multiple trees but does not consider the available energy.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

A study on Communication Robustness Testing for Industrial Control Devices (산업용 제어기기의 통신 견고성 시험 방안 연구)

  • Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1099-1116
    • /
    • 2019
  • Industrial control systems(ICS) are widely used in various industrial area and critical infrastructure. To mitigate security threats on ICS, the security assurance test for industrial control devices has been introduced and operating. The test includes testing of the security function of the device itself and testing of communication robustness. In this paper, we describe the security requirements of EDSA, Achilles, and Korea's TTA standard(security requirements for ICS). And also, we analyzed the characteristics of communication robustness test(CRT) of each certification. CRT verifies the device's operation of essential function while transmitting fuzzing and stress packets. Existing test methods are mostly focused on the embedded devices and are difficult to apply to various devices. We propose a method to test communication robustness which reflect the characteristics of control H/W, control S/W, field devices and network devices in ICS. In the future, we will apply the proposed communication robustness test to actual products and present solutions for arising issues.

Design and Analysis of a Scenario for Evaluating Application Service Performance of a Hybrid V2X Communication System (하이브리드 V2X 통신시스템의 응용서비스 성능 평가를 위한 시나리오 설계 및 분석 연구)

  • Lee, Sung-Hun;Lee, Chang-Kyo;Byun, Sang-Bong;Cho, Soo-Hyun;Cho, Hyun-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.423-430
    • /
    • 2019
  • The convergence of the automotive industry and the ICT technology can be broadly divided into the commercial service sector and the Cooperative-ITS (C-ITS) service sector. The C-ITS service sector is using V2X communication technology as a field that aims to provide safer transportation, more green and efficient transportation, and more predictable and productive mobility. The recent convergence of self-driving cars and connected cars requires high data rates, low transmission delays, and low transmission error rates. Interest in comparison of performance between WAVE and C-V2X (LTE-V2X, 5G-V2X) has been amplified and application services by communication technology are being studied. In this paper, we design the application performance evaluation method of Hybrid V2X communication system and confirm that the decrease of packet error rate (PER) performance is caused by the increase of communication distance, not the vehicle speed.

A study on the reliability and availability improvement of wireless communication in the LTE-R (철도통합무선망(LTE-R) 환경에서 무선통신 안정성과 가용성 향상을 위한 방안 연구)

  • Choi, Min-Suk;Oh, Sang-Chul;Lee, Sook-Jin;Yoon, Byung-Sik;Kim, Dong-Joon;Sung, Dong-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1172-1179
    • /
    • 2020
  • With the establishment of the railway integrated radio network (LTE-R) environment, radio-based train control transmission and reception and various forms of service are provided. The smooth delivery of these services requires improved performance in a highly reliable and available wireless environment. This paper measured the LTE-R radio communication environment to improve radio communication performance of railway integrated wireless network reliability and availability, analyzed the results, and established the wireless environment model. Based on the built-up model, we also proposed an improved radio-access algorithm to control trains for improved reliability, suggesting a way to improve stability for handover that occur during open-air operation, and proposed an algorithm for frequency auto-heating to improve availability. For simulation, data were collected from the Korea Rail Network Authority (Daejeon), Manjong-Gangneung KTX route, which can measure the actual data of LTE-R wireless environment, and the results of the simulation show performance improvement through algorithm.

Effects of Mother's Beliefs and Executions in Social Relation on Young Children's Emotional Intelligence and Prosocial Behaviors (어머니의 사회관계 신념과 실행이 유아의 정서지능과 친사회적 행동에 미치는 영향)

  • Cho, An-Na
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.147-161
    • /
    • 2022
  • The purpose of the study was to investigate mothers' beliefs and executions in the social relations area of the 2019 revised Nuri curriculum, and to investigate the effects of beliefs and executions on the emotional intelligence and prosocial behavior of young children. For this purpose, data were collected by distributing questionnaire packets to 268 mothers of children aged 3-5 years who were enrolled in 7 early childhood education institutions in Gyeonggi-do. The collected data were analyzed using the SPSS 25.0 program. As a result of the study, first, there was a statistically significant difference in the overall belief according to the mother's personal characteristic, the educational level, and a significant difference in the sub-factor, living together, in the execution. Second, it was found that there was a significant positive correlation between all variables except for the relationship between social relation execution and the ability to regulate others, which is a sub-factor of emotional intelligence. Third, beliefs and executions in social relation were found to affect all emotional intelligence and pro-social behavior, except for the effect of social relation execution on the ability to regulate others. This study is expected to provide basic data to improve parents' interest in the improvement of young children's social ability and practical interaction in child rearing.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.