• Title/Summary/Keyword: 훼손 노드

Search Result 29, Processing Time 0.022 seconds

The Secure Path Cycle Selection Method for Improving Energy Efficiency in Statistical En-route Filtering Based WSNs (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율을 향상시키기 위한 보안 경로 주기 선택 기법)

  • Nam, Su-Man;Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2011
  • Sensor nodes are easily exposed to malicious attackers by physical attacks. The attacker can generate various attacks using compromised nodes in a sensor network. The false report generating application layers injects the network by the compromised node. If a base station has the injected false report, a false alarm also occurs and unnecessary energy of the node is used. In order to defend the attack, a statistical en-route filtering method is proposed to filter the false report that goes to the base station as soon as possible. A path renewal method, which improves the method, is proposed to maintain a detection ability of the statistical en-route filtering method and to consume balanced energy of the node. In this paper, we proposed the secure path cycle method to consume effective energy for a path renewal. To select the secure path cycle, the base station determines through hop counts and the quantity of report transmission by an evaluation function. In addition, three methods, which are statistical en-route filter, path selection method, and path renewal method, are evaluated with our proposed method for efficient energy use. Therefore, the proposed method keeps the secure path and makes the efficiency of energy consumption high.

Implementation of IEEE 802.15.4a Software Stack for Ranging Accuracy Based on SDS-TWR (SDS-TWR 기반의 거리측정 정확도를 위한 IEEE 802.15.4a 소프트웨어 스택 구현)

  • Yoo, Joonhyuk;Kim, Hiecheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.6
    • /
    • pp.17-24
    • /
    • 2013
  • The localization accuracy in wireless sensor networks using ranging-based localization algorithms is greatly influenced by the ranging accuracy. Software implementation of HAL(Hardware Abstraction Layer) and MAC(Medium Access Layer) should seamlessly deliver the raw performance of ranging-based localization provided by hardware capability fully to the applications without degrading the raw performance. This paper presents the design and implementation of the software stack for IEEE 802.15.4a which supports normal ranging mode of the Nanotron's NA5TR1 RF chip. The experiment results shows that average ranging error rate with our implementation is 24.5% for the normal mode of the SDS-TWR ranging scheme.

A Musical Symbol recognition By Using Graphical Distance Measures (그래프간 유사도 측정에 의한 음악 기호 인식)

  • Jun, Jung-Woo;Jang, Kyung-Shik;Heo, Gyeong-Yong;Kim, Jai-Hie
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 1996
  • In most pattern recognition and image understanding applications, images are degraded by noise and other distortions. Therefore, it is more relevant to decide how similar two objects are rather than to decide whether the two are exactly the same. In this paper, we propose a method for recognizing degraded symbols using a distance measure between two graphs representing the symbols. a symbol is represented as a graph consisting of nodes and edges based on the run graph concept. The graph is then transformed into a reference model graph with production rule containing the embedding transform. The symbols are recognized by using the distance measure which is estimated by using the number of production rules used and the structural homomorphism between a transformed graph and a model graph. the proposed approach is applies to the recognition of non-note musical symbols and the result are given.

  • PDF

An Energy-Efficient Topology Control Scheme based on Application Layer Data in Wireless Sensor Networks (응용 계층 정보 기반의 에너지 효율적인 센서 네트워크 토폴로지 제어 기법)

  • Kim, Seung-Mok;Kim, Seung-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1297-1308
    • /
    • 2009
  • The life time of a wireless sensor network composed of numerous sensor nodes depend on ones of its sensor nodes. The energy efficiency operation of nodes, therefore, is one of the crucial factors to design the network. Researches based on the hierarchical network topology have been proposed and evolved in terms of energy efficiency. However, in existing researches, application layer data obtained from sensor nodes are not considered properly to compose cluster, including issue that nodes communicate with their cluster heads in TDMA scheduling. In this paper, we suggest an energy-efficient topology control scheme based on application layer data in wireless sensor networks. By using application layer data, sensor nodes form a section which is defined as the area of adjacent nodes that retain similar characteristics of application environments. These sections are further organized into clusters. We suggest an algorithm for selecting a cluster head as well as a way of scheduling to reduce the number of unnecessary transmissions from each node to its cluster head, which based on the degree and the duration of similarity between the node's data and its head's data in each cluster without seriously damaging the integrity of application data. The results show that the suggested scheme can save the energy of nodes and increase the life time of the entire network.

  • PDF

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.

Key Re-distribution Scheme of Dynamic Filtering Utilizing Attack Information for Improving Energy Efficiency in WSNs (무선 센서 네트워크에서 에너지 효율성 향상을 위해 공격정보를 활용한 동적 여과 기법의 키 재분배 기법)

  • Park, Dong-Jin;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.2
    • /
    • pp.113-119
    • /
    • 2016
  • Wireless sensor networks are vulnerable to an adversary due to scarce resources and wireless communication. An adversary can compromise a sensor node and launch a variety of attacks such as false report injection attacks. This attack may cause monetary damage resulting in energy drain by forwarding the false reports and false alarms at the base station. In order to address this problem, a number of en-route filtering schemes has been proposed. Notably, a dynamic en-route filtering scheme can save energy by filtering of the false report. In the key dissemination phase of the existing scheme, the nodes closer to the source node may not have matching keys to detect the false report. Therefore, continuous attacks may result in unnecessary energy wastage. In this paper, we propose a key re-distribution scheme to solve this issue. The proposed scheme early detects the false report injection attacks using initially assigned secret keys in the phase of the key pre-distribution. The experimental results demonstrate the validity of our scheme with energy efficiency of up to 26.63% and filtering capacity up to 15.92% as compared to the existing scheme.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

U-Bulguksa: Real-Time and Online Early Fire Detection Systems (U-불국사 : 실시간 온라인 화재조기감지시스템)

  • Joo, Jae-Hun;Yim, Jae-Geol
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.75-93
    • /
    • 2007
  • This paper presents real-time online early fire warning systems developed for preserving cultural properties of Bulguksa which is a world heritage designated by UNESCO. The system is based on the ubiquitous sensor network employing 900MHz and 2.4GHz bands. In this paper, we analyze requirements that should be considered in building effective management systems of cultural heritages by using wireless sensor network. Finally, we introduce the architecture, sensor and network design, and software design of the fire warning systems which is an initial version of U-Bulguksa. The current version of systems has been operating in Bukguksa for a few months. U-Bukguksa project sponsored by National Information Society Agency is ultimately aimed at developing an integrated system of U-cultural heritage management and U-tourism. The former aims to conserve and manage intangible cultural properties by providing a variety of environmental information such as erosion, crack, and gradient as well as fire which are important causes of loss and damage in real-time and online. The latter refers to the intelligent tourism information and guidance systems allowing tourists to get the personalized content on cultural heritages and help guidance with mobile devices in Bulguksa.

  • PDF

Analysis of Plants Social Network on Island Area in the Korean Peninsula (한반도 도서지역의 식물사회네트워크 분석)

  • Sang-Cheol Lee;Hyun-Mi Kang;Seok-Gon Park
    • Korean Journal of Environment and Ecology
    • /
    • v.38 no.2
    • /
    • pp.127-142
    • /
    • 2024
  • This study aimed to understand the interrelationships between tree species in plant communities through Plant Social Network (PSN) analysis using a large amount of vegetation data surveyed in an island area belonging to a warm-temperate boreal forest. The Machilus thunbergii, Castanopsis sieboldii, and Ligustrum japonicum, which belong to the canopy layer, Pittosporum tobira and Ardisia japonica, which belong to the shrub layer and Trachelospermum asiaticum and Stauntonia hexaphylla, which belong to the vines, appearing in evergreen broad-leaved climax forest community, showed strong positive association(+) with each other. These tree species had a negative association or no friendly relationship with deciduous broad-leaved species due to the large difference in location environments. Divided into 4 group modularizations in the PSN sociogram, evergreen broad-leaved tree species in Group I and deciduous broad-leaved tree species in Group II showed high centrality and connectivity. It was analyzed that the arrangement of tree species (nodes) and the degree of connection (grouping) of the sociogram can indirectly estimate environmental factors and characteristics of plant communities like DCA. Tree species with high centrality and influence in the PSN included T. asiaticum, Eurya japonica, Lindera obtusiloba, and Styrax japonicus. These tree species are common with a wide range of ecological niches and appear to have the characteristics and survival strategies of opportunistic species that commonly appear in forest gaps and damaged areas. They will play a major role in inter-species interactions and structural and functional changes in plant communities. In the future, long-term research and in-depth discussions are needed to determine how these species actually influence plant community changes through interactions