• Title/Summary/Keyword: Data collection protocol

Search Result 124, Processing Time 0.026 seconds

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Technical Procedure for Identifying the Source of Nitrate in Water using Nitrogen and Oxygen Stable Isotope Ratios (질소 및 산소 안정동위원소 활용 수계 질산성 질소 오염원 판별을 위한 기술 절차 제안)

  • Kim, Kibeum;Chung, Jaeshik;Lee, Seunghak
    • Journal of Soil and Groundwater Environment
    • /
    • v.27 no.2
    • /
    • pp.87-98
    • /
    • 2022
  • This study aims to prepare a technical protocol for identifying the source of nitrate in water using nitrogen (δ15N) and oxygen (δ18O) stable isotope ratios. The technical processes for nitrate sources identification are composed of site investigation, sample collection and analysis, isotope analysis, source identification using isotope characteristics, and source apportionment for multiple potential sources with the Bayesian isotope mixing model. Characteristics of various nitrate potential sources are reviewed, and their typical ranges of δ15N and δ18O are comparatively analyzed and summarized. This study also summarizes the current knowledge on the dual-isotope approach and how to correlate the field-relevant information such as land use and hydrochemical data to the nitrate source identification.

A Real-Time Surveillance System for Vaccine Cold Chain Based o n Internet of Things Technology

  • Shao-jun Jiang;Zhi-lai Zhang;Wen-yan Song
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.394-406
    • /
    • 2023
  • In this study, a real-time surveillance system using Internet of Things technology is proposed for vaccine cold chains. This system fully visualizes vaccine transport and storage. It comprises a 4G gateway module, lowpower and low-cost wireless temperature and humidity collection module (WTHCM), cloud service software platform, and phone app. The WTHCM is installed in freezers or truck-mounted cold chain cabinets to collect the temperature and humidity information of the vaccine storage environment. It then transmits the collected data to a gateway module in the radiofrequency_physical layer (RF_PHY). The RF_PHY is an interface for calling the bottom 2.4-GHz transceiver, which can realize a more flexible communication mode. The gateway module can simultaneously receive data from multiple acquisition terminals, process the received data depending on the protocol, and transmit the collated data to the cloud server platform via 4G or Wi-Fi. The cloud server platform primarily provides data storage, chart views, short-message warnings, and other functions. The phone app is designed to help users view and print temperature and humidity data concerning the transportation and storage of vaccines anytime and anywhere. Thus, this system provides a new vaccine management model for ensuring the safety and reliability of vaccines to a greater extent.

A Study on a Robust Clustered Group Multicast in Ad-hoc Networks (에드-혹 네트워크에서 신뢰성 있는 클러스터 기반 그룹 멀티캐스트 방식에 관한 연구)

  • Park, Yang-Jae;Lee, Jeong-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.163-170
    • /
    • 2003
  • In this paper we propose a robust clustered croup Multicast in Ad-hoc network. The proposed scheme applies to weighted clustered Algorithm. Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base station. In ad hoc network routing protocol because of limited bandwidth and high mobility robust, simple and energy consume minimal. WCGM method uses a base structure founded on combination weighted value and applies combination weight value to cluster header keeping data transmission by scoped flooding, which is the advantage of the exiting FGMP method. Because this method has safe and reliable data transmission, it shows the effect to decrease both overhead to preserve transmission structure and overhead for data transmission.

PVM Performance Enhancement over a High-Speed Myrinet (초고속 Myrinet 통신망에서의 PVM 성능 개선)

  • Kim, In-Soo;Shim, Jae-Hong;Choi, Kyung-Hee;Jung, Gi-Hyun;Moon, Kyeong-Deok;Kim, Tae-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.74-87
    • /
    • 2000
  • PVM (parallel virtual machine) provides a programming environment that allows a collection of networked workstations to appear as a single parallel computational resource. The performance of parallel applications in this environment depends on the performance of data transfers between tasks. In this paper, we present a new Myrinet-based communication model of PVM that improves PVM communication performance over a high-speed Myrinet LAN. The proposed PVM communication model adopts a communication mechanism that allows any user-level process to directly access the network interface board without going through UDP/IP protocol stacks in the kernel. This mechanism provides faster data transfers between PVM tasks over the Myrinet since it avoids data copy overhead from kernel (user space) to user space (kernel) and reduces communication latency due to network protocol software layers. We implemented EPVM (Enhanced PVM), our updated version of the traditional PVM using UDP/IP, that is based on the proposed communication model over the Myrinet. Performance results show EPVM achieves communication speed-up of one to two over the traditional PVM.

  • PDF

RFID Middleware System based on XML for Processing Large-Scale Data (대용량 데이터처리를 위한 XML기반의 RFID 미들웨어시스템)

  • Park, Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.7
    • /
    • pp.31-38
    • /
    • 2007
  • We implement the RFID middleware system based on XML for large-scale data processing. The Implemented middleware system are consist of the reader interface for tag data collection, the event manager for a data filtering, and application interface for the RFID application. The implemented RFID middleware system is to support both a fixed type's reader and portable type's reader. we analyze the middleware function with four application accessing protocol, HTTP, XML, JMS, and SOAP, and demonstrate a filtering speed in terms of CPU utilization.

Effects of the Auricular Acupressure on Pruritus and Fatigue in Hemodialysis Patients (이혈요법이 혈액투석 환자의 소양증과 피로에 미치는 효과)

  • Chun, Youngmi;Park, Sangyoun
    • Korean Journal of Adult Nursing
    • /
    • v.28 no.4
    • /
    • pp.436-446
    • /
    • 2016
  • Purpose: The purpose of this study was to identify the effect of auricular acupressure on pruritus and fatigue in hemodialysis patients. Methods: The study design was a randomized control group pre-post test. Initially, forty-four patients were randomly assigned to one of two groups. There was a loss of three participants assigned to the treatment group. The period of data collection was from December 2014 to March 2015. Both groups completed a pre-test. The treatment group received auricular acupressure once a week for ten weeks. Data were collected from the treatment group at two time periods: five weeks and ten weeks following initiation of the treatment protocol. Data were collected from the control group at week 5 and week 10. Data analysis was performed using IBM SPSS Statistics 21.0 program, specifically with the independent t-test and the Repeated Measures of ANOVA. Results: Auricular acupressure was effective in reducing pruritus (F=13.93, p<.001) and fatigue (F=18.33, p<.001). Conclusion: Auricular acupressure is a non-invasive simple method that can be used for the relief of symptoms reported by hemodialysis patients. This treatment modality could be used in several clinical areas.

Performance Variations of AODV, DSDV and DSR Protocols in MANET under CBR Traffic using NS-2.35

  • Chandra, Pankaj;Soni, Santosh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.13-20
    • /
    • 2022
  • Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.

Qualitative Research on the Curriculum of Department Security Programs in University (대학 경호 관련 학과의 교육과정 특성에 관한 질적 연구)

  • Kang, Min-Wan;Kim, Seon-Ah;Kim, Dong-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.326-336
    • /
    • 2010
  • The purpose of this research is to analysis of difference about university curriculum of secretary from ethnographic research. The research participant 4 years is the university graduate. The participant who is selected is the practical career person of 3 or more years that Works at the Seoul individual enterprise. The specialist verified continuously about research truth and ethical from collection of data and analytical process. The research method and analysis results are as follows : First, Martial art and sports relation subject is more protocol secretary and secretary subject. But emphasized an importance about protocol secretary and secretary subject. Second, The male emphasized that Specialist training and segmentation in major field of study. The woman emphasized that women's studies and protocol secretary, culture of high-level class. Third, They have emphasized difference about private security in professionalism of curriculum.