• Title/Summary/Keyword: Data forwarding method

Search Result 60, Processing Time 0.031 seconds

An Efficient Data Dissemination Protocol for Cluster-based Wireless Sensor Networks (클러스터 기반의 무선 센서네트워크에서 통신량을 줄인 데이터 보급방법)

  • Cho, Ji-Eun;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.222-230
    • /
    • 2009
  • A sensor network is an important element of the ubiquitous and it consists of sensor fields that contain sensor nodes and sink nodes that collect data from sensor nodes. Since each sensor node has limited resources, one of the important issues covered in the past sensor network studies has been maximizing the usage of limited energy to extend network lifetime. However, most studies have only considered fixed sink nodes, which created various problems for cases with multiple mobile sink nodes. Accordingly, while maintaining routes to mobile sink nodes, this study aims to deploy the hybrid communication mode that combines single and multi-hop modes for intra-cluster and inter-cluster transmission to resolve the problem of failed data transmission to mobile sink nodes caused by disconnected routes. Furthermore, a 2-level hierarchical routing protocol was used to reduce the number of sensor nodes participating in data transmission, and cross-shape trajectory forwarding was employed in packet transmission to provide an efficient data dissemination method.

Design of Collaborative System using Message exchange method based on Bridge XMDR (브리지 XMDR 기반의 메시지 교환방식을 이용한 협업 시스템 설계)

  • Moon, Seok-Jae;Lee, Soo-Youn;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.56-65
    • /
    • 2007
  • Existing application systems of enterprises can process and collect a lot of information within enterprises, but it could be difficult to share validated information with partners and other system in the process of contacting to other legacy systems required in cooperation environment. For solving these problems, EAI systems are introduced in cooperation environment so that data sharing and integration can be achieved. The integration based on EAI is not limited to particular business system but all systems of an enterprise so that standard of suitable metadata level is needed for forwarding consistently between each business of systems. Therefore this paper maintains consistency of data sharing and integrating among legacy systems in cooperative environment for proposing message exchanging based on bridge XMDR.

Intelligent On-demand Routing Protocol for Ad Hoc Network

  • Ye, Yongfei;Sun, Xinghua;Liu, Minghe;Mi, Jing;Yan, Ting;Ding, Lihua
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1113-1128
    • /
    • 2020
  • Ad hoc networks play an important role in mobile communications, and the performance of nodes has a significant impact on the choice of communication links. To ensure efficient and secure data forwarding and delivery, an intelligent routing protocol (IAODV) based on learning method is constructed. Five attributes of node energy, rate, credit value, computing power and transmission distance are taken as the basis of segmentation. By learning the selected samples and calculating the information gain of each attribute, the decision tree of routing node is constructed, and the rules of routing node selection are determined. IAODV algorithm realizes the adaptive evaluation and classification of network nodes, so as to determine the optimal transmission path from the source node to the destination node. The simulation results verify the feasibility, effectiveness and security of IAODV.

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

Simultaneous Information and Power Transfer for Multi-antenna Primary-Secondary Cooperation in Cognitive Radio Networks

  • Liu, Zhi Hui;Xu, Wen Jun;Li, Sheng Yu;Long, Cheng Zhi;Lin, Jia Ru
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.941-951
    • /
    • 2016
  • In this paper, cognitive radio and simultaneous wireless information and power transfer (SWIPT) are effectively combined to design a spectrum-efficient and energy-efficient transmission paradigm. Specifically, a novel SWIPT-based primary-secondary cooperation model is proposed to increase the transmission rate of energy/spectrum constrained users. In the proposed model, a multi-antenna secondary user conducts simultaneous energy harvesting and information forwarding by means of power splitting (PS), and tries to maximize its own transmission rate under the premise of successfully assisting the data delivery of the primary user. After the problem formulation, joint power splitting and beamforming optimization algorithms for decode-and-forward and amplify-and-forward modes are presented, in which we obtain the optimal PS factor and beamforming vectors using a golden search method and dual methods. Simulation results show that the proposed SWIPTbased primary-secondary cooperation schemes can obtain a much higher level of performance than that of non-SWIPT cooperation and non-cooperation schemes.

Congestion Control based on Genetic Algorithm in Wireless Sensor Network (무선 센서 네트워크에서 유전자 알고리즘 기반의 혼잡 제어)

  • Park, Chong-Myung;Lee, Joa-Hyoung;Jung, In-Bum
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.413-424
    • /
    • 2009
  • Wireless sensor network is based on an event driven system. Sensor nodes collect the events in surrounding environment and the sensing data are relayed into a sink node. In particular, when events are detected, the data sensing periods are likely to be shorter to get the more correct information. However, this operation causes the traffic congestion on the sensor nodes located in a routing path. Since the traffic congestion generates the data queue overflows in sensor nodes, the important information about events could be missed. In addition, since the battery energy of sensor nodes exhausts quickly for treating the traffic congestion, the entire lifetime of wireless sensor networks would be abbreviated. In this paper, a new congestion control method is proposed on the basis of genetic algorithm. To apply genetic algorithm, the data traffic rate of each sensor node is utilized as a chromosome structure. The fitness function of genetic algorithm is designed from both the average and the standard deviation of the traffic rates of sensor nodes. Based on dominant gene sets, the proposed method selects the optimal data forwarding sensor nodes for relieving the traffic congestion. In experiments, when compared with other methods to handle the traffic congestion, the proposed method shows the efficient data transmissions due to much less queue overflows and supports the fair data transmission between all sensor nodes as possible. This result not only enhances the reliability of data transmission but also distributes the energy consumptions across the network. It contributes directly to the extension of total lifetime of wireless sensor networks.

A Method of the Grandmaster Selection and the Time Synchronization Using Single TimeSync Frame for Audio/Video Bridging (동기식 이더넷에서 단일 타임싱크 프레임을 이용한 그랜드마스터 결정 및 시간 동기 방법)

  • Kang, Sung-Hwan;Lee, Jung-Won;Kim, Min-Jun;Eom, Jong-Hoon;Kwon, Yong-Sik;Kim, Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.112-119
    • /
    • 2008
  • Today, A matter of concern of home network technology increase. The standard of communication between home network devices are required. IEEE 802.1 AVB(Audio/Video Bridging) specifies transmission method for time-sensitive data between these devices using Ethernet in bridged local area networks. IEEE 802.1 AVB and IEEE 1588 PTP(Precision Time Protocol) have various message type for grandmaster selection and synchronize the devices. These messages bring on complexity protocol. We propose a method that uses Single TimeSync frame in order to the problem. Our proposal is appropriate process complexity and low transmission delay for home network by using the TimeSync frame. Furthermore, after all devices are adjusted to the single TimeSync frame, a resource reservation, a forwarding and queueing rule are needed for a time-sensitive application.

Autoencoder-Based Defense Technique against One-Pixel Adversarial Attacks in Image Classification (이미지 분류를 위한 오토인코더 기반 One-Pixel 적대적 공격 방어기법)

  • Jeong-hyun Sim;Hyun-min Song
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1087-1098
    • /
    • 2023
  • The rapid advancement of artificial intelligence (AI) technology has led to its proactive utilization across various fields. However, this widespread adoption of AI-based systems has raised concerns about the increasing threat of attacks on these systems. In particular, deep neural networks, commonly used in deep learning, have been found vulnerable to adversarial attacks that intentionally manipulate input data to induce model errors. In this study, we propose a method to protect image classification models from visually imperceptible One-Pixel attacks, where only a single pixel is altered in an image. The proposed defense technique utilizes an autoencoder model to remove potential threat elements from input images before forwarding them to the classification model. Experimental results, using the CIFAR-10 dataset, demonstrate that the autoencoder-based defense approach significantly improves the robustness of pretrained image classification models against One-Pixel attacks, with an average defense rate enhancement of 81.2%, all without the need for modifications to the existing models.

A Study on the Factors of Choosing the Liner Shipping Companies Using AHP Method by International Freight Forwarder (AHP기법을 이용한 국제물류주선업체의 정기해운선사 선택요인에 관한 연구)

  • Song, Sun-Yok
    • International Commerce and Information Review
    • /
    • v.13 no.2
    • /
    • pp.95-117
    • /
    • 2011
  • The Purpose of this study is to identify important factors in choosing liner shipping companies using the AHP. The Analytic Hierarchy Process(AHP), introduced by Satty T. L. in 1970, is a decision technique the has been applied to private and public sectors and to group decision problems. This paper will demonstrate the level of importance in 4 major factors: cost, service, transportation and promotion. In detail, the 4 major factors are divided into 14 sub-factors. In the present research, various service attributes for shipping lines were selected from previous studies and the observed data for 4 main service attributes were collected through a questionnaire survey from 26 concerned international freight forwarder experts. The conclusion of this study is as follows. First, it is found that the cost factor is the most important factor among the 4 main service attributes. It is very obvious that the cost factor directly affects the choosing the liner shipping company by international freight forwarders. Second, it is found that the second important factor in choosing the liner shipping company is the transportation factor and the third is the service factor. The promotion factor is underestimated, comparatively speaking. With the ever-increasing competition, liner shipping companies will need to study and understand the selection criteria of their clients(international freight forwarder), and apply the results to their daily and long-terms operations. In particular, liner shipping companies should establish a system to identify and sort the various selection criteria used by international freight forwarding companies.

  • PDF

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF