• Title/Summary/Keyword: Dynamic access control

Search Result 276, Processing Time 0.026 seconds

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

Shared-medium Access Control Protocol for the ATM Access Network - Part I : DMR-II Protocol Architecture - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - I부 : DMR-II 프로토콜 구조 -)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.379-388
    • /
    • 1998
  • In this paper we propose a DMR-II shared-medium access control protocol which was developed for the ATM access network users to support isochronous and non-isochronous traffics simultaneously under the bandwidth sharing environment, and describe its architecture and operation principles. The DMR-II protocol uses the slotted-ring topology, and gives the higher transmission priority to the isochronous traffic than the non-isochronous traffic. To support the isochronous traffic it uses the slot reservation mechanism, and maintains the delay variation of the isochronous traffic beyond the threshold value by using the blocking mechanism whenever the total user traffic overflows the network's bandwidth limitation. for the non-isochronous traffic the DMR-II protocol lets all the nodes to have fair transmission chances by using the reset mechanism based on the window counter scheme.

  • PDF

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.

Dynamic CSMA Protocol Based on the Network Status (네트워크 상태에 따른 동적 CSMA 프로토콜)

  • Lee, Wang-Jong;Rhee, Seung-Hyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • CSMA(Carrier Sense Multiple Access) is a media access control protocol when nodes use a shared channel. To reduce the probability of collision and increase the performance, the station lust checks the state of the channel. In this paper, we study the performance improvement method based on p-persistent strategy. The p-persistent method reduces the chance of collision and improves the efficiency. However, a probability p and the number of station affect the performance. This paper proposes a dynamic CSMA multiple access based on the network status. If the possibility of collision is low, the station increases the probability p to improve the performance. In the opposite case, the station decreases the probability p. Our simulation results show that the proposed scheme outperforms any methods of CSMA multiple access according to the current persistent strategy.

  • PDF

Design and Implementation of Role Assignment Protocol for Active Role Assignment and Passive Role Assignment (능동적 역할 할당과 수동적 역할 할당을 수행하는 역할 할당 프로토콜의 설계 및 구현)

  • 나상엽;김점구
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.111-117
    • /
    • 2004
  • In distributed-computing environments, there is a strong demand for the authentication and the access control of distributed-shared resources. I have presented role-based access control (RBAC) concept that is in the spotlight recently. RBAC model shows the standardized access control of complicated organization's resources. In RBAC, senior role has junior role's permission by virtue of role hierarchy. But, junior role cannot perform the permission, which is granted to the senior or other role groups. Inheritances of permissions in role hierarchies are static. In order to tackle this problem, I propose a dynamic role assignment, which classified into passive role assignment and active role assignment, and design dynamic role assignment protocol and implement role assignment server.

  • PDF

Load-based Dynamic Backoff Algorithm in Contention-based Wireless Shared Medium (단일 경쟁 매체에서의 새로운 로드 기반 동적 매체 접속 제어 백오프 알고리즘)

  • Seo Chang-Keun;Wang Weidong;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.406-415
    • /
    • 2005
  • The standards which use shared medium like IEEE 802.11 wireless LAN have transmission opportunity by contention in contention period. If there are collisions in contention period, medium access control protocol may solve problem by using backoff algorithm. Backoff algorithm is important part in medium access control, but legacy backoff method which is used under IEEE 802.11 standards is not adjusted when load is heavy because of increasing collisions. In this paper, we propose a new load-based dynamic backoff algorithm in contention-based wireless shared medium to improve throughput of medium and to reduce the number of collisions. Proposed backoff algorithm can increase the network utilization about $20\%$ higher than that of binary exponential backoff algorithm.

Design and performance evaluation of G.983.1 based on Dynamic UC Protocol for ATM-PON (ATM-PON에서의 G.983.1을 이용한 Dynamic MAC Protocol의 설계 및 성능평가)

  • Jang, Seong-Ho;Jang, Jong-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.523-530
    • /
    • 2002
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. PON architecture is very simple but it requires MAC protocol for control of upstream traffic. This paper proposes a MAC protocol for a broadband access network using an ATM Passive Optical Network supporting CBR/rtYBR, nrtYBR, UBR and ABR traffic. For the proposed MAC scheme, we present grant field format, minislot format, and bandwidth allocation algorithm. From the simulation result, we have confirmed that our proposed scheme can reduce the average cell delay in comparison to that of conventional MAC schemes.

Design and Performance Evaluation of G.983.1 based on Dynamic MAC Protocol for ATM-PON (ATM-PON에서 G.983.1을 이용한 Dynamic MAC Protocol의 설계 및 성능 평가)

  • 장성호;장종욱;이대봉;노태곤
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.353-356
    • /
    • 2001
  • Earlier efforts on optical access concentrated on the design of PONs for the collection and distribution portion of the access network. PON architecture is very simple but it requires MAC protocol for control of upstream traffic. This paper proposes a MAC protocol for a broadband access network using an ATM Passive Optical Network supporting CBR/rtVBR, nrtVBR, UBR and ABR traffic. For the proposed MAC scheme, we present grant field format, minislot format, and bandwidth allocation algorithm. from the simulation result, we have confirmed that our proposed scheme ran reduce the average tell delay in comparison to that of conventional MAC schemes.

  • PDF

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

A QoS Management Scheme on Dynamic SLA in B3G Networks (B3G 네트워크에서 동적 SLA 기반 QoS 방안)

  • Park Sangjoon;Lee Jongchan
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.33-42
    • /
    • 2005
  • Service Level Agreement (SLA) is a service providing scheme by a service class agreement between a user and a service provider SLA allows that a user can select an expected service class in various service classes provided from a service provider. Recently, SLA management is adapted to support the end-to-end Qos for service users in Beyond 3 Generation (B3G) networks. In B3G networks, SLA provides multiple service classes on access networks so that service classes should be managed to assure the service satisfaction for users. In this paper, we propose a dynamic Qos management scheme by IP traffic class controlling based on SLA in B3G networks. Also, to manage dynamic traffic service, we consider Differentiated services (Diffserv) mechanism for the resource management by SLA. An If service traffic class on SLA can be dynamically changed by Diffserv traffic management to support dynamic end-to-end Qos. Hence, in this paper, we consider the buffer threshold scheme for controlling traffic loads and the traffic level control scheme for implementing the dynamic traffic management by the SLA.

  • PDF