• 제목/요약/키워드: Information Centric Network

Search Result 347, Processing Time 0.024 seconds

Improving Process Innovation Effectiveness through Network Centric Organization (네트워크형 조직 이론에 근거한 혁신 효과 증대 방안 연구)

  • Lee, Chun-Yeol;Gang, Jae-Hwa
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.65-75
    • /
    • 2006
  • This paper presents rationales for a network centric organization and their impacts on organizational effectiveness. A network centric organization shows characteristics that may be used to improve organizational effectiveness and process innovations. However, some conditions are to be satisfied to build a network centric organization. This paper summarizes such pre-conditions for a network centric organization. Korea is evaluated to be a good place to build a network centric organization because of its successful adoption of IT.

  • PDF

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.

Energy-Efficient Power Control for Underlaying D2D Communication with Channel Uncertainty: User-Centric Versus Network-Centric

  • Ding, Jianfeng;Jiang, Lingge;He, Chen
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.589-599
    • /
    • 2016
  • Most existing resource management problem models arise from the original desire of allocating resources in either a user-centric or network-centric manner. The difference between their objectives is obvious: user-centric methods attempt to optimize the utility of individual users, whereas network-centric models intend to optimize the collective utilities of the entire network. In this paper, from the above two aspects, we analyze the robust power control problem in device-to-device (D2D) communication underlaying cellular networks, where two types of channel uncertainty set (e.g., ellipsoidal and column-wise) are considered. In the user-centric method, we formulate the problem into the form of a Stackelberg game, where the energy efficiency (EE) of each user is the ingredient of utility function. In order to protect the cellular user equipment's (CUE) uplink transmission, we introduce a price based cost function into the objectives of D2D user equipment (DUE). The existence and uniqueness of the game with the influence of channel uncertainty and price are discussed. In the network-centric method, we aim to maximize the collective EE of CUEs and DUEs. We show that by the appropriate mathematical transformation, the network-centric D2D power control problem has the identical local solution to that of a special case of the user-centric problem, where price plays a key role. Numerical results show the performance of the robust power control algorithms in the user-centric and network-centric models.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

Robust $H_{\infty}$ Power Control for CDMA Systems in User-Centric and Network-Centric Manners

  • Zhao, Nan;Wu, Zhilu;Zhao, Yaqin;Quan, Taifan
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.399-407
    • /
    • 2009
  • In this paper, we present a robust $H_{\infty}$ distributed power control scheme for wireless CDMA communication systems. The proposed scheme is obtained by optimizing an objective function consisting of the user's performance degradation and the network interference, and it enables a user to address various user-centric and network-centric objectives by updating power in either a greedy or energy efficient manner. The control law is fully distributed in the sense that only its own channel variation needs to be estimated for each user. The proposed scheme is robust to channel fading due to the immediate decision of the power allocation of the next time step based on the estimations from the $H_{\infty}$ filter. Simulation results demonstrate the robustness of the scheme to the uncertainties of the channel and the excellent performance and versatility of the scheme with users adapting transmit power either in a user-centric or a network-centric efficient manner.

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks

  • Han, Longzhe;Nguyen, Dinh Han;Kang, Seung-Seok;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3775-3788
    • /
    • 2014
  • With the increasing number of the wireless and mobile networks, the way that people use the Internet has changed substantively. Wireless multimedia services, such as wireless video streaming, mobile video game, and mobile voice over IP, will become the main applications of the future wireless Internet. To accommodate the growing volume of wireless data traffic and multimedia services, cognitive radio (CR) and Information-Centric Network (ICN) have been proposed to maximize the utilization of wireless spectrum and improve the network performance. Although CR and ICN have high potential significance for the future wireless Internet, few studies have been conducted on collaborative operations of CR and ICN. Due to the lack of infrastructure support in multi-hop ad hoc CR networks, the problem is more challenging for video streaming services. In this paper, we propose a Cross-layer Video Streaming Mechanism (CLISM) for Cognitive Radio Ad Hoc Information Centric Networks (CRAH-ICNs). The CLISM included two distributed schemes which are designed for the forwarding nodes and receiving nodes in CRAH-ICNs. With the cross-layer approach, the CLISM is able to self-adapt the variation of the link conditions without the central network controller. Experimental results demonstrate that the proposed CLISM efficiently adjust video transmission policy under various network conditions.

A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing (유비쿼터스 환경에서의 NCW 정보보호 대책)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.15-22
    • /
    • 2010
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information security guidelines for NCW, especially for ubiquitous network computing environment. For this purpose, this paper identified changes of battle aspect of tactical level and characteristics of information threats, and finally, the research suggested several information security guidelines for NCW. This paper is to intended to help military organization's planners determine practical and implemental plans in the near future.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

Research on Efficiency of Interest-Data Handshaking in Wireless Content-Centric Networks (무선 Content-Centric Network에서의 Interest-Data Handshaking의 효율성에 대한 연구)

  • Lee, Seung-Jin;Park, Chan-Min;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.81-86
    • /
    • 2014
  • Content Centric Network (CCN) is one of candidate technologies for the future Information Centric Networks. Recently, adopting CCN concept to wireless networks has extensively been studied. One of the well-known studies is Enhanced-Content-centric multiHop wireless NETwork (E-CHANET), which proposes efficient methods to deliver contents adopting CCN concept over wireless environment. In E-CHANET, in order for a provider to send a data packet, one interest packet from a consumer is required. In this paper, efficiency of data-interest handshaking in E-CHANET has been investigated. It is compared with a method using only one interest packet for all data packets through simulations. As results, while the handshaking provides transmission reliability, it increses content down load time too much.