• Title/Summary/Keyword: Information Centric Network

Search Result 347, Processing Time 0.032 seconds

Understanding of OT-OCN(Operation Technology - Operation Contents Network) (OT-OCN 기술의 이해)

  • Park, Jae-Kyung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.303-304
    • /
    • 2016
  • 본 논문에서는 기존의 TCP/IP 체계에서 탈피하여 보안 및 성능을 개선하기 위한 방안으로 콘텐트를 기반으로 한 네트워크 체계에 대해서 소개한다. OT-OCN은 기존의 CCN(Contents Centric Network)을 기반으로 컨텐츠의 기능을 추가하여 이를 바탕으로 자율성을 부여한 새로운 개념의 패러다임이다. 이러한 OT-OCN의 개발사는 미국의 CAT, Inc.(Cyber Advanced Technology)라는 회사로 이 기술은 보안뿐만 아니라 CCN을 통한 통신의 효율성을 극대화하고 또한 사물인터넷(IoT) 등에 활용 가능한 최적의 메커니즘이다. 본 논문에서는 이 기술의 기본적인 매커니즘에 대한 간략한 소개를 통해 차세대보안의 개념을 설명하고자 한다.

  • PDF

A Study of Machine Learning based Face Recognition for User Authentication

  • Hong, Chung-Pyo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.19 no.2
    • /
    • pp.96-99
    • /
    • 2020
  • According to brilliant development of smart devices, many related services are being devised. And, almost every service is designed to provide user-centric services based on personal information. In this situation, to prevent unintentional leakage of personal information is essential. Conventionally, ID and Password system is used for the user authentication. This is a convenient method, but it has a vulnerability that can cause problems due to information leakage. To overcome these problem, many methods related to face recognition is being researched. Through this paper, we investigated the trend of user authentication through biometrics and a representative model for face recognition techniques. One is DeepFace of FaceBook and another is FaceNet of Google. Each model is based on the concept of Deep Learning and Distance Metric Learning, respectively. And also, they are based on Convolutional Neural Network (CNN) model. In the future, further research is needed on the equipment configuration requirements for practical applications and ways to provide actual personalized services.

Blockchain based Application to Electric Vehicle in IoT environment

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.233-239
    • /
    • 2022
  • Recently, research is being conducted on the rapid service provision and reliability of the instance-based rather than the existing IP-based structure. Research is mainly conducted through Block cloud, a platform that combines service-centric networking (SCN) and blockchain. In addition, the Internet of Things network has been proposed as a fog computing environment in the structure of the existing cloud computing. Fog computing is an environment suitable for real-time information processing. In this paper, we propose a new Internet network structure based on fog computing that requires real-time for rapid processing of IoT services. The proposed system applies IoTA, the third-generation blockchain based on DAG, to the block cloud. In addition, we want to propose a basic model of the object block chain and check the application services of electric vehicles.

Community Model for Smart TV over the Top Services

  • Pandey, Suman;Won, Young Joon;Choi, Mi-Jung;Gil, Joon-Min
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.577-590
    • /
    • 2016
  • We studied the current state-of-the-art of Smart TV, the challenges and the drawbacks. Mainly we discussed the lack of end-to-end solution. We then illustrated the differences between Smart TV and IPTV from network service provider point of view. Unlike IPTV, viewer of Smart TV's over-the-top (OTT) services could be global, such as foreign nationals in a country or viewers having special viewing preferences. Those viewers are sparsely distributed. The existing TV service deployment models over Internet are not suitable for such viewers as they are based on content popularity, hence we propose a community based service deployment methodology with proactive content caching on rendezvous points (RPs). In our proposal, RPs are intermediate nodes responsible for caching routing and decision making. The viewer's community formation is based on geographical locations and similarity of their interests. The idea of using context information to do proactive caching is itself not new, but we combined this with "in network caching" mechanism of content centric network (CCN) architecture. We gauge the performance improvement achieved by a community model. The result shows that when the total numbers of requests are same; our model can have significantly better performance, especially for sparsely distributed communities.

Analysis of SCI Journals Cited by Korean Journals in the Computer field

  • Kim, Byungkyu;You, Beom-Jong;Kang, Ji-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.79-86
    • /
    • 2019
  • It is very important to analyze and provide information resources for research output produced in the computer field, the core science of the 4th Industrial Revolution. In this paper, SCI journals cited from domestic journals in the computer field were identified and the citation rankings and their co-citation networks were generated, analyzed, mapped and visualized. For this, the bibliographic and citation index information from 2015 to 2017 in the KSCD were used as the basis data, and the co-citation method and network centrality analysis were used. As a result of this study, the number of citations and the citation ranks of SCI journals and papers cited by korean journals in the computer field were analyzed, and peak time(2 years), half-life(6.6 years), and immediacy citation rate(2.4%) were measured by citation age analysis. As a result of network centrality analysis, Three network centralities(degree, betweenness, closeness) of the cited SCI journals were calculated, and the ranking of journals by each network centrality was measured, and the relationship between the subject classifications of the cited SCI journals was visualized through the mapping of the network.

An Energy Efficient Data-Centric Probing Priority Determination Method for Mobile Sinks in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율을 고려한 모바일 싱크의 데이터 중심 탐색 우선순위결정 기법)

  • Seong, Dong-Ook;Lee, Ji-Hee;Yeo, Myung-Ho;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.561-565
    • /
    • 2010
  • Many methods have been researched to prolong sensor network lifetime using mobile technologies. In the mobile sink research, there are the track based methods and the anchor points based methods as representative operation methods for mobile sinks. However, the existing methods decrease Quality of Service (QoS) and lead the routing hotspot in the vicinity of the mobile sink. The reason is that they use static mobile paths that are not concerned about the network environments such as the query position and the data priority. In this paper, we propose the novel mobile sink operation method that solves the problems of the existing methods. In our method, the probing priority of the mobile sink is determined with the data priorities for increasing the QoS and the mobile features are used for reducing the routing hotspot. The experimental results show that the proposed method reduces query response time and improves network lifetime over the existing methods.

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

Game Theory based Power Control for OFDM System (게임이론을 이용한 OFDM 시스템의 전력제어)

  • Lee, Ryoung-Kyoung;Cho, Hae-Keun;Ko, Eun-Kyoung;Lim, Yeon-Jun;Hwang, In-Kwan;Song, Myung-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4A
    • /
    • pp.373-378
    • /
    • 2007
  • In this paper, the Game Theory based power control for OFDM system is studied, which has attained intensive interest as a core artificial intelligent technology for Cognitive Radio and its efficiency is evaluated using performance metrics such as system throughput and fairness. Utility Function for joint user centric and network centric power control is defined and simulation results show that game theory based power control is far better than closed loop power control. The contribution of this paper is to formalize the game theory based power control toward the Cognitive Radio that recognizes and adapts to the radio communication environments.

Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective

  • Li, Yuheng;Zhao, Qianchuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3635-3654
    • /
    • 2015
  • With the rapid development of smart devices and mobile Internet, the video application plays an increasingly important role on mobile devices. Understanding user behavior patterns is critical for optimized operation of mobile live streaming systems. On the other hand, volume based billing models on cloud services make it easier for video service providers to scale their services as well as to reduce the waste from oversized service capacities. In this paper, the watching behaviors of a commercial mobile live streaming system are studied in a content-centric manner. Our analysis captures the intrinsic correlation existing between popularity and watching intensity of programs due to the synchronized watching behaviors with program schedule. The watching pattern is further used to estimate traffic volume generated by the program, which is useful on data volume capacity reservation and billing strategy selection in cloud services. The traffic range of programs is estimated based on a naive popularity prediction. In cross validation, the traffic ranges of around 94% of programs are successfully estimated. In high popularity programs (>20000 viewers), the overestimated traffic is less than 15% of real happened traffic when using upper bound to estimate program traffic.