• Title/Summary/Keyword: Information Centric Network

Search Result 347, Processing Time 0.03 seconds

Study on Tactical Target Tracking Performance Using Unscented Transform-based Filtering (무향 변환 기반 필터링을 이용한 전술표적 추적 성능 연구)

  • Byun, Jaeuk;Jung, Hyoyoung;Lee, Saewoom;Kim, Gi-Sung;Kim, Kiseon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.96-107
    • /
    • 2014
  • Tracking the tactical object is a fundamental affair in network-equipped modern warfare. Geodetic coordinate system based on longitude, latitude, and height is suitable to represent the location of tactical objects considering multi platform data fusion. The motion of tactical object described as a dynamic model requires an appropriate filtering to overcome the system and measurement noise in acquiring information from multiple sensors. This paper introduces the filter suitable for multi-sensor data fusion and tactical object tracking, particularly the unscented transform(UT) and its detail. The UT in Unscented Kalman Filter(UKF) uses a few samples to estimate nonlinear-propagated statistic parameters, and UT has better performance and complexity than the conventional linearization method. We show the effects of UT-based filtering via simulation considering practical tactical object tracking scenario.

Topology Aggregation for Hierarchical Wireless Tactical Networks

  • Pak, Woo-Guil;Choi, Young-June
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.344-358
    • /
    • 2011
  • Wireless tactical network (WTN) is the most important present-day technology enabling modern network centric warfare. It inherits many features from WMNs, since the WTN is based on existing wireless mesh networks (WMNs). However, it also has distinctive characteristics, such as hierarchical structures and tight QoS (Quality-of-Service) requirements. Little research has been conducted on hierarchical protocols to support various QoS in WMN. We require new protocols specifically optimized for WTNs. Control packets are generally required to find paths and reserve resources for QoS requirements, so data throughput is not degraded due to overhead. The fundamental solution is to adopt topology aggregation, in which a low tier node aggregates and simplifies the topology information and delivers it to a high tier node. The overhead from control packet exchange can be reduced greatly due to decreased information size. Although topology aggregation is effective for low overhead, it also causes the inaccuracy of topology information; thus, incurring low QoS support capability. Therefore, we need a new topology aggregation algorithm to achieve high accuracy. In this paper, we propose a new aggregation algorithm based on star topology. Noting the hierarchical characteristics in military and hierarchical networks, star topology aggregation can be used effectively. Our algorithm uses a limited number of bypasses to increase the exactness of the star topology aggregation. It adjusts topology parameters whenever it adds a bypass. Consequently, the result is highly accurate and has low computational complexity.

Efficient Method for Exchanging Data between DDS Middlewares based on Adaptive Packet Transmission (적응형 패킷 전송에 기반한 DDS 미들웨어 간의 효율적인 데이터 교환 방법)

  • Ahn, Sung-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1229-1234
    • /
    • 2012
  • In this paper, we analyze the problems that the DDS middleware, which is a standard data-centric communication interface, uses the fixed packet transmission method by the pre-defined protocol for exchanging data packets. The packet transmission method selected in a fixed manner cannot handle appropriately the increasing of resource overhead in an environment where the load of the DDS network changes dynamically. If the load on the node and network exceeds the threshold, the performance of the packet transmission may be degraded rapidly. This results in a failure of ensuring the real-time characteristic of DDS middleware. To solve this problem, we propose the scheme of the adaptive packet transmission for adjusting the transmission method in real-time based on the overhead on the DDS network.

Analysis of Author Image Based on Book Recommendation from Readers (독자 추천도서 정보를 이용한 작가 이미지 분석 연구)

  • Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.153-171
    • /
    • 2017
  • Many readers tend to read books of a specific author and to expand their reading areas according to the author. This study chose Edgar Allan Poe and analyzed the image of the author using co-recommended authors and books by other readers. The frequencies of co-occurred authors and books were investigated and the relations of authors and books were analyzed with network analysis methods. As a result, genre images of Poe, related authors, and related books are discovered. This study also suggested the methods to identify the image of a author, related author groups, and related books for libraries' reading programs and book curation.

Low-power Routing Algorithm using Routing History Cache for Wireless Sensor Network (RHC(Routing History Cache)를 사용한 저전력 소모 라우팅 알고리즘)

  • Lee, Doo-Wan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2441-2446
    • /
    • 2009
  • Wireless Sensor Network collects a data from the specific area and the control is composed of small sensor nodes. Like this sensors to after that is established at the beginning are operated with the battery, the operational duration until several years must be continued from several months and will be able to apply the resources which is restricted in efficiently there must be. In this paper RHC (rounting history cache) applies in Directed Diffusion which apply a data central concept a reliability and an efficiency in data transfer course set. RHC algorithms which proposes each sensor node updated RHC of oneself with periodic and because storing the optimization course the course and, every event occurrence hour they reset the energy is wasted the fact that a reliability with minimization of duplication message improved.

The SAN for Web Warehousing: An Alternative Data Repository (웹 웨어하우징을 위한 신개념의 저장장치 전용네트워크)

  • Soongoo Hong
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.3
    • /
    • pp.93-103
    • /
    • 2002
  • The combination of data warehousing and Internet technology produces a new concept - web warehousing. Due to the availability of web technologies and the need to make prompt decisions with timely information, web warehousing is emerging as a key strategic business weapon. Yet despite the many promising benefits of web warehousing, researchers have also identified several challenges, including scalability and availability. With the rise of the Internet and data centric computing applications, the use of new Storage Area Network (SAN) technology has been spotlighted for the possibility of a new data repository for web warehousing. In this article, the two new concepts of web warehousing and storage area networks are introduced. In particular, a SAN is discussed in detail as an alternative data repository to overcome the current limitations of web warehousing.

  • PDF

A Non-Uniform Network Split Method for Energy Efficiency in Data-Centric Sensor Networks (데이타 중심 센서 네트워크에서 에너지 효율성을 고려한 비균등 네트워크 분할 기법)

  • Kang, Hong-Koo;Kim, Joung-Joon;Park, Chun-Geol;Han, Ki-Joon
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.59-64
    • /
    • 2007
  • 데이타 중심 센서 네트워크에서는 측정된 데이타의 값에 따라 데이타를 저장하는 센서 노드가 결정되기 때문에 같은 값을 갖는 데이타가 빈번하게 발생하면 이를 저장하는 센서 노드에 부하가 집중되어 에너지가 빠르게 고갈되는 문제가 있다. 또한 센서 네트워크가 확장되면 데이타 저장 및 질의 처리시 목적 센서 노드로의 라우팅 거리가 멀어져 통신 비용이 증가되는 문제가 있다. 그러나 기존 연구들은 데이타 저장의 효율적인 관리에만 치우쳐 이와 같은 문제를 효율적으로 해결하지 못하고 있다. 본 논문에서는 이러한 문제를 해결하기 위해 비균등 네트워크 분할(Non-Uniform Network Spilt: NUNS) 기법을 제안한다. NUNS는 센서 네트워크를 센서 노드 개수와 분할된 영역 크기 차이가 최소가 되도록 비균등 크기의 Partition으로 분할하고 각 Partition에서 발생한 데이타를 그 Partition 내의 센서 노드가 저장 관리함으로써 센서 노드의 데이타 저장 부하를 분산시키고, 센서 네트워크의 확장에 따른 통신 비용을 줄인다. 그리고 NUNS는 각 Partition을 분할된 영역 크기 차이가 최소가 되도록 센서 노드 개수만큼 비균등하게 Zone으로 분할함으로써 센서 노드가 없는 Zone으로 인해 센서 노드에 부하가 집중되는 것을 막고 불필요한 라우팅 비용을 줄인다.

  • PDF

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

A Private Cloud with Private HW(DONO) (개인용 하드웨어를 이용한 클라우드 시스템)

  • Shin, Sam-Il;Park, Jae-kyung;Lee, Hyung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.679-680
    • /
    • 2021
  • 본 논문에서는 개인용 하드웨어를 통해 인증을 강화하고 이를 활용하여 개인 클라우드를 제공할 수 있는 개인용 보안장비인 DONO를 제안한다. 또한 DONO를 활용하여 보다 규모가 확장된 클라우드 서비스를 제안하고 이를 활용하여 실제 서비스가 가능함을 보여주도록 한다. DONO가 사용하는 환경은 기존의 네트워크 시스템을 따르는 대신 콘텐츠 중심의 통신을 통해 면역 기반 보안 시스템을 구축한다. 데이터 전송은 CCN(Content Centric Network)을 통해 이루어지며 CCNx 그룹이 검증한 프로토콜을 활용한다. DONO에 의해 보호되는 영역은 일반적인 네트워크 통신을 사용하지 않고 CCN 프로토콜에 따라서 운영하며 이를 통해 기존의 보안 공격과 추가적으로 알 수 없는 공격으로부터 시스템을 보호할 수 있다. 이러한 새로운 방식을 활용해 클라우드 시스템을 제공하며 보다 안전한 서비스를 활용할 수 있음을 보이도록 한다.

  • PDF

Policy Based DDoS Attack Mitigation Methodology (정책기반의 분산서비스거부공격 대응방안 연구)

  • Kim, Hyuk Joon;Lee, Dong Hwan;Kim, Dong Hwa;Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of KIISE
    • /
    • v.43 no.5
    • /
    • pp.596-605
    • /
    • 2016
  • Since the Denial of Service Attack against multiple targets in the Korean network in private and public sectors in 2009, Korea has spent a great amount of its budget to build strong Internet infrastructure against DDoS attacks. As a result of the investments, many major governments and corporations installed dedicated DDoS defense systems. However, even organizations equipped with the product based defense system often showed incompetency in dealing with DDoS attacks with little variations from known attack types. In contrast, by following a capacity centric DDoS detection method, defense personnel can identify various types of DDoS attacks and abnormality of the system through checking availability of service resources, regardless of the types of specific attack techniques. Thus, the defense personnel can easily derive proper response methods according to the attacks. Deviating from the existing DDoS defense framework, this research study introduces a capacity centric DDoS detection methodology and provides methods to mitigate DDoS attacks by applying the methodology.