• Title/Summary/Keyword: Information Centric Network

Search Result 347, Processing Time 0.032 seconds

In-network Aggregation Query Processing using the Data-Loss Correction Method in Data-Centric Storage Scheme (데이터 중심 저장 환경에서 소설 데이터 보정 기법을 이용한 인-네트워크 병합 질의 처리)

  • Park, Jun-Ho;Lee, Hyo-Joon;Seong, Dong-Ook;Yoo, Jae-Soo
    • Journal of KIISE:Databases
    • /
    • v.37 no.6
    • /
    • pp.315-323
    • /
    • 2010
  • In Wireless Sensor Networks (WSNs), various Data-Centric Storages (DCS) schemes have been proposed to store the collected data and to efficiently process a query. A DCS scheme assigns distributed data regions to sensor nodes and stores the collected data to the sensor which is responsible for the data region to process the query efficiently. However, since the whole data stored in a node will be lost when a fault of the node occurs, the accuracy of the query processing becomes low, In this paper, we propose an in-network aggregation query processing method that assures the high accuracy of query result in the case of data loss due to the faults of the nodes in the DCS scheme. When a data loss occurs, the proposed method creates a compensation model for an area of data loss using the linear regression technique and returns the result of the query including the virtual data. It guarantees the query result with high accuracy in spite of the faults of the nodes, To show the superiority of our proposed method, we compare E-KDDCS (KDDCS with the proposed method) with existing DCS schemes without the data-loss correction method. In the result, our proposed method increases accuracy and reduces query processing costs over the existing schemes.

A Network Analysis of the Library Bill Cosponsorship in the Legislative Process of the 19th National Assembly of Korea (도서관법안에 관한 19대 국회 입법과정의 공동발의 네트워크 분석)

  • Kim, Hyeyoung;Park, Ji-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.1-22
    • /
    • 2020
  • The legislative cosponsorship network shows the legislative process of the National Assembly through the relationship between the members of the National Assembly formed by cosponsorship. This study focused on the library bill proposed during the 19th National Assembly term, and conducted the cosponsorship network analysis, the centrality analysis of actors of the National Assembly, and a subgroup analysis of keyword-centric networks. As the result of the study, the library bill's cosponsorship network was segmented according to political parties, and lawmakers who played an intermediary role in close proximity to other political party members had an important influence on the network. When restructured into a keyword-oriented network, the network structure segmented into political parties improved as members of different parties shared the same keywords and formed subgroups. Based on the results, it was suggested that a strategy for spreading and sharing policy issues based on core keywords rather than library legislation, centered on lawmakers who play a mediating role between parties, is needed to activate library legislation.

Construction of Citation Network of Authors Using URI (URI 기반 저자 인용 네트워크 구축 및 활용)

  • Koo, Hee-Kwan;Jung, Han-Min;Kang, In-Su;Lee, Seung-Woo;Sung, Won-Kyung
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.2
    • /
    • pp.150-159
    • /
    • 2007
  • For the construction of accurate scientific citation information, author disambiguation should be primarily resolved. This study proposes a method that utilizes URI(Uniform Resource Identifier) to create precise author citation networks. The adoption of URIs for representing authors and papers in this study enables us to maintain the integrity of constantly changing citation information and to guarantee the accessibility to the right literature. In experiments, we extracted 2,872 author-centric citation relation pairs from recent major IT-related proceedings written in Korean. From those, 135 citation network groups were discovered. The findings of this study are expected to be applied to a variety of researcher network services and scientific information portal services.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

Network analysis and comparing citation index of statistics journals (국내 통계학 관련 학술지의 인용지수 비교 및 네트워크 분석)

  • Won, Dongkee;Choi, Kyoungho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.2
    • /
    • pp.317-325
    • /
    • 2014
  • Evaluating contents and quality of the journal along with the research ability of researcher is becoming an important issue recently. This research compared level of impact of the journals related to statistics in nation, 'Journal of the Korean Data & Information Science Society'-centric, using various KCI citation index. Moreover, this research surveyed network between the journals in the aspect of social network analysis, using co-citation frequency. From that, the following conclusions were drawn. First, percentage of self-citation was relatively high. Second, even though Statistics journal had higher impact index than the mathematics, physics and chemistry, frequency of citing statistics journal in other journals was not that high. Third, 'Journal of the Korean Data & Information Science Society' serves central role in network analysis, however it seems that more efforts are required.

Proactive Code Verification Protocol Using Empty Memory Deletion in Wireless Sensor Network (무선 센서 네트워크에서의 메모리 공간 삭제를 이용한 선행 코드-검증 기법)

  • Choi, Young-Geun;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.37-46
    • /
    • 2007
  • The authentication in WSN(Wireless Sensor Network) usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT. We provide two modes of this verification method: BS-to-node and node-to-node. The performance estimation in various environments is shown.

A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis (효과도 분석을 통한 천해용 수중분산 센서망 설계 연구)

  • Kim, Wan-Jin;Bae, Ho Seuk;Kim, Woo Shik;Lee, Sang Kug;Choi, Sang Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.591-603
    • /
    • 2014
  • In this paper, we have described the characteristics of the Underwater Distributed Sensor Network (UDSN) and proposed the conceptual design guideline by an effectiveness analysis. To perform the effectiveness analysis, we defined an battlefield environment, and then analyzed principal components which compose the UDSN to find out simulation parameters and system constraints. We have chosen a measure of effectiveness based on a target trajectory, which could enhance intuitive understanding about current status, and performed various simulations to reveal critical design parameters in terms of sensor node types, arrangement, cost and combination of detection information.

Design of Security Management Function for SNMPv3 using Role-Based Access Control Model (역할기반 접근통제 모델을 이용한 SNMPv3 보안관리기능 설계)

  • 이형효
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.1-10
    • /
    • 2001
  • SNMPv3 provides the security services such as authentication and privacy of messages as well as a new flexible and extensible administration framework. Therefore, with the security services enabled by SNMPv3, network managers can monitor and control the operation of network components more secure way than before. But, due to the user-centric security management and the deficiency of policy-based security management facility, SNMPv3 might be inadequate network management solution for large-scaled networks. In this paper, we review the problems of the SNMPv3 security services, and propose a Role-based Security Management Model(RSM), which greatly reduces the complexity of permission management by specifying and enforcing a security management policy far entire network.

  • PDF

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.