• 제목/요약/키워드: Key-scheduling

검색결과 174건 처리시간 0.019초

MOPSO-based Data Scheduling Scheme for P2P Streaming Systems

  • Liu, Pingshan;Fan, Yaqing;Xiong, Xiaoyi;Wen, Yimin;Lu, Dianjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권10호
    • /
    • pp.5013-5034
    • /
    • 2019
  • In the Peer-to-Peer (P2P) streaming systems, peers randomly form a network overlay to share video resources with a data scheduling scheme. A data scheduling scheme can have a great impact on system performance, which should achieve two optimal objectives at the same time ideally. The two optimization objectives are to improve the perceived video quality and maximize the network throughput, respectively. Maximizing network throughput means improving the utilization of peer's upload bandwidth. However, maximizing network throughput will result in a reduction in the perceived video quality, and vice versa. Therefore, to achieve the above two objects simultaneously, we proposed a new data scheduling scheme based on multi-objective particle swarm optimization data scheduling scheme, called MOPSO-DS scheme. To design the MOPSO-DS scheme, we first formulated the data scheduling optimization problem as a multi-objective optimization problem. Then, a multi-objective particle swarm optimization algorithm is proposed by encoding the neighbors of peers as the position vector of the particles. Through extensive simulations, we demonstrated the MOPSO-DS scheme could improve the system performance effectively.

Energy-Efficient Base Station Sleep Scheduling in Relay-Assisted Cellular Networks

  • Chen, Hongbin;Zhang, Qiong;Zhao, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1074-1086
    • /
    • 2015
  • We Relay-assisted cellular network architecture has been developed to cover cell-edge users and to improve capacity. However, the deployment of relay stations (RSs) in cellular networks may increase the total energy consumption. Though energy efficiency has become a major concern in cellular networks, little work has studied the energy efficiency of relay-assisted cellular networks by sleep scheduling. In this paper, a distributed base stations (BSs) sleep scheduling scheme in relay-assisted cellular networks is proposed. The goal is to maximize the energy efficiency under the spectral efficiency constraint. Firstly, whether the BSs should be sleeping or active is determined by the traffic profile. Then, the transmission powers of the active BSs are optimized within the game-theoretic framework, by using an interior-point method, so as to maximize the energy efficiency. Simulation results demonstrate that the effectiveness of the proposed scheme is superior to that turning on all the BSs without sleep scheduling.

A Rijndael Cryptoprocessor with On-the-fly Key Scheduler

  • Shim, Joon-Hyoung;Bae, Joo-Yeon;Kang, Yong-Kyu;Park, Jun-Rim
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.944-947
    • /
    • 2002
  • We implemented a cryptoprocessor with a on-the-fly key scheduler which performs forward key scheduling for encryption and reverse key scheduling for decryption. This scheduler makes the fast generation of the key value and eliminates the memory for software key scheduler. The 128-bit Rijndael processor is implemented based on the proposed architecture using Verilog-HDL and targeted to Xilinx XCV1000E FPGA device. As a result, the 128-bit Rijndael operates at 38.8MHz with on-the-fly key scheduler and consumes 11 cycles for encryption and decryption resulting in a throughput of 451.5Mbps

  • PDF

Towards Achieving the Maximum Capacity in Large Mobile Wireless Networks under Delay Constraints

  • Lin, Xiaojun;Shroff, Ness B.
    • Journal of Communications and Networks
    • /
    • 제6권4호
    • /
    • pp.352-361
    • /
    • 2004
  • In this paper, we study how to achieve the maximum capacity under delay constraints for large mobile wireless networks. We develop a systematic methodology for studying this problem in the asymptotic region when the number of nodes n in the network is large. We first identify a number of key parameters for a large class of scheduling schemes, and investigate the inherent tradeoffs among the capacity, the delay, and these scheduling parameters. Based on these inherent tradeoffs, we are able to compute the upper bound on the maximum per-node capacity of a large mobile wireless network under given delay constraints. Further, in the process of proving the upper bound, we are able to identify the optimal values of the key scheduling parameters. Knowing these optimal values, we can then develop scheduling schemes that achieve the upper bound up to some logarithmic factor, which suggests that our upper bound is fairly tight. We have applied this methodology to both the i.i.d. mobility model and the random way-point mobility model. In both cases, our methodology allows us to develop new scheduling schemes that can achieve larger capacity than previous proposals under the same delay constraints. In particular, for the i.i.d. mobility model, our scheme can achieve (n-1/3/log3/2 n) per-node capacity with constant delay. This demonstrates that, under the i.i.d. mobility model, mobility increases the capacity even with constant delays. Our methodology can also be extended to incorporate additional scheduling constraints.

Conflict Graph-based Downlink Resource Allocation and Scheduling for Indoor Visible Light Communications

  • Liu, Huanlin;Dai, Hongyue;Chen, Yong;Xia, Peijie
    • Journal of the Optical Society of Korea
    • /
    • 제20권1호
    • /
    • pp.36-41
    • /
    • 2016
  • Visible Light Communication (VLC) using Light Emitting Diodes (LEDs) within the existing lighting infrastructure can reduce the implementation cost and may gain higher throughput than radio frequency (RF) or Infrared (IR) based wireless systems. Current indoor VLC systems may suffer from poor downlink resource allocation problems and small system throughput. To address these two issues, we propose an algorithm called a conflict graph scheduling (CGS) algorithm, including a conflict graph and a scheme that is based on the conflict graph. The conflict graph can ensure that users are able to transmit data without interference. The scheme considers the user fairness and system throughput, so that they both can get optimum values. Simulation results show that the proposed algorithm can guarantee significant improvement of system throughput under the premise of fairness.

블록암호 CLEFIA-128의 효율적인 하드웨어 구현 (An Efficient Hardware Implementation of Block Cipher CLEFIA-128)

  • 배기철;신경욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.404-406
    • /
    • 2015
  • 128-비트 마스터키를 지원하는 블록암호 CLEFIA-128의 저면적 하드웨어 구현에 대해 기술한다. 라운드 키 생성을 위한 중간값 계산과 라운드 변환이 단일 데이터 프로세싱 블록으로 처리되도록 설계하였으며, 변형된 GFN(Generalized Feistel Network) 구조와 키 스케줄링 방법을 적용하여 데이터 프로세싱 블록과 키 스케줄링 블록의 회로를 단순화시켰다. Verilog HDL로 설계된 CLEFIA-128 프로세서를 FPGA로 구현하여 정상 동작함을 확인하였다. Vertex5 XC5VSX50T FPGA에서 823 slices로 구현되었으며, 최대 145 Mhz 클록으로 동작하여 105 Mbps의 성능을 갖는 것으로 예측되었다.

  • PDF

UICC 16bit 상에서의 LEA 구현 적합성 연구 (A LEA Implementation study on UICC-16bit)

  • 김현일;박철희;홍도원;서창호
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.585-592
    • /
    • 2014
  • 본 논문에서는 2013년 12월 18일에 국내표준(TTA-KO-12.0223)으로 제정된 블록암호 알고리즘 LEA(Lightweight Encryption Algorithm)[1]에 대한 UICC-16bit 상에서의 최적 구현에 대해 연구한다. LEA의 전체적인 구조를 설명하며, 키 스케줄 과정에서 고정된 상수를 통해 미리계산이 가능하여 효율성을 높일 수 있다는 점을 제시하며 이러한 개선된 키 스케줄링을 통하여 얻게되는 상수 table을 이용하여 UICC-16비트 상에 구현하였다. 또한 UICC-16bit 상에서 국내 표준 블록암호 ARIA와의 성능 비교를 통해 LEA블록암호의 우수성을 평가하였다.

실시간 시스템에서 성능 향상 기법 (Enhanced Technique for Performance in Real Time Systems)

  • 김명준
    • 한국IT서비스학회지
    • /
    • 제16권3호
    • /
    • pp.103-111
    • /
    • 2017
  • The real time scheduling is a key research area in high performance computing and has been a source of challenging problems. A periodic task is an infinite sequence of task instance where each job of a task comes in a regular period. The RMS (Rate Monotonic Scheduling) algorithm has the advantage of a strong theoretical foundation and holds out the promise of reducing the need for exhaustive testing of the scheduling. Many real-time systems built in the past based their scheduling on the Cyclic Executive Model because it produces predictable schedules which facilitate exhaustive testing. In this work we propose hybrid scheduling method which combines features of both of these scheduling algorithms. The original rate monotonic scheduling algorithm didn't consider the uniform sampling tasks in the real time systems. We have enumerated some issues when the RMS is applied to our hybrid scheduling method. We found the scheduling bound for the hard real-time systems which include the uniform sampling tasks. The suggested hybrid scheduling algorithm turns out to have some advantages from the point of view of the real time system designer, and is particularly useful in the context of large critical systems. Our algorithm can be useful for real time system designer who must guarantee the hard real time tasks.

Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계 (A design of Giga-bit security module using Fully pipe-lined CTR-AES)

  • ;박주현;김영철;김광옥
    • 한국정보통신학회논문지
    • /
    • 제12권6호
    • /
    • pp.1026-1031
    • /
    • 2008
  • 현재 가정과 소규모 사업장에서 재정적인 변화와 개인 커뮤니케이션 그리고 원격의료에 이르기까지 점점 GPON 사용이 일반화 되어가고 있다. 이러한 PON의 다중사용 때문에 개인정보 보호와 커뮤니케이션 보호를 위한 보안의 필요성이 더더욱 커지고 있다. 이를 위해 이 논문에서는 Virtex4 FPGA를 기반으로 AES의 카운터 모드를 구현하였다. 본 논문에서 구현된 구조는 pipeline 구조 구현을 위하여 크게 세 가지 특징을 가지고 있는데 1) composite filed 연산을 이용한 Subbyte, 2) efficient MixColumn transformation, 그리고 3) on-the-fly key scheduling이다. 구현된 S-box는 면적의 17% 감소와 on-the-fly key 스케줄링 기법으로 pipeline 구조에 특화된 key-expander 기능을 구현하였다.

전자상거래 보안을 위한 YK2 암호시스템의 구현 (An Implementation of YK2 Cipher System for Electronic Commerce Security)

  • 서장원
    • 한국전자거래학회지
    • /
    • 제6권1호
    • /
    • pp.17-33
    • /
    • 2001
  • EC(Electronic Commerce) which is done on the virtual space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet, Therefore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher system. YK2(Young Ku King) cipher system proposed in this paper is good solution for the EC security and it overcome the limit of current block cipher system using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is designed for the increase of time complexity by adapting more complex design for key scheduling algorithm regarded as one of important element effected to encryption.

  • PDF