• Title/Summary/Keyword: Lookup table

Search Result 233, Processing Time 0.026 seconds

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

Topology-aware Chord system for efficient lookup (효율적인 탐색을 위한 위상 인지 Chord 시스템)

  • Kim, Jun-Hong;Jo, In-June;Kim, Seung-Hae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.89-92
    • /
    • 2005
  • Centralized P2P system, Napster and Unstructured P2P system, Gnutella accomplish main current. Centralized system and unstructured system have a restriction in a scalability. To solve the this problem, structured system is appeared. CAN, Chord, Pastry and Tapestry are delegation of this system. Although structured system don't aware physical proximity of node because it uses Distribute Hash Table. In proposing system, a node can communicate with physical proximity of node using concept of LAN. Internet traffic is also decreased because communication in the Chord network divide in two(original network and sub network).

  • PDF

Sepculative Updates of a Stride Value Predictor in Wide-Issue Processors (와이드 이슈 프로세서를 위한 스트라이드 값 예측기의 모험적 갱신)

  • Jeon, Byeong-Chan;Lee, Sang-Jeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.11
    • /
    • pp.601-612
    • /
    • 2001
  • In superscalar processors, value prediction is a technique that breaks true data dependences by predicting the outcome of an instruction in order to exploit instruction level parallelism(ILP). A value predictor looks up the prediction table for the prediction value of an instruction in the instruction fetch stage, and updates with the prediction result and the resolved value after the execution of the instruction for the next prediction. However, as the instruction fetch and issue rates are increased, the same instruction is likely to fetch again before is has been updated in the predictor. Hence, the predictor looks up the stale value in the table and this mostly will cause incorrect value predictions. In this paper, a stride value predictor with the capability of speculative updates, which can update the prediction table speculatively without waiting until the instruction has been completed, is proposed. Also, the performance of the scheme is examined using Simplescalar simulator for SPECint95 benchmarks in which our value predictor is added.

  • PDF

A Study on Algorithm Robust to Error for Estimating partial Discharge Location using Acoustic Emission Sensors (AE(Acoustic Emission) 센서를 이용한 오차에 강인한 부분방전 위치추정 알고리즘에 관한 연구)

  • Cho, Sung-Min;Shin, Hee-Sang;Kim, Jae-Chul;Lee, Yang-Jin;Kim, Kwang-Hwa
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.10
    • /
    • pp.69-75
    • /
    • 2008
  • This paper presents an algorithm robust to error for estimating partial discharge (PD) location using acoustic emission sensors. In operating transformers, the velocity computing of the acoustic signal is difficult because the temperature of the Insulation oil is not homogeneous. So, some error occurs in the process. Therefore, the algorithm estimating PD location must consider this error to provide maintenance person with useful information. The conventional algorithm shows the PD position as a point, while the new algorithm using LookUp-Table(LUT) shows PD position as error-map visually. The error-map is more useful than the conventional result because of robustness to error. Also, we compared performance of them, by adding error to data on purpose.

Object Replication Methods for High Availability in DHT based P2P Computing System (분산 해쉬 테이블 기반 피어 투 피어 컴퓨팅 시스템에서 가용성 향상 객체 복제 기법)

  • Son, Young-Sung;Jung, Il-Dong;Kim, Kyong-Sok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1535-1543
    • /
    • 2007
  • Recently, there are many researches for P2P network. P2P network technologies are a good solution about making a wide spread distributed computing in the internet environment. The recent algorithms developed by several research groups for the lookup problem present a simple and general interface, a distributed hash table (DHT). In this paper, we also introduce new schemes that enhance the available rate of an object in the MagicSquare network. Replication scheme is to replicate an object with many replicas and save them to several nodes. Fragmentation scheme is to divide an object into several fragments and save them to several nodes. Replicated Fragmentation scheme is to mix replication scheme and fragmentation scheme. We will show result of simulation for our the proposed scheme.

A Study on Fingerprint-Based Coil Alignment Improvement Technique for Magnetic Resonant Wireless Power Transfer System (핑거프린트 방식의 자기 공진형 무선전력전송 코일 정렬 상태 개선 기법 연구)

  • Kim, Sungjae;Lee, Euibum;Ku, Hyunchul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.38-44
    • /
    • 2019
  • This paper proposes fingerprint-based positioning methods which can be used in a magnetic resonant wireless power transfer(WPT) system and verifies their performance. A new receiver coil with small orthogonal auxiliary coils is proposed to measure magnetic field signals in three axial directions. The magnitude and phase characteristics of the three-axis electromotive force can be obtained by using the proposed coil. To predict a position with the measured values, we propose a lookup table-based method and linear discriminant analysis-based method. For verification, the proposed methods are applied to predict 75 positions of the 6.78 MHz WPT system, and the performances such as accuracy and computation time are compared.

A Study on the Modulus Multiplier Speed-up Throughput in the RSA Cryptosystem (RSA 암호시스템의 모듈러 승산기 처리속도 향상을 위한 연구)

  • Lee, Seon-Keun;Jeung, Woo-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.217-223
    • /
    • 2009
  • Recently, the development of the various network method can generate serious social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security field such as hacking, cracking. The way to preserve security from hacker or cracker without developing new cryptographic algorithm is keeping the state of anti-cryptanalysis in a prescribed time by means of extending key-length. In this paper, the proposed montgomery multiplication structured unit array method in carry generated part and variable length multiplication for eliminating bottle neck effect with the RSA cryptosystem. Therefore, this proposed montgomery multiplier enforce the real time processing and prevent outer cracking.

  • PDF

Table-based Effective Estimation of Residual Energy for Battery-based Wireless Sensor System (배터리기반 무선 센서시스템을 위한 테이블기반 잔여 에너지양 추정기법)

  • Kim, Jae-Ung;Noh, Dong-Kun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.55-63
    • /
    • 2014
  • Up to date, numerous studies on wireless sensor networks have been performed to overcome the Energy-Constraint of the sensor system. Existing schemes for estimating the residual energy have considered only voltage of sensor system. However battery performance in the real is affected by temperature and load. In this paper we introduce more accurate scheme, for the use in wireless sensor node, based on the interpolation of lookup tables which allow for temperature and load characteristics, as well as battery voltage.

A 12-bit Hybrid Digital Pulse Width Modulator

  • Lu, Jing;Lee, Ho Joon;Kim, Yong-Bin;Kim, Kyung Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.1
    • /
    • pp.1-7
    • /
    • 2015
  • In this paper, a 12-bit high resolution, power and area efficiency hybrid digital pulse width modulator (DPWM) with process and temperature (PT) calibration has been proposed for digital controlled DC-DC converters. The hybrid structure of DPWM combines a 6-bit differential tapped delay line ring-mux digital-to-time converter (DTC) schema and a 6-bit counter-comparator DTC schema, resulting in a power and area saving solution. Furthermore, since the 6-bit differential delay line ring oscillator serves as the clock to the high 6-bit counter-comparator DTC, a high frequency clock is eliminated, and the power is significantly saved. In order to have a simple delay cell and flexible delay time controllability, a voltage controlled inverter is adopted to build the deferential delay cell, which allows fine-tuning of the delay time. The PT calibration circuit is composed of process and temperature monitors, two 2-bit flash ADCs and a lookup table. The monitor circuits sense the PT (Process and Temperature) variations, and the flash ADC converts the data into a digital code. The complete circuits design has been verified under different corners of CMOS 0.18um process technology node.

Artificial Traffic Signal Light using Fuzzy Rules

  • Kim Chjong-Soo;Hong You-Sik
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1005-1016
    • /
    • 2004
  • The conventional traffic light loses the function of optimal traffic signal cycle. And so, 30-45% of conventional traffic signal cycle is not matched to the present traffic signal cycle. In this paper proposes electro sensitive traffic light using fuzzy rules which will reduce the average vehicle waiting time and improve average vehicle speed. This paper is researching the storing method of 40 different kinds of sensor input conditions. Such as, car speed, delay· in starting time and the volume of cars in the real traffic situation. It will estimate the optimal green time in the 10 different intersections using Intelligent fuzzy method. Computer simulation results prove that reducing the average vehicle waiting time and offset better than fixed signal method which doesn't consider vehicle length.

  • PDF