• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.029 seconds

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

A Channel Scheduling Scheme for Interference Avoidance in Wireless USB Systems (무선 USB 시스템에서 간섭 회피를 위한 채널 스케쥴링 기법)

  • Kim, Jin-Woo;Park, Kyung Woo;Oh, Il-Whan;Kim, Kyung-Ho;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1441-1449
    • /
    • 2015
  • Wireless universal serial bus (WUSB) is the USB technology merged with WiMedia PHY/MAC. WUSB can be applied to wireless persanal area network (WPAN) applications as well as PAN applications like wired USB. Because numerous WUSB networks operate independently for each application, data conflict can occur between adjacent networks. To avoid data conflict, the resource in a different time zone can be utilized. However, if devices in a network increase, available resources in the network decrease, and then the lack of resources necessary to provide service can occur. To solve this problem, we propose interference avoidance scheme for WUSB systems.

Optimization Routing Protocol based on the Location, and Distance information of Sensor Nodes (센서 노드의 위치와 거리 정보를 기반으로 전송 경로를 최적화하는 라우팅 프로토콜)

  • Kim, Yong-Tae;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.127-133
    • /
    • 2015
  • In order for location information to deliver the collected information, it needs Sensor Nodes in an environment of Sensor Network. Each sensor sends data to a base station through the process of routing in a wireless sensor network environment. Therefore, Offering accurate location information is very important in a wireless sensor network environment. Most of existed routing methods save all the informations of nodes at the area of 1-hop. In order to save these informations, unnecessary wasted energy and traffics are generated. Routing Protocol proposed in this paper doesn't save node's location information, and doesn't exchange any periodic location information to reduce wasted energy. It includes transmission range of source nodes and nodes with the location information, however it doesn't include any nodes' routing near 1-hope distance.

Improved Throughput Scaling of Large Ultra-Wide Band Ad Hoc Networks (거대 초 광 대역 애드 혹 네트워크에서의 개선된 용량 스케일링)

  • Shin, Won-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.303-310
    • /
    • 2014
  • We show improved throughput scaling laws for an ultra-wide band (UWB) ad hoc network, in which n wireless nodes are randomly located. First, we consider the case where a modified hierarchical cooperation (HC) strategy is used. Then, in a dense network of unit area, our result indicates that the derived throughput scaling depends on the path-loss exponent ${\alpha}$ for certain operating regimes due to the power-limited characteristics. It also turns out that the HC protocol is dominant for 2 < ${\alpha}$ < 3 while using the nearest multihop (MH) routing leads to a higher throughput for ${\alpha}{\geq}3$. Second, the impact and benefits of infrastructure support are analyzed, where m base stations (BSs) are regularly placed in UWB networks. In this case, the derived throughput scaling depends on ${\alpha}$ due to the power-limited characteristics for all operating regimes. Furthermore, it is shown that the total throughput scales linearly with parameter m as m is larger than a certain level. Hence, the use of either HC or infrastructure is helpful in improving the throughput of UWB networks in some conditions.

Plat-Based Key Pre-Distribution Scheme in Sensor Network (센서네트워크에서 평면 그리드 기반의 키 선 분배 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.1-8
    • /
    • 2008
  • The security of wireless sensor networks is a challenging research area where the resources constraints are a bottleneck for any successful security design. Due to their computational feasibility, symmetric key algorithms that require key pre-distribution are more desirable for use in these networks. In the pre-distribution scheme, keys or keying materials are assigned to each node prior deployment to guarantee a secure communication within the entire network. Though several works are introduced on this issue, yet the connectivity and resiliency are imperfectly handled. In this paper, we revisit the grid based key pre-distribution scheme aiming to improve the connectivity, introduce a higher resiliency level, simplify the logic of key establishment and maintain same level of used of resources usage. The core of our modification relies on introducing the novel plat-based polynomial assignment and key establishment mechanism. To demonstrate the advantageous properties of our scheme over the revisited one, details of consumed resources, resulting connectivity, security and comparisons with relevant works are introduced.

Performance Improvement of the Statistical Information based Traffic Identification System (통계 정보 기반 트래픽 분석 방법론의 성능 향상)

  • An, Hyun Min;Ham, Jae Hyun;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.335-342
    • /
    • 2013
  • Nowadays, the traffic type and behavior are extremely diverse due to the growth of network speed and the appearance of various services on Internet. For efficient network operation and management, the importance of application-level traffic identification is more and more increasing in the area of traffic analysis. In recent years traffic identification methodology using statistical features of traffic flow has been broadly studied. However, there are several problems to be considered in the identification methodology base on statistical features of flow to improve the analysis accuracy. In this paper, we recognize these problems by analyzing the ground-truth traffic and propose the solution of these problems. The four problems considered in this paper are the distance measurement of features, the selection of the representative value of features, the abnormal behavior of TCP sessions, and the weight assignment to the feature. The proposed solutions were verified by showing the performance improvement through experiments in campus network.

Decentralized Group Key Management for Untrusted Dynamic Networks (신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.263-274
    • /
    • 2009
  • Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plaintext to the intermediate relaying proxies, or require the key distribution center to coordinate secure group communications between subgroups. In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy cryptography. In the proposed scheme, the key distribution center is eliminated while data confidentiality of the transmitted message is provided during the message delivery process. The proposed scheme can support a secure group communication in dynamic network environments where there is no trusted central controller for the whole network and the network topology changes frequently.

A Study on TDMG Pulse Performance and Structure for Performance Improvement of UWB system (UWB 시스템의 성능개선을 위한 TDMG 펄스 발생기의 성능과 구조에 관한 연구)

  • Ko, Young-Eun;Bang, Sung-Il
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.395-400
    • /
    • 2004
  • Being aware of growing needs for wireless communication led to the development of UWB systems, this study proposed an impulse for single band UWB systems which does not count a carrier; analyzed the characteristics and the problems of pulses suggested by the existing poise of the Un system; finally, proposed TDMG(Time Delay Multiple Gaussian) pulse that generates signals of UWB without attenuation of pulse width. The hardware structure of the TDMC pulse for the single band UWB system was modelled after describing the pulse in a mathematical method in an attempt to compare with performances of the existing pulses through computer simulation. The outcome of the test unveiled the fact that each center frequency of the TDMG pulse rose approximately 1GHz, and also each l0dB fractional bandwidth of the TDMG pulse was widened over 1GHz. In the case of derivative, center frequencies of the TDMG pulse rose over 1GHz each. As a consequence, the TDMG pulse appeared to have better quality frequency, satisfying the characteristics of spectrum and the band of frequency recommended by the FCC and decreasing interference with other wireless communication systems.

Deriving Topics for Safety of Folk Villages Following Scope and Content of ICT-Based DPD

  • Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.12 no.2
    • /
    • pp.12-23
    • /
    • 2016
  • This paper presents a novel concept of Disaster Prevention Design (DPD) and its derived subjects and topics for the safety of folk villages in both Korea and Japan. Nowadays, design concepts are focused on 'human-oriented nature' as a whole and this tendency fits to be appropriate for disaster prevention against real dangers of a future society, which is expected to have far more complicated features. On the other hand, convergences have performed with other areas in the field of Information Communication Technology (ICT) so that we can easily find examples like 'the strategy of ICT-based convergence' of the Korean Government in 2014. Modern content designs including UI (user interface) and USN (ubiquitous sensor network) have been developed as one of the representative areas of ICT & UD (universal design) convergences. These days this novel concept of convergence is overcoming the existing limitations of the conventional design concept focused on product and/or service. First of all, from that point our deduced topic or subject would naturally be a monitoring system design of constructional structures in folk villages for safety. We offer an integrated model of maintenance and a management-monitoring scheme. Another important point of view in the research is a safety sign or sign system installed in folk villages or traditional towns and their standardization. We would draw up and submit a plan that aims to upgrade signs and sign systems applied to folk villages in Korea and Japan. According to our investigations, floods in Korea and earthquakes in Japan are the most harmful disasters of folk villages. Therefore, focusing on floods in the area of traditional towns in Korea would be natural. We present a water-level expectation model using deep learning simulation. We also apply this method to the area of 'Andong Hahoe' village which has been registered with the World Cultural Heritage of UNESCO. Folk village sites include 'Asan Oeam', 'Andong Hahoe' and 'Chonju Hanok' villages in Korea and 'Beppu Onsen' village in Japan. Traditional Streets and Markets and Safe Schools and Parks are also chosen as nearby test-beds for DPD based on ICT. Our final goal of the research is to propose and realize an integrated disaster prevention and/or safety system based on big data for both Korea and Japan.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.