• Title/Summary/Keyword: Node Management

Search Result 1,126, Processing Time 0.027 seconds

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

Comparison of Thermal Ablation and Surgery for Low-Risk Papillary Thyroid Microcarcinoma: A Systematic Review and Meta-Analysis

  • Hyun Jin Kim;Se Jin Cho;Jung Hwan Baek
    • Korean Journal of Radiology
    • /
    • v.22 no.10
    • /
    • pp.1730-1741
    • /
    • 2021
  • Objective: Although thermal ablation is effective in treating low-risk papillary thyroid microcarcinomas (PTMCs), comparison of treatment outcomes between thermal ablation and surgery has not yet been systematically evaluated. This study aimed to compare the efficacy and safety of thermal ablation and surgery for the treatment of low-risk PTMCs. Materials and Methods: Ovid-MEDLINE and EMBASE databases were searched for studies reporting comparisons of treatment results between thermal ablation and surgery for patients with low-risk PTMC published up to April 6, 2020. The analysis evaluated the efficacy (local tumor recurrence, occurrence of new tumor, metastasis, and rescue surgery) and safety (complication rate) of thermal ablation and surgery. Results: This systematic review included four studies with a total of 339 PTMCs in 339 patients who underwent thermal ablation and 320 PTMCs in 314 patients who underwent surgery. There was no local tumor recurrence or distant metastasis in either group. There was no significant difference in the pooled proportion of lymph node metastasis (2.6% with thermal ablation vs. 3.3% with surgery, p = 0.65), occurrence of new tumors (1.4% with thermal ablation vs. 1.3% with surgery, p = 0.85), or rescue surgery (2.6% with thermal ablation vs. 1.6% with surgery, p = 0.62). However, the pooled complication rate was significantly higher in the surgery group than in the ablation group (3.3% with thermal ablation vs. 7.8% with surgery, p = 0.03). Conclusion: Both thermal ablation and surgery are effective and safe options for the management of low-risk PTMCs, with thermal ablation achieving a lower complication rate. Therefore, thermal ablation may be considered as an alternative treatment option for low-risk PTMC in patients who refuse surgery and active surveillance or are ineligible for surgery.

Mobility Support Scheme Based on Machine Learning in Industrial Wireless Sensor Network (산업용 무선 센서 네트워크에서의 기계학습 기반 이동성 지원 방안)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Jung, Kwansoo;Oh, Seungmin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.256-264
    • /
    • 2020
  • Industrial Wireless Sensor Networks (IWSNs) is exploited to achieve various objectives such as improving productivity and reducing cost in the diversity of industrial application, and it has requirements such as low-delay and high reliability packet transmission. To accomplish the requirement, the network manager performs graph construction and resource allocation about network topology, and determines the transmission cycle and path of each node in advance. However, this network management scheme cannot treat mobile devices that cause continuous topology changes because graph reconstruction and resource reallocation should be performed as network topology changes. That is, despite the growing need of mobile devices in many industries, existing scheme cannot adequately respond to path failure caused by movement of mobile device and packet loss in the process of path recovery. To solve this problem, a network management scheme is required to prevent packet loss caused by mobile devices. Thus, we analyse the location and movement cycle of mobile devices over time using machine learning for predicting the mobility pattern. In the proposed scheme, the network manager could prevent the problems caused by mobile devices through performing graph construction and resource allocation for the predicted network topology based on the movement pattern. Performance evaluation results show a prediction rate of about 86% compared with actual movement pattern, and a higher packet delivery ratio and a lower resource share compared to existing scheme.

An Enhanced Fast Handover Scheme for Proxy Mobile IPv6 (Proxy Mobile IPv6를 위한 개선된 신속한 핸드오버 방안)

  • Kang, Ju-Eun;Kum, Dong-Won;Cho, You-Ze
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.1-10
    • /
    • 2009
  • In a network-based approach such as Proxy Mobile IPv6 (PMIPv6), the serving network controls the mobility management on behalf of a Mobile Node (MN), thereby eliminating a MN from any mobility-related signaling. Although PMIPv6 is being standardized by the IETF NetLMM WG, PMIPv6 still suffers from a lengthy handover latency and the on-the-fly packet loss during a handover. Therefore, this paper presents an enhanced fast handover scheme for PMIPv6. The proposed handover scheme uses the Neighbor Discovery message of IPv6 to reduce the handover latency and packet buffering at the Mobile Access Gateway (MAG) to avoid the on-the-fly packet loss during a handover. In addition, it uses an additional packet buffering at the Local Mobility Anchor (LMA) to solve the packet ordering problem. We evaluate the performance of the proposed handover scheme using both analytical model and simulation. The numerical analysis shows that the proposed scheme has a relatively shorter handover latency. Simulation results demonstrate that the proposed scheme could avoid the on-the-fly packet loss and ensure the packet sequence.

Evaluation of Results in Pesticide Residues on Incongruity Commercial Agricultural Commodities using Network Analysis Method (네트워크 분석을 활용한 유통농산물 잔류농약 부적합 현황 분석)

  • Park, Jae Woo;Seo, Jun Ho;Lee, Dong Hun;Na, Kang In;Cho, Sung Yong;Bae, Man Jae
    • Journal of Food Hygiene and Safety
    • /
    • v.33 no.1
    • /
    • pp.23-30
    • /
    • 2018
  • The purpose of this research was to introduce network analysis method for analyzing pesticide residues in incongruity commercial agricultural commodities. Based on the "results in pesticide residues on incongruity commercial agricultural commodities" on "Guidelines for food safety management 2017", we used centrality analysis for pesticide residues via degree, closeness and betweenness centrality measurement. In case of degree centrality result, chlorpyrifos and diazinon were the most highly "connected node" in pesticide network. For the closeness centrality result, the most pesticides showed the similar closeness trend except for 19 species of pesticides. Fludioxonil and chlorpyrifos are recognized as the "bridge" of pesticides network with their high betweenness centrality. The results of network analysis show the "relation" data, which could not represent through out the conventional statistical analysis, among the pesticide residues. We hope that the network analysis method will be appropriate and precise tool for analyzing pesticide residues via elaboration and optimization.

Provider Provisioned based Mobile VPN using Dynamic VPN Site Configuration (동적 VPN 사이트 구성을 이용한 Provider Provisioned 기반 모바일 VPN)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2007
  • Increase in the wireless mobile network users brings the issue of mobility management into the Virtual Private Network (VPN) services. We propose a provider edge (PE)-based provider provisioned mobile VPN mechanism, which enables efficient communication between a mobile VPN user and one or more correspondents located in different VPN sites. The proposed mechanism not only reduces the IPSec tunnel overhead at the mobile user node to the minimum, but also enables the traffic to be delivered through optimized paths among the (mobile) VPN users without incurring significant extra IPSec tunnel overhead regardless of the user's locations. The proposed architecture and protocols are based on the BGP/MPLS VPN technology that is defined in RFC24547. A service provider platform entity named PPVPN Network Server (PNS) is defined in order to extend the BGP/MPLS VPN service to the mobile users. Compared to the user- and CE-based mobile VPN mechanisms, the proposed mechanism requires less overhead with respect to the IPSec tunnel management. The simulation results also show that it outperforms the existing mobile VPN mechanisms with respect to the handoff latency and/or the end-to-end packet delay.

Parathyroid Carcinoma (부갑상선암)

  • Cho Eun-Chol;Sub Jin-Hak;Chung Woong-Yun;Kim Ho-Geun;Park Cheong-Soo
    • Korean Journal of Head & Neck Oncology
    • /
    • v.17 no.2
    • /
    • pp.205-209
    • /
    • 2001
  • Purpose: Most cases of primary hyperparathyroidism are due to parathyroid adenoma or parathyroid hyperplasia. Parathyroid carcinoma is a very rare cause of hyperparathyroidism. Although the diagnosis of parathyroid carcinoma is usually established by pathologic criteria especially of vascular or capsular invasion, some clinical and biochemical features differentiate it from benign forms of hyperparathyroidism. We under-took a retrospective study in 6 patients with parathyroid carcinoma, with the aim of conveying experience from management for this rare cause of hyperparathyroidism. Methods: Clinical symptoms, biochemical laboratory, radiologic, and intraoperative findings, local recurrence and distant metastasis were analyzed in 6 patients diagnosed pathologically as a parathyroid carcinoma after operation from 1992 to 2001. Results: Mean age was 50.2 years (33.0-60.0 years) and male to female ratio was 1:1. Neck mass was found in 5 patients, multiple bone pain in 3 patients and renal stone in 1 patient. One case has suffered from chronic renal failure for 19 years. Although preoperative laboratory evaluations showed the aspects of hyperparathyroidism in all cases, mean serum calcium level was 11.2mg/dl(10.5-12.1mg/dl), slightly elevated. Laboratory values after surgery were within the normal range in 5 cases. However, in one case with chronic renal failure, serum PTH levels, serially checked, were above the normal range. Any of imaging methods failed to suggest a parathyroid carcinoma preoperatively. Parathyroid adenoma was suspected in 3 cases, thyroid cancer in the other cases before surgery. The extent of resection was radical resection of parathyroid lesion with more than unilateral thyroid lobectomy and central compartment neck node dissection and in 2 cases, the resection of recurrent laryngeal nerve or strap muscles was added. During follow-up period, any local or systemic recurrence were not evident in all the cases. Conclusion: Although parathyroid carcinoma is a rare disease and its preoperative diagnosis, in our experience, could not easily be made, the understanding of characteristic clinical and biochemical feature could help diagnosis at first surgery. Radical resection without remaining residual tumor is most important for the management of the parathyroid cancer.

  • PDF

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.