• 제목/요약/키워드: Node Management

검색결과 1,132건 처리시간 0.022초

Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

구조를 고려한 CPLD 저전력 알고리즘 (A CPLD Low Power Algorithm considering the Structure)

  • 김재진
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.1-6
    • /
    • 2014
  • In this paper, we propose a CPLD low power algorithm considering the structure. The proposed algorithm is implemented CPLD circuit FC(Feasible Cluster) for generating a problem occurs when the node being split to overcome the area and power consumption can reduce the algorithm. CPLD to configure and limitations of the LE is that the number of OR-terms. FC consists of an OR node is divided into mainly as a way to reduce the power consumption with the highest number of output nodes is divided into a top priority. The highest number of output nodes with the highest number of switching nodes become a cut-point. Division of the node is the number of OR-terms of the number of OR-terms LE is greater than adding the input and output of the inverter converts the AND. Reduce the level, power consumption and area. The proposed algorithm to MCNC logic circuits by applying a synthetic benchmark experimental results of 13% compared to the number of logical blocks decreased. 8% of the power consumption results in a reduced efficiency of the algorithm represented been demonstrated.

복수최단경로의 새로운 최적해법 (A New Algorithm for K Shortest Paths Problem)

  • 장병만
    • 한국경영과학회지
    • /
    • 제26권3호
    • /
    • pp.79-94
    • /
    • 2001
  • This paper presents a new algorithm for the K shortest paths Problem which develops initial K shortest paths, and repeat to expose hidden shortest paths with dual approach and to replace the longest path in the present K paths. The initial solution comprises K shortest paths among shortest paths to traverse each arc in a Double Shortest Arborescence which is made from bidirectional Dijkstra algorithm. When a crossing node that have two or more inward arcs is found at least three time by turns in this K shortest paths, there may be some hidden paths which are shorter than present k-th path. To expose a hidden shortest path, one inward arc of this crossing node is chose by means of minimum detouring distance calculated with dual variables, and then the hidden shortest path is exposed with joining a detouring subpath from source to this inward arc and a spur of a feasible path from this crossing node to sink. If this exposed path is shorter than the k-th path, the exposed path replaces the k-th path. This algorithm requires worst case time complexity of O(Kn$^2$), and O(n$^2$) in the case k$\leq$3.

  • PDF

사회 네트워크 상의 기술 확산 경쟁에서 확산 시작 지점의 중심성에 따른 확산 경쟁의 결과 (The Effect of Diffusion Starters' Centralities on Diffusion Extent in Diffusion of Competing Innovations on a Social Network)

  • 허원창
    • 한국경영과학회지
    • /
    • 제40권4호
    • /
    • pp.107-121
    • /
    • 2015
  • Diffusion of innovation is the process in which an innovation is communicated through certain channels over time among the members of a social system. The literatures have emphasized the importance of interpersonal network influences on individuals in convincing them to adopt innovations and thereby promoting its diffusion. In particular, the behavior of opinion leaders who lead in influencing others' opinion is important in determining the rate of adoption of innovation in a system. Centrality has been recognized as a good indicator that quantifies a node's influences on others in a given network. However, recent studies have questioned its relevance on various different types of diffusion processes. In this regard, this study aims at examining the effect of a node exhibiting high centrality on expediting diffusion of innovations. In particular, we considered the situation where two innovations compete with each other to be adopted by potential adopters who are personally connected with each other. In order to analyze this competitive diffusion process, we developed a simulation model and conducted regression analyses on the outcomes of the simulations performed. The results suggest that the effect of a node with high centrality can be substantially reduced depending upon the type of a network structure or the adoption thresholds of potential adopters in a network.

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • 제33권5호
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

전술데이터링크 네트워크에서의 노드 이탈 관리 기법 (A Node Management Scheme in Tactical Data Link Network)

  • 안광호;이주형;조준영;오혁준
    • 한국통신학회논문지
    • /
    • 제36권4B호
    • /
    • pp.386-390
    • /
    • 2011
  • 현대전은 플랫폼 기반의 전장(PCW: Platform Centric Warfare)에서 네트워크 기반의 전장(NCW: Network Centric Warfare)으로 변화하고 있다. 네트워크 기반의 전장으로 변화하면서 네트워크 운용 및 관리의 중요성이 높아지고 있다. 본 논문은 군사용 우선 네트워크에서의 노드 이탈 관리 기법을 제안한다. 군사용 무선 네트워크는 노드의 네트워크 가입, 탈퇴가 비교적 자유로운 특징을 갖는다. 이러한 특징은 네트워크 가용성을 저해하는 요인이 될 수 있다. 일반 노드의 네트워크 이탈 상황에서 발생하는 가용성 저해요인을 파악하고, 이에 대해 RSSI(Received Signal Strength Indication)를 이용한 네트워크 탈퇴 예측 방법을 이용한 기법을 제시한다. 마지막으로 모의실험을 통해 측정 RSSI 신호 시간 간격에 따른 예측 성공률을 확인한다.

Packet Traffic Management in Wearable Health Shirt by Irregular Activity Analysis on Sensor Node

  • ;정상중;신형섭;정완영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 춘계학술대회
    • /
    • pp.233-236
    • /
    • 2010
  • This paper describes the packet traffic management of the Ubiquitous Healthcare System. In this system, ECG signal and accelerometer signal is transmitted from a wearable health shirt (WHS) to the base station. However, with the increment of users in this system, traffic over-load issue occurs. The main aim of this paper is to reduce the traffic over-load issue between sensor nodes by only transmitting the required signals to the base station when irregular activities are observed. In order to achieve this, in-network processing is adapted where the process of observation is conducted inside the sensor node of WHS. Results shows that irregular activities such as fall can be detected on real-time inside the sensor node and thus resolves traffic over-load issue.

  • PDF

무선 비디오 센서 네트워크에서 스케일러블 비디오 전송을 위한 계층 기반 협업 중계 알고리즘* (Layer based Cooperative Relaying Algorithm for Scalable Video Transmission over Wireless Video Sensor Networks)

  • 하호진
    • 디지털산업정보학회논문지
    • /
    • 제18권4호
    • /
    • pp.13-21
    • /
    • 2022
  • Recently, in wireless video sensor networks(WVSN), various schemes for efficient video data transmission have been studied. In this paper, a layer based cooperative relaying(LCR) algorithm is proposed for minimizing scalable video transmission distortion from packet loss in WVSN. The proposed LCR algorithm consists of two modules. In the first step, a parameter based error propagation metric is proposed to predict the effect of each scalable layer on video quality degradation at low complexity. In the second step, a layer-based cooperative relay algorithm is proposed to minimize distortion due to packet loss using the proposed error propagation metric and channel information of the video sensor node and relay node. In the experiment, the proposed algorithm showed that the improvement of peak signal-to-noise ratio (PSNR) in various channel environments, compared to the previous algorithm(Energy based Cooperative Relaying, ECR) without considering the metric of error propagation.The proposed LCR algorithm minimizes video quality degradation from packet loss using both the channel information of relaying node and the amount of layer based error propagation in scalable video.

Access Grid 기반구조에서 Hybrid P2P Computing 기법을 이용한 Node의 컨텐츠 관리 (The Contents management of Access Grid Node using Hybrid P2P Computing)

  • 홍필두;이용우
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2004년도 가을 학술발표논문집 Vol.31 No.2 (1)
    • /
    • pp.40-42
    • /
    • 2004
  • Access Grid는 상호공동작업을 위하여 대용량의 컨텐츠 파일들을 주고받으며 공유한다. 특별히 중앙의 집중된 관리서버가 없는 Access Grid환경에서는 컨텐츠의 위치추적의 어려움, 부재, 병목 등의 현상이 발생하는데 이를 본 논문에서 1. 중앙 Hybrid서버의 구현 2. 집중컨텐츠의 거점노드복제 3. 중요컨텐츠의 24시간 공유보장 등의 기법으로 해결방안을 제안하였다. 그리고 이에 대한 효율성을 시뮬레이션 자료로 증명하였다.

  • PDF

Management of Complications During Video-Assisted Thoracic Surgery Lung Resection and Lymph Node Dissection

  • Choi, Yong Soo
    • Journal of Chest Surgery
    • /
    • 제54권4호
    • /
    • pp.263-265
    • /
    • 2021
  • Intraoperative events can occur during video-assisted thoracoscopic surgery (VATS) lobectomy due to unfavorable surgical anatomy, such as dense adhesions or calcifications around the pulmonary arteries. Troubleshooting intraoperative complications is essential for performing safe and successful VATS pulmonary resection and lymph node dissection. If continuous bleeding occurs or VATS does not proceed despite all measures, conversion to open thoracotomy should not be delayed.