• Title/Summary/Keyword: Protection Mechanism

Search Result 712, Processing Time 0.025 seconds

Protection and restoration path calculation method in T-SDN (Transport SDN) based on multiple ring-mesh topology (다중링-메시 토폴로지 기반 T-SDN(Transport SDN)에서 보호·복구 경로 계산 방식)

  • Hyuncheol Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.3-8
    • /
    • 2023
  • Multi-domain optical transport networks are not fundamentally interoperable and require an integrated orchestration mechanism and path provision mechanism at the entire network level. In addition, ensuring network survivability is one of the important issues. MPLS-TP (Multi-Protocol Label Switching-Transport Profile) defines various protection/recovery methods as standards, but does not mention how to calculate and select protection/recovery paths. Therefore, an algorithm that minimizes protection/recovery collisions at the optical circuit packet integrated network level and calculates and sets a path that can be rapidly protected/recovered over the entire integrated network area is required. In this paper, we proposed an algorithm that calculates and sets up a path that can be rapidly protected and restored in a T-SDN network composed of multiple ring-mesh topology.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

A study on the reaction mechanism on the harmful gases related to the human physiology caused by fire and panic phenomenon(II) (화재발생시의 유해가스의 반응 메카니즘과 패닉현상(II))

  • Yoon, Moung-Hoon;Lee, Jae-Won;Kwon, Young-Jin
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.502-506
    • /
    • 2008
  • Smoke composed of harmful gases such as carbon monocide and carbon dioxide is reconized as the major killer in fire situation. Especailly it is said that smoke movement is related to the panic phenomenon which threatens the life seriously. The purpose of this study is to investgate and analyse the reaction mechanism of harmful gas caused by fire effects on the human psychology and panic phenomenon.

  • PDF

Study on Museum Digital Exhibition Mode and Industrialization of Intangible Cultural Heritage

  • Bai, Jian-Song;Boo, Jong-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.129-134
    • /
    • 2011
  • Nowadays, most of exhibits are material antiquities while the exhibit of intangible cultural heritage is deficient and the form is less advanced which cannot meet the exhibition needs of digital times. This has resulted in insufficient display of intangible heritage's value which may not facilitate inherit and protection of intangible heritage, no other than protection mechanism of forming healthy industrialization. This article has established digital exhibition mode in museum about intangible cultural heritage by analysis on current museum and using mobile communication and augmented reality techniques. Discuss the mode in the layer integrating creative industry and mobile industry and provide practicable reference project of forming the healthy industrialization mechanism for protecting intangible heritage.

Contents Protection Method usign White Box Cryptography (화이트박스 암호를 이용한 콘텐츠 보호 방법)

  • Lee, Yun-Kyung;Kim, Sin-Hyo;Mun, Hye-Ran;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.627-628
    • /
    • 2010
  • S. Chow proposes white-box cryptography mechanism of AES algorithm(WBC-AES) in 2002. WBC mechanism is implementation method which is resistant to white-box attack. We describe the WBC-AES and contents protection method using it.

  • PDF

Fracture Mechanism of Ceramic/Glass-fiber-reinforced-composites Laminate by High Velocity Impact (세라믹/유리섬유강화복합재 적층판의 고속충돌에 의한 파괴거동)

  • Jung Woo-Kyun;Lee Woo-Il;Kim Hee-Jae;Kwon Jeong-Won;Ahn Sung-Hoon
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.5 s.182
    • /
    • pp.170-176
    • /
    • 2006
  • Multi-layered laminate made of ceramic/composite have been developed to prevent penetration by high velocity impact. In this study, three-layered plates consisted of 1) cover layer (glass fiber reinforced polymer), 2) $Al_{2}O_{3}$, ceramic plate, and 3) backing plate (glass fiber reinforced polymer) were fabricated with various conditions and tested for their ballistic protection characteristic. The ceramic composite laminates, with thin backing plate, were completely penetrated by armor piercing projectile. The plate with inserted rubber between ceramic and backing plate showed excellent ballistic protection, though completely penetrated by the second shoot.

Layered Access Control Mechanism using Hybrid-based Method for SVC Media Transmission (SVC 미디어의 전송을 위한 하이브리드 방식의 계층별 접근제어 메커니즘)

  • Kwon, Hyeok-Chan;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.47-54
    • /
    • 2011
  • To protect SVC(Scalable Video Coding) media, the encryption mechanism need to consider two fundamental issues; First, What is to be encrypted? Second, When encryption is performed with respect to compression? In this paper, we analyze the several encryption approaches with regard to the above issue. And we propose hybrid-based protection mechanism. This mechanism ensures the media scalability, layered access control and reuse protected content. In this experiment the proposed mechanism generates under 3% security overhead against standard scalable video coding.

A new Fast Recovery Scheme for Resiliency of Attacked Resilient Packet Ring(RPR) (공격받은 IEEE802.17 Resilient Packet Ring(RPR) 망의 Resiliency를 위한 신속한 망 복원방안)

  • Lee, Young-Joo;Koo, Do-Jung
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.57-62
    • /
    • 2008
  • In this paper, we suggest new fast recovery mechanism in RPR network, in case of node addition or removing by exterior attack. A RPR network recovery time is consist of two. Failure detecting time and reporting time are that. In this paper we propose fast recovery mechanism that can reduce each time. In a Legacy recovery mechanism, To report node's state, rpr node transmit protection messages. But interval of this protection messages increase exponentially. Thus A transmission failure of protection message cause delay of reporting of network state. Therefore we propose new node state reporting mechanism that put a node state in type b fairness message. And We also suggest fast failure detecting mechanism.

  • PDF

License Distribution Mechanism for the Rights Sharing Between Consumers

  • Liu, Zong-Hua;Lee, Byung-Wook;Han, Myung-Mook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.981-984
    • /
    • 2007
  • Most existing DRM systems give too much power to rights holders and have not concerned the requirements of the consumers. In this paper, we propose a mechanism for license distribution that considers the distribution of rights between consumers. we describe the protection of digital content in two digital licenses, formal license and peer license. Also we propose an extending mechanism to control the distribution of rights between consumers. For this mechanism, we define it by extending the ODRL model in the end.

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF