• Title/Summary/Keyword: Protocol-Based Approach

검색결과 435건 처리시간 0.025초

만성질환 예방을 위한 맞춤형 건강관리 서비스의 접근전략과 발전방향 (Strategies to approach the customized health management service to prevent chronic diseases)

  • 김영복
    • 보건교육건강증진학회지
    • /
    • 제33권4호
    • /
    • pp.89-100
    • /
    • 2016
  • Objectives: Life style modification leads to decrease health risk and change of health status for person at health risk. This study aimed to suggest essential components and effective strategies for customized health management service to provide individual and risk group in public and private health care organizations. Methods: To systematic review the essential component of health management service, I performed to collect political legislation, research papers, reports, publication and public release for heath management service from 2008 to 2016. Essential components of heath management service were service scope, service design, organizations and applied technology. Results: Service cope was composed of health risk factors, such as smoking, drinking, nutrition, physical activity and weight control. Main strategies were customized health management services, personalized behavior modification programs, evidence-based service protocol, utilization of information and communications technology (ICT), multi-dimension and multi-level approach, and public and private organizations partnership through health policies and health care system. Conclusions: To make the most of the limited resources, it should require a systematic approach that focuses on continuous monitoring and partnership of health management service.

Optimizing Energy Efficiency in Mobile Ad Hoc Networks: An Intelligent Multi-Objective Routing Approach

  • Sun Beibei
    • 대한임베디드공학회논문지
    • /
    • 제19권2호
    • /
    • pp.107-114
    • /
    • 2024
  • Mobile ad hoc networks represent self-configuring networks of mobile devices that communicate without relying on a fixed infrastructure. However, traditional routing protocols in such networks encounter challenges in selecting efficient and reliable routes due to dynamic nature of these networks caused by unpredictable mobility of nodes. This often results in a failure to meet the low-delay and low-energy consumption requirements crucial for such networks. In order to overcome such challenges, our paper introduces a novel multi-objective and adaptive routing scheme based on the Q-learning reinforcement learning algorithm. The proposed routing scheme dynamically adjusts itself based on measured network states, such as traffic congestion and mobility. The proposed approach utilizes Q-learning to select routes in a decentralized manner, considering factors like energy consumption, load balancing, and the selection of stable links. We present a formulation of the multi-objective optimization problem and discuss adaptive adjustments of the Q-learning parameters to handle the dynamic nature of the network. To speed up the learning process, our scheme incorporates informative shaped rewards, providing additional guidance to the learning agents for better solutions. Implemented on the widely-used AODV routing protocol, our proposed approaches demonstrate better performance in terms of energy efficiency and improved message delivery delay, even in highly dynamic network environments, when compared to the traditional AODV. These findings show the potential of leveraging reinforcement learning for efficient routing in ad hoc networks, making the way for future advancements in the field of mobile ad hoc networking.

온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구 (A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment)

  • 이양선;박상오
    • 한국항행학회논문지
    • /
    • 제15권4호
    • /
    • pp.664-671
    • /
    • 2011
  • IT 기술의 발전과 네트워크의 비약적인 발전에 따라 온라인 게임 환경에서 유선 네트워크와 무선 네트워크의 경계가 사라지고 유 무선 통합 서비스 환경이 도래되고 있다. 그러나 유 무선 통합 서비스 환경에 적합한 보안 기술은 아직 미비한 실정이며, 유 무선 통합 환경의 특성으로 인해 유선 네트워크에서의 보안 위협뿐만 아니라 무선 네트워크에서의 보안 위협까지 고려해야 한다. 따라서 유 무선 통합 환경을 고려한 다양한 연구가 진행되어 왔으며, 그 중 유 무선 환경을 고려한 경량화된 ID 기반 인증 및 키 관리 연구가 진행되었다. 최근 Moon 등은 퍼베시브 환경에서 인증 및 ID 기반 키 관리 프로토콜을 제안하였다. 그러나, Moon 등의 방식은 ID 기반 공개키 방식을 사용하여 연산량을 줄였으나 Pairing 기법을 사용함으로써 기존 공개키 방식과 유사한 연산량을 나타내고 있다. 따라서 본 연구는 Moon 등의 방식에서의 보안 취약점을 분석한다.

무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜 (Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks)

  • ;이경석;박승규
    • 정보처리학회논문지C
    • /
    • 제18C권5호
    • /
    • pp.303-316
    • /
    • 2011
  • 데이터 병합은 무선 센서 네트워크의 주요 기술이지만 다수의 보안 문제를 유발할 수 있으며, 이들 가운데 하나가 데이터 병합 과정 중의 compromised node에 의한 허위 데이터 삽입이나 메시지 누락이다. 이 문제에 대한 대부분의 기존 해결책은 암호화에 의존하고 있는데, 이들은 많은 연산량과 통신 부하를 필요로 한다. 이와 같은 요구 조건에도 불구하고 기존 방법들은 공격 노드의 탐지가 아닌 공격의 확인 기능만을 가진다. 이러한 제약 사항은 공격이 반복적으로 발생하는 경우, 센서 노드의 에너지 낭비를 유발한다. 비록 기존의 한 연구에서 허위 데이터 삽입점을 식별하는 기능을 제공하고 있지만, 이 방법은 전체 노드 중 최대 50%의 노드만이 데이터 전송에 참여하는 단점을 가진다. 따라서 공격자 확인이 가능할 뿐만 아니라, 동시에 데이터 전송에 참여하는 노드의 수를 증가시킬 수 있는 새로운 접근 방법이 요구된다. 본 논문에서는 허위 데이터 삽입 혹은 메시지 누락을 수행하는 compromised aggregator에 대한 대응을 위해 모니터링 기반 시큐어 데이터 병합 프로토콜을 제안한다. 제안된 프로토콜은 크게 병합 트리 작성과 시큐어 데이터 병합으로 구성되는데, 시큐어 데이터 병합에는 모니터링을 기반으로 하는 비정상 데이터 삽입 탐지와 최소한의 암호화 기법이 사용된다. 시뮬레이션 결과에 따르면 제안된 프로토콜은 데이터 전송에 참여하는 노드의 수를 95% 수준으로 증가시키는 동시에, 허위 데이터 삽입 혹은 메시지 누락을 수행하는 compromised node의 탐지가 가능한 것으로 확인되었다. 한편 제안된 프로토콜에서 compromised node를 추적하는데 요구하는 통신 오버헤드는 전체 노드의 수가 n일 때, O(n)으로 기존 연구보다 우수하거나 유사한 수준을 가진다.

Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew

  • Aoki, Makoto;Oki, Eiji;Rojas-Cessa, Roberto
    • ETRI Journal
    • /
    • 제32권6호
    • /
    • pp.854-862
    • /
    • 2010
  • One-way delay variation (OWDV) has become increasingly of interest to researchers as a way to evaluate network state and service quality, especially for real-time and streaming services such as voice-over-Internet-protocol (VoIP) and video. Many schemes for OWDV measurement require clock synchronization through the global-positioning system (GPS) or network time protocol. In clock-synchronized approaches, the accuracy of OWDV measurement depends on the accuracy of the clock synchronization. GPS provides highly accurate clock synchronization. However, the deployment of GPS on legacy network equipment might be slow and costly. This paper proposes a method for measuring OWDV that dispenses with clock synchronization. The clock synchronization problem is mainly caused by clock skew. The proposed approach is based on the measurement of inter-packet delay and accumulated OWDV. This paper shows the performance of the proposed scheme via simulations and through experiments in a VoIP network. The presented simulation and measurement results indicate that clock skew can be efficiently measured and removed and that OWDV can be measured without requiring clock synchronization.

유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계 (A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment)

  • 전영준;최용식;신승호;박상민
    • 대한안전경영과학회지
    • /
    • 제8권6호
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Delivering IPTV Service over a Virtual Network: A Study on Virtual Network Topology

  • Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Journal of Communications and Networks
    • /
    • 제14권3호
    • /
    • pp.319-335
    • /
    • 2012
  • In this study, we design an applicable model enabling internet protocol television (IPTV) service providers to use a virtual network (VN) for IPTV service delivery. The model addresses the guaranteed service delivery, cost effectiveness, flexible control, and scalable network infrastructure limitations of backbone or IP overlay-based content networks. There are two major challenges involved in this research: i) The design of an efficient, cost effective, and reliable virtual network topology (VNT) for IPTV service delivery and the handling of a VN allocation failure by infrastructure providers (InPs) and ii) the proper approach to reduce the cost of VNT recontruction and reallocation caused by VNT allocation failure. Therefore, in this study, we design a more reliable virtual network topology for solving a single virtual node, virtual link, or video server failure. We develop a novel optimization objective and an efficient VN construction algorithm for building the proposed topology. In addition, we address the VN allocation failure problem by proposing VNT decomposition and reconstruction algorithms. Various simulations are conducted to verify the effectiveness of the proposed VNT, as well as that of the associated construction, decomposition, and reconstruction algorithms in terms of reliability and efficiency. The simulation results are compared with the findings of existing works, and an improvement in performance is observed.

인터넷 거버넌스와 전문성의 정치 (Internet Governance & Politics of Expertise)

  • 김지연
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.5-20
    • /
    • 2013
  • ICANN has been governing the Domain Name System(DNS) "technically" since 1998. The architecture is called Internet Governance, and it brings about many different discourses; "What does that govern?", "Who delegate its role to ICANN?"," How could the regime ensure fairness?" etc. This article will analyze on Internet Governance by applying the government approach of Foucault, and try to compare two parts, the 'core' and the 'edge' of Internet Governance for method. Whereas the 'core' of it refers the site that be governed by the formal contract directly, the 'edge' as the rest of it means informal friendly relations with ICANN. The 'core' rule was stemmed from technological community such as IAB or IETF historically. They had invented new world and its population to integrate the technical order as protocol and the semiotic order as language, that be based on new government mode. On the other hand, ".KR" domain, one of the 'edges', has been evolved into more heterogeneous system, through contest and conflict between traditional state and Internet Governance. The governed object of ".KR" domain is situated in the crossing of each other the 'protocol user', the 'language-semiotic user' and the' geographical resident'. Here the 'geographical resident' rule was weird for DNS, so that shows the internal lack of Internet Governance. It needs to move to the concept of 'Hangeul(Korean-language) user' rather than the 'geographical resident'.

  • PDF

Cross-Layer Reduction of Wireless Network Card Idle Time to Optimize Energy Consumption of Pull Thin Client Protocols

  • Simoens, Pieter;Ali, Farhan Azmat;Vankeirsbilck, Bert;Deboosere, Lien;Turck, Filip De;Dhoedt, Bart;Demeester, Piet;Torrea-Duran, Rodolfo;Perre, Liesbet Van der;Dejonghe, Antoine
    • Journal of Communications and Networks
    • /
    • 제14권1호
    • /
    • pp.75-90
    • /
    • 2012
  • Thin client computing trades local processing for network bandwidth consumption by offloading application logic to remote servers. User input and display updates are exchanged between client and server through a thin client protocol. On wireless devices, the thin client protocol traffic can lead to a significantly higher power consumption of the radio interface. In this article, a cross-layer framework is presented that transitions the wireless network interface card (WNIC) to the energy-conserving sleep mode when no traffic from the server is expected. The approach is validated for different wireless channel conditions, such as path loss and available bandwidth, as well as for different network roundtrip time values. Using this cross-layer algorithm for sample scenario with a remote text editor, and through experiments based on actual user traces, a reduction of the WNIC energy consumption of up to 36.82% is obtained, without degrading the application's reactivity.

모바일 기기를 위한 안전한 유비쿼터스 스토리지 시스템 (A Secure Ubiquitous Storage System for Mobile Devices)

  • 태유슈;이은유;이훈재;임효택
    • 한국정보통신학회논문지
    • /
    • 제12권2호
    • /
    • pp.269-275
    • /
    • 2008
  • 최근 유비쿼터스 기술의 급속한 성장으로 모바일 컴퓨팅 분야에서의 스토리지 용량에 대한 요구가 증가하였다. 가상 스토리지 프로토콜인 iSCSI(Internet Small Computer Interface)는 이러한 문제를 효율적으로 해결하기 위한 방안이 될 수 있다. 그러나, 이 프로토콜의 불안전한 특성은 스토리지 시스템을 불안하고 외부에 노출되게 할 우려가 있다. 따라서, 본 논문에서는 모바일 기기를 위한 안전하고도 가벼운 iSCSI 기반의 가상 스토리지 스킴을 설계하고 제안하고자 한다. 성능평가를 통해 제안된 알고리즘은 기존의 IPsec보다 100% 읽기/쓰기 성능개선을 보여주고 있다.