• 제목/요약/키워드: Random Access Control

검색결과 156건 처리시간 0.028초

산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구 (A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System)

  • 강명조;김미희
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제11권5호
    • /
    • pp.147-156
    • /
    • 2022
  • 다양한 산업을 관리하고 유지하는 산업제어시스템은 주로 외부와의 연결 없이 폐쇄적으로 운영됐지만 최근 인터넷의 발전과 ICT 기술의 도입으로 외부나 공격자의 산업제어시스템에 접근이 쉬워졌다. 잘못된 접근이나 공격은 산업제어시스템의 주요 속성인 가용성을 해칠 수 있으며, 가용성이 침해될 경우 큰 피해가 발생할 수 있다. 본 논문에서는 산업제어시스템에서 명령을 내릴 때 랜덤리스트를 생성해 검증그룹을 구성하여 명령을 검증 후 실행하며, 명령 실행 결과를 이용해 검증을 진행한 검증그룹에 피드백을 적용하는 신뢰 점수 기법을 도입한다. 이를 통해 명령 검증 요청과정에서 랜덤 생성에 발생하는 오버헤드를 줄일 수 있으며, 검증 과정에 유연성을 부여하고 시스템의 가용성을 보장할 수 있다. 시스템의 성능 분석을 위해 스마트 계약 배포 시 걸리는 시간과 가스 사용량, 명령 검증 시 가스 사용량을 측정했다. 그 결과, 기존시스템과 비교해 랜덤리스트를 생성하지만, 스마트 계약 배포에 걸리는 시간은 거의 차이가 없음을 확인했고 스마트 계약 배포에 사용되는 가스는 랜덤리스트 생성과정에서 약 1.4배 증가함을 확인했다. 하지만, 명령 검증 과정에서 명령 검증과 신뢰 점수 기법의 연산을 함께 진행함에도 랜덤 연산을 하지 않아 검증 1회당 약 9% 적은 가스를 사용해 검증 과정에 가용성을 보장한다.

Throughput Analysis of CSMA/CA-based Cognitive Radio Networks in Idle Periods

  • Wang, Hanho;Hong, Daesik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권4호
    • /
    • pp.173-180
    • /
    • 2014
  • Random access protocols feature inherent sensing functionality and distributed coordination, making them suitable for cognitive radio communication environments, where secondary users must detect the white space of the primary spectrum and utilize the idle primary spectrum efficiently without centralized control. These characteristics have led to the adoption of carrier-sensing-multiple-access/collision-avoidance (CSMA/CA) in cognitive radio. This paper proposes a new analytical framework for evaluating the performance of a CSMA/CA protocol that considers the characteristics of idle periods based on the primary traffic behavior in cognitive radio systems. In particular, the CSMA/CA-based secondary network was analyzed in the terms of idle period utilization, which is the average effective data transmission time portion in an idle period. The use of the idle period was maximized by taking its statistical features into consideration.

A Simulation Study on Queueing Delay Performance of Slotted ALOHA under Time-Correlated Channels

  • Yoora Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권3호
    • /
    • pp.43-51
    • /
    • 2023
  • Slotted ALOHA (S-ALOHA) is a classical medium access control protocol widely used in multiple access communication networks, supporting distributed random access without the need for a central controller. Although stability and delay have been extensively studied in existing works, most of these studies have assumed ideal channel conditions or independent fading, and the impact of time-correlated wireless channels has been less addressed. In this paper, we investigate the queueing delay performance in S-ALOHA networks under time-correlated channel conditions by utilizing a Gilbert-Elliott model. Through simulation studies, we demonstrate how temporal correlation in the wireless channel affects the queueing delay performance. We find that stronger temporal correlation leads to increased variability in queue length, a larger probability of having queue overflows, and higher congestion levels in the S-ALOHA network. Consequently, there is an increase in the average queueing delay, even under a light traffic load. With these findings, we provide valuable insights into the queueing delay performance of S-ALOHA networks, supplementing the existing understanding of delay in S-ALOHA networks.

An SS_RRA Protocol for Integrated Voice/Data Services in Packet Radio Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제5권2호
    • /
    • pp.88-92
    • /
    • 2007
  • In this paper, an SS-RRA protocol that is based on Code Division Multiple Access is proposed and analyzed under the integrated voice and data traffic load. The backward logical channels consist of slotted time division frames with multiple spreading codes per slot. The protocol uses a reservation mechanism for the voice traffic, and a random access scheme for the data traffic. A discrete-time, discrete-state Markov chain is used to evaluate the performance. The numerical results show that the performance can be significantly improved by a few distinct spreading codes.

Fine Seek Control of Extended Applicable Range for Optical Disk Drives

  • Ryoo, Jung-Rae;Jin, Kyoung-Bog;Doh, Tae-Young;Chung, Myung-Jin
    • Transactions on Control, Automation and Systems Engineering
    • /
    • 제3권3호
    • /
    • pp.146-151
    • /
    • 2001
  • Optical disk drive has excellent advantage of random accessibility of which performance is measured by access time. However, due to the increased rotational velocity of the disk and constraints of mechanical structure, two-stage seek algorithm which executes coarse and fine seeks sequentially has been adopted in most commercial optical disk drives. Although the laser spot is moved to a target track by a single seek operation, the limited operation range of the fine actuator restricts the application of the fine seek algorithm below a few hundreds of tracks. Especially, excessive movement of the objective lens causes a failure in generation of track-cross pulse and results in an unstable seek operation. In this paper, a new control algorithm for extending the fine seek range is proposed with an appropriate control structure. The coarse actuator is utilized to reduce the misalignment between the objective lens and the laser beam axis, and the fine actuator is controlled to follow the reference velocity trajectory. The proposed algorithm is applied to a CD-ROM drive to show its feasibility and some experimental results are presented.

  • PDF

Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic

  • Sui, Nannan;Wang, Cong;Xie, Wei;Xu, Youyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.687-708
    • /
    • 2017
  • The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint. Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when ${\lambda}_1:{\lambda}_2=1:1$and by at least 20.53% when ${\lambda}_1:{\lambda}_2=10:1$, where ${\lambda}_1,{\lambda}_2$ are traffic arrival rates of M2M and H2H traffic, respectively.

프레임 구조를 갖는 무선 매체접속제어 프로토콜 상에서 퍼지 기반의 음성/데이터 통합 임의접속제어기 설계 및 성능 분석 (Design and Performance evaluation of Fuzzy-based Framed Random Access Controller ($F^2RAC$) for the Integration of Voice ad Data over Wireless Medium Access Control Protocol)

  • 홍승은;최원석;김응배;강충구;임묘택
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(1)
    • /
    • pp.189-192
    • /
    • 2000
  • This paper proposes a fuzzy-based random access controller with a superimposed frame structure (F$^2$RAC) fur voice/data-integrated wireless networks. F$^2$RAC adopts mini-slot technique for reducing contention cost, and these mini-slots of which number may dynamically vary from one frame to the next as a function of the traffic load are further partitioned into two regions for access requests coming from voice and data traffic with their respective QoS requirements. And F$^2$RAC is designed to properly determine the access regions and permission probabilities for enhancing the data packet delay while ensuring the voice packet dropping probability constraint. It mainly consists of the estimator with Pseudo-Bayesian algorithm and fuzzy logic controller with Sugeno-type of fuzzy rules. Simulation results prove that F$^2$RAC can guarantee QoS requirement of voice and provide the highest throughput efficiency and the smallest data packet delay amongst the different alternatives including PRMA[1], IPRMA[2], and SIR[3].

  • PDF

NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • 대한수학회보
    • /
    • 제46권4호
    • /
    • pp.743-769
    • /
    • 2009
  • An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first noninteractive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

As2Se3 기반 Resistive Random Access Memory의 채널 직선화를 통한 신뢰성 향상 (Improving the Reliability by Straight Channel of As2Se3-based Resistive Random Access Memory)

  • 남기현;김충혁
    • 한국전기전자재료학회논문지
    • /
    • 제29권6호
    • /
    • pp.327-331
    • /
    • 2016
  • Resistive random access memory (ReRAM) of metallic conduction channel mechanism is based on the electrochemical control of metal in solid electrolyte thin film. Amorphous chalcogenide materials have the solid electrolyte characteristic and optical reactivity at the same time. The optical reactivity has been used to improve the memory switching characteristics of the amorphous $As_2Se_3$-based ReRAM. This study focuses on the formation of holographic lattices patterns in the amorphous $As_2Se_3$ thin film for straight conductive channel. The optical parameters of amorphous $As_2Se_3$ thin film which is a refractive index and extinction coefficient was taken by n&k thin film analyzer. He-Cd laser (wavelength: 325 nm) was selected based on these basic optical parameters. The straighten conduction channel was formed by holographic lithography method using He-Cd laser.$ Ag^+$ ions that photo-diffused periodically by holographic lithography method will be the role of straight channel patterns. The fabricated ReRAM operated more less voltage and indicated better reliability.

HIPERLAN Type 2에서 Split 알고리즘에 기반한 랜덤채널 할당 기법 (Random Channel Allocation Scheme Based on Split Algorithm in HIPERLAN 2)

  • 황의석;고유창;이승규;윤철식;이형우;조충호
    • 한국통신학회논문지
    • /
    • 제28권9A호
    • /
    • pp.717-727
    • /
    • 2003
  • HIPERLAN/2(HIgh PERformance Local Area Network Type2)에서의 MAC 프로토콜은 TDMA/TDD에 기반을 두고 있으며 무선 채널은 Access Point(AP)에 의해서 할당되어진다. 상위 방향의 데이터 전송이 필요한 단말은 랜덤채널(RCH)을 통하여 AP에게 자원을 요청하게 된다. 각 MAC 프레임마다 RCH 수는 변경될 수 있는데, 이때 필요 이상의 RCH 수는 무선 채널의 낭비를 초래하게 된다. 또한 필요 이하의 RCH 수는 단말들간의 충돌을 야기하여 단말들이 AP에 접속하는 시간을 지연시킬 수 있다. 따라서 RCH 수는 트래픽 양에 따라 적절히 변화되는 것이 바람직하다. 본 논문에서는 Split 알고리즘에 기반을 두어 RCH 수를 제어하는 기법을 제안하였다. 제안된 기법에 대하여 시뮬레이션 및 수학적 분석 모델을 통하여 고정된 수의 RCH를 사용하는 방식과 기존에 제안된 방식에 비하여 처리율, 지연 및 지연에 대한 분산에서 성능이 향상됨을 보여준다.