• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.051 seconds

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

Study on the Development of LED streetlight control system using GPS satellite communication and Arduino (GPS 위성통신과 아두이노를 이용한 에너지 절약형 LED 가로등 제어 시스템 개발에 관한 연구)

  • Lee, Wan-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.632-637
    • /
    • 2016
  • A streetlight control system was developed using information technology and LED lights for efficient management and energy savings. The proposed system can control the power usage of an LED streetlight luminaire using GPS satellite communication and an Arduino with a built-in microprocessor. A control circuit was designed to control the current using GPS, a control unit, transistor, resistor, and constant-current supply circuit. The circuit was validated through experiments with normal operation. Using GPS, the control system extracts accurate time and location information according to the season, and it controls the current supplied to the LED streetlight according to the extracted time. Power consumption was reduced by more than 11%. The control system could reduce accidents caused by conventional lighting systems used to save energy, and it could improve the inefficient management of energy by preserving constant brightness of a streetlight at times and in areas that have less traffic.

DSLA: Dynamic Sampling Localization Algorithm Based on Virtual Anchor Node

  • Chen, Yanru;Yan, Bingshu;Wei, Liangxiong;Guo, Min;Yin, Feng;Luo, Qian;Wang, Wei;Chen, Liangyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4940-4957
    • /
    • 2019
  • Compared with the localization methods in the static sensor networks, node localization in dynamic sensor networks is more complicated due to the mobility of the nodes. Dynamic Sampling Localization Algorithm Based on Virtual Anchor (DSLA) is proposed in this paper to localize the unknown nodes in dynamic sensor networks. Firstly, DSLA algorithm predicts the speed and movement direction of nodes to determine a sector sampling area. Secondly, a method of calculating the sampling quantity with the size of the sampling area dynamically changing is proposed in this paper. Lastly, the virtual anchor node, i.e., the unknown node that got the preliminary possible area (PLA), assists the other unknown nodes to reduce their PLAs. The last PLA is regarded as a filtering condition to filter out the conflicting sample points quickly. In this way, the filtered sample is close to its real coordinates. The simulation results show that the DSLA algorithm can greatly improve the positioning performance when ensuring the execution time is shorter and the localization coverage rate is higher. The localization error of the DSLA algorithm can be dropped to about 20%.

Image Retrieval Method Based on IPDSH and SRIP

  • Zhang, Xu;Guo, Baolong;Yan, Yunyi;Sun, Wei;Yi, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1676-1689
    • /
    • 2014
  • At present, the Content-Based Image Retrieval (CBIR) system has become a hot research topic in the computer vision field. In the CBIR system, the accurate extractions of low-level features can reduce the gaps between high-level semantics and improve retrieval precision. This paper puts forward a new retrieval method aiming at the problems of high computational complexities and low precision of global feature extraction algorithms. The establishment of the new retrieval method is on the basis of the SIFT and Harris (APISH) algorithm, and the salient region of interest points (SRIP) algorithm to satisfy users' interests in the specific targets of images. In the first place, by using the IPDSH and SRIP algorithms, we tested stable interest points and found salient regions. The interest points in the salient region were named as salient interest points. Secondary, we extracted the pseudo-Zernike moments of the salient interest points' neighborhood as the feature vectors. Finally, we calculated the similarities between query and database images. Finally, We conducted this experiment based on the Caltech-101 database. By studying the experiment, the results have shown that this new retrieval method can decrease the interference of unstable interest points in the regions of non-interests and improve the ratios of accuracy and recall.

Adjusting the Retry Limit for Congestion Control in an Overlapping Private BSS Environment

  • Park, Chang Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1881-1900
    • /
    • 2014
  • Since 802.11 wireless LANs are so widely used, it has become common for numerous access points (APs) to overlap in a region, where most of those APs are managed individually without any coordinated control. This pattern of wireless LAN usage is called the private OBSS (Overlapping Basic Service Set) environment in this paper. Due to frame collisions across BSSs, each BSS in the private OBSS environment suffers severe performance degradation. This study approaches the problem from the perspective of congestion control rather than noise or collision resolution. The retry limit, one of the 802.11 attributes, could be used for traffic control in conjunction with TCP. Reducing the retry limit causes early discard of a frame, and it has a similar effect of random early drops at a router, well known in the research area of congestion control. It makes the shared link less crowded with frames, and then the benefit of fewer collisions surpasses the penalty of less strict error recovery. As a result, the network-wide performance improves and so does the performance of each BSS eventually. Reducing the retry limit also has positive effects of merging TCP ACKs and reducing HOL-like blocking time at the AP. Extensive experiments have validated the idea that in the OBSS environment, reducing the retry limit provides better performance, which is contrary to the common wisdom. Since our strategy is basically to sacrifice error recovery for congestion control, it could yield side-effects in an environment where the cost of error recovery is high. Therefore, to be useful in general network and traffic environments, adaptability is required. To prove the feasibility of the adaptive scheme, a simple method to dynamically adjust the value of the retry limit has been proposed. Experiments have shown that this approach could provide comparable performance in unfriendly environments.

Medium Access Control Protocols for Full-Duplex Communications in WLAN Systems: Approaches and Challenges (무선랜 시스템에서 전이중 통신을 위한 MAC 프로토콜 분석)

  • Kim, Wonjung;Song, Taewon;Kim, Taeyoon;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1276-1285
    • /
    • 2015
  • Full-duplex communications have emerged as a key technology for next-generation wireless local area networks (WLANs). Although the key enabling technology for full-duplex communications is the self-interference cancellation (SIC) technique in the physical layer, the employment of full-duplex communications has huge potentials to substantially increase the throughput at the medium access control (MAC) layer. At the same time, full-duplex communications pose non-trivial challenges to the MAC protocol design. In this article, we first identify salient problems in supporting full-duplex communications in WLAN MAC protocols. After that, we survey the state-of-the art to address those problems and analyze their pros and cons. Finally, we present open research challenges to improve the effectiveness of full-duplex communications in WLANs.

Design and Implementation of DYMO Protocol Using NanoQplus in Wireless Sensor Networks (무선 센서 네트워크에서 NanoQplus를 이용한 DYMO 프로토콜 설계와 구현)

  • Oh, Su-Taek;Bae, Jang-Sik;Jeong, Hong-Jong;Kim, Dong-Kyun;Park, Jung-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4B
    • /
    • pp.184-191
    • /
    • 2008
  • NanoQplus, which is an embedded operating system for wireless sensor networks (WSNs) and developed by Electronics and Telecommunications Research Institute (ETRI), provides programmer-friendly preemptive multi-threading programming technique, but it has poor network protocol stack, as compared to TinyOS, one of the famous operating systems for WSNs. In this paper, we apply dynamic MANET on-demand routing (DYMO) protocol, which is being standardized in Internet Engineering Task Force (IETF), to NanoQplus. Since DYMO has been proposed for mobile ad-hoc networks (MANETs) and MANETs have less resource restrictions than WSNs, the basic DYMO protocol cannot be applied to WSNs without modifications. Moreover, coherence with MAC protocol should be considered in order to eliminate redundant data between MAC and network layers. Thus, we propose a modified version of the basic DYMO protocol for NanoQplus. The experimental results from a real sensor network test-bed show that the DYMO implementation using NanoQplus works efficiently in WSNs.

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

How to Derive the Autonomous Driving Function Level of Unmanned Ground Vehicles - Focusing on Defense Robots - (무인지상차량의 자율주행 기능수준 도출 방법 - 국방로봇을 중심으로 -)

  • Kim, Yull-Hui;Choi, Yong-Hoon;Kim, Jin-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.205-213
    • /
    • 2017
  • This paper is a study on the method to derive the functional level required for autonomous unmanned ground vehicle, one of the defense robots. Conventional weapon systems are not significantly affected by the operating environment, while defense robots exhibit different performance depending on the operating environment, even if they are on the same platform. If the performance of defense robot is different depending on operational environment, results of mission performance will be vary significantly. Therefore, it is necessary to clarify the level of function required by the military in order to research and develop most optimal defense robots. In this thesis, we propose a method to derive the required function level of unmanned ground vehicles, focusing on autonomous driving, one of the most vital functions of defense robots. Our results showed that the autonomous driving function depending intervention levels and evaluated functional sensitivity for autonomous driving of the unmanned vehicle using climate and topography as variables.

Simulator for Performance Analysis of Wireless Network based on Microsoft Windows Operating Systems (MS 윈도우즈 운영체제 기반의 무선 네트워크 성능 분석 시뮬레이터의 설계 및 구현)

  • Choi, Kwan-Deok;Jang, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.155-162
    • /
    • 2010
  • To ensure accurate measurements of wireless network performance, it should be collected real-time data which are transmitted between a large number of nodes in the actual network environment. Therefore, it is necessary to develop simulation tool for finding optimal network system design method such as media access control, routing technique, ad-hoc algorithm of node deployment while overcoming spatial and temporal constraints. Our research attempts to provide an improved architecture and design method of simulation tool for wireless network is an application of multi-threading technique in these issues. We finally show that usability of the proposed simulator by comparing results derived from same test environment in the wireless LAN model of our simulator and widely used network simulation package, NS-2.