• 제목/요약/키워드: Resource Access Control

검색결과 226건 처리시간 0.024초

무선 ATM LAN 시스템에서 이동 단말에 의한 핸드오버 제어 기법 (Handover Control Scheme Initiated by the Mobile Terminal in Wireless ATM LAN System)

  • 박남훈;김영선;최준균;감상하
    • 한국정보처리학회논문지
    • /
    • 제7권4호
    • /
    • pp.1236-1245
    • /
    • 2000
  • This paper propose a novel scheme, called Mobiel Terminal Initiated Scheme(MTIS), in which mobile terminal initiates the backward handover by sending handover request message with the list of target radio ports. In this scheme, the old ATM switch suporting end-user mobility, denoted by EMAS\ulcorner, checks whether each EMAS\ulcorner, managing the target radio port, has its available resources. If it has, the EMAS\ulcorner performs the path rerouting between CrossOver Switch (COS) and itself after deciding the most suitable target radio port. Therefore, the MT initiates the handover after deciding the most suitable target radio port through the beacon signal of Wireless Access Point (WAP). The EMAS\ulcorner have only to check the resource availability of the target radio port. It is no need to waste time to decide the suitable target radio port. Also, once receiving the request of the resource availability, the EMAS\ulcorner can reduce the rerouting delay time due to perform the path rerouting to the COS. In comparison with that of the ATM-Forum procedure, our proposed MTIS handover delay time reduced 14~21%, and end-to-end transfer delay time reduced 2~9%, as a result of the simulation.

  • PDF

IMT-2000에서 다양한 서비스를 제공하기 위한 채널 액세스 방식 연구 (A Study on the Access Control Mechanism for Supporting Multiple Classes of Service in the IMT-2000)

  • 이광제;정진욱;규희삼;원영진
    • 대한전자공학회논문지TE
    • /
    • 제37권1호
    • /
    • pp.42-49
    • /
    • 2000
  • 멀티미디어 특성을 갖는 IMT-2000(International Mobile Telecommunication-2000) 환경하에서 한정된 무선 자원을 가지고 다양한 형태의 서비스를 요구 품질 수준으로 처리하기 위해서는 무선 자원의 효율적 관리가 필수적 요소이다. 무선 자원의 효율적 이용 측면에서 가장 중요한 사항은 채널 액세스 기법과 할당된 채널의 액세스 제어 문제일 것이다. 어떤 채널 액세스 기법을 사용하느냐에 따라 시스템의 처리능력 (Capacity), 사용자 서비스 품질(Quality Of Service)등이 차별화 되기 때문에 이의 적절한 선택은 매우 중요한 문제로 대두되고 있다. 따라서, 본 논문에서는 사용자들의 요구 QOS 보장과 제한된 채널 사용의 극대화라는 두 가지 상반된 목표를 달성하기 위해 Multiservice 환경하의 채널 액세스 방법과 채널 할당 시 고려되어야 할 여러 가지 변수들을 체계적으로 살펴보고, 기존 제안된 방식들의 장단점 비교를 통해 기존의 방식들에 대한 개선안을 제시한다.

  • PDF

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

저비용, 저전력 카메라 폰 구현을 위한 하드웨어 자원 공유가 가능한 카메라 제어 프로세서의 설계 (Design of a Hardware Resource Sharable Camera Control Processor for Low-Cost and Low-Power Camera Cell Phones)

  • 임규삼;백광현;김석기
    • 대한전자공학회논문지SD
    • /
    • 제47권3호
    • /
    • pp.35-40
    • /
    • 2010
  • 본 논문에서는 저비용, 저전력 카메라 폰 구현을 위한 하드웨어 자원 공유가 가능한 구조의 카메라 제어 프로세서를 제안한다. 제안한 카메라 제어 프로세서의 구조는 내부에 직접 접근 경로를 내장함으로써 베이스 밴드 프로세서가 카메라 제어 프로세서의 하드웨어 자원을 직접 활용할 수 있도록 하여 베이스 밴드 프로세서의 기능 확장과 성능 향상을 도모하는데 그 목적이 있다. 또한, 제안한 구조와 결합하여 블록 단위 클럭 차단 기법을 적용하여 저전력 소비를 구현한 결과를 기술하였다. 따라서 제안한 카메라 제어 프로세서는 시스템의 하드웨어 자원 효율성을 향상시켜 저전력, 저비용 카메라 폰 시스템 구현을 가능하게 한다. 제안한 카메라 제어 프로세서는 0.18um CMOS 공정을 사용하여 제작되었으며 면적은 $3.8mm\;{\times}\;3.8mm$이다.

A game theory approach for efficient power control and interference management in two-tier femtocell networks based on local gain

  • Al-Gumaei, Y. A.;Noordin, K. A.;Reza, A. W.;Dimyati, K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권7호
    • /
    • pp.2530-2547
    • /
    • 2015
  • In the recent years, femtocell technology has received a considerable attention due to the ability to provide an efficient indoor wireless coverage as well as enhanced capacity. However, under the spectrum sharing between femtocell user equipment (FUEs) and the owner of spectrum macrocell user equipment (MUEs), both may experience higher uplink interference to each other. This paper proposes a novel distributed power control algorithm for the interference management in two-tier femtocell networks. Due to the assignment of licensed radio frequency to the outdoor macrocell users, the access priority of MUEs should be higher than FUEs. In addition, the quality of service (QoS) of MUEs that is expressed in the target signal-to-interference-plus-noise ratio (SINR) must always be achieved. On the other hand, we consider an efficient QoS provisioning cost function for the low-tier FUEs. The proposed algorithm requires only local information and converges even in cases where the frontiers of available power serve the target SINRs impossible. The advantage of the algorithm is the ability to implement in a distributed manner. Simulation results show that the proposed algorithm based on our cost function provides effective resource allocation and substantial power saving as compared to the traditional algorithms.

웹에서의 전거통제:디지털 도서관의 지식조직 시스템(KOS)과 전거 통제 (Authority Control on the Web : Knowledge Organization Systems and Authority Control for Digital Libraries)

  • 윤정옥
    • 정보관리연구
    • /
    • 제33권4호
    • /
    • pp.85-105
    • /
    • 2002
  • 이 연구의 목적은 디지털 도서관에서 지식조직 시스템을 사용함으로써 전통적인 전거 파일의 역할을 확대하여 활용하는 사례를 살펴보는 것이다. 지식조직 시스템은 정보를 조직하고 지식경영을 조장하는 모든 유형의 체계로서 디지털 도서관의 핵심적 요소 중의 하나이다. 다양한 지식조직 시스템은 웹에서 목록과 디지털 자원 사이의 링크를 제공하고 이용자의 정보요구와 자원 사이의 다리 역할을 수행하면서 디지털 콜렉션으로부터 상관된 아이템의 검색을 지원하도록 콘텐츠를 조직한다. 지식조직 시스템이 코드를 전문으로, 객체를 기술 레코드로, 그리고 물리적 객체를 소재와 실물정보로 링크시키기 위하여 어떻게 사용될 수 있는가를 서술하였다.

Roles of Cancer Registries in Enhancing Oncology Drug Access in the Asia-Pacific Region

  • Soon, Swee-Sung;Lim, Hwee-Yong;Lopes, Gilberto;Ahn, Jeonghoon;Hu, Min;Ibrahim, Hishamshah Mohd;Jha, Anand;Ko, Bor-Sheng;Lee, Pak Wai;MacDonell, Diana;Sirachainan, Ekaphop;Wee, Hwee-Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제14권4호
    • /
    • pp.2159-2165
    • /
    • 2013
  • Cancer registries help to establish and maintain cancer incidence reporting system, serve as a resource for investigation of cancer and its causes, and provide information for planning and evaluation of preventive and control programs. However, their wider role in directly enhancing oncology drug access has not been fully explored. We examined the value of cancer registries in oncology drug access in the Asia-Pacific region on three levels: (1) specific registry variable types; (2) macroscopic strategies on the national level; and (3) a regional cancer registry network. Using literature search and proceedings from an expert forum, this paper covers recent cancer registry developments in eight economies in the Asia-Pacific region - Australia, China, Hong Kong, Malaysia, Singapore, South Korea, Taiwan, and Thailand - and the ways they can contribute to oncology drug access. Specific registry variables relating to demographics, tumor characteristics, initial treatment plans, prognostic markers, risk factors, and mortality help to anticipate drug needs, identify high-priority research area and design access programs. On a national level, linking registry data with clinical, drug safety, financial, or drug utilization databases allows analyses of associations between utilization and outcomes. Concurrent efforts should also be channeled into developing and implementing data integrity and stewardship policies, and providing clear avenues to make data available. Less mature registry systems can employ modeling techniques and ad-hoc surveys while increasing coverage. Beyond local settings, a cancer registry network for the Asia-Pacific region would offer cross-learning and research opportunities that can exert leverage through the experiences and capabilities of a highly diverse region.

3G Evolution 무선 접속 프로토콜 SDL 설계 (SDL Design of Wireless Access Protocols for 3G Evolution Systems)

  • 김재우;김태형;이재형;홍창표;양치평
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 가을 학술발표논문집 Vol.32 No.2 (1)
    • /
    • pp.265-267
    • /
    • 2005
  • 본 논문에서는 무선 랜과의 인터워킹 등 새로운 특징을 갖는 주요 기능들을 추가하기 위한 기반 시스템인 3G Evolution 시스템 개발에 필요한 액세스 시스템 내의 서브 시스템인 RRCS(Radio Resource Control Subsystem)를 구현 및 검증하기 위하여 단말-기지국간 무선 액세스 프로토콜을 형식 기술 언어인 SDL(Specification and Description Language)을 이용해 구현하였다. 여기서 효율적 시스템 설계를 위해 복잡한 각 메시지 처리 함수는 C 언어를 이용해 라이브러리화하고 이를 SDL 시스템 내에서 호출하도록 지원하는 방법을 사용했다.

  • PDF

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks

  • Umamaheswari, Subbian;Radhamani, Govindaraju
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.40-46
    • /
    • 2015
  • In a mobile ad hoc network (MANET), communication between mobile nodes occurs without centralized control. In this environment the mobility of a node is unpredictable; this is considered as a characteristic of wireless networks. Because of faulty or malicious nodes, the network is vulnerable to routing misbehavior. The resource constrained characteristics of MANETs leads to increased query delay at the time of data access. In this paper, AntHocNet+ Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system. This framework improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design. The issues of node failure and node malfunction are addressed in the cache management.