• Title/Summary/Keyword: School Network

Search Result 7,503, Processing Time 0.033 seconds

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.

Performance Analysis of Mobile IP Network Based on MPLS/WLAN for providing QoS (MPLS/WLAN기반 Mobile IP망에서 QoS 제공을 위한 성능분석)

  • Kim, Jin-Hae;Ye, Hwi-Jin;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.591-597
    • /
    • 2008
  • With the established voice service, the data service is increasing in the field of mobile telecommunications in these days. Also, the data service develops into the form of multimedia service which combines various media. However, it is limited to provide QoS(Quality of Service) for the multimedia using the established network which manages all the data in sam: rule. So, this paper suggests the network architecture which assures QoS of multimedia data by applying MPLS(Multi-Protocol Label Switching) to the core network. Especially, we analyze the efficiency of the network combining Mobile IP network based on the WLAN(Wireless LAN) and core network based on MPLS through by network simulations using QualNet.

  • PDF

Strengthening Packet Loss Measurement from the Network Intermediate Point

  • Lan, Haoliang;Ding, Wei;Zhang, YuMei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.5948-5971
    • /
    • 2019
  • Estimating loss rates with the packet traces captured from some point in the middle of the network has received much attention within the research community. Meanwhile, existing intermediate-point methods like [1] require the capturing system to capture all the TCP traffic that crosses the border of an access network (typically Gigabit network) destined to or coming from the Internet. However, limited to the performance of current hardware and software, capturing network traffic in a Gigabit environment is still a challenging task. The uncaptured packets will affect the total number of captured packets and the estimated number of packet losses, which eventually affects the accuracy of the estimated loss rate. Therefore, to obtain more accurate loss rate, a method of strengthening packet loss measurement from the network intermediate point is proposed in this paper. Through constructing a series of heuristic rules and leveraging the binomial distribution principle, the proposed method realizes the compensation for the estimated loss rate. Also, experiment results show that although there is no increase in the proportion of accurate estimates, the compensation makes the majority of estimates closer to the accurate ones.

From proteomics toward systems biology: integration of different types of proteomics data into network models

  • Rho, Sang-Chul;You, Sung-Yong;Kim, Yong-Soo;Hwang, Dae-Hee
    • BMB Reports
    • /
    • v.41 no.3
    • /
    • pp.184-193
    • /
    • 2008
  • Living organisms are comprised of various systems at different levels, i.e., organs, tissues, and cells. Each system carries out its diverse functions in response to environmental and genetic perturbations, by utilizing biological networks, in which nodal components, such as, DNA, mRNAs, proteins, and metabolites, closely interact with each other. Systems biology investigates such systems by producing comprehensive global data that represent different levels of biological information, i.e., at the DNA, mRNA, protein, or metabolite levels, and by integrating this data into network models that generate coherent hypotheses for given biological situations. This review presents a systems biology framework, called the 'Integrative Proteomics Data Analysis Pipeline' (IPDAP), which generates mechanistic hypotheses from network models reconstructed by integrating diverse types of proteomic data generated by mass spectrometry-based proteomic analyses. The devised framework includes a serial set of computational and network analysis tools. Here, we demonstrate its functionalities by applying these tools to several conceptual examples.

A School Network Construction using the ESM System (ESM 시스템을 이용한 안정된 학내망 구축)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2005
  • Today, network is a fragile state in many threat attacks. Especially, the company serviced like internet or e-commerce is exposed to danger and targeted of attacker Therefore, it is realistic that the company use the security solution. It exist various security solution in our school network. For example, Firewall, IDS, VirusWall, VPN, etc. The administrator must manage various security solution. But it is inefficient. Therefore, we need the Management System to controll every security solution. In this paper, we deal with basic contents of security solution to manage the ESM and merits and demerits when use it. Also we suggest method that the Administrator can manage his network more efficiently and systematically by using the ESM in our school network.

  • PDF

Cell Virtualization with Network Partition for Initial User Association in Software Defined Small-cell Networks

  • Sun, Guolin;Lu, Li;Ayepah-Mensah, Daniel;Fang, Xiufen;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4703-4723
    • /
    • 2018
  • In recent years, dense small cell network has been deployed to address the challenge that has resulted from the unprecendented growth of mobile data traffic and users. It has proven to be a cost efficeient solution to offload traffic from macro-cells. Software defined heterogeneous wireless network can decouple the control plane from the data plane. The control signal goes through the macro-cell while the data traffic can be offloaded by small cells. In this paper, we propose a framework for cell virtualization and user association in order to satisfy versatile requirements of multiple tenants. In the proposed framework, we propose an interference graph partioning based virtual-cell association and customized physical-cell association for multi-homed users in a software defined small cell network. The proposed user association scheme includes 3 steps: initialization, virtual-cell association and physical-cell association. Simulation results show that the proposed virtual-cell association outperforms the other schemes. For physical-cell association, the results on resource utilization and user fairness are examined for mobile users and infrastructure providers.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

An Optimal Schedule Algorithm Trade-Off Among Lifetime, Sink Aggregated Information and Sample Cycle for Wireless Sensor Networks

  • Zhang, Jinhuan;Long, Jun;Liu, Anfeng;Zhao, Guihu
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.227-237
    • /
    • 2016
  • Data collection is a key function for wireless sensor networks. There has been numerous data collection scheduling algorithms, but they fail to consider the deep and complex relationship among network lifetime, sink aggregated information and sample cycle for wireless sensor networks. This paper gives the upper bound on the sample period under the given network topology. An optimal schedule algorithm focusing on aggregated information named OSFAI is proposed. In the schedule algorithm, the nodes in hotspots would hold on transmission and accumulate their data before sending them to sink at once. This could realize the dual goals of improving the network lifetime and increasing the amount of information aggregated to sink. We formulate the optimization problem as to achieve trade-off among sample cycle, sink aggregated information and network lifetime by controlling the sample cycle. The results of simulation on the random generated wireless sensor networks show that when choosing the optimized sample cycle, the sink aggregated information quantity can be increased by 30.5%, and the network lifetime can be increased by 27.78%.

Node Incentive Mechanism in Selfish Opportunistic Network

  • WANG, Hao-tian;Chen, Zhi-gang;WU, Jia;WANG, Lei-lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1481-1501
    • /
    • 2019
  • In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.

Application of YOLOv5 Neural Network Based on Improved Attention Mechanism in Recognition of Thangka Image Defects

  • Fan, Yao;Li, Yubo;Shi, Yingnan;Wang, Shuaishuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.245-265
    • /
    • 2022
  • In response to problems such as insufficient extraction information, low detection accuracy, and frequent misdetection in the field of Thangka image defects, this paper proposes a YOLOv5 prediction algorithm fused with the attention mechanism. Firstly, the Backbone network is used for feature extraction, and the attention mechanism is fused to represent different features, so that the network can fully extract the texture and semantic features of the defect area. The extracted features are then weighted and fused, so as to reduce the loss of information. Next, the weighted fused features are transferred to the Neck network, the semantic features and texture features of different layers are fused by FPN, and the defect target is located more accurately by PAN. In the detection network, the CIOU loss function is used to replace the GIOU loss function to locate the image defect area quickly and accurately, generate the bounding box, and predict the defect category. The results show that compared with the original network, YOLOv5-SE and YOLOv5-CBAM achieve an improvement of 8.95% and 12.87% in detection accuracy respectively. The improved networks can identify the location and category of defects more accurately, and greatly improve the accuracy of defect detection of Thangka images.