• Title/Summary/Keyword: Sorority

Search Result 23, Processing Time 0.018 seconds

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network (무선랜 메쉬 네트워크에서의 효율적인 멀티미디어 서비스를 위한 보안 정량화 기반의 프레임워크 연구)

  • Shin, Myoung-Sub;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-273
    • /
    • 2008
  • Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.

The Valuation of HSA Business Using Broadband over Power Line (전력선통신망을 이용한 HSA사업의 경제적 타당성 분석)

  • Lyoo, Tae-Ho;Kim, Chang-Seob
    • Journal of Energy Engineering
    • /
    • v.16 no.4
    • /
    • pp.202-214
    • /
    • 2007
  • The concept of HSA (Home Service Aggregator) is derived from performing the energy IT business efficiently as well as successfully launcing a new service based on BPL (Broadband over Power Line). The HSA business using a BPL can extend the field of energy industry and an give a chance to create a new demand by consumer-oriented services. This study focuses on the exact evaluation of HSA business using BPL, and reasonable trusty evaluation should be the first step to launch the HSA business. In this study, the categories of cost are comprised of equipment (mainly RSM and MGW) cost, instalation cost, and maintenance cost. AMR (Automatic Meter Reading), internet integration billing service, integration charging service, internet service, sorority service, and electricity safety are listed for benefit. In this study, the ROI of HSA business is 0.9594, which is less than 1. However, that value does not consider the electricity safety benefit which is classified as a social benefit. Therefore, the value can be above 1 if it includes social and private benefits.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.