• Title/Summary/Keyword: cluster Header

Search Result 73, Processing Time 0.047 seconds

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

A key management scheme for the cluster-based sensor network using polar coordinated (극 좌표를 이용한 클러스터 기반 센서 네트워크의 키 관리 기법)

  • Hong, Seong-Sik;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.870-878
    • /
    • 2008
  • The level of security of most sensor nodes that comprise the sensor networks is low, but because of the low computing power and small storage capacity, it is even very difficult to apply a security algorithm efficiently to the sensor nodes. Therefore, preventing the join of an illegal node to a sensor network is impossible, and the transmitting information is easily exposed and overheard when the transmitting algorithm of the sensor node is hewn. In this paper, we propose a group key management scheme for the sensor network using polar coordinates, so that the sensor nodes can deliver information securely inside a cluster and any illegal node is prevented from joining to the cluster where a sensor network is composed of many clusters. In the proposed scheme, all of the sensor nodes in a cluster set up the authentication keys based on the pivot value provided by the CH. The intensive simulations show that the proposed scheme outperforms the pair-wise scheme in terms of the secure key management and the prevention of the illegal nodes joining to the network.

Group-based Cache Sharing Scheme Considering Peer Connectivity in Mobile P2P Networks (모바일 P2P 네트워크에서 피어의 연결성을 고려한 그룹 기반 캐시 공유 기법)

  • Kim, Jaegu;Yoon, Sooyong;Lim, Jongtae;Lee, Seokhee;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.20-31
    • /
    • 2014
  • Recently, cache sharing methods have been studied in order to effectively reply to user requests in mobile P2P networks. In this paper, we propose a cache sharing scheme based on a cluster considering the peer connectivity in mobile P2P networks. The proposed scheme shares caches by making a cluster that consists of peers preserving the connectivity among them for a long time. The proposed scheme reduces data duplication to efficiently use the cache space in a cluster. The cache space is divided into two parts with a data cache and a temporary cache for a cache space. It is possible to reduce the delay time when the cluster topology is changed or the cache data is replaced utilizing a temporary cache. The proposed scheme checks the caches of peers in a route to a cluster header and the caches of one-hop peers in order to reduce the communication cost. It is shown through performance evaluation that the proposed scheme outperforms the existing schemes.

A Novel Clustering Method for Increasing Connection Durability in Sensor Network Environment (센서 네트워크에서 연결 지속성 향상 가능한 새로운 클러스터링 기법에 관한 연구)

  • Kim, Dae-Hyun;Kim, Jin-Mook;Lee, Kyung-Oh
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.119-124
    • /
    • 2008
  • The LEACH is a study method of a clustering base that was representative in many routing techniques that was suggested in sensor network environment. This is suggested technique to manage the sensor network group which consisted of many sensors in efficiency. However, it does not consider energy remaining quantity of the cluster header to manage cluster group, the problem where the cluster group is able to destroyed on the middle which transmits data. We are going to propose to solve such a problem by this paper for new clustering technique to accomplish management for a cluster group. It uses the technique which it proposes from the dissertation which it sees and are to the data transfer and the control also the connection directivity of the cluster group to improve also the lag time diminishes, test result it will lead and the possibility which it will know it was.

Super Cluster based Routing Protocol in Sensor Network

  • Noh Jae-hwan;Lee Byeong-jik;Kim Kyung-jun;Lee Ick-soo;Lee Suk-gyu;Han Ki-jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.193-198
    • /
    • 2004
  • In variety of environments for applications, wireless sensor networks have received increasing attention in the recent few years. But, sensor nodes have many limitations including battery power and communication range. These networks require robust wireless communicant protocols that are energy efficient and provide low latency. In this paper, we propose new protocol as is defined SCP. The key idea of SCP is that only one node which is defined as a Super-Cluster Header sends the combined data to the BS. We evaluated the effectiveness of SCP through experiments which have several parameter violations. Simulation results shows that performance of SCP is through better than other legacy protocol within the framework of energy cost, life time of the sensor network and fair distribution of the energy consumption.

  • PDF

Algorithm of energy efficient cluster header selection (에너지 효율적인 클러스터 헤더 선정 알고리즘)

  • Jung ILgyu;Ryu Jeoungpil;Ha Namkoo;Lee Byeongjik;Kang Taewook;Han Kijun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.499-501
    • /
    • 2005
  • 일반적인 센서 네트워크는 제한된 에너지와 밀집한 노드 특성을 보인다. 센서 네트워크에서 가장 중요한 이슈 중의 하나는 제한된 에너지의 효율을 높여 네트워크의 수명을 오래 유지하는 것이다. 이를 위하여 클러스터 기반의 센서 네트워크를 구성 함으로서 네트워크 수명을 연장 하는 방법들이 제시 되고 있다. 그러나 이러한 방법은 맵 상태를 고려하지 않으므로 전체적인 네트워크 수명 측면에서는 비효율적이다. 본 논문에서는 에너지 효율적인 클러스터 기반의 센서 네트워크를 구성하기 위하여, 센서 노드의 잔여 에너지와 이웃 노드의 수를 고려한 클러스터 헤더 선정 기법을 제안한다. 제안된 기법으로 클러스터 헤더를 선정함으로써 효과적인 데이터 수집과 전송을 할 수 있다.

  • PDF

Underwater Packet Flow Control for Underwater Networks (수중네트워크를 위한 수중패킷 흐름제어기법)

  • Shin, Soo Young;Park, Soo Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.924-931
    • /
    • 2016
  • In this paper, Various network adaptive MAC scheduling technique is proposed to effectively overcome limits of narrow bandwidth and low transmission speed in underwater. UPFC(Underwater Packet Flow Control) is a technique to reduce both the number of transmission and transmission time using three types (Normal, Blocked, Parallel) of data transmission. In this technique, the load information, in which a transmission node have, is transmitted to destination node using marginal bit in reserved header. Then the transmitted information is referred to determine weighting factor. According to the weighting factor, scheduling is dynamically changed adaptively. The performance of UPFC is analyzed and flow control technique which can be applied to Cluster Based Network and Ad Hoc network as well.

Group hashing for Secure Communications m Wireless Sensor Network (무선 센서 네트워크 환경에서 안전한 통신을 위한 그룹 해싱 기법)

  • Lee, Hee-man;Kang, Jung-Ho;Kim, Jung-ho;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.470-472
    • /
    • 2014
  • 무선 센서 네트워크에서 무선 전송 매체를 통한 통신으로 유선 네트워크에 비해 보안이 매우 취약하며 Sensor Node는 매우 제한된 통신, 계산 능력으로 기존에 다양한 암호화 방식 적용이 어렵기 때문에 데이터의 eavesdropping와 capture가 발생할 수 있다. 본 논문은 이러한 환경에서 지역적으로 같은 보안방식을 사용하여 한 지역 패킷이 노출되면 그룹 전체에 노출로 이어지는 취약점을 방지하기 위해서 BaseStation은 각 그룹의 ClusterHeader가 사용할 서로 다른 해시 알고리즘을 주기적으로 갱신하여 악의적인 사용자의 노드 eavesdropping 및 capture를 방지하고 안전한 통신을 수행하고자 한다. 제안된 기법은 기존 논문들의 비해 프로토콜의 효율성과 안전성을 보였다.

Design and Implementation of APFS Object Identification Tool for Digital Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.10-18
    • /
    • 2022
  • Since High Sierra, APFS has been used as the main file system. It is a well-established file system that has been used stably thus far. From the perspective of digital forensics, there are still many areas to be investigated. Apple File System Reference is provided to the apple developer site, but it is not satisfactory to fully analyze APFS. Researchers know more about the structure of APFS than before, but they have not yet fully analyzed its structure to a perfect level about it. In this paper, we develop APFS object identification tool for digital forensics. The most basic and essential object identification and analysis of the APFS filesystem will be conducted with the tool. The analysis in this study serves as the background for an analysis of the checkpoint operation principle and structure, including the more complex B-tree structure of APFS. There are several options for the developed tool, but the results of two use cases will be shown here. Based on the implemented tool, it is hoped that more functions will be added to make APFS a useful tool for faster and more accurate analyses.

A Relay Cluster Header Selection Scheme for Reduction of Energy Usage on Hierarchical WSN (계층적 WSN에서 에너지 사용 감소를 위한 릴레이 클러스터 헤더 선출 기법)

  • Park, Si-Yong;Cho, Hyun-Sug
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1094-1097
    • /
    • 2009
  • 본 논문에서는 클러스터 기반의 계층적 무선 센서 네트워크에서 에너지 사용을 줄이기 위해서 클러스터 헤더를 선출할 때 에너지 소모량을 고려하여 선출하는 기법을 제안한다. 제안하는 기법은 무선센서 네트워크의 크기나 위치 정보와 같은 전체적인 정보 없이 분산 환경을 기반으로 하고 있으며, 이전 클러스터 헤더가 에너지 잔류량과 현재 라운드에서의 에너지 소비량을 예측하여 다음 라운드의 클러스터 헤더를 선출한다. 실험결과 제안한 기법은 비교기법인 LEACH에 비하여 에너지 소모를 향상시켰고, 라운드마다 고른 에너지 소비량을 보였다.