• 제목/요약/키워드: communication networks

검색결과 5,470건 처리시간 0.029초

Applying a sensor energy supply communication scheme to big data opportunistic networks

  • CHEN, Zhigang;WU, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2029-2046
    • /
    • 2016
  • Energy consumption is an important index in mobile ad hoc networks. Data packet transmission increases among nodes, particularly in big data communication. However, nodes may be unable to transmit data packets because of energy over-consumption. Consequently, information may be lost and network communication may block. While opportunistic network is a kind of mobile ad hoc networks, researchers do not focus on energy consumption in opportunistic network communication. This study proposed an effective sensor energy supply scheme that can be applied in opportunistic networks. This scheme considers nodes sensor requests and communication model. In this scheme, nodes do not only accomplish energy supply in communication, but also extend communication time in opportunistic networks. Compared with the Spray and Wait algorithm and the Binary Spray and Wait algorithm in simulations, the proposed scheme extends communication time, increases data packet transmission, and accomplishes energy supply among nodes.

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점 (Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks)

  • 신동현;이승준;김창화
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1940-1950
    • /
    • 2017
  • The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

다양한 형태의 통신망 성능 분석을 위한 시뮬레이션 도구의 개발 (Development of a simulator for the performance evaluation of various types of communication networks)

  • 윤복식
    • 산업공학
    • /
    • 제9권3호
    • /
    • pp.157-167
    • /
    • 1996
  • Due to the drastic technological innovation and introduction of various kinds, of new communication services, the structure and operation of communication networks are becoming complicated and diversified more and more. Accordingly, the necessity of flexible simulation tools which can be utilized for various performance evaluation jobs in various types of communication networks is growing. In this article, various existing simulation tools are briefly surveyed and the requirements for the simulator dedicated for the performance evaluation of communication networks are discussed. Then, a strategy to develop a simulator dedicated for the performance evaluation of communication networks is proposed. Our approach is based on the prototyping strategy, in which a relatively simple prototype structure is developed first and more functions are added whenever necessary. By following this strategy, a simulator can be developed and evolved in a timely manner at a relatively small cost.

  • PDF

Enhanced Dynamic Segment Protection in WDM Optical Networks under Reliability Constraints

  • Guo, Lei;Cao, Jin;Yu, Hongfang;Li, Lemin
    • ETRI Journal
    • /
    • 제28권1호
    • /
    • pp.99-102
    • /
    • 2006
  • In this letter, we study the protection problem in wavelength division multiplexing (WDM) optical networks, and propose a novel dynamic heuristic algorithm called differentiated reliable segment protection (DRSP). Differing from previous work, DRSP can effectively avoid the trap problem and is able to find a feasible solution for each connection request. Therefore, DRSP outperforms the previous work. Simulation results have shown to be promising.

  • PDF

Design of Hard Partition-based Non-Fuzzy Neural Networks

  • Park, Keon-Jun;Kwon, Jae-Hyun;Kim, Yong-Kab
    • International journal of advanced smart convergence
    • /
    • 제1권2호
    • /
    • pp.30-33
    • /
    • 2012
  • This paper propose a new design of fuzzy neural networks based on hard partition to generate the rules of the networks. For this we use hard c-means (HCM) clustering algorithm. The premise part of the rules of the proposed networks is realized with the aid of the hard partition of input space generated by HCM clustering algorithm. The consequence part of the rule is represented by polynomial functions. And the coefficients of the polynomial functions are learned by BP algorithm. The number of the hard partition of input space equals the number of clusters and the individual partitioned spaces indicate the rules of the networks. Due to these characteristics, we may alleviate the problem of the curse of dimensionality. The proposed networks are evaluated with the use of numerical experimentation.

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks

  • Kim, Daehee;Kim, Dongwan;An, Sunshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1249-1272
    • /
    • 2016
  • In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.

A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System

  • Isaac Sim;Jinwoo Jeong;Sangbom Yun;Yunsik Lim;Junghyun Seo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.128-133
    • /
    • 2023
  • Satellite based communication is networks in which users in a wide area can access without wired-based ground infrastructure. In particular, the need is emerging due to the recent Ukraine-Russia war. Satellite network systems acquire data that is difficult to observe on Earth as well as communication networks and are also used for research and development, which allows additional data to be produced. However, due to the nature of communication networks existing in outer space, certain vulnerabilities are revealed, and attacks based on them can be exposed. In this paper, we analyze vulnerabilities that may arise due to the nature of satellite communication networks and describes current research, countermeasures, and future research directions.

이기종 전술통신망 종단간 암호화 통신을 위한 메커니즘 (A mechanism for end-to-end secure communication in heterogeneous tactical networks)

  • 박철용;김기홍;류재철
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.625-634
    • /
    • 2014
  • 전술통신망은 이기종 다양한 특성의 통신장비로 구성된 네트워크가 복합적으로 운용되고 있다. 이러한 구성으로 인해 종단간 통신을 위해 기종별 데이터 포맷으로 변환하기 위한 망연동 게이트웨이를 적용하고 통신 정보보호를 위해 네트워크별 암호기술이 적용되고 있다. 이는 이기종 망간 암호화된 데이터를 직접 전송할 수 없고 통신데이터의 재가공 및 처리지연의 문제점이 있다. 서로 다른 전술통신망 사이에 위치하는 망연동 게이트웨이에서 통신데이터에 대한 재가공과 암호화 데이터에 대한 복호화 및 재암호화가 요구된다. 본 논문에서는 전술통신망에서 이기종간 종단간 암호화 통신을 위한 통신방식을 제안한다. 제안한 방식을 이용하여 PSTN과 UHF 통신망간 게이트웨이에서 재가공, 재암호화, 전송 지연요소 등을 없애 실시간 음성 및 데이터 통신을 가능하게 한다. 또한, 종단간 정보보호를 위해 단대단 정보보호방식을 적용한다. 이를 통신망에 적용하여 기존 방식 대비 제안한 방식의 성능을 비교 분석한다. 제안한 방식은 기존방식의 문제점을 해결하고 이기종 전술통신망간 종단간 암호화 통신이 가능함을 확인하였다.

Adaptive Partition-Based Address Allocation Protocol in Mobile Ad Hoc Networks

  • Kim, Ki-Il;Peng, Bai;Kim, Kyong-Hoon
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.141-147
    • /
    • 2009
  • To initialize and maintain self-organizing networks such as mobile ad hoc networks, address allocation protocol is essentially required. However, centralized approaches that pervasively used in traditional networks are not recommended in this kind of networks since they cannot handle with mobility efficiently. In addition, previous distributed approaches suffer from inefficiency with control overhead caused by duplicated address detection and management of available address pool. In this paper, we propose a new dynamic address allocation scheme, which is based on adaptive partition. An available address is managed in distributed way by multiple agents and partitioned adaptively according to current network environments. Finally, simulation results reveal that a proposed scheme is superior to previous approach in term of address acquisition delay under diverse simulation scenarios.