• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.03 seconds

Tabu Search Algorithm for Constructing Load-balanced Connected Dominating Sets in Wireless Sensor Networks (무선 센서 네트워크에서 부하 균형 연결 지배 집합을 구성하기 위한 타부서치 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.571-581
    • /
    • 2022
  • Wireless sensor networks use the concept of connected dominating sets that can form virtual backbones for effective routing and broadcasting. In this paper, we propose an optimization algorithm that configures a connected dominating sets in order to balance the load of nodes to increase network lifetime and to perform effective routing. The proposed optimization algorithm in this paper uses the metaheuristic method of tabu search algorithm, and is designed to balance the number of dominatees in each dominator in the constituted linked dominance set. By constructing load-balanced connected dominating sets with the proposed algorithm, it is possible to extend the network lifetime by balancing the load of the dominators. The performance of the proposed tabu search algorithm was evaluated the items related to load balancing on the wireless sensor network, and it was confirmed in the performance evaluation result that the performance was superior to the previously proposed method.

Comparison of Deep Learning Models for Judging Business Card Image Rotation (명함 이미지 회전 판단을 위한 딥러닝 모델 비교)

  • Ji-Hoon, Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.34-40
    • /
    • 2023
  • A smart business card printing system that automatically prints business cards requested by customers online is being activated. What matters is that the business card submitted by the customer to the system may be abnormal. This paper deals with the problem of determining whether the image of a business card has been abnormally rotated by adopting artificial intelligence technology. It is assumed that the business card rotates 0 degrees, 90 degrees, 180 degrees, and 270 degrees. Experiments were conducted by applying existing VGG, ResNet, and DenseNet artificial neural networks without designing special artificial neural networks, and they were able to distinguish image rotation with an accuracy of about 97%. DenseNet161 showed 97.9% accuracy and ResNet34 also showed 97.2% precision. This illustrates that if the problem is simple, it can produce sufficiently good results even if the neural network is not a complex one.

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

Analysis and study of Deep Reinforcement Learning based Resource Allocation for Renewable Powered 5G Ultra-Dense Networks

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.226-234
    • /
    • 2024
  • The frequent handover problem and playing ping-pong effects in 5G (5th Generation) ultra-dense networking cannot be effectively resolved by the conventional handover decision methods, which rely on the handover thresholds and measurement reports. For instance, millimetre-wave LANs, broadband remote association techniques, and 5G/6G organizations are instances of group of people yet to come frameworks that request greater security, lower idleness, and dependable principles and correspondence limit. One of the critical parts of 5G and 6G innovation is believed to be successful blockage the board. With further developed help quality, it empowers administrator to run many systems administration recreations on a solitary association. To guarantee load adjusting, forestall network cut disappointment, and give substitute cuts in case of blockage or cut frustration, a modern pursuing choices framework to deal with showing up network information is require. Our goal is to balance the strain on BSs while optimizing the value of the information that is transferred from satellites to BSs. Nevertheless, due to their irregular flight characteristic, some satellites frequently cannot establish a connection with Base Stations (BSs), which further complicates the joint satellite-BS connection and channel allocation. SF redistribution techniques based on Deep Reinforcement Learning (DRL) have been devised, taking into account the randomness of the data received by the terminal. In order to predict the best capacity improvements in the wireless instruments of 5G and 6G IoT networks, a hybrid algorithm for deep learning is being used in this study. To control the level of congestion within a 5G/6G network, the suggested approach is put into effect to a training set. With 0.933 accuracy and 0.067 miss rate, the suggested method produced encouraging results.

An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

  • Rooh Ullah;Beenish Ayesha Akram;Amna Zafar;Atif Saeed;Sultan H. Almotiri;Mohammed A. Al Ghamdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1390-1411
    • /
    • 2024
  • Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

Implementation of CoAP/6LoWPAN over BLE Networks for IoT Services (BLE 네트워크 상에서 사물인터넷 서비스 제공을 위한 CoAP과 6LoWPAN 구현)

  • Kim, Cheol-Min;Kang, Hyung-Woo;Choi, Sang-Il;Koh, Seok-Joo
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.298-306
    • /
    • 2016
  • With the advent of Internet of Things (IoT) technology that allows the communications between things and devices over the Internet, a lot of researches on the IoT services, such as smart home or healthcare, have been progressed. In the existing machine-to-machine (M2M) communications, however, since the underlying link-layer technologies, such as Bluetooth or ZigBee, do not use the Internet Protocol (IP) communication, those technologies are not suitable to provide the IoT services. Accordingly, this paper discusses how to provide the Internet services in the M2M communication, and propose an implementation of the Constrained Application Protocol (CoAP) over 6LoWPAN for providing IoT services in the BLE networks. Based on the implementation, we compared the performance between HTTP and CoAP for IoT communications. From the experimental results, we can see that the CoAP protocol gives better performance than the HTTP protocol with two times higher throughput, 21% faster transmission time, and 22% smaller amount of generated packets.

Network-Adaptive Transport Error Control for Reliable Wireless Media Transmission (신뢰성 있는 무선 미디어 전송을 위한 네트워크 적응형 전송오류 제어)

  • Lee Chul-Ho;Choi Jeong-Yong;Kwon Young-Woo;Kim Jongwon;Shin Jitae;Jeon Dong-San;Kim Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.4 s.29
    • /
    • pp.548-556
    • /
    • 2005
  • In wireless network environments, wireless channels are characterized by time-varying fading and interference conditions, which may lead to burst packet corruptions and delay variation. This can cause severe quality degradation of streaming media. To guarantee successful transmission of media over the hostile wireless networks, where channel conditions are highly fluctuating, a flexible and network-adaptive transport method is required. Thus, we propose a network-adaptive transport error control consisting of packet-level interleaved FEC and delay-constrained ARQ, which acts as an application-level transport method of streaming media to alleviate burst packet losses while adapting to the changing channel condition in wireless networks. The performances of the proposed network-adaptive transport error control, general error control schemes, and hybrid schemes are evaluated by a developed simulator at the transport-level and video quality of streaming media. Simulation results show that the proposed mechanism provides the best overall performance among compared other schemes in terms of the transport-level performance of error control and the performance of video quality for streaming media.

A TDMA Based Data Collection Scheme Considering the Variability of Data in Sensor Networks with Mobile Sink (이동 싱크 기반 센서 네트워크에서 데이터 변화율을 고려한 TDMA 기반 데이터 수집 기법)

  • Park, Hyoung-Soon;Yeo, Myung-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.51-58
    • /
    • 2010
  • In data collection using a mobile sink, the time that sensor nodes are included in its communication radius is not uniform. The data collection schedule in non-uniform time is needed between a mobile sink and sensor nodes for efficient data collection. The existing data collection schemes using a mobile sink considered staying time in its communication range and data collected by the mobile sink. However, they did not consider the characteristics of data collected in sensor networks. In this paper, we propose a TDMA based schedule scheme that consists of the data collection period by each sensor nodes and the data collection period between a mobile sink and sensor nodes. Moreover, we propose a data collection scheme considering the variability of data in sensor networks. The proposed data collection scheme collects only data that changed larger than the threshold set by the user. In order to show the superiority of the proposed scheme, we compare it with DWEDF that aims to collect data uniformly. As a result, our experimental results show that the proposed scheme reduces about 23% energy consumption and the data collection failure of sensor nodes over the DWEDF.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.