• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.029 seconds

Rule-Based Anomaly Detection Technique Using Roaming Honeypots for Wireless Sensor Networks

  • Gowri, Muthukrishnan;Paramasivan, Balasubramanian
    • ETRI Journal
    • /
    • v.38 no.6
    • /
    • pp.1145-1152
    • /
    • 2016
  • Because the nodes in a wireless sensor network (WSN) are mobile and the network is highly dynamic, monitoring every node at all times is impractical. As a result, an intruder can attack the network easily, thus impairing the system. Hence, detecting anomalies in the network is very essential for handling efficient and safe communication. To overcome these issues, in this paper, we propose a rule-based anomaly detection technique using roaming honeypots. Initially, the honeypots are deployed in such a way that all nodes in the network are covered by at least one honeypot. Honeypots check every new connection by letting the centralized administrator collect the information regarding the new connection by slowing down the communication with the new node. Certain predefined rules are applied on the new node to make a decision regarding the anomality of the node. When the timer value of each honeypot expires, other sensor nodes are appointed as honeypots. Owing to this honeypot rotation, the intruder will not be able to track a honeypot to impair the network. Simulation results show that this technique can efficiently handle the anomaly detection in a WSN.

Effects of Link Failures on Performance of Packet Scatter Schemes in Fat-Trees (Fat-Tree에서 링크 장애가 패킷분산방식의 성능에 미치는 영향)

  • Lim, Chansook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.9-15
    • /
    • 2013
  • Most of recent studies on data center networks are based on the assumption of symmetrical multi-rooted tree topologies such as a Fat-Tree. While packet scatter schemes are very effective for such a network topology, it is known that various failures can result in an asymmetric topology which degrades TCP performance. In this paper, we reexamine the effects of link failures on packet scatter schemes in Fat-Trees. Our simulation results show that in case of a single link failure in a large-scale Fat-Tree, packet reordering does not occur enough to degrade TCP performance. This implies that we do not necessarily need a complex scheme to make packet schemes robust to link failures.

Energy Efficiency of Cooperative Routing with EGC Over Rayleigh Fading Channel (레일리 페이딩 채널을 통해 결합된 등가 이득 협력 라우팅의 에너지 효율)

  • Kong, Hyung-Yun;Tran, Truc Thanh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.65-70
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol to obtain energy savings in static wireless networks. Each terminal in the network is equipped with a single antenna and each receiver uses equal gain combining technique (EGC) to combine received signals. We also propose a power allocation strategy which optimizes the total transmit power at each stage. Monte-Carlo simulations are presented to evaluate and compare performance of the proposed protocol with the multi-hop direct transmission (MDT) and the cooperative routing protocol proposed by Khadani [8], in terms of the average total transmit power and the average number of required stages.

A Study on SSDP protocol based IoT / IoL Device Discovery Algorithm for Energy Harvesting Interworking Smart Home

  • Lee, Jonghyeok;Han, Jungdo;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.7-12
    • /
    • 2018
  • The spread of IoT (Internet of Things) technology that connects objects based on wired / wireless networks is accelerating, and IoT-based smart home technology that constitutes a super connected network connecting sensors and home appliances existing inside and outside the home is getting popular. In addition, demand for alternative energy technologies such as photovoltaic power generation is rapidly increasing due to rapid increase of consumption of energy resources. Recently, small solar power systems for general households as well as large solar power systems for installation in large buildings are being introduced, but they are effectively implemented due to limitations of small solar panels and lack of power management technology. In this paper, we have studied smart home structure and IoT / IoL device discovery algorithm for energy harvesting system based on photovoltaic power generation, It is possible to construct an efficient smart home system for device control.

A Spatial Filtering Neural Network Extracting Feature Information Of Handwritten Character (필기체 문자 인식에서 특징 추출을 위한 공간 필터링 신경회로망)

  • Hong, Keong-Ho;Jeong, Eun-Hwa
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.1
    • /
    • pp.19-25
    • /
    • 2001
  • A novel approach for the feature extraction of handwritten characters is proposed by using spatial filtering neural networks with 4 layers. The proposed system first removes rough pixels which are easy to occur in handwritten characters. The system then extracts and removes the boundary information which have no influence on characters recognition. Finally, The system extracts feature information and removes the noises from feature information. The spatial filters adapted in the system correspond to the receptive fields of ganglion cells in retina and simple cells in visual cortex. With PE2 Hangul database, we perform experiments extracting features of handwritten characters recognition. It will be shown that the network can extract feature informations from handwritten characters successfully.

  • PDF

A Marking Algorithm for QoS Provisioning in WMSN (WMSN에서 QoS 보장을 위한 마킹 알고리즘)

  • Kim, Jeonghue;Lee, Sungkeun;Koh, Jingwang;Jung, Changryul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.2
    • /
    • pp.193-204
    • /
    • 2010
  • Since Wireless Multimedia Sensor Network(WMSN) needs to process various multimedia data such as audio, image and video data as well as scalar data, it requires a mechanism that can support Quality of Service(QoS) to handle efficiently. This paper classifies traffic in WMSN as periodic monitoring traffic, event traffic, multimedia traffic and query-based traffic, proposes marking algorithm and queue management mechanism that guarantee differentiated QoS in terms of delay, energy efficiency and credibility on each traffic and conduct performance analysis with simulation.

A Channel Allocation and Data Delivery Scheme Considering Channel Overlapping in Wireless Tactical Networks (군 전술망의 무선 이동 통신 체계의 통신 범위 중첩을 고려한 채널 할당 기법과 데이터 전달 기법)

  • Shin, Hyun-Sup;Chae, Sung-Yoon;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.501-508
    • /
    • 2011
  • In this paper, we propose a channel allocation algorithm of MSAP(Mobile Subscriber Access Point) and data delivery scheme exploiting the symbol level network coding. The network is comprised of TS(Tactical Switch) as a backbone node, MSAPs, and TMFTs(Tactical Multi-Function Terminal). The TS performs the channel allocation considering the communication range overlapping between the neighboring MSAPs and applies the symbol level network coding, if necessary, depending on the position of the TMFTs. Assuming the number of available antennas of TMFT and MSAP will be extended to two from one, we propose two schemes: single mode and dual mode. Through the simulation, we show that the proposed delivery scheme provides higher delivery ratio and lower delivery delay compared with the legacy store-and-forward scheme.

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2716-2723
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

Transmission Performance of Voice Traffic over LTE-R Network (LTE-R 네트워크에서 음성트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.568-570
    • /
    • 2018
  • Currently, with rapid progress and supply of mobile communication technology, LTE(Long Term Evolution) technology is expanded and widely used to industrial and emergency communications beyond earlier smart-phone based service. In this paper, transmission performance of voice traffic, one of railway communication service based on LTE-R as an application field of LTE technology, is analyzed. This study is performed performance analysis with level of application service and consider effects of satisfaction level for users. Computer Simulation based on ns(Network Simulation)-3 is used for analysis and VoIP(Voice over Internet Protocol) specification is used for voice traffics. Results of this paper is used to implement LTE-R networks and develope application services over LTE-R network.

  • PDF

A New Routing Protocol for Cost-Effective Communication between Mobile Hosts (이동 호드트들간의 경제성있는 통신을 위한 새로운 루팅 프로토콜)

  • Cha, Yeong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.406-416
    • /
    • 1995
  • This paper is concerned with a routing protocol for cost-effective communications between mobile hosts on computer networks in which mobile hosts can move freely their physical positions. The proposed routing protocol consists of two protocols : one is called location registration protocol performing registration of the location information as the mobile host does move; the other one is called message transfer protocol which actually delivers a message to the destination mobile host. The detailed protocol's operational behavior and major characteristics are presented. And it is shown that our protocols are superior to previous ones, in terms of the communication cost(i.e, number of messages) required for routing a message, and are functionally improved ones.

  • PDF