• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.032 seconds

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Consensus-Based Distributed Algorithm for Optimal Resource Allocation of Power Network under Supply-Demand Imbalance (수급 불균형을 고려한 전력망의 최적 자원 할당을 위한 일치 기반의 분산 알고리즘)

  • Young-Hun, Lim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.6
    • /
    • pp.440-448
    • /
    • 2022
  • Recently, due to the introduction of distributed energy resources, the optimal resource allocation problem of the power network is more and more important, and the distributed resource allocation method is required to process huge amount of data in large-scale power networks. In the optimal resource allocation problem, many studies have been conducted on the case when the supply-demand balance is satisfied due to the limitation of the generation capacity of each generator, but the studies considering the supply-demand imbalance, that total demand exceeds the maximum generation capacity, have rarely been considered. In this paper, we propose the consensus-based distributed algorithm for the optimal resource allocation of power network considering the supply-demand imbalance condition as well as the supply-demand balance condition. The proposed distributed algorithm is designed to allocate the optimal resources when the supply-demand balance condition is satisfied, and to measure the amount of required resources when the supply-demand is imbalanced. Finally, we conduct the simulations to verify the performance of the proposed algorithm.

UAV-MEC Offloading and Migration Decision Algorithm for Load Balancing in Vehicular Edge Computing Network (차량 엣지 컴퓨팅 네트워크에서 로드 밸런싱을 위한 UAV-MEC 오프로딩 및 마이그레이션 결정 알고리즘)

  • A Young, Shin;Yujin, Lim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.437-444
    • /
    • 2022
  • Recently, research on mobile edge services has been conducted to handle computationally intensive and latency-sensitive tasks occurring in wireless networks. However, MEC, which is fixed on the ground, cannot flexibly cope with situations where task processing requests increase sharply, such as commuting time. To solve this problem, a technology that provides edge services using UAVs (Unmanned Aerial Vehicles) has emerged. Unlike ground MEC servers, UAVs have limited battery capacity, so it is necessary to optimize energy efficiency through load balancing between UAV MEC servers. Therefore, in this paper, we propose a load balancing technique with consideration of the energy state of UAVs and the mobility of vehicles. The proposed technique is composed of task offloading scheme using genetic algorithm and task migration scheme using Q-learning. To evaluate the performance of the proposed technique, experiments were conducted with varying mobility speed and number of vehicles, and performance was analyzed in terms of load variance, energy consumption, communication overhead, and delay constraint satisfaction rate.

Feature Extraction and Recognition of Myanmar Characters Based on Deep Learning (딥러닝 기반 미얀마 문자의 특징 추출 및 인식)

  • Ohnmar, Khin;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.977-984
    • /
    • 2022
  • Recently, with the economic development of Southeast Asia, the use of information devices is widely spreading, and the demand for application services using intelligent character recognition is increasing. This paper discusses deep learning-based feature extraction and recognition of Myanmar, one of the Southeast Asian countries. Myanmar alphabet (33 letters) and Myanmar numerals (10 numbers) are used for feature extraction. In this paper, the number of nine features are extracted and more than three new features are proposed. Extracted features of each characters and numbers are expressed with successful results. In the recognition part, convolutional neural networks are used to assess its execution on character distinction. Its algorithm is implemented on captured image data-sets and its implementation is evaluated. The precision of models on the input data set is 96 % and uses a real-time input image.

Study on Neuron Activities for Adversarial Examples in Convolutional Neural Network Model by Population Sparseness Index (개체군 희소성 인덱스에 의한 컨벌루션 신경망 모델의 적대적 예제에 대한 뉴런 활동에 관한 연구)

  • Youngseok Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Convolutional neural networks have already been applied to various fields beyond human visual processing capabilities in the image processing area. However, they are exposed to a severe risk of deteriorating model performance due to the appearance of adversarial attacks. In addition, defense technology to respond to adversarial attacks is effective against the attack but is vulnerable to other types of attacks. Therefore, to respond to an adversarial attack, it is necessary to analyze how the performance of the adversarial attack deteriorates through the process inside the convolutional neural network. In this study, the adversarial attack of the Alexnet and VGG11 models was analyzed using the population sparseness index, a measure of neuronal activity in neurophysiology. Through the research, it was observed in each layer that the population sparsity index for adversarial examples showed differences from that of benign examples.

Implementation of Public Address System Using Anchor Technology

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.1-12
    • /
    • 2023
  • A public address (PA) system installed in a building is a system that delivers alerts, announcements, instructions, etc. in an emergency or disaster situation. As for the products used in PA systems, with the development of information and communication technology, PA products with various functions have been introduced to the market. PA systems recently launched in the market may be connected through a single network to enable efficient management and operation, or use voice recognition technology to deliver quick information in case of an emergency. In addition, a system capable of locating a user inside a building using a location-based service and guiding or responding to a safe area in the event of an emergency is being launched on the market. However, the new PA systems currently on the market add some functions to the existing PA system configuration to make system operation more convenient, but they do not change the complex PA system configuration to reduce facility costs, maintenance, and management costs. In this paper, we propose a novel PA system configuration for buildings using audio networks and control hierarchy over peer-to-peer (Anchor) technology based on audio over IP (AoIP), which simplifies the complex PA system configuration and enables convenient operation and management. As a result of the study, through the emergency signal processing algorithm, fire broadcasting was made possible according to the detection of the existence of a fire signal in the Anchor system. In addition, the control device of the PA system was replaced with software to reduce the equipment installation cost, and the PA system configuration was simplified. In the future, it is expected that the PA system using Anchor technology will become the standard for PA facilities.

A Life time improvement Method of SVM application LEACH protocol in Wireless Sensor Networks (SVM을 적용한 LEACH 프로토콜 기반 무선센서네트워크의 수명 개선 방법)

  • Pyo, Se Jun;Jo, Yong-Ok;Ok, Tae-Seong;Bang, Jong-Dae;Keshav, Tushar;Lee, Seong-Ho;Ryu, Hui-Eun;Lee, Yeonwoo;Bae, Jinsoo;Lee, Seong-Ro
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.606-608
    • /
    • 2011
  • 무선 센서 네트워크는 특정지역에 센서 노드를 설치하여 주변 정보 또는 특정 목적의 데이터를 수집하고, 그 정보를 수집하는 싱크(Sink)로 구성되어 있다. 무선 센서 네트워크의 수명은 망을 구성하는 센서 노드의 베터리 소비에 따라 수명이 결정 되고 하나의 노드가 죽기 시작하면서부터 급격하게 센서 노드의 베터리 소비가 커져 빠르게 죽는다. 무선 센서 네트워크를 구성하는 센서노드는 라우팅, 센싱을 수행하기 때문에 베터리 소비에 많은 부담을 가지고 있다. 본 논문은 무선 센서 네트워크의 대표적 클러스터링 기반 라우팅 기법인 LEACH(Low - Energy Adaptive Clustering Hierarchy)프로토콜에 SVM(Support Vector Machine)을 적용하여 센서노드의 균형적인 베터리 소비로 망을 효율적으로 관리하고 망의 수명을 개선 할 수 있는 방법을 제안 한다. 이러한 센서 노드의 균형적인 베터리 소비로 무선센서 네트워크의 수명을 개선 한다. 실험결과 기존의 LEACH 프로토콜보다 우수한 성능을 보인다.

Design of Intelligent Big data Convergence Service to Support Non-store Founders based on Non-face-to-face (무점포 창업자 지원을 위한 비대면 기반의 지능형 빅데이터 융합 서비스 설계)

  • Hyun-Mo Koo;Ji-Yun Hong;Cheol-Soo Kang
    • Journal of Advanced Technology Convergence
    • /
    • v.2 no.2
    • /
    • pp.1-8
    • /
    • 2023
  • Due to the recent long-term economic downturn, the number of non-store and mail-order sellers is increasing as prospective entrepreneurs are concentrated due to the phenomenon of non-store start-ups with low start-up costs. In particular, in addition to unemployed young people and housewives who lack funds, many office workers who wish to have a 'two-job' are jumping into the business. Therefore, in this paper, we have moved away from provider-oriented service platforms that are dependent on specific networks, operators, and service types. In addition, we plan to design a business integration support system that can provide B2B services in the promotional material industry that contributes to business support and profit generation of wholesale and retail non-store entrepreneurs through sharing and participation. The proposed system is judged to be a business integrated operation support system applying orchestration and service management technology and enterprise business partner management technology that can provide stable operation management service.

A Position Recognition Method of Mobile Relay with Acceleration Sensor for Efficient Communication Network Connection (효율적인 통신망 연결을 위한 가속도 센서를 탑재한 이동식 중계기의 위치 인식 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.527-528
    • /
    • 2022
  • It is not easy to identify the location of mobile terminals based on drones in the mountainous area, the densely populated urban area, or the space where mobile terminals can easily move by using equipments or modules that can recognize the location of sensors or mobile terminals with LBS (Location-Based Service). However, although the performance of GPS has developed due to the development of technology, it is still widely used in position recognition systems using GPS modules in the sea and onshore, and there is much room for more utilization. Currently, most of the existing sensor networks need to send at least three location information messages to mobile terminals with location information that a plurality of mobile base stations depend on GPS. However, location recognition of mobile repeaters that maintain a certain movement speed using acceleration sensors is necessary for efficient communication network connection.

  • PDF

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF