• Title/Summary/Keyword: detailed routing

검색결과 45건 처리시간 0.026초

무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술 (A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks)

  • 천은홍;이연식
    • 융합보안논문지
    • /
    • 제16권5호
    • /
    • pp.3-9
    • /
    • 2016
  • 무선 센서 네트워크은 폭넓은 다양한 응용에서 경제적으로 성공할 수 있는 모니터링 솔루션이다. 그러나 악의적이거나 감시하는 사람이 없는 환경에서 침입을 인식하고 방지하며 안전하고 에너지 효율적인 것을 보장하는 네트워크를 통한 정보의 안전한 전송은 주된 도전이다. 이에 따라, 이 논문은 집적된 데이터의 무결성, 인증성과 비밀성을 보장하기 위하여 안전한 무선 센서 네트워크에 필수적인 보호를 포함하는 분산 클러스터링 프로세스를 제안한다. 안전한 키 관리 스킴을 위하여 대칭형과 비대칭형 키의 전단계 분산의 개념을 사용하고, 클러스터 내에 있는 각 센서 노드가 배치되기 전에 암호화를 위한 전단계 분산 매개변수를 사용하는 센서 네트워크 토폴로지에 기초한 계층적 클러스터에 대한 상세한 스킴에 대하여 기술한다. 마지막으로 무선 센서 네트워크에서 제안된 스킴의 성능 시험 결과를 보인다.

Safety Management for MR-Guided Interventions

  • Cherkashin, Mikhail;Berezina, Natalia;Serov, Alexey;Fedorov, Artem;Andreev, Georgy;Kuplevatsky, Vladymir
    • Investigative Magnetic Resonance Imaging
    • /
    • 제20권3호
    • /
    • pp.152-157
    • /
    • 2016
  • Purpose: Operating room management is the serious and complex task for hospital managers and the common approach is to develop relevant standard operational procedures. From patient and staff safety perspective, operating room management should be well-studied and hospital should identify and address any potential risks. Simultaneous usage of different imaging and less-invasive treatment technologies demands strong management control. Materials and Methods: We have formed the multidisciplinary expert panel (surgeons, anesthesiologists, radiologists, healthcare managers etc.) for hybrid theater management standard operational procedure development. On the first stage the general concept of hybrid room design and patient routing was developed. The second stage included the technical details discussion. For patient safety improvement we modified the Surgical Safety Check-list in accordance with potential MRI-related safety challenges and concerns. Results: WHO Surgical Safety Checklist is a simple and easy-to use tool which includes three blocks of question (grouped by the surgery process). We have developed two additional blocks of questions for the intraoperative magnetic resonance investigation. It is very important to have a special detailed routing with a strong control of ferromagnetic devices and anesthesiology care. Conclusion: High-energy MRI (1.5-3.0T) is characterized by potential influence on patient and staff safety in case of hybrid surgery. It is obvious to have a strong managerial control of ferromagnetic devices and anesthesiology care. Surgical Safety Checklist is the validated tool for improving patient safety. Modification and customization of this check-list potentially provides the opportunity for surgery processes improving.

Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

  • Borisov, Nikita;Klonowski, Marek;Kutylowski, Miroslaw;Lauks-Dutka, Anna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권3호
    • /
    • pp.380-399
    • /
    • 2010
  • In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the entire path is revealed. The ACNS 2008 proposal addressed this by using a more complicated key management scheme. The revised protocol is immune to detour attacks. We show, however, that the ModOnion construction is highly malleable and this property can be exploited in order to redirect ModOnions. Our attacks require detailed probing and are less efficient than the detour attack, but they can nevertheless recover the full onion path while avoiding detection and investigation. Motivated by this, we present modifications to the ModOnion protocol that dramatically reduce the malleability of the encryption primitive. It addresses the class of attacks we present and it makes other attacks difficult to formulate.

무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉(제1부) : 프로토콜 설계 (Concealing Communication Source and Destination in Wireless Sensor Networks(Part I) : Protocol Design)

  • 차영환
    • 한국전자통신학회논문지
    • /
    • 제8권2호
    • /
    • pp.219-226
    • /
    • 2013
  • 무선 센서 네트워크에 있어서 전역 도청에 대응하는 통신 근원지와 도착치의 위치기밀을 유지하기 위해서는 수많은 속임수용 더미 패킷들이 지속적으로 발행된다. 근원지나 도착지를 포함하는 특정 크기의 보호구역들을 설정한 후, 이 안의 노들들에 대해서만 데이터전송 중에 더미 패킷들을 생성하도록 제한하여 근원지와 도착지의 위치기밀성을 제공하면서도 패킷발생량을 줄이는 접근방안을 고려한다. 제안 프로토콜을 설계하고 형식화한 상세한 프로토콜 명세서를 제시한 후, 주요 특성과 정확성을 검증한다.

Spatiotemporal Routing Analysis for Emergency Response in Indoor Space

  • Lee, Jiyeong;Kwan, Mei-Po
    • 한국측량학회지
    • /
    • 제32권6호
    • /
    • pp.637-650
    • /
    • 2014
  • Geospatial research on emergency response in multi-level micro-spatial environments (e.g., multi-story buildings) that aims at understanding and analyzing human movements at the micro level has increased considerably since 9/11. Past research has shown that reducing the time rescuers needed to reach a disaster site within a building (e.g., a particular room) can have a significant impact on evacuation and rescue outcomes in this kind of disaster situations. With the purpose developing emergency response systems that are capable of using complex real-time geospatial information to generate fast-changing scenarios, this study develops a Spatiotemporal Optimal Route Algorithm (SORA) for guiding rescuers to move quickly from various entrances of a building to the disaster site (room) within the building. It identifies the optimal route and building evacuation bottlenecks within the network in real-time emergency situations. It is integrated with a Ubiquitous Sensor Network (USN) based tracking system in order to monitor dynamic geospatial entities, including the dynamic capacities and flow rates of hallways per time period. Because of the limited scope of this study, the simulated data were used to implement the SORA and evaluate its effectiveness for performing 3D topological analysis. The study shows that capabilities to take into account detailed dynamic geospatial data about emergency situations, including changes in evacuation status over time, are essential for emergency response systems.

선체 구조와의 연관성을 고려한 신속 배관 모델링 방법 (Rapid Pipe Modeling Method Considering the Relationship with a Hull Structure)

  • 노명일;최우영;이규열
    • 대한조선학회논문집
    • /
    • 제43권2호
    • /
    • pp.258-267
    • /
    • 2006
  • The present piping modeling method requires detailed inputs from a designer to generate a piping model, and thus it takes much time for the designer to perform such task. Moreover, the piping model has no relation with that of hull structure. Thus, it is time-consuming and requires much effort if design changes arise. In this study, a method that generates quickly many pipes using a pipe tray and a conversion method that converts automatically the pipes into objects related with the hull structure are proposed. A piping modeling system based on the proposed methods is developed. The applicability of the developed system is demonstrated by applying it to the generation of the piping model of a deadweight 300,000ton VLCC(Very Large Crude oil Carrier). The results show that the developed system can quickly generate the piping model in relation with the hull structure.

SUCV를 개선한 MIPv6 바인딩 갱신 프로토콜 (Improving SUCV Protocol for the Secure Binding Update in MIPv6)

  • 원유석;조경산
    • 정보처리학회논문지C
    • /
    • 제13C권3호
    • /
    • pp.267-274
    • /
    • 2006
  • MIPv6에서 경로 최적화를 제공하기 위한 바인딩 갱신은 다양한 공격에 취약할 수 있다. 따라서, 안전한 바인딩 갱신이 MIPv6의 중요한 연구 과제가 되었으며, 이를 위한 여러 프로토콜들이 제안되었다. 본 연구에서는 기존의 여러 바인딩 갱신 프로토콜들의 특성을 비교 분석하고, 그 중에서 보안성 및 성능에서 우수한 평가를 받는 SUCV 프로토콜에 대한 공격 취약점과 관리의 문제점을 제시하고, 이를 해결할 수 있는 개선된 바인딩 갱신 프로토콜을 제안한다. 또한, 상세한 분석을 통해 제안 프로토콜이 SUCV 프로토콜이 갖는 redirect 공격, DoS 공격 및 brute force 공격에 대한 취약성과 관리적 문제점을 개선하고 MN의 연산 부하를 감소시킴을 제시한다.

An Energy Efficient Localized Topology Control Algorithm for Wireless Multihop Networks

  • Shang, Dezhong;Zhang, Baoxian;Yao, Zheng;Li, Cheng
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.371-377
    • /
    • 2014
  • Localized topology control is attractive for obtaining reduced network graphs with desirable features such as sparser connectivity and reduced transmit powers. In this paper, we focus on studying how to prolong network lifetime in the context of localized topology control for wireless multi-hop networks. For this purpose, we propose an energy efficient localized topology control algorithm. In our algorithm, each node is required to maintain its one-hop neighborhood topology. In order to achieve long network lifetime, we introduce a new metric for characterizing the energy criticality status of each link in the network. Each node independently builds a local energy-efficient spanning tree for finding a reduced neighbor set while maximally avoiding using energy-critical links in its neighborhood for the local spanning tree construction. We present the detailed design description of our algorithm. The computational complexity of the proposed algorithm is deduced to be O(mlog n), where m and n represent the number of links and nodes in a node's one-hop neighborhood, respectively. Simulation results show that our algorithm significantly outperforms existing work in terms of network lifetime.

A Fast and Scalable Inter-Domain MPLS Protection Mechanism

  • Huang, Chang-Cheng;Messier, Donald
    • Journal of Communications and Networks
    • /
    • 제6권1호
    • /
    • pp.60-67
    • /
    • 2004
  • With the fast growth of Internet and a new widespread interest in optical networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. It is widely accepted that layer three protection and recovery mechanisms are too slow for today’s reliability requirements. Failure recovery latencies ranging from several seconds to minutes, for layer three routing protocols, have been widely reported. For this reason, a recovery mechanism at the MPLS layer capable of recovering from failed paths in 10’s of milliseconds has been sought. In light of this, several MPLS based protection mechanisms have been proposed, such as end-to-end path protection and local repair mechanism. Those mechanisms are designed for intra-domain recoveries and little or no attention has been given to the case of non-homogenous independent inter-domains. This paper presents a novel solution for the setup and maintenance of independent protection mechanisms within individual domains and merged at the domain boundaries. This innovative solution offers significant advantages including fast recovery across multiple nonhomogeneous domains and high scalability. Detailed setup and operation procedures are described. Finally, simulation results using OPNET are presented showing recovery times of a few milliseconds.

치수/공차표의 자동생성 알고리듬 (An Algorithm for Automatic Generation of Dimension and Tolerance Charts)

  • 정종인;김광수;최후곤
    • 대한산업공학회지
    • /
    • 제29권1호
    • /
    • pp.21-31
    • /
    • 2003
  • Determination of operational dimensions and tolerances is complex if there exist inconsistencies between operational and design specifications. Dimension and tolerance charts (D&T charts) have been used to establish the relationships among operational dimensions in complex machining. This chart proves that individual operations can be harmonized when they are interconnected. However, it is hard to generate the chart manually. Because operational dimensions and tolerances must meet the design specifications, the dimensions and tolerances of interconnected operations have to be verified serially for economical operations. In this paper, the chart is automatically generated from the interconnected operations. More importantly, all operational dimensions and tolerances displayed in the chart have been verified by using LP to meet the design specifications. Finally, the chart is converted to an operational routing sheet that contains a detailed process plan along with cutting speed, feed rate, and operational references based on material hardness, surface finish, and tool nose radius.