• 제목/요약/키워드: network performance and reliability

Search Result 579, Processing Time 0.029 seconds

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

A Study of Collision Avoidance Algorithm Based on Multi-Beacon in the Vehicular Ad-hoc Network (VANET 환경에서 멀티 비콘을 적용한 충돌 회피 알고리즘에 관한 연구)

  • Kim, Jae-Wan;Eom, Doo-Seop
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.195-213
    • /
    • 2012
  • In ubiquitous environments, the Intelligent Transportation System (ITS) protocol is a typical service used to improve the quality of life for humans. The Vehicular Ad-hoc Network (VANET) protocol, a part of ITS, needs further study with regards to its support for high reliability, high speed mobility, data transmission efficiency, and so on. The IEEE 802.11 standard provides a high data rate channel, but it was designed for peer-to-peer network protocols. IEEE 802.11p also provides a high data rate channel, however, it only facilitates communication between roadside and on-board equipment. A VANET has characteristics that enable its topology to change rapidly; it can also be expanded to a multi-hop range network during communication. Therefore, the VANET protocol needs a way to infer the current topology information relating to VANET equipped vehicles. In this paper, we present the Multi-Beacon MAC Protocol, and propose a method to resolve the problem of beacon collisions in VANET through the use of this Multi-Beacon MAC protocol. Evaluation of the performance of Multi-Beacon MAC protocol by means of both mathematical analyses and simulation experiments indicate that the proposed method can effectively reduce beacon collisions and improve the throughput and the delay between vehicles in VANET systems.

Analysis on Radio Communication Characteristics of LTE Railway Network (철도통합무선망(LTE-R)의 무선통신특성 분석)

  • Yoon, Byungsik;Lee, Sook-Jin;Kim, Dong Joon;Sung, Dong Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.1-8
    • /
    • 2020
  • The Ministry of Land, Infrastructure and Transport of Korea has been trying to spread integrated railway communication network technologies based on a major railway policy since 2012. As a result, the world's first commercial Long-Term Evolution - Railway (LTE-R) network was established on the Gangneung line (Manjong station - Gangneung station) and has been commercially operating as a railway communication system since 2017. Special function and performance requirements are needed for safe and efficient railway operations, such as group calls, emergency calls, functional addressing, and train control based on wireless communications. In this paper, we present functional and performance railway communications requirements that are based on European wireless railway communications systems. In addition, we measured communications characteristics and performance using a KTX field test on the Gangneung line to analyze the validity and reliability of the LTE-R network. Although the average Radio Frequency (RF) conditions were satisfied in the requirements, we found sudden communications quality degradation, such as Radio Link Failure (RLF) in some railway sections. We propose a way to improve performance and network installations based on in-depth analysis of LTE-R communications field-test results.

Sensor Fusion System for Improving the Recognition Performance of 3D Object (3차원 물체의 인식 성능 향상을 위한 감각 융합 시스템)

  • Kim, Ji-Kyoung;Oh, Yeong-Jae;Chong, Kab-Sung;Wee, Jae-Woo;Lee, Chong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.107-109
    • /
    • 2004
  • In this paper, authors propose the sensor fusion system that can recognize multiple 3D objects from 2D projection images and tactile information. The proposed system focuses on improving recognition performance of 3D object. Unlike the conventional object recognition system that uses image sensor alone, the proposed method uses tactual sensors in addition to visual sensor. Neural network is used to fuse these informations. Tactual signals are obtained from the reaction force by the pressure sensors at the fingertips when unknown objects are grasped by four-fingered robot hand. The experiment evaluates the recognition rate and the number of teaming iterations of various objects. The merits of the proposed systems are not only the high performance of the learning ability but also the reliability of the system with tactual information for recognizing various objects even though visual information has a defect. The experimental results show that the proposed system can improve recognition rate and reduce learning time. These results verify the effectiveness of the proposed sensor fusion system as recognition scheme of 3D object.

  • PDF

Developing a New Risk Assessment Methodology for Distribution System Operators Regulated by Quality Regulation Considering Reclosing Time

  • Saboorideilami, S.;Abdi, Hamdi
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.4
    • /
    • pp.1154-1162
    • /
    • 2014
  • In the restructured electricity market, Performance-Based Regulation (PBR) regime has been introduced to the distribution network. To ensure the network stability, this regime is used along with quality regulations. Quality regulation impose new financial risks on distribution system operators (DSOs). The poor quality of the network will result in reduced revenues for DSOs. The mentioned financial risks depend on the quality indices of the system. Based on annual variation of these indices, the cost of quality regulation will also vary. In this paper with regard to reclosing fault in distribution network, we develop a risk-based method to assess the financial risks caused by quality regulation for DSOs. Furthermore, in order to take the stochastic behavior of the distribution network and quality indices variations into account, time-sequential Monte Carlo simulation method is used. Using the proposed risk method, the effect of taking reclosing time into account will be examined on system quality indicators and the cost of quality regulation in Swedish rural reliability test system (SRRTS). The results show that taking reclosing fault into consideration, affects the system quality indicators, particularly annual average interruption frequency index of the system (SAIFI). Moreover taking reclosing fault into consideration also affects the quality regulations cost. Therefore, considering reclosing time provides a more realistic viewpoint about the financial risks arising from quality regulation for DSOs.

A Study for Algorithm of Safe Transmission in Distributed Network (분산 네트워크에서 안전한 전송을 위한 알고리즘에 관한 연구)

  • Kim, Tae-Kyung;Seo, Hee-Suk;Lee, Dong-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.35-40
    • /
    • 2009
  • The reliability of processing the distributed application becomes more and more important issues in distributed network as the usage of distributed network increases. Because the distributed network applications are processed in the available resources of Internet. It is important factors that the user can efficiently access the available resources and processed results can be delivered to the user of job request. Therefore in this paper, we suggested the survivability factor for sending data safely whether it can be efficiently accessed between the user and available resource which processes the distributed application. And evaluated the performance of the suggested factor using the data transmission time. Also we suggested the transmission algorithm for safe transmission using the survivability factor.

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (MOS(Mean Opinion Score)를 이용한 네트워크 보안 QoS(Quality of Service) 평가체계)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • Network security performance evaluation is a complex and diverse system environments, a single, specific performance measurements alone performance evaluation measure itself and the meaning of the reliability of the evaluation results do not limit the number of days only. In this paper, we propose a method to measure the security features of security, QoS measurement techniques using MOS satisfaction. MOS(Mean Opinion Score) Rating specifications for network security, QoS satisfaction and how to operate the development and operational model for future customer's satisfaction for information systems that can be used to evaluate the QoS measurement/analysis be utilized in the field. Objectified in the form of standards and performance measurement system provider (supplier development) and consumers(users) all the results available so that how to develop a system. Development is the development of information security features, the performance of these two features networking capabilities and a comprehensive evaluation of a three-gaeyoungyeok Correlating performance measurement methodology. Systematic measurement environment designed using the proposed methodology of this study, when the operating system is on the satisfaction of the security, QoS can be calculated. Forward In addition, a variety of performance metrics and performance measurement methods by extending the network security system satisfaction rating upgrade by the way will be.

Fault Location Algorithm in a Two-ended Sources Transmission Line (양전원 송전선로의 고장점 표정 알고리즘)

  • Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.18-24
    • /
    • 2016
  • In order to service restoration and enhance power system reliability, a number of impedance based fault location algorithms have been developed for fault locating in a transmission line. This paper presents an advanced impedance-based fault location algorithms in a two-ended sources transmission line to reduce the DC offset error effects. This fault location algorithm uses of the GPS time synchronized voltage and current signals from the local and remote terminal. The algorithm uses an advanced DC offset removal filter. A series of test results using ATPdraw simulation data show the performance effectiveness of the proposed algorithm. The proposed algorithm is valid for a two-end sources transmission network.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

Development of Prediction Model for Greenhouse Control based on Machine Learning (머신러닝 기반의 온실 제어를 위한 예측모델 개발)

  • Kim, Sang Yeob;Park, Kyoung Sub;Lee, Sang Min;Heo, Byeong Mun;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.749-756
    • /
    • 2018
  • In this study, we developed a prediction model for greenhouse control using machine learning technique. The prediction model was developed using measured data (2016) on greenhouse in the Protected Horticulture Research Institute. In order to improve the predictive performance of model and to ensure the reliability of data, the dimension of the data was reduced by correlation analysis. The dataset were divided into spring, summer, autumn, and winter considering the seasonal characteristics. An artificial neural network, recurrent neural network, and multiple regression model were constructed as a machine leaning based prediction model and evaluated by comparative analysis with real dataset. As a result, ANN showed good performance in selected dataset, while MRM showed good performance in full dataset.